From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:45059) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZHsaT-0000Lg-Gn for qemu-devel@nongnu.org; Wed, 22 Jul 2015 07:53:26 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ZHsaO-0002f0-Du for qemu-devel@nongnu.org; Wed, 22 Jul 2015 07:53:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44408) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZHsaO-0002eV-8p for qemu-devel@nongnu.org; Wed, 22 Jul 2015 07:53:20 -0400 References: <1437544792-3949-1-git-send-email-jasowang@redhat.com> <1437544792-3949-3-git-send-email-jasowang@redhat.com> <20150722093145.GD12010@redhat.com> <20150722131342-mutt-send-email-mst@redhat.com> <55AF8129.50105@redhat.com> <20150722114611.GI12010@redhat.com> From: Paolo Bonzini Message-ID: <55AF842A.1040508@redhat.com> Date: Wed, 22 Jul 2015 13:53:14 +0200 MIME-Version: 1.0 In-Reply-To: <20150722114611.GI12010@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH V3 2/3] virtio-blk: fail get_features when both scsi and 1.0 were set List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Daniel P. Berrange" Cc: cornelia.huck@de.ibm.com, libvir-list@redhat.com, Jason Wang , qemu-devel@nongnu.org, "Michael S. Tsirkin" On 22/07/2015 13:46, Daniel P. Berrange wrote: > IIUC, the SCSI passthrough feature for virtio-blk is enabled by > setting the 'scsi=on' property on the virtio-blk device, which is > exposed by libvirt with XML: > > > > > > > > (For use with virtio-scsi you'd just change the element) > > So if the guest is using virtio-1.0, then this will now fail to boot, or > cause an error from monitor hotplug. This is not too bad, but I'm just > wondering if there's anything else we ought to think about doing in libvirt > in this situation. Normally we'd try to detect unsupported things upfront > so we can report VIR_ERR_CONFIG_UNSUPPORTED, instead of the generic error > code VIR_ERR_INTERNAL_ERROR, but perhaps this is sufficiently niche to > not worry about it and its fine to just delegate error reporting to QEMU ? Probably. Note that it will be a long time before the default is changed to 1.0 (if it ever will). Perhaps you can start warning now about , and suggest using virtio-scsi instead? Paolo