permissions: 0.783 KVM: 0.766 graphic: 0.712 device: 0.709 PID: 0.688 semantic: 0.683 debug: 0.677 performance: 0.676 boot: 0.675 network: 0.669 socket: 0.659 other: 0.658 vnc: 0.644 files: 0.583 qemu-img can't convert vmdk file: Operation not permitted There is no reason why the vdmk image can't be converted. Even running it as root does not help. $ ls -lh insgesamt 60G -rw-rw-rw- 1 root root 479M 2011-09-10 17:47 freetz-linux-1.2.1-disk1.vmdk $ sudo qemu-img convert freetz-linux-1.2.1-disk1.vmdk -O raw /tmp/freetz-linux-1.2.1-disk1.raw qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk': Operation not permitted qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk' I get a similar Error when I try to rum vmdk images directly. After adding a new machine and adding vmdk disks with virt-manager, it tells me when I start the virtual machine: Error starting domain: internal error process exited while connecting to monitor: char device redirected to /dev/pts/1 kvm: -drive file=/var/lib/libvirt/images/freetz-linux-1.2.1-disk1.vmdk,if=none,id=drive-virtio-disk0,boot=on,format=qcow2: could not open disk image /var/lib/libvirt/images/freetz-linux-1.2.1-disk1.vmdk: Invalid argument Runnung raw images works perfectly for me. Hint: i have a symlink set: /var/lib/libvirt$ ls -lh insgesamt 12K drwxr-xr-x 2 root root 4,0K 2011-07-26 14:30 boot lrwxrwxrwx 1 root root 9 2011-08-19 10:47 images -> /home/vms drwxr-xr-x 2 root root 4,0K 2011-08-19 09:38 network drwxr-xr-x 5 libvirt-qemu kvm 4,0K 2011-12-16 04:34 qemu but this should not be the reason hopefully ProblemType: Bug DistroRelease: Ubuntu 11.04 Package: qemu-kvm 0.14.0+noroms-0ubuntu4.4 ProcVersionSignature: Ubuntu 2.6.38-13.52-generic 2.6.38.8 Uname: Linux 2.6.38-13-generic x86_64 Architecture: amd64 CheckboxSubmission: 8f12e98536291f59719792d89958b124 CheckboxSystem: d00f84de8a555815fa1c4660280da308 Date: Fri Dec 16 04:24:10 2011 InstallationMedia: Ubuntu 10.04.1 LTS "Lucid Lynx" - Release amd64 (20100816.1) KvmCmdLine: Error: command ['ps', '-C', 'kvm', '-F'] failed with exit code 1: UID PID PPID C SZ RSS PSR STIME TTY TIME CMD MachineType: Dell Inc. Latitude E5510 ProcEnviron: LANGUAGE=de_DE:en PATH=(custom, user) LANG=de_DE.UTF-8 SHELL=/bin/bash ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-2.6.38-13-generic root=UUID=503213e4-5136-4e60-8a02-7cbd0123dca8 ro quiet splash vt.handoff=7 SourcePackage: qemu-kvm UpgradeStatus: Upgraded to natty on 2011-08-18 (119 days ago) dmi.bios.date: 09/08/2011 dmi.bios.vendor: Dell Inc. dmi.bios.version: A11 dmi.board.name: 023HKR dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA11:bd09/08/2011:svnDellInc.:pnLatitudeE5510:pvr0001:rvnDellInc.:rn023HKR:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E5510 dmi.product.version: 0001 dmi.sys.vendor: Dell Inc. I just saw that the image format in my last comment was not set right. After changing it from qcow2 to vmdk I get this error when starting the machine: Error starting domain: operation failed: failed to retrieve chardev info in qemu with 'info chardev' Traceback (most recent call last): File "/usr/share/virt-manager/virtManager/asyncjob.py", line 45, in cb_wrapper callback(asyncjob, *args, **kwargs) File "/usr/share/virt-manager/virtManager/engine.py", line 956, in asyncfunc vm.startup() File "/usr/share/virt-manager/virtManager/domain.py", line 1048, in startup self._backend.create() File "/usr/lib/python2.7/dist-packages/libvirt.py", line 330, in create if ret == -1: raise libvirtError ('virDomainCreate() failed', dom=self) libvirtError: operation failed: failed to retrieve chardev info in qemu with 'info chardev' To reproduce the problem feel free to download this image: http://sourceforge.net/projects/freetz-linux/ here's the xml file of the virtual machine same on a fresh installed up to date ubuntu 11.10: sudo qemu-img convert freetz-linux-1.2.1-disk1.vmdk -O raw /tmp/freetz-linux-1.2.1-disk1.raw qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk': Operation not permitted qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk' up-to-date debian 6.0 says: # qemu-img convert freetz-linux-1.2.1-disk1.vmdk -O raw freetz1.img qemu-img: error while reading debian testing says: qemu-img convert freetz-linux-1.2.1-disk1.vmdk -O raw freetz1.img qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk': Operation not permitted qemu-img: Could not open 'freetz-linux-1.2.1-disk1.vmdk' debian sid says: qemu-img convert freetz-linux-1.2.1-disk1.vmdk -O raw freetz1.img *** glibc detected *** qemu-img: double free or corruption (top): 0x000000000755cd60 *** ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x72656)[0x2b78929df656] /lib/x86_64-linux-gnu/libc.so.6(cfree+0x6c)[0x2b78929e438c] qemu-img[0x41c4a2] qemu-img[0x41d1e6] qemu-img[0x40e6d9] qemu-img[0x40f247] qemu-img[0x4055f1] qemu-img[0x4068ad] /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xfd)[0x2b789298bead] qemu-img[0x404efd] ======= Memory map: ======== 00400000-0045a000 r-xp 00000000 91:e6 114343429 /usr/bin/qemu-img 0065a000-0065f000 rw-p 0005a000 91:e6 114343429 /usr/bin/qemu-img 0065f000-00a60000 rw-p 0065f000 00:00 0 0755a000-0757b000 rw-p 0755a000 00:00 0 [heap] 2b7891471000-2b7891490000 r-xp 00000000 91:e6 254542713 /lib/x86_64-linux-gnu/ld-2.13.so 2b7891490000-2b7891492000 rw-p 2b7891490000 00:00 0 2b7891690000-2b7891691000 r--p 0001f000 91:e6 254542713 /lib/x86_64-linux-gnu/ld-2.13.so 2b7891691000-2b7891692000 rw-p 00020000 91:e6 254542713 /lib/x86_64-linux-gnu/ld-2.13.so 2b7891692000-2b7891693000 rw-p 2b7891692000 00:00 0 2b7891693000-2b789169a000 r-xp 00000000 91:e6 254542726 /lib/x86_64-linux-gnu/librt-2.13.so 2b789169a000-2b7891899000 ---p 00007000 91:e6 254542726 /lib/x86_64-linux-gnu/librt-2.13.so 2b7891899000-2b789189a000 r--p 00006000 91:e6 254542726 /lib/x86_64-linux-gnu/librt-2.13.so 2b789189a000-2b789189b000 rw-p 00007000 91:e6 254542726 /lib/x86_64-linux-gnu/librt-2.13.so 2b789189b000-2b78918b2000 r-xp 00000000 91:e6 89718972 /usr/lib/libz.so.1.2.3.4 2b78918b2000-2b7891ab1000 ---p 00017000 91:e6 89718972 /usr/lib/libz.so.1.2.3.4 2b7891ab1000-2b7891ab2000 rw-p 00016000 91:e6 89718972 /usr/lib/libz.so.1.2.3.4 2b7891ab2000-2b7891ab3000 rw-p 2b7891ab2000 00:00 0 2b7891ab3000-2b7891ace000 r-xp 00000000 91:e6 115417965 /usr/lib/librbd.so.1.0.0 2b7891ace000-2b7891ccd000 ---p 0001b000 91:e6 115417965 /usr/lib/librbd.so.1.0.0 2b7891ccd000-2b7891cce000 rw-p 0001a000 91:e6 115417965 /usr/lib/librbd.so.1.0.0 2b7891cce000-2b7891eca000 r-xp 00000000 91:e6 115417963 /usr/lib/librados.so.2.0.0 2b7891eca000-2b78920ca000 ---p 001fc000 91:e6 115417963 /usr/lib/librados.so.2.0.0 2b78920ca000-2b78920d9000 rw-p 001fc000 91:e6 115417963 /usr/lib/librados.so.2.0.0 2b78920d9000-2b78920ed000 rw-p 2b78920d9000 00:00 0 2b78920ed000-2b7892147000 r-xp 00000000 91:e6 254542231 /usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4.2.0 2b7892147000-2b7892347000 ---p 0005a000 91:e6 254542231 /usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4.2.0 2b7892347000-2b7892349000 r--p 0005a000 91:e6 254542231 /usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4.2.0 2b7892349000-2b789234a000 rw-p 0005c000 91:e6 254542231 /usr/lib/x86_64-linux-gnu/libcurl-gnutls.so.4.2.0 2b789234a000-2b789234b000 rw-p 2b789234a000 00:00 0 2b789234b000-2b789234f000 r-xp 00000000 91:e6 152502901 /lib/libuuid.so.1.3.0 2b789234f000-2b789254e000 ---p 00004000 91:e6 152502901 /lib/libuuid.so.1.3.0 2b789254e000-2b789254f000 rw-p 00003000 91:e6 152502901 /lib/libuuid.so.1.3.0 2b789254f000-2b7892550000 r-xp 00000000 91:e6 254542270 /lib/x86_64-linux-gnu/libaio.so.1.0.1 2b7892550000-2b789274f000 ---p 00001000 91:e6 254542270 /lib/x86_64-linux-gnu/libaio.so.1.0.1 2b789274f000-2b7892750000 rw-p 00000000 91:e6 254542270 /lib/x86_64-linux-gnu/libaio.so.1.0.1 2b7892750000-2b7892767000 r-xp 00000000 91:e6 254542714 /lib/x86_64-linux-gnu/libpthread-2.13.so 2b7892767000-2b7892966000 ---p 00017000 91:e6 254542714 /lib/x86_64-linux-gnu/libpthread-2.13.so 2b7892966000-2b7892967000 r--p 00016000 91:e6 254542714 /lib/x86_64-linux-gnu/libpthread-2.13.so 2b7892967000-2b7892968000 rw-p 00017000 91:e6 254542714 /lib/x86_64-linux-gnu/libpthread-2.13.so 2b7892968000-2b789296d000 rw-p 2b7892968000 00:00 0 2b789296d000-2b7892ae7000 r-xp 00000000 91:e6 254542727 /lib/x86_64-linux-gnu/libc-2.13.so 2b7892ae7000-2b7892ce7000 ---p 0017a000 91:e6 254542727 /lib/x86_64-linux-gnu/libc-2.13.so 2b7892ceAborted seems to be an older problem: https://bugzilla.redhat.com/show_bug.cgi?id=548723 still getting the error while trying to convert a vmdk how to proceed? I just generated OVA from vsphere client, then I untarred it and I got a ovf and a vmdk file, how do I convert the vmdk to a readable format by kvm? Angelo, a workaround for me was to run the freetz image (which in fact is an ubuntu image) with VirtalBox. Then I booted the Machine with a systemrescuecd CD. In systemrescuecd I extracted the disk image using the dd command (disk druid). You can netcat the raw image via network to your KVM machine. The raw image booted without any problems in KVM. Hope this works for you. Confirmed on ubuntu 11.10: >> qemu-img convert ZendTo-Ubuntu-x64-disk1.vmdk -O raw zend.img qemu-img: Could not open 'ZendTo-Ubuntu-x64-disk1.vmdk': Operation not permitted qemu-img: Could not open 'ZendTo-Ubuntu-x64-disk1.vmdk' Hello, Could someone please comment on this? There are blogs and such all over the internet talking about how easy it is to use qemu-img convert to convert VMware vmdk's to KVM qcow2's (or other formats). However, every time I do this, no matter what version of Linux or qemu-img I am using, it either a) produces an image but that is only a few MBs and thus obviously unbootable; or b) has the error in comment #9 (Operation not permitted). I see thomas303's workaround but that obviously sounds pretty harsh to be doing on a regular basis as we are looking to support our product on both VMware and KVM. Will this inability to convert vmdk to qcow2 be addressed in qemu soon? @Neil, it looks like the 2011 google summer of code project did not succeed. I don't know of anyone else working on this problem right now. Actually support upstream has improved a lot in recent qemu (thanks to IBM), and Red Hat are planning on doing further work in this area. Right now / with old qemu, the best thing is to convert your proprietary vmdk files to a portable format, ie. raw or qcow2, and use that instead. I retried with ubuntu 16.04, qemu-img version 2.5.0 (Debian 1:2.5+dfsg-5ubuntu10.4). While the original file (freetz vmdk) is not available (they use .ova now), I got another .vmdk file from http://www.osboxes.org/debian/#debian-8-5-vmware qemu-img convert Debian\ 8.5\ \(64bit\).vmdk -O raw test.raw qemu-img convert Debian\ 8.5\ \(64bit\).vmdk -O qcow2 test.qcow2 Both worked, and I could boot the system I converted from .vmdk using qemu-kvm. Looks as if this issue got fixed, finally. I did the same task on totally different images recently and it worked fine. Thanks for bumping that old bug so we can close it. That "Debian 8.5 (64bit).vmdk" also works fine with the qemu-img from upstream master branch ==> I'm closing this ticket now for upstream, too. Description of problem: qemu-img convert cannot convert a VMDK4 format file to (eg) raw (or anything else). It silently produces a large file that mostly contains zero bytes, and is completely unusable. Version-Release number of selected component (if applicable): Tested with qemu-img 0.10.5, 0.11.0, and git d9a50a366f2178 (2009-12-11). How reproducible: Always. Steps to Reproduce: 1. Export to OVF from VMWare vSphere / ESX 4.0.0. 2. Copy the resultant disk image to a Fedora machine. 3. Check the SHA1 sums (from *.mf file) to make sure image was not corrupted during the copy. 4. Run: qemu-img convert -O raw TestLinux-disk1.vmdk TestLinux-disk1.raw 5. Try to mount / use the resulting raw file, eg. using guestfish. Actual results: The raw file contains mostly zeroes, see below. It contains zeroes where there should be partition tables, superblocks etc. and so is totally unusable. Expected results: A usable disk image. Additional info: Compare the entropy of the VMDK file with the resulting raw disk. I would expect the entropy to be about the same, but you can see the raw disk is mostly compressible (zeroes). $ ls -l TestLinux-disk1.vmdk -rw-rw-r-- 1 rjones rjones 887312896 2009-12-18 10:35 TestLinux-disk1.vmdk $ gzip -c TestLinux-disk1.vmdk | wc -c 860846320 $ gzip -c TestLinux-disk1.raw | wc -c 8744715 VMWare's OVF metadata says the following about the disk format: Virtual disk information qemu-img 0.10.5 fails in a different way. It gives the error message: qemu-img: error while reading qemu-img >= 0.11.0 fail silently, no error message or error code. I've tried this with several disk images exported from vSphere 4 and they have all failed to convert in the same way. Test files (at time of writing these are STILL UPLOADING, with ETA of 2009-12-19). http://homes.merjis.com/~rich/TestLinux-disk1.vmdk SHA1: 2C81BAE89210B075ACC51DA9D025935470149D55 http://homes.merjis.com/~rich/TestLinux.ovf SHA1: 30831689B8C6F1B1A1FCBB728769B5F71056A580 This package has changed ownership in the Fedora Package Database. Reassigning to the new owner of this component. This package has changed ownership in the Fedora Package Database. Reassigning to the new owner of this component. You don't happen to know if this reproduces with qemu-img > 0.12.x or have a test image I can convert to reproduce handy? Nothing much has changed in the qemu vmdk block driver since I looked at it before (I just checked upstream git), so it's very likely to be still broken. I have some VMDK images, but I warn you that they are very large! If you have somewhere I can upload them to, I can send some your way ... This bug appears to have been reported against 'rawhide' during the Fedora 13 development cycle. Changing version to '13'. More information and reason for this action is here: http://fedoraproject.org/wiki/BugZappers/HouseKeeping I just checked upstream git for the driver again, and apart from code cleanups the code is still the same as ever. Therefore moving the bug -> Rawhide. Updated links: http://oirase.annexia.org/tmp/TestLinux-disk1.vmdk SHA1: 2c81bae89210b075acc51da9d025935470149d55 http://oirase.annexia.org/tmp/TestLinux.ovf SHA1: 30831689b8c6f1b1a1fcbb728769b5f71056a580 Latest qemu-img no longer silently converts to zeroes. Instead it gives a strange error: $ qemu-img convert -f vmdk -O raw TestLinux-disk1.vmdk TestLinux-disk1.raw qemu-img: Could not open 'TestLinux-disk1.vmdk': Operation not permitted qemu-img: Could not open 'TestLinux-disk1.vmdk' > qemu-img: Could not open 'TestLinux-disk1.vmdk': Operation not permitted This is probably because qemu-img.c code expects brdv_open() to return an errno value ret = bdrv_open(bs, filename, flags, drv); if (ret < 0) { error_report("Could not open '%s': %s", filename, strerror(-ret)); goto fail; } while the vmdk_open function just returns -1 for everything: ... return 0; fail: qemu_free(s->l1_backup_table); qemu_free(s->l1_table); qemu_free(s->l2_cache); return -1; } and by coincidence, '1 == EPERM'. There are ~4 codepaths in vmdk_open that could fail, the VMDK magic check and then a couple of reads of metadata There is hope: http://lists.gnu.org/archive/html/qemu-devel/2011-05/msg03130.html http://lists.gnu.org/archive/html/qemu-devel/2011-06/threads.html#00033 The vmdk from "Export as OVF..." doesn't work. # qemu-img convert -O raw esx4.1-rhel5.7-i386-disk1.vmdk test-vmdk.raw qemu-img: Could not open 'esx4.1-rhel5.7-i386-disk1.vmdk' qemu-img: Could not open 'esx4.1-rhel5.7-i386-disk1.vmdk' I copied a vmdk file from ESX storage directly,and then use qemu-img to convert it to raw,it works. # qemu-img convert -O raw esx4.1-rhel5.7-i386-flat.vmdk test-vmdk.raw # ll test-vmdk.raw -rw-r--r--. 1 root root 8589934592 Feb 17 16:58 test-vmdk.raw (In reply to comment #11) > I copied a vmdk file from ESX storage directly,and then use qemu-img to convert > it to raw,it works. > # qemu-img convert -O raw esx4.1-rhel5.7-i386-flat.vmdk test-vmdk.raw > # ll test-vmdk.raw > -rw-r--r--. 1 root root 8589934592 Feb 17 16:58 test-vmdk.raw *-flat.vmdk files are not VMDK. They are just raw files which happen to have a .vmdk extension. So this doesn't really prove anything. This package has changed ownership in the Fedora Package Database. Reassigning to the new owner of this component. This bug has lingered for forever, so I don't think tracking this in Fedora is going to solve much. Rich, if you can still reproduce this with qemu.git, I'd recommend filing an upstream bug and publishing a reproducer image like you did before.