19821f1d3SAlan Somers /*- 24d846d26SWarner Losh * SPDX-License-Identifier: BSD-2-Clause 39821f1d3SAlan Somers * 49821f1d3SAlan Somers * Copyright (c) 2019 The FreeBSD Foundation 59821f1d3SAlan Somers * 69821f1d3SAlan Somers * This software was developed by BFF Storage Systems, LLC under sponsorship 79821f1d3SAlan Somers * from the FreeBSD Foundation. 89821f1d3SAlan Somers * 99821f1d3SAlan Somers * Redistribution and use in source and binary forms, with or without 109821f1d3SAlan Somers * modification, are permitted provided that the following conditions 119821f1d3SAlan Somers * are met: 129821f1d3SAlan Somers * 1. Redistributions of source code must retain the above copyright 139821f1d3SAlan Somers * notice, this list of conditions and the following disclaimer. 149821f1d3SAlan Somers * 2. Redistributions in binary form must reproduce the above copyright 159821f1d3SAlan Somers * notice, this list of conditions and the following disclaimer in the 169821f1d3SAlan Somers * documentation and/or other materials provided with the distribution. 179821f1d3SAlan Somers * 189821f1d3SAlan Somers * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 199821f1d3SAlan Somers * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 209821f1d3SAlan Somers * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 219821f1d3SAlan Somers * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 229821f1d3SAlan Somers * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 239821f1d3SAlan Somers * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 249821f1d3SAlan Somers * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 259821f1d3SAlan Somers * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 269821f1d3SAlan Somers * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 279821f1d3SAlan Somers * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 289821f1d3SAlan Somers * SUCH DAMAGE. 299821f1d3SAlan Somers */ 309821f1d3SAlan Somers 312d6bf515SAlan Somers struct _sem; 322d6bf515SAlan Somers typedef struct _sem sem_t; 337fc0921dSAlan Somers struct _dirdesc; 347fc0921dSAlan Somers typedef struct _dirdesc DIR; 352d6bf515SAlan Somers 36a87257acSAlan Somers /* Nanoseconds to sleep, for tests that must */ 37a87257acSAlan Somers #define NAP_NS (100'000'000) 38a87257acSAlan Somers 3961b0a927SAlan Somers void get_unprivileged_id(uid_t *uid, gid_t *gid); 40a87257acSAlan Somers inline void nap() 41a87257acSAlan Somers { 42a87257acSAlan Somers usleep(NAP_NS / 1000); 43a87257acSAlan Somers } 4461b0a927SAlan Somers 45b0ecfb42SAlan Somers enum cache_mode { 46b0ecfb42SAlan Somers Uncached, 47b0ecfb42SAlan Somers Writethrough, 48b0ecfb42SAlan Somers Writeback, 49b0ecfb42SAlan Somers WritebackAsync 50b0ecfb42SAlan Somers }; 51b0ecfb42SAlan Somers 52b0ecfb42SAlan Somers const char *cache_mode_to_s(enum cache_mode cm); 53c2265ae7SAlan Somers bool is_unsafe_aio_enabled(void); 54c2265ae7SAlan Somers 558eecd9ceSAlan Somers extern const uint32_t libfuse_max_write; 569821f1d3SAlan Somers class FuseTest : public ::testing::Test { 579821f1d3SAlan Somers protected: 58*9f31c474SAlan Somers uint32_t m_maxread; 599821f1d3SAlan Somers uint32_t m_maxreadahead; 608eecd9ceSAlan Somers uint32_t m_maxwrite; 619821f1d3SAlan Somers uint32_t m_init_flags; 6291ff3a0dSAlan Somers bool m_allow_other; 639821f1d3SAlan Somers bool m_default_permissions; 6416bd2d47SAlan Somers uint32_t m_kernel_minor_version; 653429092cSAlan Somers enum poll_method m_pm; 6691972cfcSAlan Somers bool m_noatime; 679821f1d3SAlan Somers bool m_push_symlinks_in; 68140bb492SAlan Somers bool m_ro; 698eecd9ceSAlan Somers bool m_async; 70402b609cSAlan Somers bool m_noclusterr; 71ed74f781SAlan Somers bool m_nointr; 72fef46454SAlan Somers unsigned m_time_gran; 739821f1d3SAlan Somers MockFS *m_mock = NULL; 749821f1d3SAlan Somers const static uint64_t FH = 0xdeadbeef1a7ebabe; 758d99a6b9SAlan Somers const char *reclaim_mib = "debug.try_reclaim_vnode"; 762f636248SAlan Somers const char *m_fsname; 77616eaa66SAlan Somers const char *m_subtype; 789821f1d3SAlan Somers 799821f1d3SAlan Somers public: 809821f1d3SAlan Somers int m_maxbcachebuf; 81e9b411d2SGleb Smirnoff unsigned long m_maxphys; 829821f1d3SAlan Somers 839821f1d3SAlan Somers FuseTest(): 84*9f31c474SAlan Somers m_maxread(0), 85d569012fSAlan Somers m_maxreadahead(0), 86f928dbcbSAlan Somers m_maxwrite(0), 879821f1d3SAlan Somers m_init_flags(0), 8891ff3a0dSAlan Somers m_allow_other(false), 899821f1d3SAlan Somers m_default_permissions(false), 9016bd2d47SAlan Somers m_kernel_minor_version(FUSE_KERNEL_MINOR_VERSION), 913429092cSAlan Somers m_pm(BLOCKING), 9291972cfcSAlan Somers m_noatime(false), 93140bb492SAlan Somers m_push_symlinks_in(false), 948eecd9ceSAlan Somers m_ro(false), 95402b609cSAlan Somers m_async(false), 96fef46454SAlan Somers m_noclusterr(false), 97ed74f781SAlan Somers m_nointr(false), 988e765737SAlan Somers m_time_gran(1), 992f636248SAlan Somers m_fsname(""), 100616eaa66SAlan Somers m_subtype(""), 1018e765737SAlan Somers m_maxbcachebuf(0), 1028e765737SAlan Somers m_maxphys(0) 1039821f1d3SAlan Somers {} 1049821f1d3SAlan Somers 1059821f1d3SAlan Somers virtual void SetUp(); 1069821f1d3SAlan Somers 1079821f1d3SAlan Somers virtual void TearDown() { 1089821f1d3SAlan Somers if (m_mock) 1099821f1d3SAlan Somers delete m_mock; 1109821f1d3SAlan Somers } 1119821f1d3SAlan Somers 1129821f1d3SAlan Somers /* 1139f10f423SAlan Somers * Create an expectation that FUSE_ACCESS will be called once for the 11491ff3a0dSAlan Somers * given inode with the given access_mode, returning the given errno 11591ff3a0dSAlan Somers */ 11691ff3a0dSAlan Somers void expect_access(uint64_t ino, mode_t access_mode, int error); 11791ff3a0dSAlan Somers 1183429092cSAlan Somers /* Expect FUSE_DESTROY and shutdown the daemon */ 1193429092cSAlan Somers void expect_destroy(int error); 1203429092cSAlan Somers 12191ff3a0dSAlan Somers /* 122398c88c7SAlan Somers * Create an expectation that FUSE_FALLOCATE will be called with the 123398c88c7SAlan Somers * given inode, offset, length, and mode, exactly times times and 124398c88c7SAlan Somers * returning error 125398c88c7SAlan Somers */ 126398c88c7SAlan Somers void expect_fallocate(uint64_t ino, uint64_t offset, uint64_t length, 127398c88c7SAlan Somers uint32_t mode, int error, int times=1); 128398c88c7SAlan Somers 129398c88c7SAlan Somers /* 1309f10f423SAlan Somers * Create an expectation that FUSE_FLUSH will be called times times for 1319f10f423SAlan Somers * the given inode 1329f10f423SAlan Somers */ 1339f10f423SAlan Somers void expect_flush(uint64_t ino, int times, ProcessMockerT r); 1349f10f423SAlan Somers 1359f10f423SAlan Somers /* 136ff4fbdf5SAlan Somers * Create an expectation that FUSE_FORGET will be called for the given 1372d6bf515SAlan Somers * inode. There will be no response. If sem is provided, it will be 1382d6bf515SAlan Somers * posted after the operation is received by the daemon. 139ff4fbdf5SAlan Somers */ 1402d6bf515SAlan Somers void expect_forget(uint64_t ino, uint64_t nlookup, sem_t *sem = NULL); 141ff4fbdf5SAlan Somers 142ff4fbdf5SAlan Somers /* 1439821f1d3SAlan Somers * Create an expectation that FUSE_GETATTR will be called for the given 1449821f1d3SAlan Somers * inode any number of times. It will respond with a few basic 1459821f1d3SAlan Somers * attributes, like the given size and the mode S_IFREG | 0644 1469821f1d3SAlan Somers */ 1479821f1d3SAlan Somers void expect_getattr(uint64_t ino, uint64_t size); 1489821f1d3SAlan Somers 1499821f1d3SAlan Somers /* 150bfcb817bSAlan Somers * Create an expectation that FUSE_GETXATTR will be called once for the 151bfcb817bSAlan Somers * given inode. 152bfcb817bSAlan Somers */ 153bfcb817bSAlan Somers void expect_getxattr(uint64_t ino, const char *attr, ProcessMockerT r); 154bfcb817bSAlan Somers 155bfcb817bSAlan Somers /* 1569821f1d3SAlan Somers * Create an expectation that FUSE_LOOKUP will be called for the given 157ff4fbdf5SAlan Somers * path exactly times times and cache validity period. It will respond 158ff4fbdf5SAlan Somers * with inode ino, mode mode, filesize size. 1599821f1d3SAlan Somers */ 1609821f1d3SAlan Somers void expect_lookup(const char *relpath, uint64_t ino, mode_t mode, 161ff4fbdf5SAlan Somers uint64_t size, int times, uint64_t attr_valid = UINT64_MAX, 162474ba6faSAlan Somers uid_t uid = 0, gid_t gid = 0); 1639821f1d3SAlan Somers 16416bd2d47SAlan Somers /* The protocol 7.8 version of expect_lookup */ 16516bd2d47SAlan Somers void expect_lookup_7_8(const char *relpath, uint64_t ino, mode_t mode, 16616bd2d47SAlan Somers uint64_t size, int times, uint64_t attr_valid = UINT64_MAX, 16716bd2d47SAlan Somers uid_t uid = 0, gid_t gid = 0); 16816bd2d47SAlan Somers 1699821f1d3SAlan Somers /* 170a1542146SAlan Somers * Create an expectation that FUSE_OPEN will be called for the given 1719821f1d3SAlan Somers * inode exactly times times. It will return with open_flags flags and 1729821f1d3SAlan Somers * file handle FH. 1739821f1d3SAlan Somers */ 1749821f1d3SAlan Somers void expect_open(uint64_t ino, uint32_t flags, int times); 1759821f1d3SAlan Somers 1769821f1d3SAlan Somers /* 1779821f1d3SAlan Somers * Create an expectation that FUSE_OPENDIR will be called exactly once 1789821f1d3SAlan Somers * for inode ino. 1799821f1d3SAlan Somers */ 1809821f1d3SAlan Somers void expect_opendir(uint64_t ino); 1819821f1d3SAlan Somers 1829821f1d3SAlan Somers /* 1839821f1d3SAlan Somers * Create an expectation that FUSE_READ will be called exactly once for 1849821f1d3SAlan Somers * the given inode, at offset offset and with size isize. It will 1859821f1d3SAlan Somers * return the first osize bytes from contents 18616bd2d47SAlan Somers * 18716bd2d47SAlan Somers * Protocol 7.8 tests can use this same expectation method because 18816bd2d47SAlan Somers * nothing currently validates the size of the fuse_read_in struct. 1899821f1d3SAlan Somers */ 1909821f1d3SAlan Somers void expect_read(uint64_t ino, uint64_t offset, uint64_t isize, 19141ae9f9eSAlan Somers uint64_t osize, const void *contents, int flags = -1, 19241ae9f9eSAlan Somers uint64_t fh = FH); 1939821f1d3SAlan Somers 1949821f1d3SAlan Somers /* 195e5b50fe7SAlan Somers * Create an expectation that FUSE_READIR will be called any number of 196e5b50fe7SAlan Somers * times on the given ino with the given offset, returning (by copy) 197e5b50fe7SAlan Somers * the provided entries 198e5b50fe7SAlan Somers */ 199e5b50fe7SAlan Somers void expect_readdir(uint64_t ino, uint64_t off, 200e5b50fe7SAlan Somers std::vector<struct dirent> &ents); 201e5b50fe7SAlan Somers 202e5b50fe7SAlan Somers /* 203e0bec057SAlan Somers * Create an expectation that FUSE_RELEASE will be called exactly once 20442d50d16SAlan Somers * for the given inode and filehandle, returning success 2059821f1d3SAlan Somers */ 20642d50d16SAlan Somers void expect_release(uint64_t ino, uint64_t fh); 2079821f1d3SAlan Somers 2089821f1d3SAlan Somers /* 20935cf0e7eSAlan Somers * Create an expectation that FUSE_RELEASEDIR will be called exactly 21035cf0e7eSAlan Somers * once for the given inode 21135cf0e7eSAlan Somers */ 21235cf0e7eSAlan Somers void expect_releasedir(uint64_t ino, ProcessMockerT r); 21335cf0e7eSAlan Somers 21435cf0e7eSAlan Somers /* 215ff4fbdf5SAlan Somers * Create an expectation that FUSE_UNLINK will be called exactly once 216ff4fbdf5SAlan Somers * for the given path, returning an errno 217ff4fbdf5SAlan Somers */ 218ff4fbdf5SAlan Somers void expect_unlink(uint64_t parent, const char *path, int error); 219ff4fbdf5SAlan Somers 220ff4fbdf5SAlan Somers /* 2219821f1d3SAlan Somers * Create an expectation that FUSE_WRITE will be called exactly once 222bda39894SAlan Somers * for the given inode, at offset offset, with size isize and buffer 223bda39894SAlan Somers * contents. Any flags present in flags_set must be set, and any 224bda39894SAlan Somers * present in flags_unset must not be set. Other flags are don't care. 225bda39894SAlan Somers * It will return osize. 2269821f1d3SAlan Somers */ 2279821f1d3SAlan Somers void expect_write(uint64_t ino, uint64_t offset, uint64_t isize, 228bda39894SAlan Somers uint64_t osize, uint32_t flags_set, uint32_t flags_unset, 229bda39894SAlan Somers const void *contents); 23009c01e67SAlan Somers 23116bd2d47SAlan Somers /* Protocol 7.8 version of expect_write */ 23216bd2d47SAlan Somers void expect_write_7_8(uint64_t ino, uint64_t offset, uint64_t isize, 233bda39894SAlan Somers uint64_t osize, const void *contents); 23416bd2d47SAlan Somers 23509c01e67SAlan Somers /* 23609c01e67SAlan Somers * Helper that runs code in a child process. 23709c01e67SAlan Somers * 23809c01e67SAlan Somers * First, parent_func runs in the parent process. 23909c01e67SAlan Somers * Then, child_func runs in the child process, dropping privileges if 24009c01e67SAlan Somers * desired. 24109c01e67SAlan Somers * Finally, fusetest_fork returns. 24209c01e67SAlan Somers * 24309c01e67SAlan Somers * # Returns 24409c01e67SAlan Somers * 245a1542146SAlan Somers * fusetest_fork may SKIP the test, which the caller should detect with 246a1542146SAlan Somers * the IsSkipped() method. If not, then the child's exit status will 247a1542146SAlan Somers * be returned in status. 24809c01e67SAlan Somers */ 249a1542146SAlan Somers void fork(bool drop_privs, int *status, 25009c01e67SAlan Somers std::function<void()> parent_func, 25109c01e67SAlan Somers std::function<int()> child_func); 2527fc0921dSAlan Somers 2537fc0921dSAlan Somers /* 2547fc0921dSAlan Somers * Deliberately leak a file descriptor. 2557fc0921dSAlan Somers * 2567fc0921dSAlan Somers * Closing a file descriptor on fusefs would cause the server to 2577fc0921dSAlan Somers * receive FUSE_CLOSE and possibly FUSE_INACTIVE. Handling those 2587fc0921dSAlan Somers * operations would needlessly complicate most tests. So most tests 2597fc0921dSAlan Somers * deliberately leak the file descriptors instead. This method serves 2607fc0921dSAlan Somers * to document the leakage, and provide a single point of suppression 2617fc0921dSAlan Somers * for static analyzers. 2627fc0921dSAlan Somers */ 263dd21a916SAlan Somers /* coverity[+close: arg-0] */ 2647fc0921dSAlan Somers static void leak(int fd __unused) {} 2657fc0921dSAlan Somers 2667fc0921dSAlan Somers /* 2677fc0921dSAlan Somers * Deliberately leak a DIR* pointer 2687fc0921dSAlan Somers * 2697fc0921dSAlan Somers * See comments for FuseTest::leak 2707fc0921dSAlan Somers */ 2717fc0921dSAlan Somers static void leakdir(DIR* dirp __unused) {} 2728d99a6b9SAlan Somers 2738d99a6b9SAlan Somers /* Manually reclaim a vnode. Requires root privileges. */ 2748d99a6b9SAlan Somers void reclaim_vnode(const char *fullpath); 2759821f1d3SAlan Somers }; 276