[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] VMX status report. Xen: #17630 & Xen0: #540 -- blocked



Li, Haicheng writes ("[Xen-devel] VMX status report. Xen: #17630 & Xen0: #540 
-- blocked"):
> Today's nightly testing is still blocked for both PAE and 32E, c/s 17606
> introduced this issue.
...
> New issue:
> [Bug 1250] HVM guest can not boot with Qcow image
> http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1250

I'm afraid you are using the wrong syntax.
file:... is for raw images.

Prior to changeset 17606, the emulated IDE controller would, if the
specified file looked like a qcow image, interpret it that way - but
the PV presentation of the same device (via blktap) to the same guest
would treat it as a raw image.  This (and other related scenarios)
allows a malicious guest to read any file on the host (including for
example the host's underlying disk devices), because the qcow image
format contains the (host) pathname of the backing file.

In changeset 17606 the behaviour was changed so that file:... always
treats the specified file as a raw disk image.  To use a file
containing a qcow image, you have to say tap:qcow:...

This was discussed here on the list quite recently; feel free to
comment further if you think the fix is the wrong one.

Ian.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.