|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1250] HVM guest can not boot with Qcow image
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1250
------- Comment #2 from haicheng.li@xxxxxxxxx 2008-05-14 23:08 -------
Ian Jackson wrote:
> I'm afraid you are using the wrong syntax.
> file:... is for raw images.
>
> Prior to changeset 17606, the emulated IDE controller would, if the
> specified file looked like a qcow image, interpret it that way - but
> the PV presentation of the same device (via blktap) to the same guest
> would treat it as a raw image. This (and other related scenarios)
> allows a malicious guest to read any file on the host (including for
> example the host's underlying disk devices), because the qcow image
> format contains the (host) pathname of the backing file.
>
> In changeset 17606 the behaviour was changed so that file:... always
> treats the specified file as a raw disk image. To use a file
> containing a qcow image, you have to say tap:qcow:...
>
> This was discussed here on the list quite recently; feel free to
> comment further if you think the fix is the wrong one.
>
> Ian.
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
|
|
|
|