2013-07-29 05:44:47 +02:00
|
|
|
/*
|
|
|
|
* QTest testcase for QOM
|
|
|
|
*
|
|
|
|
* Copyright (c) 2013 SUSE LINUX Products GmbH
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or later.
|
|
|
|
* See the COPYING file in the top-level directory.
|
|
|
|
*/
|
|
|
|
|
2016-02-08 19:08:51 +01:00
|
|
|
#include "qemu/osdep.h"
|
2014-02-08 11:41:07 +01:00
|
|
|
|
2018-02-01 12:18:39 +01:00
|
|
|
#include "qapi/qmp/qdict.h"
|
2018-02-01 12:18:38 +01:00
|
|
|
#include "qapi/qmp/qlist.h"
|
2016-03-20 18:16:19 +01:00
|
|
|
#include "qemu/cutils.h"
|
2022-03-30 11:39:05 +02:00
|
|
|
#include "libqtest.h"
|
2014-01-10 14:31:38 +01:00
|
|
|
|
2023-01-18 13:25:57 +01:00
|
|
|
static int verbosity_level;
|
2022-12-15 16:30:36 +01:00
|
|
|
|
2019-05-15 19:43:26 +02:00
|
|
|
static void test_properties(QTestState *qts, const char *path, bool recurse)
|
2014-02-07 15:36:16 +01:00
|
|
|
{
|
|
|
|
char *child_path;
|
2015-12-02 21:20:34 +01:00
|
|
|
QDict *response, *tuple, *tmp;
|
2014-02-07 15:36:16 +01:00
|
|
|
QList *list;
|
|
|
|
QListEntry *entry;
|
2022-11-21 20:42:40 +01:00
|
|
|
GSList *children = NULL, *links = NULL;
|
2014-02-07 15:36:16 +01:00
|
|
|
|
2023-01-18 13:25:57 +01:00
|
|
|
if (verbosity_level >= 2) {
|
|
|
|
g_test_message("Obtaining properties of %s", path);
|
|
|
|
}
|
2019-05-15 19:43:26 +02:00
|
|
|
response = qtest_qmp(qts, "{ 'execute': 'qom-list',"
|
|
|
|
" 'arguments': { 'path': %s } }", path);
|
2014-02-07 15:36:16 +01:00
|
|
|
g_assert(response);
|
|
|
|
|
2014-04-12 00:07:12 +02:00
|
|
|
if (!recurse) {
|
2018-04-19 17:01:43 +02:00
|
|
|
qobject_unref(response);
|
2014-04-12 00:07:12 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-02-07 15:36:16 +01:00
|
|
|
g_assert(qdict_haskey(response, "return"));
|
2018-02-24 16:40:29 +01:00
|
|
|
list = qobject_to(QList, qdict_get(response, "return"));
|
2014-02-07 15:36:16 +01:00
|
|
|
QLIST_FOREACH_ENTRY(list, entry) {
|
2018-02-24 16:40:29 +01:00
|
|
|
tuple = qobject_to(QDict, qlist_entry_obj(entry));
|
2014-04-12 00:07:12 +02:00
|
|
|
bool is_child = strstart(qdict_get_str(tuple, "type"), "child<", NULL);
|
|
|
|
bool is_link = strstart(qdict_get_str(tuple, "type"), "link<", NULL);
|
|
|
|
|
|
|
|
if (is_child || is_link) {
|
2014-02-07 15:36:16 +01:00
|
|
|
child_path = g_strdup_printf("%s/%s",
|
|
|
|
path, qdict_get_str(tuple, "name"));
|
2022-11-21 20:42:40 +01:00
|
|
|
if (is_child) {
|
|
|
|
children = g_slist_prepend(children, child_path);
|
|
|
|
} else {
|
|
|
|
links = g_slist_prepend(links, child_path);
|
|
|
|
}
|
2014-02-07 15:36:16 +01:00
|
|
|
} else {
|
|
|
|
const char *prop = qdict_get_str(tuple, "name");
|
2023-01-18 13:25:57 +01:00
|
|
|
if (verbosity_level >= 3) {
|
2022-12-15 16:30:36 +01:00
|
|
|
g_test_message("-> %s", prop);
|
|
|
|
}
|
2019-05-15 19:43:26 +02:00
|
|
|
tmp = qtest_qmp(qts,
|
|
|
|
"{ 'execute': 'qom-get',"
|
|
|
|
" 'arguments': { 'path': %s, 'property': %s } }",
|
|
|
|
path, prop);
|
2014-02-07 15:36:16 +01:00
|
|
|
/* qom-get may fail but should not, e.g., segfault. */
|
2015-12-02 21:20:34 +01:00
|
|
|
g_assert(tmp);
|
2018-04-19 17:01:43 +02:00
|
|
|
qobject_unref(tmp);
|
2014-02-07 15:36:16 +01:00
|
|
|
}
|
|
|
|
}
|
2022-11-21 20:42:40 +01:00
|
|
|
|
|
|
|
while (links) {
|
|
|
|
test_properties(qts, links->data, false);
|
|
|
|
g_free(links->data);
|
|
|
|
links = g_slist_delete_link(links, links);
|
|
|
|
}
|
|
|
|
while (children) {
|
|
|
|
test_properties(qts, children->data, true);
|
|
|
|
g_free(children->data);
|
|
|
|
children = g_slist_delete_link(children, children);
|
|
|
|
}
|
|
|
|
|
2018-04-19 17:01:43 +02:00
|
|
|
qobject_unref(response);
|
2014-02-07 15:36:16 +01:00
|
|
|
}
|
|
|
|
|
2014-01-10 14:31:39 +01:00
|
|
|
static void test_machine(gconstpointer data)
|
2013-07-29 05:44:47 +02:00
|
|
|
{
|
|
|
|
const char *machine = data;
|
2014-01-10 14:31:39 +01:00
|
|
|
QDict *response;
|
2019-05-15 19:43:26 +02:00
|
|
|
QTestState *qts;
|
2013-07-29 05:44:47 +02:00
|
|
|
|
2019-05-15 19:43:26 +02:00
|
|
|
qts = qtest_initf("-machine %s", machine);
|
2014-02-07 15:36:16 +01:00
|
|
|
|
2019-05-15 19:43:26 +02:00
|
|
|
test_properties(qts, "/machine", true);
|
2014-02-07 15:36:16 +01:00
|
|
|
|
2019-05-15 19:43:26 +02:00
|
|
|
response = qtest_qmp(qts, "{ 'execute': 'quit' }");
|
2014-01-10 14:31:39 +01:00
|
|
|
g_assert(qdict_haskey(response, "return"));
|
2018-04-19 17:01:43 +02:00
|
|
|
qobject_unref(response);
|
2014-02-07 15:36:16 +01:00
|
|
|
|
2019-05-15 19:43:26 +02:00
|
|
|
qtest_quit(qts);
|
2015-12-02 21:20:34 +01:00
|
|
|
g_free((void *)machine);
|
2013-07-29 05:44:47 +02:00
|
|
|
}
|
|
|
|
|
2017-03-30 09:50:06 +02:00
|
|
|
static void add_machine_test_case(const char *mname)
|
2013-07-29 05:44:47 +02:00
|
|
|
{
|
piix: fix xenfv regression, add compat machine xenfv-4.2
With QEMU 4.0 an incompatible change was added to pc_piix, which makes it
practical impossible to migrate domUs started with qemu2 or qemu3 to
newer qemu versions. Commit 7fccf2a06890e3bc3b30e29827ad3fb93fe88fea
added and enabled a new member "smbus_no_migration_support". In commit
4ab2f2a8aabfea95cc53c64e13b3f67960b27fdf the vmstate_acpi got new
elements, which are conditionally filled. As a result, an incoming
migration expected smbus related data unless smbus migration was
disabled for a given MachineClass. Since first commit forgot to handle
'xenfv', domUs started with QEMU 4.x are incompatible with their QEMU
siblings.
Using other existing machine types, such as 'pc-i440fx-3.1', is not
possible because 'xenfv' creates the 'xen-platform' PCI device at
00:02.0, while all other variants to run a domU would create it at
00:04.0.
To cover both the existing and the broken case of 'xenfv' in a single
qemu binary, a new compatibility variant of 'xenfv-4.2' must be added
which targets domUs started with qemu 4.2. The existing 'xenfv' restores
compatibility of QEMU 5.x with qemu 3.1.
Host admins who started domUs with QEMU 4.x (preferrable QEMU 4.2)
have to use a wrapper script which appends '-machine xenfv-4.2' to
the device-model command line. This is only required if there is no
maintenance window which allows to temporary shutdown the domU and
restart it with a fixed device-model.
The wrapper script is as simple as this:
#!/bin/sh
exec /usr/bin/qemu-system-i386 "$@" -machine xenfv-4.2
With xl this script will be enabled with device_model_override=, see
xl.cfg(5). To live migrate a domU, adjust the existing domU.cfg and pass
it to xl migrate or xl save/restore:
xl migrate -C new-domU.cfg domU remote-host
xl save domU CheckpointFile new-domU.cfg
xl restore new-domU.cfg CheckpointFile
With libvirt this script will be enabled with the <emulator> element in
domU.xml. Use 'virsh edit' prior 'virsh migrate' to replace the existing
<emulator> element to point it to the wrapper script.
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Message-Id: <20200327151841.13877-1-olaf@aepfle.de>
[Adjust tests for blacklisted machine types, simplifying the one in
qom-test. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2020-03-27 16:18:40 +01:00
|
|
|
char *path;
|
2014-01-10 14:31:38 +01:00
|
|
|
|
piix: fix xenfv regression, add compat machine xenfv-4.2
With QEMU 4.0 an incompatible change was added to pc_piix, which makes it
practical impossible to migrate domUs started with qemu2 or qemu3 to
newer qemu versions. Commit 7fccf2a06890e3bc3b30e29827ad3fb93fe88fea
added and enabled a new member "smbus_no_migration_support". In commit
4ab2f2a8aabfea95cc53c64e13b3f67960b27fdf the vmstate_acpi got new
elements, which are conditionally filled. As a result, an incoming
migration expected smbus related data unless smbus migration was
disabled for a given MachineClass. Since first commit forgot to handle
'xenfv', domUs started with QEMU 4.x are incompatible with their QEMU
siblings.
Using other existing machine types, such as 'pc-i440fx-3.1', is not
possible because 'xenfv' creates the 'xen-platform' PCI device at
00:02.0, while all other variants to run a domU would create it at
00:04.0.
To cover both the existing and the broken case of 'xenfv' in a single
qemu binary, a new compatibility variant of 'xenfv-4.2' must be added
which targets domUs started with qemu 4.2. The existing 'xenfv' restores
compatibility of QEMU 5.x with qemu 3.1.
Host admins who started domUs with QEMU 4.x (preferrable QEMU 4.2)
have to use a wrapper script which appends '-machine xenfv-4.2' to
the device-model command line. This is only required if there is no
maintenance window which allows to temporary shutdown the domU and
restart it with a fixed device-model.
The wrapper script is as simple as this:
#!/bin/sh
exec /usr/bin/qemu-system-i386 "$@" -machine xenfv-4.2
With xl this script will be enabled with device_model_override=, see
xl.cfg(5). To live migrate a domU, adjust the existing domU.cfg and pass
it to xl migrate or xl save/restore:
xl migrate -C new-domU.cfg domU remote-host
xl save domU CheckpointFile new-domU.cfg
xl restore new-domU.cfg CheckpointFile
With libvirt this script will be enabled with the <emulator> element in
domU.xml. Use 'virsh edit' prior 'virsh migrate' to replace the existing
<emulator> element to point it to the wrapper script.
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Message-Id: <20200327151841.13877-1-olaf@aepfle.de>
[Adjust tests for blacklisted machine types, simplifying the one in
qom-test. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2020-03-27 16:18:40 +01:00
|
|
|
path = g_strdup_printf("qom/%s", mname);
|
|
|
|
qtest_add_data_func(path, g_strdup(mname), test_machine);
|
|
|
|
g_free(path);
|
2013-07-29 05:44:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
2022-12-15 16:30:36 +01:00
|
|
|
char *v_env = getenv("V");
|
|
|
|
|
2023-01-18 13:25:57 +01:00
|
|
|
if (v_env) {
|
|
|
|
verbosity_level = atoi(v_env);
|
2022-12-15 16:30:36 +01:00
|
|
|
}
|
|
|
|
|
2013-07-29 05:44:47 +02:00
|
|
|
g_test_init(&argc, &argv, NULL);
|
|
|
|
|
2018-08-16 13:35:55 +02:00
|
|
|
qtest_cb_for_every_machine(add_machine_test_case, g_test_quick());
|
2013-07-29 05:44:47 +02:00
|
|
|
|
|
|
|
return g_test_run();
|
|
|
|
}
|