blob: 56a2dd58e6fefa35b46e20275ddfd51e1ab52427 [file] [log] [blame]
Philippe Mathieu-Daudé11a82d12019-03-07 15:58:38 +01001#!/usr/bin/env bash
Fam Zhengde9efdb2017-05-03 00:35:58 +08002#
3# Test image locking for POSIX locks
4#
5# Copyright 2017 Red Hat, Inc.
6#
7# This program is free software; you can redistribute it and/or modify
8# it under the terms of the GNU General Public License as published by
9# the Free Software Foundation; either version 2 of the License, or
10# (at your option) any later version.
11#
12# This program is distributed in the hope that it will be useful,
13# but WITHOUT ANY WARRANTY; without even the implied warranty of
14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15# GNU General Public License for more details.
16#
17# You should have received a copy of the GNU General Public License
18# along with this program. If not, see <http://www.gnu.org/licenses/>.
19#
20
21# creator
22owner=famz@redhat.com
23
24seq="$(basename $0)"
25echo "QA output created by $seq"
26
Fam Zhengde9efdb2017-05-03 00:35:58 +080027tmp=/tmp/$$
28status=1 # failure is the default!
29
30_cleanup()
31{
32 _cleanup_test_img
Max Reitzf91ecbd2019-11-07 17:37:01 +010033 _rm_test_img "$TEST_IMG.overlay"
Max Reitz748f8312019-10-17 15:31:43 +020034 rm -f "$SOCK_DIR/nbd.socket"
Fam Zhengde9efdb2017-05-03 00:35:58 +080035}
36trap "_cleanup; exit \$status" 0 1 2 3 15
37
38# get standard environment, filters and checks
39. ./common.rc
40. ./common.filter
41. ./common.qemu
42
43_supported_fmt qcow2
44_supported_proto file
Fam Zhengde9efdb2017-05-03 00:35:58 +080045
46size=32M
47
Cornelia Huckf1d55162017-09-13 11:10:36 +020048case "$QEMU_DEFAULT_MACHINE" in
49 s390-ccw-virtio)
50 virtioblk=virtio-blk-ccw
51 ;;
52 *)
53 virtioblk=virtio-blk-pci
54 ;;
55esac
56
Fam Zhengde9efdb2017-05-03 00:35:58 +080057_make_test_img $size
58
59echo "Starting QEMU"
60_launch_qemu -drive file=$TEST_IMG,if=none,id=drive0,file.locking=on \
Cornelia Huckf1d55162017-09-13 11:10:36 +020061 -device $virtioblk,drive=drive0
Fam Zhengde9efdb2017-05-03 00:35:58 +080062
63echo
64echo "Starting a second QEMU using the same image should fail"
Kevin Wolfc60f6fc2017-10-29 13:49:22 +010065echo 'quit' | $QEMU -nographic -monitor stdio \
Fam Zhengde9efdb2017-05-03 00:35:58 +080066 -drive file=$TEST_IMG,if=none,id=drive0,file.locking=on \
Cornelia Huckf1d55162017-09-13 11:10:36 +020067 -device $virtioblk,drive=drive0 2>&1 | _filter_testdir 2>&1 |
Fam Zhengde9efdb2017-05-03 00:35:58 +080068 _filter_qemu |
69 sed -e '/falling back to POSIX file/d' \
70 -e '/locks can be lost unexpectedly/d'
71
72_cleanup_qemu
73
Max Reitz6d0a4a02018-11-16 17:45:26 +010074echo
75echo '=== Testing reopen ==='
76echo
77
78# This tests that reopening does not unshare any permissions it should
79# not unshare
80# (There was a bug where reopening shared exactly the opposite of the
81# permissions it was supposed to share)
82
83_launch_qemu
84
85_send_qemu_cmd $QEMU_HANDLE \
86 "{'execute': 'qmp_capabilities'}" \
87 'return'
88
89# Open the image without any format layer (we are not going to access
90# it, so that is fine)
91# This should keep all permissions shared.
92success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
93 "{'execute': 'blockdev-add',
94 'arguments': {
95 'node-name': 'node0',
96 'driver': 'file',
97 'filename': '$TEST_IMG',
98 'locking': 'on'
99 } }" \
100 'return' \
101 'error'
102
103# This snapshot will perform a reopen to drop R/W to RO.
104# It should still keep all permissions shared.
105success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
106 "{'execute': 'blockdev-snapshot-sync',
107 'arguments': {
108 'node-name': 'node0',
109 'snapshot-file': '$TEST_IMG.overlay',
110 'snapshot-node-name': 'node1'
111 } }" \
112 'return' \
113 'error'
114
115# Now open the same file again
116# This does not require any permissions (and does not unshare any), so
117# this will not conflict with node0.
118success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
119 "{'execute': 'blockdev-add',
120 'arguments': {
121 'node-name': 'node1',
122 'driver': 'file',
123 'filename': '$TEST_IMG',
124 'locking': 'on'
125 } }" \
126 'return' \
127 'error'
128
Max Reitz8fabb8b2019-04-17 17:30:05 +0200129# Start an NBD server to which we can attach node1
130success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
131 "{'execute': 'nbd-server-start',
132 'arguments': {
133 'addr': {
134 'type': 'unix',
135 'data': {
Max Reitz748f8312019-10-17 15:31:43 +0200136 'path': '$SOCK_DIR/nbd.socket'
Max Reitz8fabb8b2019-04-17 17:30:05 +0200137 } } } }" \
138 'return' \
139 'error'
140
141# Now we attach the image to the NBD server. This server does require
142# some permissions (at least WRITE and READ_CONSISTENT), so if
Max Reitz6d0a4a02018-11-16 17:45:26 +0100143# reopening node0 unshared any (which it should not have), this will
144# fail (but it should not).
145success_or_failure=y _send_qemu_cmd $QEMU_HANDLE \
Max Reitz8fabb8b2019-04-17 17:30:05 +0200146 "{'execute': 'nbd-server-add',
Max Reitz6d0a4a02018-11-16 17:45:26 +0100147 'arguments': {
Max Reitz8fabb8b2019-04-17 17:30:05 +0200148 'device': 'node1'
Max Reitz6d0a4a02018-11-16 17:45:26 +0100149 } }" \
150 'return' \
151 'error'
152
153_cleanup_qemu
154
Max Reitzdc68c9d2019-05-22 19:03:52 +0200155echo
156echo '=== Testing failure to loosen restrictions ==='
157echo
158
159_launch_qemu -drive file=$TEST_IMG,if=none,file.locking=on
160
161_send_qemu_cmd $QEMU_HANDLE \
162 "{'execute': 'qmp_capabilities'}" \
163 'return'
164
165_cleanup_test_img
166
167# When quitting qemu, it will try to drop its locks on the test image.
168# Because that file no longer exists, it will be unable to do so.
169# However, that is not fatal, so it should just move on.
170_send_qemu_cmd $QEMU_HANDLE \
171 "{'execute': 'quit'}" \
172 'return'
173
174wait=1 _cleanup_qemu
175
Fam Zhengde9efdb2017-05-03 00:35:58 +0800176# success, all done
177echo "*** done"
178rm -f $seq.full
179status=0