On Thu, Dec 17, 2009 at 11:53:45AM +0100, Christoph Hellwig wrote: > If you're primarily interested in protection against other qemu > instances you can add you code on top, but that seems like a rather > marginal use case.
It's a pretty serious case for people accessing live virtual machines with the libguestfs tools. I'd like to make it impossible (or at least harder) for them to corrupt their disk images. Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones virt-p2v converts physical machines to virtual machines. Boot with a live CD or over the network (PXE) and turn machines into Xen guests. http://et.redhat.com/~rjones/virt-p2v