xref: /openbmc/qemu/tests/qemu-iotests/182 (revision 200dbf37)
1#!/usr/bin/env bash
2#
3# Test image locking for POSIX locks
4#
5# Copyright 2017 Red Hat, Inc.
6#
7# This program is free software; you can redistribute it and/or modify
8# it under the terms of the GNU General Public License as published by
9# the Free Software Foundation; either version 2 of the License, or
10# (at your option) any later version.
11#
12# This program is distributed in the hope that it will be useful,
13# but WITHOUT ANY WARRANTY; without even the implied warranty of
14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15# GNU General Public License for more details.
16#
17# You should have received a copy of the GNU General Public License
18# along with this program.  If not, see <http://www.gnu.org/licenses/>.
19#
20
21# creator
22owner=famz@redhat.com
23
24seq="$(basename $0)"
25echo "QA output created by $seq"
26
27tmp=/tmp/$$
28status=1	# failure is the default!
29
30_cleanup()
31{
32    _cleanup_test_img
33    rm -f "$TEST_IMG.overlay"
34    rm -f "$TEST_DIR/nbd.socket"
35}
36trap "_cleanup; exit \$status" 0 1 2 3 15
37
38# get standard environment, filters and checks
39. ./common.rc
40. ./common.filter
41. ./common.qemu
42
43_supported_fmt qcow2
44_supported_proto file
45
46size=32M
47
48case "$QEMU_DEFAULT_MACHINE" in
49  s390-ccw-virtio)
50      virtioblk=virtio-blk-ccw
51      ;;
52  *)
53      virtioblk=virtio-blk-pci
54      ;;
55esac
56
57_make_test_img $size
58
59echo "Starting QEMU"
60_launch_qemu -drive file=$TEST_IMG,if=none,id=drive0,file.locking=on \
61    -device $virtioblk,drive=drive0
62
63echo
64echo "Starting a second QEMU using the same image should fail"
65echo 'quit' | $QEMU -nographic -monitor stdio \
66    -drive file=$TEST_IMG,if=none,id=drive0,file.locking=on \
67    -device $virtioblk,drive=drive0 2>&1 | _filter_testdir 2>&1 |
68    _filter_qemu |
69    sed -e '/falling back to POSIX file/d' \
70        -e '/locks can be lost unexpectedly/d'
71
72_cleanup_qemu
73
74echo
75echo '=== Testing reopen ==='
76echo
77
78# This tests that reopening does not unshare any permissions it should
79# not unshare
80# (There was a bug where reopening shared exactly the opposite of the
81# permissions it was supposed to share)
82
83_launch_qemu
84
85_send_qemu_cmd $QEMU_HANDLE \
86    "{'execute': 'qmp_capabilities'}" \
87    'return'
88
89# Open the image without any format layer (we are not going to access
90# it, so that is fine)
91# This should keep all permissions shared.
92success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
93    "{'execute': 'blockdev-add',
94      'arguments': {
95          'node-name': 'node0',
96          'driver': 'file',
97          'filename': '$TEST_IMG',
98          'locking': 'on'
99          } }" \
100    'return' \
101    'error'
102
103# This snapshot will perform a reopen to drop R/W to RO.
104# It should still keep all permissions shared.
105success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
106    "{'execute': 'blockdev-snapshot-sync',
107      'arguments': {
108          'node-name': 'node0',
109          'snapshot-file': '$TEST_IMG.overlay',
110          'snapshot-node-name': 'node1'
111      } }" \
112    'return' \
113    'error'
114
115# Now open the same file again
116# This does not require any permissions (and does not unshare any), so
117# this will not conflict with node0.
118success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
119    "{'execute': 'blockdev-add',
120      'arguments': {
121          'node-name': 'node1',
122          'driver': 'file',
123          'filename': '$TEST_IMG',
124          'locking': 'on'
125          } }" \
126    'return' \
127    'error'
128
129# Start an NBD server to which we can attach node1
130success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
131    "{'execute': 'nbd-server-start',
132      'arguments': {
133          'addr': {
134              'type': 'unix',
135              'data': {
136                  'path': '$TEST_DIR/nbd.socket'
137              } } } }" \
138    'return' \
139    'error'
140
141# Now we attach the image to the NBD server.  This server does require
142# some permissions (at least WRITE and READ_CONSISTENT), so if
143# reopening node0 unshared any (which it should not have), this will
144# fail (but it should not).
145success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
146    "{'execute': 'nbd-server-add',
147      'arguments': {
148          'device': 'node1'
149      } }" \
150    'return' \
151    'error'
152
153_cleanup_qemu
154
155# success, all done
156echo "*** done"
157rm -f $seq.full
158status=0
159