]> git.proxmox.com Git - mirror_qemu.git/blame - docs/tools/virtiofsd.rst
virtiofs: drop remapped security.capability xattr as needed
[mirror_qemu.git] / docs / tools / virtiofsd.rst
CommitLineData
6a7e2bbe
SH
1QEMU virtio-fs shared file system daemon
2========================================
3
4Synopsis
5--------
6
7**virtiofsd** [*OPTIONS*]
8
9Description
10-----------
11
12Share a host directory tree with a guest through a virtio-fs device. This
13program is a vhost-user backend that implements the virtio-fs device. Each
14virtio-fs device instance requires its own virtiofsd process.
15
16This program is designed to work with QEMU's ``--device vhost-user-fs-pci``
17but should work with any virtual machine monitor (VMM) that supports
18vhost-user. See the Examples section below.
19
06844584
SH
20This program must be run as the root user. The program drops privileges where
21possible during startup although it must be able to create and access files
22with any uid/gid:
23
24* The ability to invoke syscalls is limited using seccomp(2).
25* Linux capabilities(7) are dropped.
26
27In "namespace" sandbox mode the program switches into a new file system
28namespace and invokes pivot_root(2) to make the shared directory tree its root.
29A new pid and net namespace is also created to isolate the process.
30
31In "chroot" sandbox mode the program invokes chroot(2) to make the shared
32directory tree its root. This mode is intended for container environments where
33the container runtime has already set up the namespaces and the program does
34not have permission to create namespaces itself.
35
36Both sandbox modes prevent "file system escapes" due to symlinks and other file
37system objects that might lead to files outside the shared directory.
6a7e2bbe
SH
38
39Options
40-------
41
42.. program:: virtiofsd
43
44.. option:: -h, --help
45
46 Print help.
47
48.. option:: -V, --version
49
50 Print version.
51
52.. option:: -d
53
54 Enable debug output.
55
56.. option:: --syslog
57
58 Print log messages to syslog instead of stderr.
59
60.. option:: -o OPTION
61
62 * debug -
63 Enable debug output.
64
65 * flock|no_flock -
66 Enable/disable flock. The default is ``no_flock``.
67
3005c099
DDAG
68 * modcaps=CAPLIST
69 Modify the list of capabilities allowed; CAPLIST is a colon separated
70 list of capabilities, each preceded by either + or -, e.g.
71 ''+sys_admin:-chown''.
72
6a7e2bbe
SH
73 * log_level=LEVEL -
74 Print only log messages matching LEVEL or more severe. LEVEL is one of
75 ``err``, ``warn``, ``info``, or ``debug``. The default is ``info``.
76
6a7e2bbe 77 * posix_lock|no_posix_lock -
88fc1079 78 Enable/disable remote POSIX locks. The default is ``no_posix_lock``.
6a7e2bbe
SH
79
80 * readdirplus|no_readdirplus -
81 Enable/disable readdirplus. The default is ``readdirplus``.
82
06844584
SH
83 * sandbox=namespace|chroot -
84 Sandbox mode:
85 - namespace: Create mount, pid, and net namespaces and pivot_root(2) into
86 the shared directory.
87 - chroot: chroot(2) into shared directory (use in containers).
88 The default is "namespace".
89
6a7e2bbe
SH
90 * source=PATH -
91 Share host directory tree located at PATH. This option is required.
92
93 * timeout=TIMEOUT -
94 I/O timeout in seconds. The default depends on cache= option.
95
96 * writeback|no_writeback -
76ca4b58 97 Enable/disable writeback cache. The cache allows the FUSE client to buffer
6a7e2bbe
SH
98 and merge write requests. The default is ``no_writeback``.
99
100 * xattr|no_xattr -
101 Enable/disable extended attributes (xattr) on files and directories. The
102 default is ``no_xattr``.
103
104.. option:: --socket-path=PATH
105
106 Listen on vhost-user UNIX domain socket at PATH.
107
f6698f2b
AB
108.. option:: --socket-group=GROUP
109
110 Set the vhost-user UNIX domain socket gid to GROUP.
111
6a7e2bbe
SH
112.. option:: --fd=FDNUM
113
114 Accept connections from vhost-user UNIX domain socket file descriptor FDNUM.
115 The file descriptor must already be listening for connections.
116
117.. option:: --thread-pool-size=NUM
118
119 Restrict the number of worker threads per request queue to NUM. The default
120 is 64.
121
122.. option:: --cache=none|auto|always
123
124 Select the desired trade-off between coherency and performance. ``none``
125 forbids the FUSE client from caching to achieve best coherency at the cost of
126 performance. ``auto`` acts similar to NFS with a 1 second metadata cache
127 timeout. ``always`` sets a long cache lifetime at the expense of coherency.
f1303afe 128 The default is ``auto``.
6a7e2bbe 129
6084633d
DDAG
130xattr-mapping
131-------------
132
133By default the name of xattr's used by the client are passed through to the server
134file system. This can be a problem where either those xattr names are used
135by something on the server (e.g. selinux client/server confusion) or if the
136virtiofsd is running in a container with restricted privileges where it cannot
137access some attributes.
138
139A mapping of xattr names can be made using -o xattrmap=mapping where the ``mapping``
140string consists of a series of rules.
141
142The first matching rule terminates the mapping.
143The set of rules must include a terminating rule to match any remaining attributes
144at the end.
145
146Each rule consists of a number of fields separated with a separator that is the
147first non-white space character in the rule. This separator must then be used
148for the whole rule.
149White space may be added before and after each rule.
1d84a021 150
6084633d
DDAG
151Using ':' as the separator a rule is of the form:
152
153``:type:scope:key:prepend:``
154
155**scope** is:
156
157- 'client' - match 'key' against a xattr name from the client for
158 setxattr/getxattr/removexattr
159- 'server' - match 'prepend' against a xattr name from the server
160 for listxattr
161- 'all' - can be used to make a single rule where both the server
162 and client matches are triggered.
163
164**type** is one of:
165
166- 'prefix' - is designed to prepend and strip a prefix; the modified
167 attributes then being passed on to the client/server.
168
169- 'ok' - Causes the rule set to be terminated when a match is found
170 while allowing matching xattr's through unchanged.
171 It is intended both as a way of explicitly terminating
172 the list of rules, and to allow some xattr's to skip following rules.
173
174- 'bad' - If a client tries to use a name matching 'key' it's
175 denied using EPERM; when the server passes an attribute
176 name matching 'prepend' it's hidden. In many ways it's use is very like
ac9574bc 177 'ok' as either an explicit terminator or for special handling of certain
6084633d
DDAG
178 patterns.
179
180**key** is a string tested as a prefix on an attribute name originating
181on the client. It maybe empty in which case a 'client' rule
182will always match on client names.
183
184**prepend** is a string tested as a prefix on an attribute name originating
185on the server, and used as a new prefix. It may be empty
186in which case a 'server' rule will always match on all names from
187the server.
188
189e.g.:
190
191 ``:prefix:client:trusted.:user.virtiofs.:``
192
193 will match 'trusted.' attributes in client calls and prefix them before
194 passing them to the server.
195
196 ``:prefix:server::user.virtiofs.:``
197
198 will strip 'user.virtiofs.' from all server replies.
199
200 ``:prefix:all:trusted.:user.virtiofs.:``
201
202 combines the previous two cases into a single rule.
203
204 ``:ok:client:user.::``
205
206 will allow get/set xattr for 'user.' xattr's and ignore
207 following rules.
208
209 ``:ok:server::security.:``
210
211 will pass 'securty.' xattr's in listxattr from the server
212 and ignore following rules.
213
214 ``:ok:all:::``
215
216 will terminate the rule search passing any remaining attributes
217 in both directions.
218
219 ``:bad:server::security.:``
220
221 would hide 'security.' xattr's in listxattr from the server.
222
1d84a021
DDAG
223A simpler 'map' type provides a shorter syntax for the common case:
224
225``:map:key:prepend:``
226
227The 'map' type adds a number of separate rules to add **prepend** as a prefix
228to the matched **key** (or all attributes if **key** is empty).
229There may be at most one 'map' rule and it must be the last rule in the set.
230
e586edcb
DDAG
231Note: When the 'security.capability' xattr is remapped, the daemon has to do
232extra work to remove it during many operations, which the host kernel normally
233does itself.
234
491bfaea
DDAG
235xattr-mapping Examples
236----------------------
237
2381) Prefix all attributes with 'user.virtiofs.'
239
240::
241
242-o xattrmap=":prefix:all::user.virtiofs.::bad:all:::"
243
244
245This uses two rules, using : as the field separator;
246the first rule prefixes and strips 'user.virtiofs.',
247the second rule hides any non-prefixed attributes that
248the host set.
249
1d84a021
DDAG
250This is equivalent to the 'map' rule:
251
252::
253-o xattrmap=":map::user.virtiofs.:"
254
491bfaea
DDAG
2552) Prefix 'trusted.' attributes, allow others through
256
257::
258
259 "/prefix/all/trusted./user.virtiofs./
260 /bad/server//trusted./
261 /bad/client/user.virtiofs.//
262 /ok/all///"
263
264
265Here there are four rules, using / as the field
266separator, and also demonstrating that new lines can
267be included between rules.
268The first rule is the prefixing of 'trusted.' and
269stripping of 'user.virtiofs.'.
270The second rule hides unprefixed 'trusted.' attributes
271on the host.
272The third rule stops a guest from explicitly setting
273the 'user.virtiofs.' path directly.
274Finally, the fourth rule lets all remaining attributes
275through.
276
1d84a021
DDAG
277This is equivalent to the 'map' rule:
278
279::
280-o xattrmap="/map/trusted./user.virtiofs./"
281
491bfaea
DDAG
2823) Hide 'security.' attributes, and allow everything else
283
284::
285
286 "/bad/all/security./security./
287 /ok/all///'
288
289The first rule combines what could be separate client and server
290rules into a single 'all' rule, matching 'security.' in either
291client arguments or lists returned from the host. This stops
292the client seeing any 'security.' attributes on the server and
293stops it setting any.
294
6a7e2bbe
SH
295Examples
296--------
297
298Export ``/var/lib/fs/vm001/`` on vhost-user UNIX domain socket
299``/var/run/vm001-vhost-fs.sock``:
300
301::
302
303 host# virtiofsd --socket-path=/var/run/vm001-vhost-fs.sock -o source=/var/lib/fs/vm001
304 host# qemu-system-x86_64 \
305 -chardev socket,id=char0,path=/var/run/vm001-vhost-fs.sock \
306 -device vhost-user-fs-pci,chardev=char0,tag=myfs \
307 -object memory-backend-memfd,id=mem,size=4G,share=on \
308 -numa node,memdev=mem \
309 ...
310 guest# mount -t virtiofs myfs /mnt