qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* [Qemu-devel] [Bug 1831354] [NEW] unable to read symlinks when mounting 9p filesystem with security_model=mapped
@ 2019-06-02  0:20 Olie Hilt
  2019-06-02  0:21 ` [Qemu-devel] [Bug 1831354] " Olie Hilt
  2021-05-05 11:45 ` Thomas Huth
  0 siblings, 2 replies; 3+ messages in thread
From: Olie Hilt @ 2019-06-02  0:20 UTC (permalink / raw)
  To: qemu-devel

Public bug reported:

I am trying to use clang that is mounted from a 9p filesystem that has the options 
 -fsdev local,id=virtfs3,path=/clang,security_model=mapped-file -device virtio-9p-pci,fsdev=virtfs3,mount_tag=clang

clang has symlinks to clang-9. eg /clang/clang/bin/clang is a symlink
that points to clang-9 in the current directory.

the clang filesystem is on a bind mount point on /clang/clang on the
host and this is mapped to the same place on the guest. If I have the
same virtfs mount point with the security_model=none I don't have this
problem.

** Affects: qemu
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1831354

Title:
  unable to read symlinks when mounting 9p filesystem with
  security_model=mapped

Status in QEMU:
  New

Bug description:
  I am trying to use clang that is mounted from a 9p filesystem that has the options 
   -fsdev local,id=virtfs3,path=/clang,security_model=mapped-file -device virtio-9p-pci,fsdev=virtfs3,mount_tag=clang

  clang has symlinks to clang-9. eg /clang/clang/bin/clang is a symlink
  that points to clang-9 in the current directory.

  the clang filesystem is on a bind mount point on /clang/clang on the
  host and this is mapped to the same place on the guest. If I have the
  same virtfs mount point with the security_model=none I don't have this
  problem.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1831354/+subscriptions


^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Qemu-devel] [Bug 1831354] Re: unable to read symlinks when mounting 9p filesystem with security_model=mapped
  2019-06-02  0:20 [Qemu-devel] [Bug 1831354] [NEW] unable to read symlinks when mounting 9p filesystem with security_model=mapped Olie Hilt
@ 2019-06-02  0:21 ` Olie Hilt
  2021-05-05 11:45 ` Thomas Huth
  1 sibling, 0 replies; 3+ messages in thread
From: Olie Hilt @ 2019-06-02  0:21 UTC (permalink / raw)
  To: qemu-devel

On the host: readlink clang
clang-9

and guest:

ls: cannot read symbolic link 'clang': No such file or directory
lrwxrwxrwx 1 root root 7 May 30 02:21 clang

readlink clang

returns nothing.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1831354

Title:
  unable to read symlinks when mounting 9p filesystem with
  security_model=mapped

Status in QEMU:
  New

Bug description:
  I am trying to use clang that is mounted from a 9p filesystem that has the options 
   -fsdev local,id=virtfs3,path=/clang,security_model=mapped-file -device virtio-9p-pci,fsdev=virtfs3,mount_tag=clang

  clang has symlinks to clang-9. eg /clang/clang/bin/clang is a symlink
  that points to clang-9 in the current directory.

  the clang filesystem is on a bind mount point on /clang/clang on the
  host and this is mapped to the same place on the guest. If I have the
  same virtfs mount point with the security_model=none I don't have this
  problem.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1831354/+subscriptions


^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug 1831354] Re: unable to read symlinks when mounting 9p filesystem with security_model=mapped
  2019-06-02  0:20 [Qemu-devel] [Bug 1831354] [NEW] unable to read symlinks when mounting 9p filesystem with security_model=mapped Olie Hilt
  2019-06-02  0:21 ` [Qemu-devel] [Bug 1831354] " Olie Hilt
@ 2021-05-05 11:45 ` Thomas Huth
  1 sibling, 0 replies; 3+ messages in thread
From: Thomas Huth @ 2021-05-05 11:45 UTC (permalink / raw)
  To: qemu-devel

This is an automated cleanup. This bug report has been moved to QEMU's
new bug tracker on gitlab.com and thus gets marked as 'expired' now.
Please continue with the discussion here:

 https://gitlab.com/qemu-project/qemu/-/issues/173


** Changed in: qemu
       Status: New => Expired

** Bug watch added: gitlab.com/qemu-project/qemu/-/issues #173
   https://gitlab.com/qemu-project/qemu/-/issues/173

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1831354

Title:
  unable to read symlinks when mounting 9p filesystem with
  security_model=mapped

Status in QEMU:
  Expired

Bug description:
  I am trying to use clang that is mounted from a 9p filesystem that has the options 
   -fsdev local,id=virtfs3,path=/clang,security_model=mapped-file -device virtio-9p-pci,fsdev=virtfs3,mount_tag=clang

  clang has symlinks to clang-9. eg /clang/clang/bin/clang is a symlink
  that points to clang-9 in the current directory.

  the clang filesystem is on a bind mount point on /clang/clang on the
  host and this is mapped to the same place on the guest. If I have the
  same virtfs mount point with the security_model=none I don't have this
  problem.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1831354/+subscriptions


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2021-05-05 11:58 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-06-02  0:20 [Qemu-devel] [Bug 1831354] [NEW] unable to read symlinks when mounting 9p filesystem with security_model=mapped Olie Hilt
2019-06-02  0:21 ` [Qemu-devel] [Bug 1831354] " Olie Hilt
2021-05-05 11:45 ` Thomas Huth

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).