Re: [libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-10-02 Thread Pavel Mores
On Wed, Oct 02, 2019 at 02:04:28PM +0200, Michal Privoznik wrote:
> On 10/2/19 1:11 PM, Daniel P. Berrangé wrote:
> > On Wed, Oct 02, 2019 at 10:45:28AM +0200, Michal Privoznik wrote:
> > > On 9/30/19 3:41 PM, Pavel Mores wrote:
> > > > The way in which the qemu driver generates aliases for disks involves
> > > > ignoring the partition number part of a target dev name.  This means 
> > > > that
> > > > all partitions of a block device and the device itself all end up with 
> > > > the
> > > > same alias.  If multiple such disks are specified in XML, the resulting
> > > > name clash makes qemu invocation fail.
> > > > 
> > > > Since attaching partitions to qemu VMs doesn't seem to make much sense
> > > > anyway, disallow partitions in target specifications altogether.
> > > > 
> > > > https://bugzilla.redhat.com/show_bug.cgi?id=1346265
> > > > 
> > > > Signed-off-by: Pavel Mores 
> > > > ---
> > > >src/qemu/qemu_domain.c| 15 +++
> > > >.../disk-attaching-partition-nosupport.xml| 27 
> > > > +++
> > > >tests/qemuxml2argvtest.c  |  1 +
> > > >3 files changed, 43 insertions(+)
> > > >create mode 100644 
> > > > tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml
> > > > 
> 
> > 
> > I think it is fine for freeze, so go ahead with your proposed fix.
> > 
> 
> Thanks, I've made the change and pushed these.
> 
> Congratulations Pavel on your first libvirt contribution!

Cheers, and apologies for the additional work you had with it. :-)

pvl

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list


Re: [libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-10-02 Thread Michal Privoznik

On 10/2/19 1:11 PM, Daniel P. Berrangé wrote:

On Wed, Oct 02, 2019 at 10:45:28AM +0200, Michal Privoznik wrote:

On 9/30/19 3:41 PM, Pavel Mores wrote:

The way in which the qemu driver generates aliases for disks involves
ignoring the partition number part of a target dev name.  This means that
all partitions of a block device and the device itself all end up with the
same alias.  If multiple such disks are specified in XML, the resulting
name clash makes qemu invocation fail.

Since attaching partitions to qemu VMs doesn't seem to make much sense
anyway, disallow partitions in target specifications altogether.

https://bugzilla.redhat.com/show_bug.cgi?id=1346265

Signed-off-by: Pavel Mores 
---
   src/qemu/qemu_domain.c| 15 +++
   .../disk-attaching-partition-nosupport.xml| 27 +++
   tests/qemuxml2argvtest.c  |  1 +
   3 files changed, 43 insertions(+)
   create mode 100644 
tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml





I think it is fine for freeze, so go ahead with your proposed fix.



Thanks, I've made the change and pushed these.

Congratulations Pavel on your first libvirt contribution!

Michal

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Re: [libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-10-02 Thread Daniel P . Berrangé
On Wed, Oct 02, 2019 at 10:45:28AM +0200, Michal Privoznik wrote:
> On 9/30/19 3:41 PM, Pavel Mores wrote:
> > The way in which the qemu driver generates aliases for disks involves
> > ignoring the partition number part of a target dev name.  This means that
> > all partitions of a block device and the device itself all end up with the
> > same alias.  If multiple such disks are specified in XML, the resulting
> > name clash makes qemu invocation fail.
> > 
> > Since attaching partitions to qemu VMs doesn't seem to make much sense
> > anyway, disallow partitions in target specifications altogether.
> > 
> > https://bugzilla.redhat.com/show_bug.cgi?id=1346265
> > 
> > Signed-off-by: Pavel Mores 
> > ---
> >   src/qemu/qemu_domain.c| 15 +++
> >   .../disk-attaching-partition-nosupport.xml| 27 +++
> >   tests/qemuxml2argvtest.c  |  1 +
> >   3 files changed, 43 insertions(+)
> >   create mode 100644 
> > tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml
> > 
> > diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c
> > index e8e895d9aa..545c985f40 100644
> > --- a/src/qemu/qemu_domain.c
> > +++ b/src/qemu/qemu_domain.c
> > @@ -5880,6 +5880,8 @@ qemuDomainDeviceDefValidateDisk(const 
> > virDomainDiskDef *disk,
> >   {
> >   const char *driverName = virDomainDiskGetDriver(disk);
> >   virStorageSourcePtr n;
> > +int idx;
> > +int partition;
> >   if (disk->src->shared && !disk->src->readonly &&
> >   !qemuBlockStorageSourceSupportsConcurrentAccess(disk->src)) {
> > @@ -5948,6 +5950,19 @@ qemuDomainDeviceDefValidateDisk(const 
> > virDomainDiskDef *disk,
> >   return -1;
> >   }
> > +if (virDiskNameParse(disk->dst, , ) < 0) {
> > +virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
> > +   _("invalid disk target '%s'"), disk->dst);
> > +return -1;
> > +}
> > +
> > +if (partition != 0) {
> > +virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
> > +   _("can't attach disk partition '%s', please attach 
> > whole disk instead"),
> > +   disk->dst);
> 
> Hopefully it's not too late, but this error message and the commit title
> neither don't look okay. You can attach /dev/sda1 to a domain, but we don't
> want you to put "sda1" into the disk target, we want you to name it just
> "sda". So perhaps "Refuse partitions in disk targets" as commit tile and
> "invalid disk target '%s', partitions can't appear in disk targets" for the
> error message looks better?
> 
> The patch looks goot otherwise. Currently we are in a freeze, but since this
> is a bug fix it can go in. Objections anybody? I volunteer to merge it.

I think it is fine for freeze, so go ahead with your proposed fix.

Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list


Re: [libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-10-02 Thread Michal Privoznik

On 9/30/19 3:41 PM, Pavel Mores wrote:

The way in which the qemu driver generates aliases for disks involves
ignoring the partition number part of a target dev name.  This means that
all partitions of a block device and the device itself all end up with the
same alias.  If multiple such disks are specified in XML, the resulting
name clash makes qemu invocation fail.

Since attaching partitions to qemu VMs doesn't seem to make much sense
anyway, disallow partitions in target specifications altogether.

https://bugzilla.redhat.com/show_bug.cgi?id=1346265

Signed-off-by: Pavel Mores 
---
  src/qemu/qemu_domain.c| 15 +++
  .../disk-attaching-partition-nosupport.xml| 27 +++
  tests/qemuxml2argvtest.c  |  1 +
  3 files changed, 43 insertions(+)
  create mode 100644 
tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml

diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c
index e8e895d9aa..545c985f40 100644
--- a/src/qemu/qemu_domain.c
+++ b/src/qemu/qemu_domain.c
@@ -5880,6 +5880,8 @@ qemuDomainDeviceDefValidateDisk(const virDomainDiskDef 
*disk,
  {
  const char *driverName = virDomainDiskGetDriver(disk);
  virStorageSourcePtr n;
+int idx;
+int partition;
  
  if (disk->src->shared && !disk->src->readonly &&

  !qemuBlockStorageSourceSupportsConcurrentAccess(disk->src)) {
@@ -5948,6 +5950,19 @@ qemuDomainDeviceDefValidateDisk(const virDomainDiskDef 
*disk,
  return -1;
  }
  
+if (virDiskNameParse(disk->dst, , ) < 0) {

+virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
+   _("invalid disk target '%s'"), disk->dst);
+return -1;
+}
+
+if (partition != 0) {
+virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
+   _("can't attach disk partition '%s', please attach whole 
disk instead"),
+   disk->dst);


Hopefully it's not too late, but this error message and the commit title 
neither don't look okay. You can attach /dev/sda1 to a domain, but we 
don't want you to put "sda1" into the disk target, we want you to name 
it just "sda". So perhaps "Refuse partitions in disk targets" as commit 
tile and "invalid disk target '%s', partitions can't appear in disk 
targets" for the error message looks better?


The patch looks goot otherwise. Currently we are in a freeze, but since 
this is a bug fix it can go in. Objections anybody? I volunteer to merge it.


Michal

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list


Re: [libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-10-01 Thread Daniel P . Berrangé
On Mon, Sep 30, 2019 at 03:41:00PM +0200, Pavel Mores wrote:
> The way in which the qemu driver generates aliases for disks involves
> ignoring the partition number part of a target dev name.  This means that
> all partitions of a block device and the device itself all end up with the
> same alias.  If multiple such disks are specified in XML, the resulting
> name clash makes qemu invocation fail.
> 
> Since attaching partitions to qemu VMs doesn't seem to make much sense
> anyway, disallow partitions in target specifications altogether.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1346265
> 
> Signed-off-by: Pavel Mores 
> ---
>  src/qemu/qemu_domain.c| 15 +++
>  .../disk-attaching-partition-nosupport.xml| 27 +++
>  tests/qemuxml2argvtest.c  |  1 +
>  3 files changed, 43 insertions(+)
>  create mode 100644 
> tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml

Reviewed-by: Daniel P. Berrangé 


Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

[libvirt] [PATCH v2 1/2] qemu: make attaching disk partition to VM illegal

2019-09-30 Thread Pavel Mores
The way in which the qemu driver generates aliases for disks involves
ignoring the partition number part of a target dev name.  This means that
all partitions of a block device and the device itself all end up with the
same alias.  If multiple such disks are specified in XML, the resulting
name clash makes qemu invocation fail.

Since attaching partitions to qemu VMs doesn't seem to make much sense
anyway, disallow partitions in target specifications altogether.

https://bugzilla.redhat.com/show_bug.cgi?id=1346265

Signed-off-by: Pavel Mores 
---
 src/qemu/qemu_domain.c| 15 +++
 .../disk-attaching-partition-nosupport.xml| 27 +++
 tests/qemuxml2argvtest.c  |  1 +
 3 files changed, 43 insertions(+)
 create mode 100644 
tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml

diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c
index e8e895d9aa..545c985f40 100644
--- a/src/qemu/qemu_domain.c
+++ b/src/qemu/qemu_domain.c
@@ -5880,6 +5880,8 @@ qemuDomainDeviceDefValidateDisk(const virDomainDiskDef 
*disk,
 {
 const char *driverName = virDomainDiskGetDriver(disk);
 virStorageSourcePtr n;
+int idx;
+int partition;
 
 if (disk->src->shared && !disk->src->readonly &&
 !qemuBlockStorageSourceSupportsConcurrentAccess(disk->src)) {
@@ -5948,6 +5950,19 @@ qemuDomainDeviceDefValidateDisk(const virDomainDiskDef 
*disk,
 return -1;
 }
 
+if (virDiskNameParse(disk->dst, , ) < 0) {
+virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
+   _("invalid disk target '%s'"), disk->dst);
+return -1;
+}
+
+if (partition != 0) {
+virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
+   _("can't attach disk partition '%s', please attach 
whole disk instead"),
+   disk->dst);
+return -1;
+}
+
 for (n = disk->src; virStorageSourceIsBacking(n); n = n->backingStore) {
 if (qemuDomainValidateStorageSource(n, qemuCaps) < 0)
 return -1;
diff --git a/tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml 
b/tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml
new file mode 100644
index 00..591819fbb6
--- /dev/null
+++ b/tests/qemuxml2argvdata/disk-attaching-partition-nosupport.xml
@@ -0,0 +1,27 @@
+
+  QEMUGuest1
+  c7a5fdbd-edaf-9455-926a-d65c16db1809
+  219100
+  219100
+  1
+  
+hvm
+
+  
+  
+  destroy
+  restart
+  destroy
+  
+/usr/bin/qemu-system-i686
+
+  
+  
+  
+
+
+
+
+
+  
+
diff --git a/tests/qemuxml2argvtest.c b/tests/qemuxml2argvtest.c
index 5bbac1c8b8..058eee998f 100644
--- a/tests/qemuxml2argvtest.c
+++ b/tests/qemuxml2argvtest.c
@@ -1097,6 +1097,7 @@ mymain(void)
 DO_TEST("disk-no-boot", NONE);
 DO_TEST_PARSE_ERROR("disk-device-lun-type-invalid",
 QEMU_CAPS_VIRTIO_SCSI);
+DO_TEST_CAPS_LATEST_PARSE_ERROR("disk-attaching-partition-nosupport");
 DO_TEST_FAILURE("disk-usb-nosupport", NONE);
 DO_TEST("disk-usb-device",
 QEMU_CAPS_DEVICE_USB_STORAGE);
-- 
2.21.0

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list