Message ID | 20220408171013.912436-1-bmeng.cn@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | 9pfs: Add 9pfs support for Windows host | expand |
On Freitag, 8. April 2022 19:10:09 CEST Bin Meng wrote: > At present there is no Windows support for 9p file system. > This series adds initial Windows support for 9p file system. Nice! > Only 'local' file system driver backend is supported. security_model > should be 'none' due to limitations on Windows host. We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, it is in bad shape and we will probably deprecate it in near future anyway. But it would be good to have support for the synth driver, because we are using it for running test cases and fuzzing tests (QA). What are the limitations against security_model=mapped on Windows? Keep in mind that with security_model=none you are very limited in what you can do with 9p. > Example command line to test: > > "-fsdev local,path=c:\msys64,security_model=none,id=p9 -device > virtio-9p-pci,fsdev=p9,mount_tag=p9fs" > > > Guohuai Shi (4): > fsdev: Add missing definitions for Windows in file-op-9p.h > hw/9pfs: Update 'local' file system backend driver to support Windows > fsdev: Enable 'local' file system driver backend for Windows > meson.build: Turn on virtfs for Windows host > > meson.build | 10 +- > fsdev/file-op-9p.h | 33 ++++++ > hw/9pfs/9p-util.h | 4 + > hw/9pfs/9p.h | 22 ++++ > fsdev/qemu-fsdev.c | 2 + > hw/9pfs/9p-local.c | 273 +++++++++++++++++++++++++++++++++++++++++++- > hw/9pfs/9p.c | 85 +++++++++++++- > hw/9pfs/codir.c | 17 +++ > fsdev/meson.build | 1 + > hw/9pfs/meson.build | 10 +- > 10 files changed, 449 insertions(+), 8 deletions(-)
+Guohuai On Tue, Apr 12, 2022 at 8:27 PM Christian Schoenebeck <qemu_oss@crudebyte.com> wrote: > > On Freitag, 8. April 2022 19:10:09 CEST Bin Meng wrote: > > At present there is no Windows support for 9p file system. > > This series adds initial Windows support for 9p file system. > > Nice! > > > Only 'local' file system driver backend is supported. security_model > > should be 'none' due to limitations on Windows host. > > We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, it is in > bad shape and we will probably deprecate it in near future anyway. But it > would be good to have support for the synth driver, because we are using it > for running test cases and fuzzing tests (QA). > > What are the limitations against security_model=mapped on Windows? Keep in > mind that with security_model=none you are very limited in what you can do > with 9p. > Regards, Bin
> We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, it is in > bad shape and we will probably deprecate it in near future anyway. But it > would be good to have support for the synth driver, because we are using it > for running test cases and fuzzing tests (QA). synth driver can not be built on Windows platform (or cross build on Linux). So the test cases can not work on Windows. > What are the limitations against security_model=mapped on Windows? Keep in > mind that with security_model=none you are very limited in what you can do > with 9p. MSYS library does not support extend attribute (e.g. getxattr), And does not support POSIX permission APIs (e.g. chmod, chown). Security model is useless on Windows host. It is possible that to "map" extend attribute to NTFS stream data. However, if Windows host media is not NTFS (e.g. FAT) which does not support stream data, then the "map" can not work. Thanks Guohuai -----Original Message----- From: Bin Meng <bmeng.cn@gmail.com> Sent: 2022年4月13日 11:19 To: Christian Schoenebeck <qemu_oss@crudebyte.com>; Shi, Guohuai <Guohuai.Shi@windriver.com> Cc: qemu-devel@nongnu.org Developers <qemu-devel@nongnu.org>; Greg Kurz <groug@kaod.org> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host [Please note: This e-mail is from an EXTERNAL e-mail address] +Guohuai On Tue, Apr 12, 2022 at 8:27 PM Christian Schoenebeck <qemu_oss@crudebyte.com> wrote: > > On Freitag, 8. April 2022 19:10:09 CEST Bin Meng wrote: > > At present there is no Windows support for 9p file system. > > This series adds initial Windows support for 9p file system. > > Nice! > > > Only 'local' file system driver backend is supported. security_model > > should be 'none' due to limitations on Windows host. > > We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, > it is in bad shape and we will probably deprecate it in near future > anyway. But it would be good to have support for the synth driver, > because we are using it for running test cases and fuzzing tests (QA). > > What are the limitations against security_model=mapped on Windows? > Keep in mind that with security_model=none you are very limited in > what you can do with 9p. > Regards, Bin
On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: > > We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, it is > > in bad shape and we will probably deprecate it in near future anyway. > > But it would be good to have support for the synth driver, because we are > > using it for running test cases and fuzzing tests (QA). > > synth driver can not be built on Windows platform (or cross build on > Linux). So the test cases can not work on Windows. Could you please be more specific what kind of challenge you see for making the synth driver working on Windows? The synth driver is just a simple mockup driver [1] that simulates in-RAM-only a filesystem with a bunch of hard coded dirs and files, solely for the purpose to run test cases. So the synth driver does not interact with any real filesystem on host at all. My expectation therefore would be that it just needs to tweak some header includes and maybe declaring missing POSIX data types, which you have done for the local driver already anyway. BTW support for macOS hosts has just been recently added for 9p, I know it is different as its a POSIX OS, but maybe you might still find the diff [2] helpful. [1] https://wiki.qemu.org/Documentation/9p#9p_Filesystem_Drivers [2] https://gitlab.com/qemu-project/qemu/-/commit/f45cc81911adc772 > > What are the limitations against security_model=mapped on Windows? Keep in > > mind that with security_model=none you are very limited in what you can > > do with 9p. > > MSYS library does not support extend attribute (e.g. getxattr), > And does not support POSIX permission APIs (e.g. chmod, chown). > Security model is useless on Windows host. That would be security_model=passthrough, yes, that's not possible with msys. The recommended way in practice though is using security_model=mapped [3] for all systems, which should be possible to achieve with msys as well ... [3] https://wiki.qemu.org/Documentation/9psetup#Starting_the_Guest_directly > It is possible that to "map" extend attribute to NTFS stream data. > However, if Windows host media is not NTFS (e.g. FAT) which does not support > stream data, then the "map" can not work. ... yes exactly, it would make sense to use ADS [4] instead of xattr on Windows. ADS are available with NTFS and ReFS and maybe also with exFAT nowadays (?), not sure about the latter though. But I think it is fair enough to assume Windows users to either use NTFS or ReFS. And if they don't, you can still call error_report_once() to make user aware that seucrity_model=mapped(-xattr) requires a fileystem on Windows that supports ADS. [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) Best regards, Christian Schoenebeck
> -----Original Message----- > From: Christian Schoenebeck <qemu_oss@crudebyte.com> > Sent: 2022年4月14日 19:24 > To: qemu-devel@nongnu.org; Shi, Guohuai <Guohuai.Shi@windriver.com> > Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> > Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host > > [Please note: This e-mail is from an EXTERNAL e-mail address] > > On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: > > > We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, > > > it is in bad shape and we will probably deprecate it in near future anyway. > > > But it would be good to have support for the synth driver, because > > > we are using it for running test cases and fuzzing tests (QA). > > > > synth driver can not be built on Windows platform (or cross build on > > Linux). So the test cases can not work on Windows. > > Could you please be more specific what kind of challenge you see for making the > synth driver working on Windows? The synth driver is just a simple mockup driver > [1] that simulates in-RAM-only a filesystem with a bunch of hard coded dirs and > files, solely for the purpose to run test cases. So the synth driver does not interact > with any real filesystem on host at all. My expectation therefore would be that > it just needs to tweak some header includes and maybe declaring missing POSIX data > types, which you have done for the local driver already anyway. > For 9p-synth: I had enabled 9p-synth.c and built it successfully on Windows platform. However, test cases code are not built on Windows host. So I think it is useless that enable synth on Windows host (no way to run it). > BTW support for macOS hosts has just been recently added for 9p, I know it is > different as its a POSIX OS, but maybe you might still find the diff [2] helpful. > > [1] https://wiki.qemu.org/Documentation/9p#9p_Filesystem_Drivers > [2] https://gitlab.com/qemu-project/qemu/-/commit/f45cc81911adc772 > > > > What are the limitations against security_model=mapped on Windows? > > > Keep in mind that with security_model=none you are very limited in > > > what you can do with 9p. > > > > MSYS library does not support extend attribute (e.g. getxattr), And > > does not support POSIX permission APIs (e.g. chmod, chown). > > Security model is useless on Windows host. > > That would be security_model=passthrough, yes, that's not possible with msys. > The recommended way in practice though is using security_model=mapped [3] for all > systems, which should be possible to achieve with msys as well ... > > [3] https://wiki.qemu.org/Documentation/9psetup#Starting_the_Guest_directly > > > It is possible that to "map" extend attribute to NTFS stream data. > > However, if Windows host media is not NTFS (e.g. FAT) which does not > > support stream data, then the "map" can not work. > > ... yes exactly, it would make sense to use ADS [4] instead of xattr on Windows. > ADS are available with NTFS and ReFS and maybe also with exFAT nowadays (?), not > sure about the latter though. But I think it is fair enough to assume Windows users > to either use NTFS or ReFS. And if they don't, you can still call error_report_once() > to make user aware that > seucrity_model=mapped(-xattr) requires a fileystem on Windows that supports ADS. > > [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) > Windows does not support POSIX permission. So I think that only allow user to use security_model=none is reasonable on Windows host. There is a difficulty to support "mapped" or "mapped-file" on Windows host: There are many functions in 9p-code using APIs like "openat", "mkdirat", etc. MSYS does not support that (openat is not valid on Windows host). I remember that 9p replaced "open" by "openat" for a long time. To fully support "security_model=mapped", 9p for Windows need to replace "openat" by "open". This may impact too many functions. I would have a try to enable "mapped" by using ADS, but it looks like a big refactor for 9p-local.c Best Regards, Guohuai
On Donnerstag, 14. April 2022 19:25:04 CEST Shi, Guohuai wrote: > > -----Original Message----- > > From: Christian Schoenebeck <qemu_oss@crudebyte.com> > > Sent: 2022年4月14日 19:24 > > To: qemu-devel@nongnu.org; Shi, Guohuai <Guohuai.Shi@windriver.com> > > Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> > > Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host > > > > [Please note: This e-mail is from an EXTERNAL e-mail address] > > > > On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: > > > > > > We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, > > > > it is in bad shape and we will probably deprecate it in near future > > > > anyway. But it would be good to have support for the synth driver, > > > > because we are using it for running test cases and fuzzing tests > > > > (QA). [...] > For 9p-synth: > > I had enabled 9p-synth.c and built it successfully on Windows platform. > However, test cases code are not built on Windows host. > So I think it is useless that enable synth on Windows host (no way to run > it). Please, don't give up too soon. Looking at tests/qtest/meson.build it starts with: # All QTests for now are POSIX-only, but the dependencies are # really in libqtest, not in the testcases themselves. if not config_host.has_key('CONFIG_POSIX') subdir_done() endif And looking at tests/qtest/libqtest.c I "think" this should be working on Windows as well. It uses socket APIs which are available on Windows. I don't see a real show stopper here for Windows. Could you please try if you can compile the tests on Windows? What we would need is test/qtest/qos-test, we don't need all the other tests: https://wiki.qemu.org/Documentation/9p#Test_Cases > > > It is possible that to "map" extend attribute to NTFS stream data. > > > However, if Windows host media is not NTFS (e.g. FAT) which does not > > > support stream data, then the "map" can not work. > > > > ... yes exactly, it would make sense to use ADS [4] instead of xattr on > > Windows. ADS are available with NTFS and ReFS and maybe also with exFAT > > nowadays (?), not sure about the latter though. But I think it is fair > > enough to assume Windows users to either use NTFS or ReFS. And if they > > don't, you can still call error_report_once() to make user aware that > > seucrity_model=mapped(-xattr) requires a fileystem on Windows that > > supports ADS. > > [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) > > > > Windows does not support POSIX permission. > So I think that only allow user to use security_model=none is reasonable on > Windows host. It depends on the use case. I assume your use case are Windows guests, in that case you don't have the concept of POSIX permissions neither on guest side, nor on host side (on the long-term I am pretty sure though that Windows guest users would want to have some kind of Windows ACL mapping implementation as well). > There is a difficulty to support "mapped" or "mapped-file" on Windows host: > There are many functions in 9p-code using APIs like "openat", "mkdirat", > etc. MSYS does not support that (openat is not valid on Windows host). I > remember that 9p replaced "open" by "openat" for a long time. > To fully support "security_model=mapped", 9p for Windows need to replace > "openat" by "open". This may impact too many functions. > > I would have a try to enable "mapped" by using ADS, but it looks like a big > refactor for 9p-local.c Regarding openat(): We had a similar challenge for macOS host implementation; macOS does not have mknodat(), so what we're currently doing is pthread_fchdir_np(...) mknod(...) https://github.com/qemu/qemu/blob/master/hw/9pfs/9p-util-darwin.c#L84 So on Windows you could do: chdir(...) open(...) as workaround for providing openat() for msys. For security_model=mapped(-xattr) to work on Windows you basically would need to provide a replacement implementation (based on Windows ADS) in 9p-util-windows.c for: ssize_t fgetxattrat_nofollow(int dirfd, const char *filename, const char *name, void *value, size_t size); ssize_t flistxattrat_nofollow(int dirfd, const char *filename, char *list, size_t size); ssize_t fremovexattrat_nofollow(int dirfd, const char *filename, const char *name); int fsetxattrat_nofollow(int dirfd, const char *filename, const char *name, void *value, size_t size, int flags); So it does not look too bad I think to get security_model=mapped working, and it would make Windows 9p host support much more usable (for Linux guests, macOS guests, but also for Windows guests with mapped Windows ACL in future). Best regards, Christian Schoenebeck
On 17/04/2022 13:55, Christian Schoenebeck wrote: > On Donnerstag, 14. April 2022 19:25:04 CEST Shi, Guohuai wrote: >>> -----Original Message----- >>> From: Christian Schoenebeck <qemu_oss@crudebyte.com> >>> Sent: 2022年4月14日 19:24 >>> To: qemu-devel@nongnu.org; Shi, Guohuai <Guohuai.Shi@windriver.com> >>> Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> >>> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host >>> >>> [Please note: This e-mail is from an EXTERNAL e-mail address] >>> >>> On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: >>> >>>>> We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, >>>>> it is in bad shape and we will probably deprecate it in near future >>>>> anyway. But it would be good to have support for the synth driver, >>>>> because we are using it for running test cases and fuzzing tests >>>>> (QA). > [...] >> For 9p-synth: >> >> I had enabled 9p-synth.c and built it successfully on Windows platform. >> However, test cases code are not built on Windows host. >> So I think it is useless that enable synth on Windows host (no way to run >> it). > > Please, don't give up too soon. Looking at tests/qtest/meson.build it starts > with: > > # All QTests for now are POSIX-only, but the dependencies are > # really in libqtest, not in the testcases themselves. > if not config_host.has_key('CONFIG_POSIX') > subdir_done() > endif > > And looking at tests/qtest/libqtest.c I "think" this should be working on > Windows as well. It uses socket APIs which are available on Windows. I don't > see a real show stopper here for Windows. > > Could you please try if you can compile the tests on Windows? What we would > need is test/qtest/qos-test, we don't need all the other tests: > > https://wiki.qemu.org/Documentation/9p#Test_Cases > >>>> It is possible that to "map" extend attribute to NTFS stream data. >>>> However, if Windows host media is not NTFS (e.g. FAT) which does not >>>> support stream data, then the "map" can not work. >>> >>> ... yes exactly, it would make sense to use ADS [4] instead of xattr on >>> Windows. ADS are available with NTFS and ReFS and maybe also with exFAT >>> nowadays (?), not sure about the latter though. But I think it is fair >>> enough to assume Windows users to either use NTFS or ReFS. And if they >>> don't, you can still call error_report_once() to make user aware that >>> seucrity_model=mapped(-xattr) requires a fileystem on Windows that >>> supports ADS. >>> [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) >>> >> >> Windows does not support POSIX permission. >> So I think that only allow user to use security_model=none is reasonable on >> Windows host. > > It depends on the use case. I assume your use case are Windows guests, in that > case you don't have the concept of POSIX permissions neither on guest side, > nor on host side (on the long-term I am pretty sure though that Windows guest > users would want to have some kind of Windows ACL mapping implementation as > well). > >> There is a difficulty to support "mapped" or "mapped-file" on Windows host: >> There are many functions in 9p-code using APIs like "openat", "mkdirat", >> etc. MSYS does not support that (openat is not valid on Windows host). I >> remember that 9p replaced "open" by "openat" for a long time. >> To fully support "security_model=mapped", 9p for Windows need to replace >> "openat" by "open". This may impact too many functions. >> >> I would have a try to enable "mapped" by using ADS, but it looks like a big >> refactor for 9p-local.c > > Regarding openat(): We had a similar challenge for macOS host implementation; > macOS does not have mknodat(), so what we're currently doing is > > pthread_fchdir_np(...) > mknod(...) > > https://github.com/qemu/qemu/blob/master/hw/9pfs/9p-util-darwin.c#L84 > > So on Windows you could do: > > chdir(...) > open(...) > > as workaround for providing openat() for msys. > > For security_model=mapped(-xattr) to work on Windows you basically would need > to provide a replacement implementation (based on Windows ADS) in > 9p-util-windows.c for: > > ssize_t fgetxattrat_nofollow(int dirfd, const char *filename, const char > *name, void *value, size_t size); > > ssize_t flistxattrat_nofollow(int dirfd, const char *filename, > char *list, size_t size); > > ssize_t fremovexattrat_nofollow(int dirfd, const char *filename, > const char *name); > > int fsetxattrat_nofollow(int dirfd, const char *filename, const char *name, > void *value, size_t size, int flags); > > So it does not look too bad I think to get security_model=mapped working, and > it would make Windows 9p host support much more usable (for Linux guests, > macOS guests, but also for Windows guests with mapped Windows ACL in future). FWIW even just having security_model=none would be very useful here, since then 9pfs could be used to share host files across all of Windows, MacOS and POSIX OSs which is something that can't yet be done with virtiofsd. Whilst using ADS would allow the xattrs to be attached to files, how would this work in the case of ACLs which are stored as a "system.posix_acl_access" attribute? My concern would be that files copied from the guest to the host wouldn't have sensible permissions when read directly on the host. Presumably there would be some existing precedent for how this is handled in WSL2? ATB, Mark.
On Montag, 18. April 2022 11:07:33 CEST Mark Cave-Ayland wrote: > On 17/04/2022 13:55, Christian Schoenebeck wrote: > > On Donnerstag, 14. April 2022 19:25:04 CEST Shi, Guohuai wrote: > >>> -----Original Message----- > >>> From: Christian Schoenebeck <qemu_oss@crudebyte.com> > >>> Sent: 2022年4月14日 19:24 > >>> To: qemu-devel@nongnu.org; Shi, Guohuai <Guohuai.Shi@windriver.com> > >>> Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> > >>> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host > >>> > >>> [Please note: This e-mail is from an EXTERNAL e-mail address] > >>> > >>> On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: > >>>>> We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, > >>>>> it is in bad shape and we will probably deprecate it in near future > >>>>> anyway. But it would be good to have support for the synth driver, > >>>>> because we are using it for running test cases and fuzzing tests > >>>>> (QA). > > > > [...] > > > >> For 9p-synth: > >> > >> I had enabled 9p-synth.c and built it successfully on Windows platform. > >> However, test cases code are not built on Windows host. > >> So I think it is useless that enable synth on Windows host (no way to run > >> it). > > > > Please, don't give up too soon. Looking at tests/qtest/meson.build it > > starts with: > > > > # All QTests for now are POSIX-only, but the dependencies are > > # really in libqtest, not in the testcases themselves. > > if not config_host.has_key('CONFIG_POSIX') > > > > subdir_done() > > > > endif > > > > And looking at tests/qtest/libqtest.c I "think" this should be working on > > Windows as well. It uses socket APIs which are available on Windows. I > > don't see a real show stopper here for Windows. > > > > Could you please try if you can compile the tests on Windows? What we > > would > > need is test/qtest/qos-test, we don't need all the other tests: > > > > https://wiki.qemu.org/Documentation/9p#Test_Cases > > > >>>> It is possible that to "map" extend attribute to NTFS stream data. > >>>> However, if Windows host media is not NTFS (e.g. FAT) which does not > >>>> support stream data, then the "map" can not work. > >>> > >>> ... yes exactly, it would make sense to use ADS [4] instead of xattr on > >>> Windows. ADS are available with NTFS and ReFS and maybe also with exFAT > >>> nowadays (?), not sure about the latter though. But I think it is fair > >>> enough to assume Windows users to either use NTFS or ReFS. And if they > >>> don't, you can still call error_report_once() to make user aware that > >>> seucrity_model=mapped(-xattr) requires a fileystem on Windows that > >>> supports ADS. > >>> [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) > >> > >> Windows does not support POSIX permission. > >> So I think that only allow user to use security_model=none is reasonable > >> on > >> Windows host. > > > > It depends on the use case. I assume your use case are Windows guests, in > > that case you don't have the concept of POSIX permissions neither on > > guest side, nor on host side (on the long-term I am pretty sure though > > that Windows guest users would want to have some kind of Windows ACL > > mapping implementation as well). > > > >> There is a difficulty to support "mapped" or "mapped-file" on Windows > >> host: > >> There are many functions in 9p-code using APIs like "openat", "mkdirat", > >> etc. MSYS does not support that (openat is not valid on Windows host). I > >> remember that 9p replaced "open" by "openat" for a long time. > >> To fully support "security_model=mapped", 9p for Windows need to replace > >> "openat" by "open". This may impact too many functions. > >> > >> I would have a try to enable "mapped" by using ADS, but it looks like a > >> big > >> refactor for 9p-local.c > > > > Regarding openat(): We had a similar challenge for macOS host > > implementation; macOS does not have mknodat(), so what we're currently > > doing is > > > > pthread_fchdir_np(...) > > mknod(...) > > > > https://github.com/qemu/qemu/blob/master/hw/9pfs/9p-util-darwin.c#L84 > > > > So on Windows you could do: > > chdir(...) > > open(...) > > > > as workaround for providing openat() for msys. > > > > For security_model=mapped(-xattr) to work on Windows you basically would > > need to provide a replacement implementation (based on Windows ADS) in > > > > 9p-util-windows.c for: > > ssize_t fgetxattrat_nofollow(int dirfd, const char *filename, const > > char > > > > *name, void *value, size_t size); > > > > ssize_t flistxattrat_nofollow(int dirfd, const char *filename, > > > > char *list, size_t size); > > > > ssize_t fremovexattrat_nofollow(int dirfd, const char *filename, > > > > const char *name); > > > > int fsetxattrat_nofollow(int dirfd, const char *filename, const char > > *name, > > > > void *value, size_t size, int flags); > > > > So it does not look too bad I think to get security_model=mapped working, > > and it would make Windows 9p host support much more usable (for Linux > > guests, macOS guests, but also for Windows guests with mapped Windows ACL > > in future). > FWIW even just having security_model=none would be very useful here, since > then 9pfs could be used to share host files across all of Windows, MacOS > and POSIX OSs which is something that can't yet be done with virtiofsd. > > Whilst using ADS would allow the xattrs to be attached to files, how would > this work in the case of ACLs which are stored as a > "system.posix_acl_access" attribute? My concern would be that files copied > from the guest to the host wouldn't have sensible permissions when read > directly on the host. Presumably there would be some existing precedent for > how this is handled in WSL2? The behaviour with security_level=mapped on Windows would be identical to that of other already supported systems, that is there are two *distinct* levels for ownership and permissions in mapped mode: 1. The actual ownership information and permissions on host's file system. Guest won't ever get more permissions than those on host fs level, so this level defines the maximum permissions if you will. Those information are not directly exposed to, visible to, nor altered by guest though. 2. The ownership information and permissions mapped by 9p server. That's what guest sees and is able to alter in this mode. The only difference between security_level=mapped(-xattr) and security_level=mapped-file is just the location where those mapped ownership and permissions are stored to by 9p server (currently: either hidden xattr vs. hidden file). See also section "1. local fs driver" for some more explanation on this: https://wiki.qemu.org/Documentation/9p#9p_Filesystem_Drivers As for POSIX ACLs specifically: a Linux guest kernel does access those as "system.posix_acl_access" and "system.posix_acl_default" xattrs, but on host fs level they are actually stored and read by 9p server as "user.virtfs.posix_acl_access" and "user.virtfs.posix_acl_default" xattrs instead. So again, ACLs that may exist on host fs level are separated from ACLs on guest level in mapped mode, similar to POSIX ownership, permissions and device type info. Best regards, Christian Schoenebeck
On 18/04/2022 13:31, Christian Schoenebeck wrote: > On Montag, 18. April 2022 11:07:33 CEST Mark Cave-Ayland wrote: >> On 17/04/2022 13:55, Christian Schoenebeck wrote: >>> On Donnerstag, 14. April 2022 19:25:04 CEST Shi, Guohuai wrote: >>>>> -----Original Message----- >>>>> From: Christian Schoenebeck <qemu_oss@crudebyte.com> >>>>> Sent: 2022年4月14日 19:24 >>>>> To: qemu-devel@nongnu.org; Shi, Guohuai <Guohuai.Shi@windriver.com> >>>>> Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> >>>>> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host >>>>> >>>>> [Please note: This e-mail is from an EXTERNAL e-mail address] >>>>> >>>>> On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: >>>>>>> We have 3 fs drivers: local, synth, proxy. I don't mind about proxy, >>>>>>> it is in bad shape and we will probably deprecate it in near future >>>>>>> anyway. But it would be good to have support for the synth driver, >>>>>>> because we are using it for running test cases and fuzzing tests >>>>>>> (QA). >>> >>> [...] >>> >>>> For 9p-synth: >>>> >>>> I had enabled 9p-synth.c and built it successfully on Windows platform. >>>> However, test cases code are not built on Windows host. >>>> So I think it is useless that enable synth on Windows host (no way to run >>>> it). >>> >>> Please, don't give up too soon. Looking at tests/qtest/meson.build it >>> starts with: >>> >>> # All QTests for now are POSIX-only, but the dependencies are >>> # really in libqtest, not in the testcases themselves. >>> if not config_host.has_key('CONFIG_POSIX') >>> >>> subdir_done() >>> >>> endif >>> >>> And looking at tests/qtest/libqtest.c I "think" this should be working on >>> Windows as well. It uses socket APIs which are available on Windows. I >>> don't see a real show stopper here for Windows. >>> >>> Could you please try if you can compile the tests on Windows? What we >>> would >>> need is test/qtest/qos-test, we don't need all the other tests: >>> >>> https://wiki.qemu.org/Documentation/9p#Test_Cases >>> >>>>>> It is possible that to "map" extend attribute to NTFS stream data. >>>>>> However, if Windows host media is not NTFS (e.g. FAT) which does not >>>>>> support stream data, then the "map" can not work. >>>>> >>>>> ... yes exactly, it would make sense to use ADS [4] instead of xattr on >>>>> Windows. ADS are available with NTFS and ReFS and maybe also with exFAT >>>>> nowadays (?), not sure about the latter though. But I think it is fair >>>>> enough to assume Windows users to either use NTFS or ReFS. And if they >>>>> don't, you can still call error_report_once() to make user aware that >>>>> seucrity_model=mapped(-xattr) requires a fileystem on Windows that >>>>> supports ADS. >>>>> [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) >>>> >>>> Windows does not support POSIX permission. >>>> So I think that only allow user to use security_model=none is reasonable >>>> on >>>> Windows host. >>> >>> It depends on the use case. I assume your use case are Windows guests, in >>> that case you don't have the concept of POSIX permissions neither on >>> guest side, nor on host side (on the long-term I am pretty sure though >>> that Windows guest users would want to have some kind of Windows ACL >>> mapping implementation as well). >>> >>>> There is a difficulty to support "mapped" or "mapped-file" on Windows >>>> host: >>>> There are many functions in 9p-code using APIs like "openat", "mkdirat", >>>> etc. MSYS does not support that (openat is not valid on Windows host). I >>>> remember that 9p replaced "open" by "openat" for a long time. >>>> To fully support "security_model=mapped", 9p for Windows need to replace >>>> "openat" by "open". This may impact too many functions. >>>> >>>> I would have a try to enable "mapped" by using ADS, but it looks like a >>>> big >>>> refactor for 9p-local.c >>> >>> Regarding openat(): We had a similar challenge for macOS host >>> implementation; macOS does not have mknodat(), so what we're currently >>> doing is >>> >>> pthread_fchdir_np(...) >>> mknod(...) >>> >>> https://github.com/qemu/qemu/blob/master/hw/9pfs/9p-util-darwin.c#L84 >>> >>> So on Windows you could do: >>> chdir(...) >>> open(...) >>> >>> as workaround for providing openat() for msys. >>> >>> For security_model=mapped(-xattr) to work on Windows you basically would >>> need to provide a replacement implementation (based on Windows ADS) in >>> >>> 9p-util-windows.c for: >>> ssize_t fgetxattrat_nofollow(int dirfd, const char *filename, const >>> char >>> >>> *name, void *value, size_t size); >>> >>> ssize_t flistxattrat_nofollow(int dirfd, const char *filename, >>> >>> char *list, size_t size); >>> >>> ssize_t fremovexattrat_nofollow(int dirfd, const char *filename, >>> >>> const char *name); >>> >>> int fsetxattrat_nofollow(int dirfd, const char *filename, const char >>> *name, >>> >>> void *value, size_t size, int flags); >>> >>> So it does not look too bad I think to get security_model=mapped working, >>> and it would make Windows 9p host support much more usable (for Linux >>> guests, macOS guests, but also for Windows guests with mapped Windows ACL >>> in future). >> FWIW even just having security_model=none would be very useful here, since >> then 9pfs could be used to share host files across all of Windows, MacOS >> and POSIX OSs which is something that can't yet be done with virtiofsd. >> >> Whilst using ADS would allow the xattrs to be attached to files, how would >> this work in the case of ACLs which are stored as a >> "system.posix_acl_access" attribute? My concern would be that files copied >> from the guest to the host wouldn't have sensible permissions when read >> directly on the host. Presumably there would be some existing precedent for >> how this is handled in WSL2? > > The behaviour with security_level=mapped on Windows would be identical to that > of other already supported systems, that is there are two *distinct* levels > for ownership and permissions in mapped mode: > > 1. The actual ownership information and permissions on host's file system. > Guest won't ever get more permissions than those on host fs level, so this > level defines the maximum permissions if you will. Those information are not > directly exposed to, visible to, nor altered by guest though. > > 2. The ownership information and permissions mapped by 9p server. That's what > guest sees and is able to alter in this mode. The only difference between > security_level=mapped(-xattr) and security_level=mapped-file is just the > location where those mapped ownership and permissions are stored to by 9p > server (currently: either hidden xattr vs. hidden file). > > See also section "1. local fs driver" for some more explanation on this: > https://wiki.qemu.org/Documentation/9p#9p_Filesystem_Drivers > > As for POSIX ACLs specifically: a Linux guest kernel does access those as > "system.posix_acl_access" and "system.posix_acl_default" xattrs, but on host > fs level they are actually stored and read by 9p server as > "user.virtfs.posix_acl_access" and "user.virtfs.posix_acl_default" xattrs > instead. So again, ACLs that may exist on host fs level are separated from > ACLs on guest level in mapped mode, similar to POSIX ownership, permissions > and device type info. Hi Christian, Thanks for the detailed explanation, the last paragraph above in particular clearly answers my question as to how 9pfs handles the xattr-based permissions in mapped mode. I am certainly interested to help test later versions of the patchset. ATB, Mark.
Hi All, I just finished a basic PoC for mapped-file. It works! I think I can also support "security_model=map-xattr" by NTFS ADS. However, I got a limitation of MinGW: https://github.com/mirror/mingw-w64/blob/master/mingw-w64-crt/misc/dirent.c#L290 MinGW can not handle seekdir() while the directory has changed. That means, if run command like "rm -rf *", MinGW may not delete all files. "rm -rf *" need to call readdir()(and call seekdir() in 9P) and unlink(), and MinGW's seekdir() may seek directory to wrong directory entry index. I am considering to change 9PFS readdir() implement on Windows host, to fix this problem. Thanks, Guohuai -----Original Message----- From: Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk> Sent: Tuesday, April 19, 2022 18:59 To: Christian Schoenebeck <qemu_oss@crudebyte.com> Cc: Shi, Guohuai <Guohuai.Shi@windriver.com>; qemu-devel@nongnu.org; Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows host [Please note: This e-mail is from an EXTERNAL e-mail address] On 18/04/2022 13:31, Christian Schoenebeck wrote: > On Montag, 18. April 2022 11:07:33 CEST Mark Cave-Ayland wrote: >> On 17/04/2022 13:55, Christian Schoenebeck wrote: >>> On Donnerstag, 14. April 2022 19:25:04 CEST Shi, Guohuai wrote: >>>>> -----Original Message----- >>>>> From: Christian Schoenebeck <qemu_oss@crudebyte.com> >>>>> Sent: 2022年4月14日 19:24 >>>>> To: qemu-devel@nongnu.org; Shi, Guohuai >>>>> <Guohuai.Shi@windriver.com> >>>>> Cc: Bin Meng <bmeng.cn@gmail.com>; Greg Kurz <groug@kaod.org> >>>>> Subject: Re: [RFC PATCH 0/4] 9pfs: Add 9pfs support for Windows >>>>> host >>>>> >>>>> [Please note: This e-mail is from an EXTERNAL e-mail address] >>>>> >>>>> On Mittwoch, 13. April 2022 05:30:57 CEST Shi, Guohuai wrote: >>>>>>> We have 3 fs drivers: local, synth, proxy. I don't mind about >>>>>>> proxy, it is in bad shape and we will probably deprecate it in >>>>>>> near future anyway. But it would be good to have support for the >>>>>>> synth driver, because we are using it for running test cases and >>>>>>> fuzzing tests (QA). >>> >>> [...] >>> >>>> For 9p-synth: >>>> >>>> I had enabled 9p-synth.c and built it successfully on Windows platform. >>>> However, test cases code are not built on Windows host. >>>> So I think it is useless that enable synth on Windows host (no way >>>> to run it). >>> >>> Please, don't give up too soon. Looking at tests/qtest/meson.build >>> it starts with: >>> >>> # All QTests for now are POSIX-only, but the dependencies are # >>> really in libqtest, not in the testcases themselves. >>> if not config_host.has_key('CONFIG_POSIX') >>> >>> subdir_done() >>> >>> endif >>> >>> And looking at tests/qtest/libqtest.c I "think" this should be >>> working on Windows as well. It uses socket APIs which are available >>> on Windows. I don't see a real show stopper here for Windows. >>> >>> Could you please try if you can compile the tests on Windows? What >>> we would need is test/qtest/qos-test, we don't need all the other >>> tests: >>> >>> https://wiki.qemu.org/Documentation/9p#Test_Cases >>> >>>>>> It is possible that to "map" extend attribute to NTFS stream data. >>>>>> However, if Windows host media is not NTFS (e.g. FAT) which does >>>>>> not support stream data, then the "map" can not work. >>>>> >>>>> ... yes exactly, it would make sense to use ADS [4] instead of >>>>> xattr on Windows. ADS are available with NTFS and ReFS and maybe >>>>> also with exFAT nowadays (?), not sure about the latter though. >>>>> But I think it is fair enough to assume Windows users to either >>>>> use NTFS or ReFS. And if they don't, you can still call >>>>> error_report_once() to make user aware that >>>>> seucrity_model=mapped(-xattr) requires a fileystem on Windows that >>>>> supports ADS. >>>>> [4] https://en.wikipedia.org/wiki/NTFS#Alternate_data_stream_(ADS) >>>> >>>> Windows does not support POSIX permission. >>>> So I think that only allow user to use security_model=none is >>>> reasonable on Windows host. >>> >>> It depends on the use case. I assume your use case are Windows >>> guests, in that case you don't have the concept of POSIX permissions >>> neither on guest side, nor on host side (on the long-term I am >>> pretty sure though that Windows guest users would want to have some >>> kind of Windows ACL mapping implementation as well). >>> >>>> There is a difficulty to support "mapped" or "mapped-file" on >>>> Windows >>>> host: >>>> There are many functions in 9p-code using APIs like "openat", >>>> "mkdirat", etc. MSYS does not support that (openat is not valid on >>>> Windows host). I remember that 9p replaced "open" by "openat" for a long time. >>>> To fully support "security_model=mapped", 9p for Windows need to >>>> replace "openat" by "open". This may impact too many functions. >>>> >>>> I would have a try to enable "mapped" by using ADS, but it looks >>>> like a big refactor for 9p-local.c >>> >>> Regarding openat(): We had a similar challenge for macOS host >>> implementation; macOS does not have mknodat(), so what we're >>> currently doing is >>> >>> pthread_fchdir_np(...) >>> mknod(...) >>> >>> >>> https://github.com/qemu/qemu/blob/master/hw/9pfs/9p-util-darwin.c#L8 >>> 4 >>> >>> So on Windows you could do: >>> chdir(...) >>> open(...) >>> >>> as workaround for providing openat() for msys. >>> >>> For security_model=mapped(-xattr) to work on Windows you basically >>> would need to provide a replacement implementation (based on Windows >>> ADS) in >>> >>> 9p-util-windows.c for: >>> ssize_t fgetxattrat_nofollow(int dirfd, const char *filename, const >>> char >>> >>> *name, void *value, size_t size); >>> >>> ssize_t flistxattrat_nofollow(int dirfd, const char *filename, >>> >>> char *list, size_t size); >>> >>> ssize_t fremovexattrat_nofollow(int dirfd, const char *filename, >>> >>> const char *name); >>> >>> int fsetxattrat_nofollow(int dirfd, const char *filename, const char >>> *name, >>> >>> void *value, size_t size, int flags); >>> >>> So it does not look too bad I think to get security_model=mapped >>> working, and it would make Windows 9p host support much more usable >>> (for Linux guests, macOS guests, but also for Windows guests with >>> mapped Windows ACL in future). >> FWIW even just having security_model=none would be very useful here, >> since then 9pfs could be used to share host files across all of >> Windows, MacOS and POSIX OSs which is something that can't yet be done with virtiofsd. >> >> Whilst using ADS would allow the xattrs to be attached to files, how >> would this work in the case of ACLs which are stored as a >> "system.posix_acl_access" attribute? My concern would be that files >> copied from the guest to the host wouldn't have sensible permissions >> when read directly on the host. Presumably there would be some >> existing precedent for how this is handled in WSL2? > > The behaviour with security_level=mapped on Windows would be identical > to that of other already supported systems, that is there are two > *distinct* levels for ownership and permissions in mapped mode: > > 1. The actual ownership information and permissions on host's file system. > Guest won't ever get more permissions than those on host fs level, so > this level defines the maximum permissions if you will. Those > information are not directly exposed to, visible to, nor altered by guest though. > > 2. The ownership information and permissions mapped by 9p server. > That's what guest sees and is able to alter in this mode. The only > difference between > security_level=mapped(-xattr) and security_level=mapped-file is just > the location where those mapped ownership and permissions are stored > to by 9p server (currently: either hidden xattr vs. hidden file). > > See also section "1. local fs driver" for some more explanation on this: > https://wiki.qemu.org/Documentation/9p#9p_Filesystem_Drivers > > As for POSIX ACLs specifically: a Linux guest kernel does access those > as "system.posix_acl_access" and "system.posix_acl_default" xattrs, > but on host fs level they are actually stored and read by 9p server as > "user.virtfs.posix_acl_access" and "user.virtfs.posix_acl_default" > xattrs instead. So again, ACLs that may exist on host fs level are > separated from ACLs on guest level in mapped mode, similar to POSIX > ownership, permissions and device type info. Hi Christian, Thanks for the detailed explanation, the last paragraph above in particular clearly answers my question as to how 9pfs handles the xattr-based permissions in mapped mode. I am certainly interested to help test later versions of the patchset. ATB, Mark.
On Dienstag, 19. April 2022 13:10:40 CEST Shi, Guohuai wrote: > Hi All, > > I just finished a basic PoC for mapped-file. > It works! I think I can also support "security_model=map-xattr" by NTFS > ADS. Slick! > However, I got a limitation of MinGW: > > https://github.com/mirror/mingw-w64/blob/master/mingw-w64-crt/misc/dirent.c# > L290 > > MinGW can not handle seekdir() while the directory has changed. > That means, if run command like "rm -rf *", MinGW may not delete all files. > "rm -rf *" need to call readdir()(and call seekdir() in 9P) and unlink(), > and MinGW's seekdir() may seek directory to wrong directory entry index. > I am considering to change 9PFS readdir() implement on Windows host, to fix > this problem. To avoid history repeating [1]: please do not attempt to address this in 9p.c! That file is the controller portion of 9p server and must remain fs-agnostic. Such kind of issue should rather be addressed on fs driver level (e.g. 9p-local.c, 9p-util-windows.c). I.e. don't do it like this: [1] https://lore.kernel.org/all/20211122004913.20052-1-wwcohen@gmail.com/T/#m734f405973768e43ce3ed7550bd21809abb25813 Best regards, Christian Schoenebeck