Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

p9share: guest/host permissions #167

Open
miurahr opened this issue Mar 4, 2014 · 3 comments
Open

p9share: guest/host permissions #167

miurahr opened this issue Mar 4, 2014 · 3 comments
Assignees

Comments

@miurahr
Copy link
Collaborator

miurahr commented Mar 4, 2014

qemu's virtfs has a difficulty in host/guest owner/group and permissions.

It has three access modes.

1 mapped: Files are created with Qemu user credentials and the client-user's credentials are saved in extended attributes.
2 passthrough: Files on the filesystem are directly created with client-user's credentials.
3 none: It is equivalent to passthrough security model; the only exception is, failure of priviliged operation like chown are ignored. This makes a passthrough like security model usable for people who run kvm as non root.

In default, 'none' aka. 'squash' in configuration.

for squash, user need to take care of owner's and permissions both guest credentials and host qemu's uid/gid.
Files and directories should be permitted to r/w for qemu(eg. libvirt-qemu/kvm) and guest(eg. vagrant/vagrant) in Ubuntu.

@miurahr miurahr added this to the 0.1.6 milestone Mar 4, 2014
@miurahr miurahr self-assigned this Mar 4, 2014
@miurahr
Copy link
Collaborator Author

miurahr commented Mar 23, 2014

Need document.

@adrahon
Copy link
Owner

adrahon commented Jun 5, 2014

Currently on Fedora 20, I have read only access to the shared directory, I don't know if it's what we want, but we need to document it.

@miurahr
Copy link
Collaborator Author

miurahr commented Jul 1, 2014

In recent Operating system, qemu/kvm run in its special user: libvirt-qemu or similar user.
p9 shared folders are often owned by normal user.
It happens that qemu cannot write shared folder because of owner mismatch. libvirt-qemu user cannot write in a directory owned by normal user that permission is usually 755, or 775.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants