public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
To: Laszlo Ersek <lersek@redhat.com>
Cc: devel@edk2.groups.io, virtio-fs@redhat.com,
	"Jordan Justen" <jordan.l.justen@intel.com>,
	"Philippe Mathieu-Daudé" <philmd@redhat.com>,
	"Ard Biesheuvel" <ard.biesheuvel@arm.com>
Subject: Re: [Virtio-fs] [edk2 PATCH 06/48] OvmfPkg/VirtioFsDxe: introduce the basic FUSE request/response headers
Date: Thu, 17 Dec 2020 14:06:30 +0000	[thread overview]
Message-ID: <20201217140630.GF4117@work-vm> (raw)
In-Reply-To: <936ba94a-8226-8649-d9af-b5f6382ebbc2@redhat.com>

* Laszlo Ersek (lersek@redhat.com) wrote:
> On 12/17/20 12:49, Dr. David Alan Gilbert wrote:
> > * Laszlo Ersek (lersek@redhat.com) wrote:
> >> Introduce the VIRTIO_FS_FUSE_REQUEST and VIRTIO_FS_FUSE_RESPONSE
> >> structures, which are the common headers for the various FUSE
> >> request/response structures.
> >>
> >> Introduce the VirtioFsFuseNewRequest() helper function for populating
> >> VIRTIO_FS_FUSE_REQUEST, from parameters and from a VIRTIO_FS-level request
> >> counter.
> >>
> >> Introduce the VirtioFsFuseCheckResponse() helper function for verifying
> >> most FUSE response types that begin with the VIRTIO_FS_FUSE_RESPONSE
> >> header.
> >>
> >> Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>
> >> Cc: Jordan Justen <jordan.l.justen@intel.com>
> >> Cc: Philippe Mathieu-Daudé <philmd@redhat.com>
> >> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3097
> >> Signed-off-by: Laszlo Ersek <lersek@redhat.com>
> >> ---
> >>  OvmfPkg/Include/IndustryStandard/VirtioFs.h |  49 +++++
> >>  OvmfPkg/VirtioFsDxe/VirtioFsDxe.h           |  17 ++
> >>  OvmfPkg/VirtioFsDxe/DriverBinding.c         |   5 +
> >>  OvmfPkg/VirtioFsDxe/Helpers.c               | 216 ++++++++++++++++++++
> >>  4 files changed, 287 insertions(+)
> >>
> >> diff --git a/OvmfPkg/Include/IndustryStandard/VirtioFs.h b/OvmfPkg/Include/IndustryStandard/VirtioFs.h
> >> index ea7d80d15d0b..521288b03f1c 100644
> >> --- a/OvmfPkg/Include/IndustryStandard/VirtioFs.h
> >> +++ b/OvmfPkg/Include/IndustryStandard/VirtioFs.h
> >> @@ -44,9 +44,58 @@ typedef struct {
> >>    //
> >>    // The total number of request virtqueues exposed by the device (i.e.,
> >>    // excluding the "hiprio" queue).
> >>    //
> >>    UINT32 NumReqQueues;
> >>  } VIRTIO_FS_CONFIG;
> >>  #pragma pack ()
> >>  
> >> +//
> >> +// FUSE-related definitions follow.
> >> +//
> >> +// From virtio-v1.1-cs01-87fa6b5d8155, 5.11 File System Device: "[...] The
> >> +// driver acts as the FUSE client mounting the file system. The virtio file
> >> +// system device provides the mechanism for transporting FUSE requests [...]"
> >> +//
> >> +// Unfortunately, the documentation of the FUSE wire protocol is lacking. The
> >> +// Virtio spec (as of this writing) simply defers to
> >> +// "include/uapi/linux/fuse.h" in the Linux kernel source -- see the reference
> >> +// in virtio spec file "introduction.tex", at commit 87fa6b5d8155.
> >> +//
> >> +// Of course, "include/uapi/linux/fuse.h" is a moving target (the virtio spec
> >> +// does not specify a particular FUSE interface version). The OvmfPkg code
> >> +// targets version 7.31, because that's the lowest version that the QEMU
> >> +// virtio-fs daemon supports at this time -- see QEMU commit 72c42e2d6551
> >> +// ("virtiofsd: Trim out compatibility code", 2020-01-23).
> > 
> > Fuse has it's own in built protocol versioning and negotiation, and as I
> > remember it's the version of the header in the Linux kernel that's the
> > definitive version.  I think it would have also been safe just to take
> > the latest released kernel version
> 
> 7.32 (kernel commit c6ff213fe5b8) introduces "submount support", which
> does not seem relevant. The strategy we follow in
> "OvmfPkg/Include/IndustryStandard" is: never include or convert header
> files from other projects whole-sale; always evaluate every structure
> and macro one by one for necessity, and if a definition is really needed
> for the driver being implemented, add that definition manually, and
> natively to the edk2 coding style.

The 'submount support' is probably something you don't need; note that
you may end up with multiple files with the same inode number
(if the host fs has submounts).

> This approach has caused zero friction or extra maintenance work over
> the years, and it allows for a native look & feel. (It's a different
> question what people think of edk2's "native" look and feel :))
> 
> A counter-example is the Xen headers in
> "OvmfPkg/Include/IndustryStandard/Xen", which were mass-imported and
> then fixed up separately for edk2 compatibility at some point -- much to
> my dismay. They feel totally foreign in edk2 and they've never stopped
> being a thorn in my side. It's not just the headers of course: when you
> *use* those macros and typedefs in the actual driver code, it shows.
> 
> So, as long as it's up to me, OVMF never "just takes" but "adds from
> zero", and I do stick with the absolute minimum needed.

Yep that's fine.

Dave

> Thanks,
> Laszlo
> 
> > 
> > Dave
> > 
> >> +// Correspondingly, Linux's "include/uapi/linux/fuse.h" is consulted as checked
> >> +// out at commit (c6ff213fe5b8^) = d78092e4937d ("fuse: fix page dereference
> >> +// after free", 2020-09-18); that is, right before commit c6ff213fe5b8 ("fuse:
> >> +// add submount support to <uapi/linux/fuse.h>", 2020-09-18) introduces FUSE
> >> +// interface version 7.32.
> >> +//
> >> +#define VIRTIO_FS_FUSE_MAJOR  7
> >> +#define VIRTIO_FS_FUSE_MINOR 31
> >> +
> >> +#pragma pack (1)
> >> +//
> >> +// Request-response headers common to all request types.
> >> +//
> >> +typedef struct {
> >> +  UINT32 Len;
> >> +  UINT32 Opcode;
> >> +  UINT64 Unique;
> >> +  UINT64 NodeId;
> >> +  UINT32 Uid;
> >> +  UINT32 Gid;
> >> +  UINT32 Pid;
> >> +  UINT32 Padding;
> >> +} VIRTIO_FS_FUSE_REQUEST;
> >> +
> >> +typedef struct {
> >> +  UINT32 Len;
> >> +  INT32  Error;
> >> +  UINT64 Unique;
> >> +} VIRTIO_FS_FUSE_RESPONSE;
> >> +#pragma pack ()
> >> +
> >>  #endif // VIRTIO_FS_H_
> >> diff --git a/OvmfPkg/VirtioFsDxe/VirtioFsDxe.h b/OvmfPkg/VirtioFsDxe/VirtioFsDxe.h
> >> index 12acbd6dc359..f7eae9a4b71a 100644
> >> --- a/OvmfPkg/VirtioFsDxe/VirtioFsDxe.h
> >> +++ b/OvmfPkg/VirtioFsDxe/VirtioFsDxe.h
> >> @@ -39,16 +39,17 @@ typedef struct {
> >>    //                              field         init function       init depth
> >>    //                              -----------   ------------------  ----------
> >>    UINT64                          Signature; // DriverBindingStart  0
> >>    VIRTIO_DEVICE_PROTOCOL          *Virtio;   // DriverBindingStart  0
> >>    VIRTIO_FS_LABEL                 Label;     // VirtioFsInit        1
> >>    UINT16                          QueueSize; // VirtioFsInit        1
> >>    VRING                           Ring;      // VirtioRingInit      2
> >>    VOID                            *RingMap;  // VirtioRingMap       2
> >> +  UINT64                          RequestId; // DriverBindingStart  0
> >>    EFI_EVENT                       ExitBoot;  // DriverBindingStart  0
> >>    EFI_SIMPLE_FILE_SYSTEM_PROTOCOL SimpleFs;  // DriverBindingStart  0
> >>  } VIRTIO_FS;
> >>  
> >>  #define VIRTIO_FS_FROM_SIMPLE_FS(SimpleFsReference) \
> >>    CR (SimpleFsReference, VIRTIO_FS, SimpleFs, VIRTIO_FS_SIG);
> >>  
> >>  //
> >> @@ -127,16 +128,32 @@ VirtioFsSgListsValidate (
> >>  
> >>  EFI_STATUS
> >>  VirtioFsSgListsSubmit (
> >>    IN OUT VIRTIO_FS                     *VirtioFs,
> >>    IN OUT VIRTIO_FS_SCATTER_GATHER_LIST *RequestSgList,
> >>    IN OUT VIRTIO_FS_SCATTER_GATHER_LIST *ResponseSgList OPTIONAL
> >>    );
> >>  
> >> +EFI_STATUS
> >> +VirtioFsFuseNewRequest (
> >> +  IN OUT VIRTIO_FS              *VirtioFs,
> >> +     OUT VIRTIO_FS_FUSE_REQUEST *Request,
> >> +  IN     UINT32                 RequestSize,
> >> +  IN     UINT32                 Opcode,
> >> +  IN     UINT64                 NodeId
> >> +  );
> >> +
> >> +EFI_STATUS
> >> +VirtioFsFuseCheckResponse (
> >> +  IN  VIRTIO_FS_SCATTER_GATHER_LIST *ResponseSgList,
> >> +  IN  UINT64                        RequestId,
> >> +  OUT UINTN                         *TailBufferFill
> >> +  );
> >> +
> >>  //
> >>  // EFI_SIMPLE_FILE_SYSTEM_PROTOCOL member functions for the Virtio Filesystem
> >>  // driver.
> >>  //
> >>  
> >>  EFI_STATUS
> >>  EFIAPI
> >>  VirtioFsOpenVolume (
> >> diff --git a/OvmfPkg/VirtioFsDxe/DriverBinding.c b/OvmfPkg/VirtioFsDxe/DriverBinding.c
> >> index b888158a805d..4a2787a50a6e 100644
> >> --- a/OvmfPkg/VirtioFsDxe/DriverBinding.c
> >> +++ b/OvmfPkg/VirtioFsDxe/DriverBinding.c
> >> @@ -79,16 +79,21 @@ VirtioFsBindingStart (
> >>      goto FreeVirtioFs;
> >>    }
> >>  
> >>    Status = VirtioFsInit (VirtioFs);
> >>    if (EFI_ERROR (Status)) {
> >>      goto CloseVirtio;
> >>    }
> >>  
> >> +  //
> >> +  // Initialize the FUSE request counter.
> >> +  //
> >> +  VirtioFs->RequestId = 1;
> >> +
> >>    Status = gBS->CreateEvent (EVT_SIGNAL_EXIT_BOOT_SERVICES, TPL_CALLBACK,
> >>                    VirtioFsExitBoot, VirtioFs, &VirtioFs->ExitBoot);
> >>    if (EFI_ERROR (Status)) {
> >>      goto UninitVirtioFs;
> >>    }
> >>  
> >>    VirtioFs->SimpleFs.Revision   = EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_REVISION;
> >>    VirtioFs->SimpleFs.OpenVolume = VirtioFsOpenVolume;
> >> diff --git a/OvmfPkg/VirtioFsDxe/Helpers.c b/OvmfPkg/VirtioFsDxe/Helpers.c
> >> index 88264d4b264c..5bd2dc641f6d 100644
> >> --- a/OvmfPkg/VirtioFsDxe/Helpers.c
> >> +++ b/OvmfPkg/VirtioFsDxe/Helpers.c
> >> @@ -693,8 +693,224 @@ VirtioFsSgListsSubmit (
> >>        if (!EFI_ERROR (Status) && EFI_ERROR (UnmapStatus)) {
> >>          Status = UnmapStatus;
> >>        }
> >>      }
> >>    }
> >>  
> >>    return Status;
> >>  }
> >> +
> >> +/**
> >> +  Set up the fields of a new VIRTIO_FS_FUSE_REQUEST object.
> >> +
> >> +  The function may only be called after VirtioFsInit() returns successfully and
> >> +  before VirtioFsUninit() is called.
> >> +
> >> +  @param[in,out] VirtioFs The Virtio Filesystem device that the request is
> >> +                          being prepared for. The "VirtioFs->RequestId" field
> >> +                          will be copied into "Request->Unique". On output (on
> >> +                          successful return), "VirtioFs->RequestId" will be
> >> +                          incremented.
> >> +
> >> +  @param[out] Request     The VIRTIO_FS_FUSE_REQUEST object whose fields are to
> >> +                          be set.
> >> +
> >> +  @param[in] RequestSize  The total size of the request, including
> >> +                          sizeof(VIRTIO_FS_FUSE_REQUEST).
> >> +
> >> +  @param[in] Opcode       The VIRTIO_FS_FUSE_OPCODE that identifies the command
> >> +                          to send.
> >> +
> >> +  @param[in] NodeId       The inode number of the file that the request refers
> >> +                          to.
> >> +
> >> +  @retval EFI_INVALID_PARAMETER  RequestSize is smaller than
> >> +                                 sizeof(VIRTIO_FS_FUSE_REQUEST).
> >> +
> >> +  @retval EFI_OUT_OF_RESOURCES   "VirtioFs->RequestId" is MAX_UINT64, and can
> >> +                                 be incremented no more.
> >> +
> >> +  @retval EFI_SUCCESS            Request has been populated,
> >> +                                 "VirtioFs->RequestId" has been incremented.
> >> +**/
> >> +EFI_STATUS
> >> +VirtioFsFuseNewRequest (
> >> +  IN OUT VIRTIO_FS              *VirtioFs,
> >> +     OUT VIRTIO_FS_FUSE_REQUEST *Request,
> >> +  IN     UINT32                 RequestSize,
> >> +  IN     UINT32                 Opcode,
> >> +  IN     UINT64                 NodeId
> >> +  )
> >> +{
> >> +  if (RequestSize < sizeof *Request) {
> >> +    return EFI_INVALID_PARAMETER;
> >> +  }
> >> +
> >> +  if (VirtioFs->RequestId == MAX_UINT64) {
> >> +    return EFI_OUT_OF_RESOURCES;
> >> +  }
> >> +
> >> +  Request->Len     = RequestSize;
> >> +  Request->Opcode  = Opcode;
> >> +  Request->Unique  = VirtioFs->RequestId++;
> >> +  Request->NodeId  = NodeId;
> >> +  Request->Uid     = 0;
> >> +  Request->Gid     = 0;
> >> +  Request->Pid     = 1;
> >> +  Request->Padding = 0;
> >> +
> >> +  return EFI_SUCCESS;
> >> +}
> >> +
> >> +/**
> >> +  Check the common FUSE response format.
> >> +
> >> +  The first buffer in the response scatter-gather list is assumed a
> >> +  VIRTIO_FS_FUSE_RESPONSE structure. Subsequent response buffers, if any, up to
> >> +  and excluding the last one, are assumed fixed size. The last response buffer
> >> +  may or may not be fixed size, as specified by the caller.
> >> +
> >> +  This function may only be called after VirtioFsSgListsSubmit() returns
> >> +  successfully.
> >> +
> >> +  @param[in] ResponseSgList   The scatter-gather list that describes the
> >> +                              response part of the exchange -- the buffers that
> >> +                              the Virtio Filesystem device filled in during the
> >> +                              virtio transfer.
> >> +
> >> +  @param[in] RequestId        The request identifier to which the response is
> >> +                              expected to belong.
> >> +
> >> +  @param[out] TailBufferFill  If NULL, then the last buffer in ResponseSgList
> >> +                              is considered fixed size. Otherwise, the last
> >> +                              buffer is considered variable size, and on
> >> +                              successful return, TailBufferFill reports the
> >> +                              number of bytes in the last buffer.
> >> +
> >> +  @retval EFI_INVALID_PARAMETER  TailBufferFill is not NULL (i.e., the last
> >> +                                 buffer is considered variable size), and
> >> +                                 ResponseSgList->NumVec is 1.
> >> +
> >> +  @retval EFI_INVALID_PARAMETER  The allocated size of the first buffer does
> >> +                                 not match sizeof(VIRTIO_FS_FUSE_RESPONSE).
> >> +
> >> +  @retval EFI_PROTOCOL_ERROR     The VIRTIO_FS_FUSE_RESPONSE structure in the
> >> +                                 first buffer has not been fully populated.
> >> +
> >> +  @retval EFI_PROTOCOL_ERROR     "VIRTIO_FS_FUSE_RESPONSE.Len" in the first
> >> +                                 buffer does not equal the sum of the
> >> +                                 individual buffer sizes (as populated).
> >> +
> >> +  @retval EFI_PROTOCOL_ERROR     "VIRTIO_FS_FUSE_RESPONSE.Unique" in the first
> >> +                                 buffer does not equal RequestId.
> >> +
> >> +  @retval EFI_PROTOCOL_ERROR     "VIRTIO_FS_FUSE_RESPONSE.Error" in the first
> >> +                                 buffer is zero, but a subsequent fixed size
> >> +                                 buffer has not been fully populated.
> >> +
> >> +  @retval EFI_DEVICE_ERROR       "VIRTIO_FS_FUSE_RESPONSE.Error" in the first
> >> +                                 buffer is nonzero. The caller may investigate
> >> +                                 "VIRTIO_FS_FUSE_RESPONSE.Error". Note that the
> >> +                                 completeness of the subsequent fixed size
> >> +                                 buffers is not verified in this case.
> >> +
> >> +  @retval EFI_SUCCESS            Verification successful.
> >> +**/
> >> +EFI_STATUS
> >> +VirtioFsFuseCheckResponse (
> >> +  IN  VIRTIO_FS_SCATTER_GATHER_LIST *ResponseSgList,
> >> +  IN  UINT64                        RequestId,
> >> +  OUT UINTN                         *TailBufferFill
> >> +  )
> >> +{
> >> +  UINTN                   NumFixedSizeVec;
> >> +  VIRTIO_FS_FUSE_RESPONSE *CommonResp;
> >> +  UINT32                  TotalTransferred;
> >> +  UINTN                   Idx;
> >> +
> >> +  //
> >> +  // Ensured by VirtioFsSgListsValidate().
> >> +  //
> >> +  ASSERT (ResponseSgList->NumVec > 0);
> >> +
> >> +  if (TailBufferFill == NULL) {
> >> +    //
> >> +    // All buffers are considered fixed size.
> >> +    //
> >> +    NumFixedSizeVec = ResponseSgList->NumVec;
> >> +  } else {
> >> +    //
> >> +    // If the last buffer is variable size, then we need that buffer to be
> >> +    // different from the first buffer, which is considered a
> >> +    // VIRTIO_FS_FUSE_RESPONSE (fixed size) structure.
> >> +    //
> >> +    if (ResponseSgList->NumVec == 1) {
> >> +      return EFI_INVALID_PARAMETER;
> >> +    }
> >> +    NumFixedSizeVec = ResponseSgList->NumVec - 1;
> >> +  }
> >> +
> >> +  //
> >> +  // The first buffer is supposed to carry a (fully populated)
> >> +  // VIRTIO_FS_FUSE_RESPONSE structure.
> >> +  //
> >> +  if (ResponseSgList->IoVec[0].Size != sizeof *CommonResp) {
> >> +    return EFI_INVALID_PARAMETER;
> >> +  }
> >> +  if (ResponseSgList->IoVec[0].Transferred != ResponseSgList->IoVec[0].Size) {
> >> +    return EFI_PROTOCOL_ERROR;
> >> +  }
> >> +
> >> +  //
> >> +  // FUSE must report the same number of bytes, written by the Virtio
> >> +  // Filesystem device, as the virtio transport does.
> >> +  //
> >> +  CommonResp = ResponseSgList->IoVec[0].Buffer;
> >> +  TotalTransferred = 0;
> >> +  for (Idx = 0; Idx < ResponseSgList->NumVec; Idx++) {
> >> +    //
> >> +    // Integer overflow and truncation are not possible, based on
> >> +    // VirtioFsSgListsValidate() and VirtioFsSgListsSubmit().
> >> +    //
> >> +    TotalTransferred += (UINT32)ResponseSgList->IoVec[Idx].Transferred;
> >> +  }
> >> +  if (CommonResp->Len != TotalTransferred) {
> >> +    return EFI_PROTOCOL_ERROR;
> >> +  }
> >> +
> >> +  //
> >> +  // Enforce that FUSE match our request ID in the response.
> >> +  //
> >> +  if (CommonResp->Unique != RequestId) {
> >> +    return EFI_PROTOCOL_ERROR;
> >> +  }
> >> +
> >> +  //
> >> +  // If there is an explicit error report, skip checking the transfer
> >> +  // counts for the rest of the fixed size buffers.
> >> +  //
> >> +  if (CommonResp->Error != 0) {
> >> +    return EFI_DEVICE_ERROR;
> >> +  }
> >> +
> >> +  //
> >> +  // There was no error reported, so we require that the Virtio Filesystem
> >> +  // device populate all fixed size buffers. We checked this for the very first
> >> +  // buffer above; let's check the rest (if any).
> >> +  //
> >> +  ASSERT (NumFixedSizeVec >= 1);
> >> +  for (Idx = 1; Idx < NumFixedSizeVec; Idx++) {
> >> +    if (ResponseSgList->IoVec[Idx].Transferred !=
> >> +        ResponseSgList->IoVec[Idx].Size) {
> >> +      return EFI_PROTOCOL_ERROR;
> >> +    }
> >> +  }
> >> +
> >> +  //
> >> +  // If the last buffer is considered variable size, report its filled size.
> >> +  //
> >> +  if (TailBufferFill != NULL) {
> >> +    *TailBufferFill = ResponseSgList->IoVec[NumFixedSizeVec].Transferred;
> >> +  }
> >> +
> >> +  return EFI_SUCCESS;
> >> +}
> >> -- 
> >> 2.19.1.3.g30247aa5d201
> >>
> >>
> >>
> >> _______________________________________________
> >> Virtio-fs mailing list
> >> Virtio-fs@redhat.com
> >> https://www.redhat.com/mailman/listinfo/virtio-fs
> 
-- 
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK


  reply	other threads:[~2020-12-17 14:06 UTC|newest]

Thread overview: 65+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-12-16 21:10 [edk2 PATCH 00/48] ArmVirtPkg, OvmfPkg: virtio filesystem driver Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 01/48] OvmfPkg: introduce VirtioFsDxe Laszlo Ersek
2020-12-18 17:42   ` Ard Biesheuvel
2020-12-18 18:13     ` [Virtio-fs] " Dr. David Alan Gilbert
2020-12-19 21:16       ` Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 02/48] ArmVirtPkg: include VirtioFsDxe in the ArmVirtQemu* platforms Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 03/48] OvmfPkg/VirtioFsDxe: DriverBinding: open VirtioDevice, install SimpleFs Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 04/48] OvmfPkg/VirtioFsDxe: implement virtio device (un)initialization Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 05/48] OvmfPkg/VirtioFsDxe: add a scatter-gather list data type Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 06/48] OvmfPkg/VirtioFsDxe: introduce the basic FUSE request/response headers Laszlo Ersek
2020-12-17 11:49   ` [Virtio-fs] " Dr. David Alan Gilbert
2020-12-17 13:57     ` Laszlo Ersek
2020-12-17 14:06       ` Dr. David Alan Gilbert [this message]
2020-12-17 14:32       ` Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 07/48] OvmfPkg/VirtioFsDxe: map "errno" values to EFI_STATUS Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 08/48] OvmfPkg/VirtioFsDxe: submit the FUSE_INIT request to the device Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 09/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_OPENDIR Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 10/48] OvmfPkg/VirtioFsDxe: add shared wrapper for FUSE_RELEASE / FUSE_RELEASEDIR Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 11/48] OvmfPkg/VirtioFsDxe: implement EFI_SIMPLE_FILE_SYSTEM_PROTOCOL.OpenVolume() Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 12/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_FORGET Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 13/48] OvmfPkg/VirtioFsDxe: add a shared wrapper for FUSE_FSYNC / FUSE_FSYNCDIR Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 14/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_FLUSH Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 15/48] OvmfPkg/VirtioFsDxe: flush, sync, release and forget in Close() / Delete() Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 16/48] OvmfPkg/VirtioFsDxe: add helper for appending and sanitizing paths Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 17/48] OvmfPkg/VirtioFsDxe: manage path lifecycle in OpenVolume, Close, Delete Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 18/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_OPEN Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 19/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_MKDIR Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 20/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_CREATE Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 21/48] OvmfPkg/VirtioFsDxe: convert FUSE inode attributes to EFI_FILE_INFO Laszlo Ersek
2020-12-16 21:10 ` [edk2 PATCH 22/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_LOOKUP Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 23/48] OvmfPkg/VirtioFsDxe: split canon. path into last parent + last component Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 24/48] OvmfPkg/VirtioFsDxe: add a shared wrapper for FUSE_UNLINK / FUSE_RMDIR Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 25/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_GETATTR Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 26/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.Open() Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 27/48] OvmfPkg/VirtioFsDxe: erase the dir. entry in EFI_FILE_PROTOCOL.Delete() Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 28/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_STATFS Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 29/48] OvmfPkg/VirtioFsDxe: add helper for formatting UEFI basenames Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 30/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.GetInfo() Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 31/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.GetPosition, .SetPosition Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 32/48] OvmfPkg/VirtioFsDxe: add a shared wrapper for FUSE_READ / FUSE_READDIRPLUS Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 33/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.Read() for regular files Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 34/48] OvmfPkg/VirtioFsDxe: convert FUSE dirent filename to EFI_FILE_INFO Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 35/48] OvmfPkg/VirtioFsDxe: add EFI_FILE_INFO cache fields to VIRTIO_FS_FILE Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 36/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.Read() for directories Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 37/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.Flush() Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 38/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_WRITE Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 39/48] OvmfPkg/VirtioFsDxe: implement EFI_FILE_PROTOCOL.Write() Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 40/48] OvmfPkg/VirtioFsDxe: handle the volume label in EFI_FILE_PROTOCOL.SetInfo Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 41/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_RENAME2 Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 42/48] OvmfPkg/VirtioFsDxe: add helper for composing rename/move destination path Laszlo Ersek
2020-12-18 17:39   ` Ard Biesheuvel
2020-12-19 22:40     ` Laszlo Ersek
2020-12-19 22:54       ` Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 43/48] OvmfPkg/VirtioFsDxe: handle file rename/move in EFI_FILE_PROTOCOL.SetInfo Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 44/48] OvmfPkg/VirtioFsDxe: implement the wrapper function for FUSE_SETATTR Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 45/48] OvmfPkg/VirtioFsDxe: add helper for determining file size update Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 46/48] OvmfPkg/VirtioFsDxe: add helper for determining access time updates Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 47/48] OvmfPkg/VirtioFsDxe: add helper for determining file mode bits update Laszlo Ersek
2020-12-16 21:11 ` [edk2 PATCH 48/48] OvmfPkg/VirtioFsDxe: handle attribute updates in EFI_FILE_PROTOCOL.SetInfo Laszlo Ersek
2020-12-18 17:44 ` [edk2 PATCH 00/48] ArmVirtPkg, OvmfPkg: virtio filesystem driver Ard Biesheuvel
2020-12-20  0:09   ` Laszlo Ersek
2020-12-20 10:15     ` Ard Biesheuvel
2020-12-21  1:46       ` Laszlo Ersek
2020-12-21 10:10         ` Ard Biesheuvel
2020-12-21 18:02           ` [edk2-devel] " Laszlo Ersek

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20201217140630.GF4117@work-vm \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox