qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] Mount image file feature


From: Programmingkid
Subject: Re: [Qemu-devel] Mount image file feature
Date: Thu, 3 Sep 2015 10:24:05 -0400

On Sep 3, 2015, at 5:46 AM, Markus Armbruster wrote:

> Programmingkid <address@hidden> writes:
> 
>> On Sep 2, 2015, at 10:31 AM, Max Reitz wrote:
>> 
>>> On 31.08.2015 22:33, Programmingkid wrote:
>>>> 
>>>> On Aug 31, 2015, at 4:26 PM, Max Reitz wrote:
>>> 
>>> [snip]
>>> 
>>>>> The following works for me:
>>>>> 
>>>>> $ echo foo > bar
>>>>> $ x86_64-softmmu/qemu-system-x86_64 -qmp stdio -usb -cdrom
>>>>> ~/tmp/archlinux-2015.07.01-dual.iso -enable-kvm -m 512
>>>>> {"QMP": {"version": {"qemu": {"micro": 50, "minor": 4, "major": 2},
>>>>> "package": ""}, "capabilities": []}}
>>>>> {'execute': 'qmp_capabilities'}
>>>>> {"return": {}}
>>>>> {'execute': 'blockdev-add', 'arguments': {'options': {'id': 'usb-image',
>>>>> 'driver': 'raw', 'file': {'driver': 'file', 'filename': 'bar'}}}}
>>>>> 
>>>>> {"return": {}}
>>>>> {'execute': 'device_add', 'arguments': {'driver': 'usb-storage', 'id':
>>>>> 'usb-disk', 'drive': 'usb-image'}}
>>>>> {"return": {}}
>>>>> 
>>>>> In the VM, before device_add:
>>>>> # cat /dev/sda
>>>>> cat: /dev/sda: No such file or directory
>>>>> 
>>>>> After device_add:
>>>>> # cat /dev/sda
>>>>> foo
>>>> 
>>>> Is there a function that the GUI could call to send all of the JSON
>>>> code as the
>>>> argument to execute.
>>> 
>>> If you put the GUI outside of qemu, it's very simple, obviously, since
>>> you then just need to send it to whichever interface you chose to be
>>> used for QMP.
>>> 
>>> (Yes, I'm still strongly encouraging you to write a separate GUI. The
>>> only part that I suppose to be more difficult than when putting
>>> everything into qemu itself is integrating the guest output into your
>>> GUI. Ideally you'd probably either use VNC or qxl/spice for that, but
>>> for the start I personally would just use SDL (it does work on OS X,
>>> too, doesn't it?)
>> 
>> Yes it does.
>> 
>>> so you get a bare window which is only the guest
>>> output, and then put the VM controls into a separate window.)
>>> 
>>> The nice thing about a GUI outside of qemu, besides looking preferable
>>> design-wise to me, is that you can configure the VM offline, too.
>>> 
>>> 
>>> For the GUI inside of qemu: Well, there is handle_qmp_command(), but it
>>> doesn't look like it's intended to be used directly. Judging from
>>> monitor.c, you'd want to set up a JSON parser, call
>>> json_message_parser_init(parser, handle_hmp_command); and then use
>>> json_message_parser_feed() to send commands.
>> 
>> Wow, that is a bit overwhelming. I really like what my patch does. It
>> just sends a
>> command to the monitor as if the user typed it up. Very simple, easy,
>> and effective.
>> I will never have to look for some poorly documented function again!
> 
> On the flip side, you'll never get a patch abusing handle_hmp_command()
> or handle_qmp_command() as internal interface committed.
> 
>>> So the GUI inside of qemu would probably want to continue to call qmp_*
>>> directly, i.e. qmp_blockdev_add() and qmp_device_add().
>>> 
>>>>> Unplugging the device can be done with device_del; but there is no
>>>>> blockdev-del yet, so the image file will remain lingering.
>>>> 
>>>> If the user decided to use the same image file again, would that be 
>>>> possible?
>>> 
>>> Yes, but you'd have to keep track of the ID you gave it. If you call
>>> blockdev-add again, qemu will happily open it anew and then it'll be
>>> open twice.
>> 
>> I just call drive_del then device_del. So far so good. I have mounted
>> and unmounted the same image file several times without problem.
> 
> Wrong order, trap for the unwary.  Let me paste my standard advice:
> 
>    drive_del is nasty.  Its purpose is to revoke access to an image
>    even when the guest refuses to cooperate.  To the guest, this looks
>    like hardware failure. 

Has the device been probably ejected from the guest first?

> 
>    If you drive_del before device_del, even a perfectly well-behaved
>    guest guest is exposed to a terminally broken device between
>    drive_del and completion of unplug.
> 
>    Always try a device_del first, and only if that does not complete
>    within reasonable time, and you absolutely must revoke access to the
>    image, then whack it over the head with drive_del.

I guess I could use "device_del" only. I just thought it made sense to use
"drive_del" when I used the "drive_add" command.

> 
> Copied from
> http://lists.gnu.org/archive/html/qemu-devel/2014-04/msg00116.html
> 
> I hope we can eventually replace and deprecate drive_del with something
> that where the obvious use is the correct one.

I haven't noticed any problems so far. When I use "drive_del", the "info block" 
command says it is gone. That is good. Then I do a "device_del". "info usb" 
shows
the device gone. Maybe any problems with "drive_del" you might have had in the 
past have been fixed. Have you tried it out lately? I did extensive testing of 
my patch
using Debian Linux as a guest. Never heard it complain. 




reply via email to

[Prev in Thread] Current Thread [Next in Thread]