[qubes-users] Re: 4.0.1 persistent external LVM block device attach

2019-01-29 Thread Eric
Got around to checking and this issue has been open for over
a year: https://github.com/QubesOS/qubes-issues/issues/3437

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f7.5c50cc77%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: 4.0.1 persistent external LVM block device attach

2019-01-23 Thread Eric
Yes qvm-block does not accept any symlink, (mapper/...,
disk/by-uuid/... or -L , -U flags like mount) so will open
the issue and there is a *possible* related issue that a non
existent device fail of qube start may happen if the device
is not up yet, since they obviously happen in parallel.
Can't test now.

Any ideas for a hack?

Also noticed that the front device spec is NOT optional for
persistent attaches (if there are more than one) as they
will all try to grab xvdi on qube start with the second one
(not necessarily the second one originally entered) causing
a failure - unlike typing the attach commands into dom0.
Separate issue (check on entry) or just doc update? Needs
man update.

Thanks, Eric

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/938.5c490910%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: 4.0.1 persistent external LVM block device attach

2019-01-23 Thread brendan . hoar
On Tuesday, January 22, 2019 at 2:26:16 PM UTC-5, Eric wrote:
> qvm-block does not accept a UUID (not documented
> and gives an error: not exposed) I suspect that
> should be added as an issue.

[Out of curiosity, I ask, since I am away from the Qubes systems at the moment:]

By "qvm-block does not accept a UUID", may I interpret that to mean "cannot 
utilize a source device using the link in the sub-tree: /dev/disk/by-id "? 

If so, that would be worth opening an issue for in qubes-issues, I think. From 
what I can glean from docs, xl block-attach and virsh attach-disk both support 
the source being a symbolic link to the real device at the /dev level (and I 
believe qvm-block is based on virsh and/or libvirt, which utilizes xl block-* 
in the back-end).

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0fead00a-fd09-4ee8-a5ea-fec889620d5d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.