summaryrefslogtreecommitdiff
path: root/sysconfigs
diff options
context:
space:
mode:
authorDaniel P. Berrange <berrange@redhat.com>2013-03-19 11:20:20 +0000
committerAnthony Liguori <aliguori@us.ibm.com>2013-04-15 14:29:20 -0500
commite6b636779b51c97e67694be740ee972c52460c59 (patch)
tree132813125593e7128b06d88fc88f27530599a430 /sysconfigs
parent0ca5aa4f4c4a8bcc73988dd52a536241d35e5223 (diff)
downloadqemu-e6b636779b51c97e67694be740ee972c52460c59.tar.gz
qemu-e6b636779b51c97e67694be740ee972c52460c59.tar.bz2
qemu-e6b636779b51c97e67694be740ee972c52460c59.zip
Add -f FMT / --format FMT arg to qemu-nbd
Currently the qemu-nbd program will auto-detect the format of any disk it is given. This behaviour is known to be insecure. For example, if qemu-nbd initially exposes a 'raw' file to an unprivileged app, and that app runs 'qemu-img create -f qcow2 -o backing_file=/etc/shadow /dev/nbd0' then the next time the app is started, the qemu-nbd will now detect it as a 'qcow2' file and expose /etc/shadow to the unprivileged app. The only way to avoid this is to explicitly tell qemu-nbd what disk format to use on the command line, completely disabling auto-detection. This patch adds a '-f' / '--format' arg for this purpose, mirroring what is already available via qemu-img and qemu commands. qemu-nbd --format raw -p 9000 evil.img will now always use raw, regardless of what format 'evil.img' looks like it contains Signed-off-by: Daniel P. Berrange <berrange@redhat.com> [Use errx, not err. - Paolo] Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
Diffstat (limited to 'sysconfigs')
0 files changed, 0 insertions, 0 deletions