From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id C6263C433FE for ; Mon, 14 Feb 2022 15:46:36 +0000 (UTC) Received: from localhost ([::1]:48172 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nJdYh-0005wN-Mm for qemu-devel@archiver.kernel.org; Mon, 14 Feb 2022 10:46:35 -0500 Received: from eggs.gnu.org ([209.51.188.92]:47620) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nJdWJ-00031H-PR for qemu-devel@nongnu.org; Mon, 14 Feb 2022 10:44:08 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]:27143) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nJdWC-0006yw-LD for qemu-devel@nongnu.org; Mon, 14 Feb 2022 10:44:05 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1644853433; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=p/pWqSYrFnbdgoYRmzb/cyWNWM9OAKs1hpNENREmDcI=; b=Z2kRhSPCsWWdNirL8MG3wyhRrml1AM0IbTl8TR03IBLWFfxSZ1s6wZsgXgRB9wWZbPknTB wTWXVelXl434YnVyxz+RL1rch9nWRtefXnAi2wU9STifcvLNSliiR2NWtfGwoIv5+OEhRN c/meCgia4X5Cz9+PoyXjsCKx7hNzY1Q= Received: from mail-oo1-f70.google.com (mail-oo1-f70.google.com [209.85.161.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-453-lWuSn5KSMf2fqftijs8WIg-1; Mon, 14 Feb 2022 10:43:51 -0500 X-MC-Unique: lWuSn5KSMf2fqftijs8WIg-1 Received: by mail-oo1-f70.google.com with SMTP id n8-20020a4abd08000000b002eabaaab571so10816326oop.11 for ; Mon, 14 Feb 2022 07:43:51 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=p/pWqSYrFnbdgoYRmzb/cyWNWM9OAKs1hpNENREmDcI=; b=nto7h9E4kZRpdz2/DzUORBL0d3iVpGrqLUCCNRzwcp+3dEOUVIlAg8cS4Rhq1kXZ1d g2ZSrdUNKeZ9E61Wwdy35vqKM2hZWyiFHTQeCji+5C+Eds0kVrwkEttgZEqEPMktiBbL RBtaw5sZOJw/I9iZAJBmprbdARp3e3OFOup8sjykfdBp2Y27mp34/19x5FuBERhhQPHN xO0Q9Pp/v3m7/uE55VBKkc5JO1gIdZ+FLtA5cQf+GutXwo52oHuXz8aK7IGrTf3rRrZ5 YzI2tgnVWyzTrIezlCCmcbaBvbPZrMvFyFsDbENCoIJaqCoLLiiv2bIeECJQh0SvDl68 AGsw== X-Gm-Message-State: AOAM532RzCOKoKcaxGM3FblWgfcRtGpv86MsIkBw4AxKgrRcy5dgyoLe jXMCiEvX+74kaRNvyYOIdi2fuOzpoWZJP6tsOT5feTvqurQ3Yko7ZsniZPJ3qJpvNZHGO4Lg39m rR/r4xV51Han5p3az5B7SGlC1c9jyDVo= X-Received: by 2002:a05:6830:12c1:: with SMTP id a1mr135036otq.374.1644853431220; Mon, 14 Feb 2022 07:43:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJwGxqNMpwzFuFCIa4KCD4PZ9ZJnbbf4BxL8hkSLmxX9TArZAp71hlDRfYpXhbX9wfQI0JTbLI51gRGFZWIFCY4= X-Received: by 2002:a05:6830:12c1:: with SMTP id a1mr135027otq.374.1644853430964; Mon, 14 Feb 2022 07:43:50 -0800 (PST) MIME-Version: 1.0 References: <20220214135820.43897-1-groug@kaod.org> <20220214135820.43897-2-groug@kaod.org> In-Reply-To: <20220214135820.43897-2-groug@kaod.org> From: German Maglione Date: Mon, 14 Feb 2022 16:43:15 +0100 Message-ID: Subject: Re: [Virtio-fs] [PATCH v5 1/3] virtiofsd: Add support for FUSE_SYNCFS request with announce_submounts To: Greg Kurz Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=gmaglion@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: multipart/alternative; boundary="00000000000075e33405d7fc48c8" Received-SPF: pass client-ip=170.10.129.124; envelope-from=gmaglion@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -28 X-Spam_score: -2.9 X-Spam_bar: -- X-Spam_report: (-2.9 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.083, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: virtio-fs-list , qemu-devel@nongnu.org, Vivek Goyal Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" --00000000000075e33405d7fc48c8 Content-Type: text/plain; charset="UTF-8" On Mon, Feb 14, 2022 at 3:00 PM Greg Kurz wrote: > Honor the expected behavior of syncfs() to synchronously flush all data > and metadata to disk on linux systems. > > If virtiofsd is started with '-o announce_submounts', the client is > expected to send a FUSE_SYNCFS request for each individual submount. > In this case, we just create a new file descriptor on the submount > inode with lo_inode_open(), call syncfs() on it and close it. The > intermediary file is needed because O_PATH descriptors aren't > backed by an actual file and syncfs() would fail with EBADF. > > If virtiofsd is started without '-o announce_submounts' or if the > client doesn't have the FUSE_CAP_SUBMOUNTS capability, the client > only sends a single FUSE_SYNCFS request for the root inode. The > server would thus need to track submounts internally and call > syncfs() on each of them. This will be implemented later. > > Note that syncfs() might suffer from a time penalty if the submounts > are being hammered by some unrelated workload on the host. The only > solution to prevent that is to avoid shared mounts. > > Signed-off-by: Greg Kurz > --- > tools/virtiofsd/fuse_lowlevel.c | 11 +++++++ > tools/virtiofsd/fuse_lowlevel.h | 13 ++++++++ > tools/virtiofsd/passthrough_ll.c | 45 +++++++++++++++++++++++++++ > tools/virtiofsd/passthrough_seccomp.c | 1 + > 4 files changed, 70 insertions(+) > > diff --git a/tools/virtiofsd/fuse_lowlevel.c > b/tools/virtiofsd/fuse_lowlevel.c > index e4679c73abc2..e02d8b25a5f6 100644 > --- a/tools/virtiofsd/fuse_lowlevel.c > +++ b/tools/virtiofsd/fuse_lowlevel.c > @@ -1876,6 +1876,16 @@ static void do_lseek(fuse_req_t req, fuse_ino_t > nodeid, > } > } > > +static void do_syncfs(fuse_req_t req, fuse_ino_t nodeid, > + struct fuse_mbuf_iter *iter) > +{ > + if (req->se->op.syncfs) { > + req->se->op.syncfs(req, nodeid); > + } else { > + fuse_reply_err(req, ENOSYS); > + } > +} > + > static void do_init(fuse_req_t req, fuse_ino_t nodeid, > struct fuse_mbuf_iter *iter) > { > @@ -2280,6 +2290,7 @@ static struct { > [FUSE_RENAME2] = { do_rename2, "RENAME2" }, > [FUSE_COPY_FILE_RANGE] = { do_copy_file_range, "COPY_FILE_RANGE" }, > [FUSE_LSEEK] = { do_lseek, "LSEEK" }, > + [FUSE_SYNCFS] = { do_syncfs, "SYNCFS" }, > }; > > #define FUSE_MAXOP (sizeof(fuse_ll_ops) / sizeof(fuse_ll_ops[0])) > diff --git a/tools/virtiofsd/fuse_lowlevel.h > b/tools/virtiofsd/fuse_lowlevel.h > index c55c0ca2fc1c..b889dae4de0e 100644 > --- a/tools/virtiofsd/fuse_lowlevel.h > +++ b/tools/virtiofsd/fuse_lowlevel.h > @@ -1226,6 +1226,19 @@ struct fuse_lowlevel_ops { > */ > void (*lseek)(fuse_req_t req, fuse_ino_t ino, off_t off, int whence, > struct fuse_file_info *fi); > + > + /** > + * Synchronize file system content > + * > + * If this request is answered with an error code of ENOSYS, > + * this is treated as success and future calls to syncfs() will > + * succeed automatically without being sent to the filesystem > + * process. > + * > + * @param req request handle > + * @param ino the inode number > + */ > + void (*syncfs)(fuse_req_t req, fuse_ino_t ino); > }; > > /** > diff --git a/tools/virtiofsd/passthrough_ll.c > b/tools/virtiofsd/passthrough_ll.c > index b3d0674f6d2f..2bf5d40df531 100644 > --- a/tools/virtiofsd/passthrough_ll.c > +++ b/tools/virtiofsd/passthrough_ll.c > @@ -3357,6 +3357,50 @@ static void lo_lseek(fuse_req_t req, fuse_ino_t > ino, off_t off, int whence, > } > } > > +static int lo_do_syncfs(struct lo_data *lo, struct lo_inode *inode) > +{ > + int fd, ret = 0; > + > + fuse_log(FUSE_LOG_DEBUG, "lo_do_syncfs(ino=%" PRIu64 ")\n", > + inode->fuse_ino); > + > + fd = lo_inode_open(lo, inode, O_RDONLY); > + if (fd < 0) { > + return -fd; > + } > + > + if (syncfs(fd) < 0) { > + ret = errno; > + } > + > + close(fd); > + return ret; > +} > + > +static void lo_syncfs(fuse_req_t req, fuse_ino_t ino) > +{ > + struct lo_data *lo = lo_data(req); > + int err; > + > + if (lo->announce_submounts) { > + struct lo_inode *inode; > + > + inode = lo_inode(req, ino); > + if (!inode) { > + fuse_reply_err(req, EBADF); > + return; > + } > + > + err = lo_do_syncfs(lo, inode); > + lo_inode_put(lo, &inode); > + } else { > + /* Requires the sever to track submounts. Not implemented yet */ > + err = ENOSYS; > + } > In the current rust version we don't check if announce_submount is enabled, with and without it lo_syncfs do the same thing. So, if announce_submount is not enabled, at least the root shared dir get synced. > + > + fuse_reply_err(req, err); > +} > + > static void lo_destroy(void *userdata) > { > struct lo_data *lo = (struct lo_data *)userdata; > @@ -3417,6 +3461,7 @@ static struct fuse_lowlevel_ops lo_oper = { > .copy_file_range = lo_copy_file_range, > #endif > .lseek = lo_lseek, > + .syncfs = lo_syncfs, > .destroy = lo_destroy, > }; > > diff --git a/tools/virtiofsd/passthrough_seccomp.c > b/tools/virtiofsd/passthrough_seccomp.c > index a3ce9f898d2d..3e9d6181dc69 100644 > --- a/tools/virtiofsd/passthrough_seccomp.c > +++ b/tools/virtiofsd/passthrough_seccomp.c > @@ -108,6 +108,7 @@ static const int syscall_allowlist[] = { > SCMP_SYS(set_robust_list), > SCMP_SYS(setxattr), > SCMP_SYS(symlinkat), > + SCMP_SYS(syncfs), > SCMP_SYS(time), /* Rarely needed, except on static builds */ > SCMP_SYS(tgkill), > SCMP_SYS(unlinkat), > -- > 2.34.1 > > _______________________________________________ > Virtio-fs mailing list > Virtio-fs@redhat.com > https://listman.redhat.com/mailman/listinfo/virtio-fs > > -- German --00000000000075e33405d7fc48c8 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


=
On Mon, Feb 14, 2022 at 3:00 PM Greg = Kurz <groug@kaod.org> wrote:
Honor the expected= behavior of syncfs() to synchronously flush all data
and metadata to disk on linux systems.

If virtiofsd is started with '-o announce_submounts', the client is=
expected to send a FUSE_SYNCFS request for each individual submount.
In this case, we just create a new file descriptor on the submount
inode with lo_inode_open(), call syncfs() on it and close it. The
intermediary file is needed because O_PATH descriptors aren't
backed by an actual file and syncfs() would fail with EBADF.

If virtiofsd is started without '-o announce_submounts' or if the client doesn't have the FUSE_CAP_SUBMOUNTS capability, the client
only sends a single FUSE_SYNCFS request for the root inode. The
server would thus need to track submounts internally and call
syncfs() on each of them. This will be implemented later.

Note that syncfs() might suffer from a time penalty if the submounts
are being hammered by some unrelated workload on the host. The only
solution to prevent that is to avoid shared mounts.

Signed-off-by: Greg Kurz <groug@kaod.org>
---
=C2=A0tools/virtiofsd/fuse_lowlevel.c=C2=A0 =C2=A0 =C2=A0 =C2=A0| 11 ++++++= +
=C2=A0tools/virtiofsd/fuse_lowlevel.h=C2=A0 =C2=A0 =C2=A0 =C2=A0| 13 ++++++= ++
=C2=A0tools/virtiofsd/passthrough_ll.c=C2=A0 =C2=A0 =C2=A0 | 45 +++++++++++= ++++++++++++++++
=C2=A0tools/virtiofsd/passthrough_seccomp.c |=C2=A0 1 +
=C2=A04 files changed, 70 insertions(+)

diff --git a/tools/virtiofsd/fuse_lowlevel.c b/tools/virtiofsd/fuse_lowleve= l.c
index e4679c73abc2..e02d8b25a5f6 100644
--- a/tools/virtiofsd/fuse_lowlevel.c
+++ b/tools/virtiofsd/fuse_lowlevel.c
@@ -1876,6 +1876,16 @@ static void do_lseek(fuse_req_t req, fuse_ino_t node= id,
=C2=A0 =C2=A0 =C2=A0}
=C2=A0}

+static void do_syncfs(fuse_req_t req, fuse_ino_t nodeid,
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 struct fuse_mbuf_iter *iter)
+{
+=C2=A0 =C2=A0 if (req->se->op.syncfs) {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 req->se->op.syncfs(req, nodeid);
+=C2=A0 =C2=A0 } else {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 fuse_reply_err(req, ENOSYS);
+=C2=A0 =C2=A0 }
+}
+
=C2=A0static void do_init(fuse_req_t req, fuse_ino_t nodeid,
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0struct fuse_mbuf_iter *iter)
=C2=A0{
@@ -2280,6 +2290,7 @@ static struct {
=C2=A0 =C2=A0 =C2=A0[FUSE_RENAME2] =3D { do_rename2, "RENAME2" },=
=C2=A0 =C2=A0 =C2=A0[FUSE_COPY_FILE_RANGE] =3D { do_copy_file_range, "= COPY_FILE_RANGE" },
=C2=A0 =C2=A0 =C2=A0[FUSE_LSEEK] =3D { do_lseek, "LSEEK" },
+=C2=A0 =C2=A0 [FUSE_SYNCFS] =3D { do_syncfs, "SYNCFS" },
=C2=A0};

=C2=A0#define FUSE_MAXOP (sizeof(fuse_ll_ops) / sizeof(fuse_ll_ops[0]))
diff --git a/tools/virtiofsd/fuse_lowlevel.h b/tools/virtiofsd/fuse_lowleve= l.h
index c55c0ca2fc1c..b889dae4de0e 100644
--- a/tools/virtiofsd/fuse_lowlevel.h
+++ b/tools/virtiofsd/fuse_lowlevel.h
@@ -1226,6 +1226,19 @@ struct fuse_lowlevel_ops {
=C2=A0 =C2=A0 =C2=A0 */
=C2=A0 =C2=A0 =C2=A0void (*lseek)(fuse_req_t req, fuse_ino_t ino, off_t off= , int whence,
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0struct= fuse_file_info *fi);
+
+=C2=A0 =C2=A0 /**
+=C2=A0 =C2=A0 =C2=A0* Synchronize file system content
+=C2=A0 =C2=A0 =C2=A0*
+=C2=A0 =C2=A0 =C2=A0* If this request is answered with an error code of EN= OSYS,
+=C2=A0 =C2=A0 =C2=A0* this is treated as success and future calls to syncf= s() will
+=C2=A0 =C2=A0 =C2=A0* succeed automatically without being sent to the file= system
+=C2=A0 =C2=A0 =C2=A0* process.
+=C2=A0 =C2=A0 =C2=A0*
+=C2=A0 =C2=A0 =C2=A0* @param req request handle
+=C2=A0 =C2=A0 =C2=A0* @param ino the inode number
+=C2=A0 =C2=A0 =C2=A0*/
+=C2=A0 =C2=A0 void (*syncfs)(fuse_req_t req, fuse_ino_t ino);
=C2=A0};

=C2=A0/**
diff --git a/tools/virtiofsd/passthrough_ll.c b/tools/virtiofsd/passthrough= _ll.c
index b3d0674f6d2f..2bf5d40df531 100644
--- a/tools/virtiofsd/passthrough_ll.c
+++ b/tools/virtiofsd/passthrough_ll.c
@@ -3357,6 +3357,50 @@ static void lo_lseek(fuse_req_t req, fuse_ino_t ino,= off_t off, int whence,
=C2=A0 =C2=A0 =C2=A0}
=C2=A0}

+static int lo_do_syncfs(struct lo_data *lo, struct lo_inode *inode)
+{
+=C2=A0 =C2=A0 int fd, ret =3D 0;
+
+=C2=A0 =C2=A0 fuse_log(FUSE_LOG_DEBUG, "lo_do_syncfs(ino=3D%" PR= Iu64 ")\n",
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0inode->fuse_ino);
+
+=C2=A0 =C2=A0 fd =3D lo_inode_open(lo, inode, O_RDONLY);
+=C2=A0 =C2=A0 if (fd < 0) {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 return -fd;
+=C2=A0 =C2=A0 }
+
+=C2=A0 =C2=A0 if (syncfs(fd) < 0) {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 ret =3D errno;
+=C2=A0 =C2=A0 }
+
+=C2=A0 =C2=A0 close(fd);
+=C2=A0 =C2=A0 return ret;
+}
+
+static void lo_syncfs(fuse_req_t req, fuse_ino_t ino)
+{
+=C2=A0 =C2=A0 struct lo_data *lo =3D lo_data(req);
+=C2=A0 =C2=A0 int err;
+
+=C2=A0 =C2=A0 if (lo->announce_submounts) {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 struct lo_inode *inode;
+
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 inode =3D lo_inode(req, ino);
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 if (!inode) {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 fuse_reply_err(req, EBADF);
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 return;
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 }
+
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 err =3D lo_do_syncfs(lo, inode);
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 lo_inode_put(lo, &inode);
+=C2=A0 =C2=A0 } else {
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 /* Requires the sever to track submounts. Not = implemented yet */
+=C2=A0 =C2=A0 =C2=A0 =C2=A0 err =3D ENOSYS;
+=C2=A0 =C2=A0 }

In the current rust ve= rsion we don't check if announce_submount is enabled,
with an= d without it lo_syncfs do the same thing. So, if announce_submount
is not enabled, at least the root shared dir get synced.
=C2=A0
+
+=C2=A0 =C2=A0 fuse_reply_err(req, err);
+}
+
=C2=A0static void lo_destroy(void *userdata)
=C2=A0{
=C2=A0 =C2=A0 =C2=A0struct lo_data *lo =3D (struct lo_data *)userdata;
@@ -3417,6 +3461,7 @@ static struct fuse_lowlevel_ops lo_oper =3D {
=C2=A0 =C2=A0 =C2=A0.copy_file_range =3D lo_copy_file_range,
=C2=A0#endif
=C2=A0 =C2=A0 =C2=A0.lseek =3D lo_lseek,
+=C2=A0 =C2=A0 .syncfs =3D lo_syncfs,
=C2=A0 =C2=A0 =C2=A0.destroy =3D lo_destroy,
=C2=A0};

diff --git a/tools/virtiofsd/passthrough_seccomp.c b/tools/virtiofsd/passth= rough_seccomp.c
index a3ce9f898d2d..3e9d6181dc69 100644
--- a/tools/virtiofsd/passthrough_seccomp.c
+++ b/tools/virtiofsd/passthrough_seccomp.c
@@ -108,6 +108,7 @@ static const int syscall_allowlist[] =3D {
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(set_robust_list),
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(setxattr),
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(symlinkat),
+=C2=A0 =C2=A0 SCMP_SYS(syncfs),
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(time), /* Rarely needed, except on static buil= ds */
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(tgkill),
=C2=A0 =C2=A0 =C2=A0SCMP_SYS(unlinkat),
--
2.34.1

_______________________________________________
Virtio-fs mailing list
Virtio-fs@redhat.= com
https://listman.redhat.com/mailman/listinfo/vir= tio-fs



--
German
--00000000000075e33405d7fc48c8--