A directory mounted via virtfs with security-model=mapped[-xattr|-file] can contain 
"native" symlinks

This can happen e.g. when booting from a rootfs directory tree (usually with 
writable overlay set up on the host side)

Currently, with security-model=mapped, QEMU expects that all host "symlinks" are in 
"mapped" format, i.e. are files containing the linked path, so it tries to open with 
O_NOFOLLOW and fails with ELOOP in case of a native symlink

This patch gives such cases a second chance: trying to open as a native 
symlink, by reusing security-model=[none|passthrough] else if branch

QEMU issues:
https://gitlab.com/qemu-project/qemu/-/issues/173 (from 
https://bugs.launchpad.net/qemu/+bug/1831354)
https://gitlab.com/qemu-project/qemu/-/issues/3088 (dup of the first one)


Signed-off-by: Andrey Erokhin <[email protected]>


diff --git a/hw/9pfs/9p-local.c b/hw/9pfs/9p-local.c
index 31e216227c..b4f8be2c81 100644
--- a/hw/9pfs/9p-local.c
+++ b/hw/9pfs/9p-local.c
@@ -468,12 +468,14 @@ static ssize_t local_readlink(FsContext *fs_ctx, V9fsPath 
*fs_path,
fd = local_open_nofollow(fs_ctx, fs_path->data, O_RDONLY, 0);
         if (fd == -1) {
+            if (errno == ELOOP) goto native_symlink;
             return -1;
         }
         tsize = RETRY_ON_EINTR(read(fd, (void *)buf, bufsz));
         close_preserve_errno(fd);
     } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) ||
                (fs_ctx->export_flags & V9FS_SM_NONE)) {
+native_symlink:;
         char *dirpath = g_path_get_dirname(fs_path->data);
         char *name = g_path_get_basename(fs_path->data);
         int dirfd;


Reply via email to