[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-discuss] Qemu-discuss Digest, Vol 35, Issue 5

From: Bradley, Mike
Subject: Re: [Qemu-discuss] Qemu-discuss Digest, Vol 35, Issue 5
Date: Mon, 4 Aug 2014 20:36:07 +0000

You might try looking at the website http://wiki.osdev.org/UEFI

Towards the bottom there is a Makefile example of creating disk images without 
root permission


-----Original Message-----
From: address@hidden [mailto:address@hidden On Behalf Of address@hidden
Sent: Monday, August 04, 2014 12:01 PM
To: address@hidden
Subject: Qemu-discuss Digest, Vol 35, Issue 5

Send Qemu-discuss mailing list submissions to

To subscribe or unsubscribe via the World Wide Web, visit
or, via email, send a message with subject or body 'help' to

You can reach the person managing the list at

When replying, please edit your Subject line so it is more specific than "Re: 
Contents of Qemu-discuss digest..."

Today's Topics:

   1. Re: manipulating raw disk image as non-root user (Dale R. Worley)


Message: 1
Date: Mon, 4 Aug 2014 11:14:04 -0400
From: address@hidden (Dale R. Worley)
To: address@hidden
Subject: Re: [Qemu-discuss] manipulating raw disk image as non-root
Message-ID: <address@hidden>

Perhaps you could add an entry to /etc/fstab with the 'user' option.
It would allow the mounting of a file with a specific name, looped back to a 
specific mount point.  (Assuming you can set up loopback mounts in /etc/fstab.) 
 It may be possible to set enough restrictions in the fstab entry (noexec, 
nodev, etc.) to prevent this from being a gigantic security hole.

(The actual safe way would be to write a setuid program that is given the basic 
formatting specifications, creates an empty filesystem, and mounts that.  That 
way the user can't put anything into the disk image file beforehand that would 
compromise security.)



Qemu-discuss mailing list

End of Qemu-discuss Digest, Vol 35, Issue 5

reply via email to

[Prev in Thread] Current Thread [Next in Thread]