|
|
a41c76 |
From 9146b5849b0dfc2ee59eea09712cc7f5f88c88f2 Mon Sep 17 00:00:00 2001
|
|
|
a41c76 |
Message-Id: <9146b5849b0dfc2ee59eea09712cc7f5f88c88f2@dist-git>
|
|
|
a41c76 |
From: Peter Krempa <pkrempa@redhat.com>
|
|
|
a41c76 |
Date: Fri, 28 Feb 2020 10:24:45 +0100
|
|
|
a41c76 |
Subject: [PATCH] kbase: backing_chains: Add steps how to securely probe image
|
|
|
a41c76 |
format
|
|
|
a41c76 |
MIME-Version: 1.0
|
|
|
a41c76 |
Content-Type: text/plain; charset=UTF-8
|
|
|
a41c76 |
Content-Transfer-Encoding: 8bit
|
|
|
a41c76 |
|
|
|
a41c76 |
We document steps how to fix images if they are rejected for missing
|
|
|
a41c76 |
the 'backing file format' field. Document also how to securely probe
|
|
|
a41c76 |
the image format if it's unknown.
|
|
|
a41c76 |
|
|
|
a41c76 |
Signed-off-by: Peter Krempa <pkrempa@redhat.com>
|
|
|
a41c76 |
Reviewed-by: Ján Tomko <jtomko@redhat.com>
|
|
|
a41c76 |
(cherry picked from commit 82d5b762f11b50abb710c751251f28d4325a4c91)
|
|
|
a41c76 |
|
|
|
a41c76 |
https://bugzilla.redhat.com/show_bug.cgi?id=1798148
|
|
|
a41c76 |
Message-Id: <039ebfe436c361b067ef73a7c0bb16db1e410044.1582881363.git.pkrempa@redhat.com>
|
|
|
a41c76 |
Reviewed-by: Ján Tomko <jtomko@redhat.com>
|
|
|
a41c76 |
---
|
|
|
a41c76 |
docs/kbase/backing_chains.rst | 15 +++++++++++++++
|
|
|
a41c76 |
1 file changed, 15 insertions(+)
|
|
|
a41c76 |
|
|
|
a41c76 |
diff --git a/docs/kbase/backing_chains.rst b/docs/kbase/backing_chains.rst
|
|
|
a41c76 |
index 12ed6253ac..af848ccb14 100644
|
|
|
a41c76 |
--- a/docs/kbase/backing_chains.rst
|
|
|
a41c76 |
+++ b/docs/kbase/backing_chains.rst
|
|
|
a41c76 |
@@ -176,6 +176,21 @@ properly. ``$BACKING_IMAGE_PATH`` should be specified as a full absolute path.
|
|
|
a41c76 |
If relative referencing of the backing image is desired, the path must be
|
|
|
a41c76 |
relative to the location of image described by ``$IMAGE_PATH``.
|
|
|
a41c76 |
|
|
|
a41c76 |
+**Important:** If the ``$BACKING_IMAGE_FORMAT`` is not known it can be queried
|
|
|
a41c76 |
+using ``qemu-img info $BACKING_IMAGE_PATH`` and looking for the ``file format:``
|
|
|
a41c76 |
+field, but for security reasons should be used *only* if at least one of the
|
|
|
a41c76 |
+following criteria is met:
|
|
|
a41c76 |
+
|
|
|
a41c76 |
+- ``file format`` is ``raw``
|
|
|
a41c76 |
+- ``backing file`` is NOT present
|
|
|
a41c76 |
+- ``backing file`` is present AND is correct/trusted
|
|
|
a41c76 |
+
|
|
|
a41c76 |
+Note that the last criteria may require manual inspection and thus should not
|
|
|
a41c76 |
+be scripted unless the trust for the image can be expressed programatically.
|
|
|
a41c76 |
+
|
|
|
a41c76 |
+Also note that the above steps may need to be repeated recursively for any
|
|
|
a41c76 |
+subsequent backing images.
|
|
|
a41c76 |
+
|
|
|
a41c76 |
Missing images reported after after moving disk images into a different path
|
|
|
a41c76 |
----------------------------------------------------------------------------
|
|
|
a41c76 |
|
|
|
a41c76 |
--
|
|
|
a41c76 |
2.25.1
|
|
|
a41c76 |
|