On Thursday 04 October 2012 06:57 PM, Andreas Pflug wrote:
> Since the multipath-tools package includes no standard multipath.conf, 
> multipathd will grab any new block device. This can lead to surprising and 
> hard debug effects.
> e.g. attaching a device in a XEN dom0 domain will render the device 
> inaccessible. This corrupts xen-utils-4.1 since xend will attach the boot 
> device locally for pygrub, but can't release it properly because multipathd 
> has it.
>
> I suggest supplying at least a minimal multipath.conf that blacklists the 
> most dangerous devices by default.
> -- Package-specific info:
> Contents of /etc/multipath.conf:
> blacklist
> {
>       devnode "^xvd[0-9a-z]*"
> }

Thanks. That is a good point. But it'd make more sense to ship the
default file with
blacklist
{
                    devnode "*"
}

And then let the user pick up his/her choice of settings.
That way, it'd cover everything. Virtual block devices, Pluggable
portable dists etc.

-- 
Ritesh Raj Sarraf
RESEARCHUT - http://www.researchut.com
"Necessity is the mother of invention."


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to