2020-01-06 20:51:35 +00:00
|
|
|
// Copyright 2019 The gVisor Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package tmpfs
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2020-01-16 00:31:24 +00:00
|
|
|
"sync/atomic"
|
2020-01-06 20:51:35 +00:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"gvisor.dev/gvisor/pkg/abi/linux"
|
2020-01-27 23:17:58 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/context"
|
2020-01-06 20:51:35 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/fspath"
|
2020-01-31 22:14:52 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/sentry/fs/lock"
|
2020-01-06 20:51:35 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
|
|
|
|
"gvisor.dev/gvisor/pkg/sentry/kernel/contexttest"
|
|
|
|
"gvisor.dev/gvisor/pkg/sentry/vfs"
|
2020-01-31 22:14:52 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/syserror"
|
2020-01-27 23:17:58 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/usermem"
|
2020-01-06 20:51:35 +00:00
|
|
|
)
|
|
|
|
|
2020-01-16 00:31:24 +00:00
|
|
|
// nextFileID is used to generate unique file names.
|
|
|
|
var nextFileID int64
|
|
|
|
|
|
|
|
// newTmpfsRoot creates a new tmpfs mount, and returns the root. If the error
|
|
|
|
// is not nil, then cleanup should be called when the root is no longer needed.
|
|
|
|
func newTmpfsRoot(ctx context.Context) (*vfs.VirtualFilesystem, vfs.VirtualDentry, func(), error) {
|
2020-01-06 20:51:35 +00:00
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
|
2020-02-14 21:39:51 +00:00
|
|
|
vfsObj := &vfs.VirtualFilesystem{}
|
|
|
|
if err := vfsObj.Init(); err != nil {
|
|
|
|
return nil, vfs.VirtualDentry{}, nil, fmt.Errorf("VFS init: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-01-06 20:51:35 +00:00
|
|
|
vfsObj.MustRegisterFilesystemType("tmpfs", FilesystemType{}, &vfs.RegisterFilesystemTypeOptions{
|
|
|
|
AllowUserMount: true,
|
|
|
|
})
|
|
|
|
mntns, err := vfsObj.NewMountNamespace(ctx, creds, "", "tmpfs", &vfs.GetFilesystemOptions{})
|
|
|
|
if err != nil {
|
2020-01-16 00:31:24 +00:00
|
|
|
return nil, vfs.VirtualDentry{}, nil, fmt.Errorf("failed to create tmpfs root mount: %v", err)
|
2020-01-06 20:51:35 +00:00
|
|
|
}
|
|
|
|
root := mntns.Root()
|
2020-01-16 00:31:24 +00:00
|
|
|
return vfsObj, root, func() {
|
|
|
|
root.DecRef()
|
2020-02-04 19:47:41 +00:00
|
|
|
mntns.DecRef()
|
2020-01-16 00:31:24 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// newFileFD creates a new file in a new tmpfs mount, and returns the FD. If
|
|
|
|
// the returned err is not nil, then cleanup should be called when the FD is no
|
|
|
|
// longer needed.
|
|
|
|
func newFileFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) {
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
vfsObj, root, cleanup, err := newTmpfsRoot(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
filename := fmt.Sprintf("tmpfs-test-file-%d", atomic.AddInt64(&nextFileID, 1))
|
2020-01-06 20:51:35 +00:00
|
|
|
|
|
|
|
// Create the file that will be write/read.
|
|
|
|
fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{
|
2020-01-16 00:31:24 +00:00
|
|
|
Root: root,
|
|
|
|
Start: root,
|
|
|
|
Path: fspath.Parse(filename),
|
2020-01-06 20:51:35 +00:00
|
|
|
}, &vfs.OpenOptions{
|
|
|
|
Flags: linux.O_RDWR | linux.O_CREAT | linux.O_EXCL,
|
2020-01-16 00:31:24 +00:00
|
|
|
Mode: linux.ModeRegular | mode,
|
2020-01-06 20:51:35 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
2020-01-16 00:31:24 +00:00
|
|
|
cleanup()
|
2020-01-06 20:51:35 +00:00
|
|
|
return nil, nil, fmt.Errorf("failed to create file %q: %v", filename, err)
|
|
|
|
}
|
|
|
|
|
2020-01-16 00:31:24 +00:00
|
|
|
return fd, cleanup, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// newDirFD is like newFileFD, but for directories.
|
|
|
|
func newDirFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) {
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
vfsObj, root, cleanup, err := newTmpfsRoot(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
dirname := fmt.Sprintf("tmpfs-test-dir-%d", atomic.AddInt64(&nextFileID, 1))
|
|
|
|
|
|
|
|
// Create the dir.
|
|
|
|
if err := vfsObj.MkdirAt(ctx, creds, &vfs.PathOperation{
|
|
|
|
Root: root,
|
|
|
|
Start: root,
|
|
|
|
Path: fspath.Parse(dirname),
|
|
|
|
}, &vfs.MkdirOptions{
|
|
|
|
Mode: linux.ModeDirectory | mode,
|
|
|
|
}); err != nil {
|
|
|
|
cleanup()
|
|
|
|
return nil, nil, fmt.Errorf("failed to create directory %q: %v", dirname, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open the dir and return it.
|
|
|
|
fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{
|
|
|
|
Root: root,
|
|
|
|
Start: root,
|
|
|
|
Path: fspath.Parse(dirname),
|
|
|
|
}, &vfs.OpenOptions{
|
|
|
|
Flags: linux.O_RDONLY | linux.O_DIRECTORY,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
cleanup()
|
|
|
|
return nil, nil, fmt.Errorf("failed to open directory %q: %v", dirname, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd, cleanup, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// newPipeFD is like newFileFD, but for pipes.
|
|
|
|
func newPipeFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) {
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
vfsObj, root, cleanup, err := newTmpfsRoot(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pipename := fmt.Sprintf("tmpfs-test-pipe-%d", atomic.AddInt64(&nextFileID, 1))
|
|
|
|
|
|
|
|
// Create the pipe.
|
|
|
|
if err := vfsObj.MknodAt(ctx, creds, &vfs.PathOperation{
|
|
|
|
Root: root,
|
|
|
|
Start: root,
|
|
|
|
Path: fspath.Parse(pipename),
|
|
|
|
}, &vfs.MknodOptions{
|
|
|
|
Mode: linux.ModeNamedPipe | mode,
|
|
|
|
}); err != nil {
|
|
|
|
cleanup()
|
|
|
|
return nil, nil, fmt.Errorf("failed to create pipe %q: %v", pipename, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open the pipe and return it.
|
|
|
|
fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{
|
|
|
|
Root: root,
|
|
|
|
Start: root,
|
|
|
|
Path: fspath.Parse(pipename),
|
|
|
|
}, &vfs.OpenOptions{
|
|
|
|
Flags: linux.O_RDWR,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
cleanup()
|
|
|
|
return nil, nil, fmt.Errorf("failed to open pipe %q: %v", pipename, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd, cleanup, nil
|
2020-01-06 20:51:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test that we can write some data to a file and read it back.`
|
|
|
|
func TestSimpleWriteRead(t *testing.T) {
|
|
|
|
ctx := contexttest.Context(t)
|
2020-01-16 00:31:24 +00:00
|
|
|
fd, cleanup, err := newFileFD(ctx, 0644)
|
2020-01-06 20:51:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
// Write.
|
|
|
|
data := []byte("foobarbaz")
|
|
|
|
n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Write failed: %v", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(data)) {
|
|
|
|
t.Errorf("fd.Write got short write length %d, want %d", n, len(data))
|
|
|
|
}
|
|
|
|
if got, want := fd.Impl().(*regularFileFD).off, int64(len(data)); got != want {
|
|
|
|
t.Errorf("fd.Write left offset at %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seek back to beginning.
|
|
|
|
if _, err := fd.Seek(ctx, 0, linux.SEEK_SET); err != nil {
|
|
|
|
t.Fatalf("fd.Seek failed: %v", err)
|
|
|
|
}
|
|
|
|
if got, want := fd.Impl().(*regularFileFD).off, int64(0); got != want {
|
|
|
|
t.Errorf("fd.Seek(0) left offset at %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read.
|
|
|
|
buf := make([]byte, len(data))
|
|
|
|
n, err = fd.Read(ctx, usermem.BytesIOSequence(buf), vfs.ReadOptions{})
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
t.Fatalf("fd.Read failed: %v", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(data)) {
|
|
|
|
t.Errorf("fd.Read got short read length %d, want %d", n, len(data))
|
|
|
|
}
|
|
|
|
if got, want := string(buf), string(data); got != want {
|
|
|
|
t.Errorf("Read got %q want %s", got, want)
|
|
|
|
}
|
|
|
|
if got, want := fd.Impl().(*regularFileFD).off, int64(len(data)); got != want {
|
|
|
|
t.Errorf("fd.Write left offset at %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPWrite(t *testing.T) {
|
|
|
|
ctx := contexttest.Context(t)
|
2020-01-16 00:31:24 +00:00
|
|
|
fd, cleanup, err := newFileFD(ctx, 0644)
|
2020-01-06 20:51:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
// Fill file with 1k 'a's.
|
|
|
|
data := bytes.Repeat([]byte{'a'}, 1000)
|
|
|
|
n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Write failed: %v", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(data)) {
|
|
|
|
t.Errorf("fd.Write got short write length %d, want %d", n, len(data))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write "gVisor is awesome" at various offsets.
|
|
|
|
buf := []byte("gVisor is awesome")
|
|
|
|
offsets := []int{0, 1, 2, 10, 20, 50, 100, len(data) - 100, len(data) - 1, len(data), len(data) + 1}
|
|
|
|
for _, offset := range offsets {
|
|
|
|
name := fmt.Sprintf("PWrite offset=%d", offset)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
n, err := fd.PWrite(ctx, usermem.BytesIOSequence(buf), int64(offset), vfs.WriteOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("fd.PWrite got err %v want nil", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(buf)) {
|
|
|
|
t.Errorf("fd.PWrite got %d bytes want %d", n, len(buf))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update data to reflect expected file contents.
|
|
|
|
if len(data) < offset+len(buf) {
|
|
|
|
data = append(data, make([]byte, (offset+len(buf))-len(data))...)
|
|
|
|
}
|
|
|
|
copy(data[offset:], buf)
|
|
|
|
|
|
|
|
// Read the whole file and compare with data.
|
|
|
|
readBuf := make([]byte, len(data))
|
|
|
|
n, err = fd.PRead(ctx, usermem.BytesIOSequence(readBuf), 0, vfs.ReadOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.PRead failed: %v", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(data)) {
|
|
|
|
t.Errorf("fd.PRead got short read length %d, want %d", n, len(data))
|
|
|
|
}
|
|
|
|
if got, want := string(readBuf), string(data); got != want {
|
|
|
|
t.Errorf("PRead got %q want %s", got, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-31 22:14:52 +00:00
|
|
|
func TestLocks(t *testing.T) {
|
|
|
|
ctx := contexttest.Context(t)
|
|
|
|
fd, cleanup, err := newFileFD(ctx, 0644)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
var (
|
|
|
|
uid1 lock.UniqueID
|
|
|
|
uid2 lock.UniqueID
|
|
|
|
// Non-blocking.
|
|
|
|
block lock.Blocker
|
|
|
|
)
|
|
|
|
|
|
|
|
uid1 = 123
|
|
|
|
uid2 = 456
|
|
|
|
|
|
|
|
if err := fd.Impl().LockBSD(ctx, uid1, lock.ReadLock, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockBSD failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().LockBSD(ctx, uid2, lock.ReadLock, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockBSD failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if got, want := fd.Impl().LockBSD(ctx, uid2, lock.WriteLock, block), syserror.ErrWouldBlock; got != want {
|
|
|
|
t.Fatalf("fd.Impl().LockBSD failed: got = %v, want = %v", got, want)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().UnlockBSD(ctx, uid1); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().UnlockBSD failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().LockBSD(ctx, uid2, lock.WriteLock, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockBSD failed: err = %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
rng1 := lock.LockRange{0, 1}
|
|
|
|
rng2 := lock.LockRange{1, 2}
|
|
|
|
|
|
|
|
if err := fd.Impl().LockPOSIX(ctx, uid1, lock.ReadLock, rng1, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().LockPOSIX(ctx, uid2, lock.ReadLock, rng2, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().LockPOSIX(ctx, uid1, lock.WriteLock, rng1, block); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err)
|
|
|
|
}
|
|
|
|
if got, want := fd.Impl().LockPOSIX(ctx, uid2, lock.ReadLock, rng1, block), syserror.ErrWouldBlock; got != want {
|
|
|
|
t.Fatalf("fd.Impl().LockPOSIX failed: got = %v, want = %v", got, want)
|
|
|
|
}
|
|
|
|
if err := fd.Impl().UnlockPOSIX(ctx, uid1, rng1); err != nil {
|
|
|
|
t.Fatalf("fd.Impl().UnlockPOSIX failed: err = %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-06 20:51:35 +00:00
|
|
|
func TestPRead(t *testing.T) {
|
|
|
|
ctx := contexttest.Context(t)
|
2020-01-16 00:31:24 +00:00
|
|
|
fd, cleanup, err := newFileFD(ctx, 0644)
|
2020-01-06 20:51:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
// Write 100 sequences of 'gVisor is awesome'.
|
|
|
|
data := bytes.Repeat([]byte("gVisor is awsome"), 100)
|
|
|
|
n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Write failed: %v", err)
|
|
|
|
}
|
|
|
|
if n != int64(len(data)) {
|
|
|
|
t.Errorf("fd.Write got short write length %d, want %d", n, len(data))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read various sizes from various offsets.
|
|
|
|
sizes := []int{0, 1, 2, 10, 20, 50, 100, 1000}
|
|
|
|
offsets := []int{0, 1, 2, 10, 20, 50, 100, 1000, len(data) - 100, len(data) - 1, len(data), len(data) + 1}
|
|
|
|
|
|
|
|
for _, size := range sizes {
|
|
|
|
for _, offset := range offsets {
|
|
|
|
name := fmt.Sprintf("PRead offset=%d size=%d", offset, size)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
var (
|
|
|
|
wantRead []byte
|
|
|
|
wantErr error
|
|
|
|
)
|
|
|
|
if offset < len(data) {
|
|
|
|
wantRead = data[offset:]
|
|
|
|
} else if size > 0 {
|
|
|
|
wantErr = io.EOF
|
|
|
|
}
|
|
|
|
if offset+size < len(data) {
|
|
|
|
wantRead = wantRead[:size]
|
|
|
|
}
|
|
|
|
buf := make([]byte, size)
|
|
|
|
n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), int64(offset), vfs.ReadOptions{})
|
|
|
|
if err != wantErr {
|
|
|
|
t.Errorf("fd.PRead got err %v want %v", err, wantErr)
|
|
|
|
}
|
|
|
|
if n != int64(len(wantRead)) {
|
|
|
|
t.Errorf("fd.PRead got %d bytes want %d", n, len(wantRead))
|
|
|
|
}
|
|
|
|
if got := string(buf[:n]); got != string(wantRead) {
|
|
|
|
t.Errorf("fd.PRead got %q want %q", got, string(wantRead))
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-01-16 21:58:25 +00:00
|
|
|
|
|
|
|
func TestTruncate(t *testing.T) {
|
|
|
|
ctx := contexttest.Context(t)
|
|
|
|
fd, cleanup, err := newFileFD(ctx, 0644)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
// Fill the file with some data.
|
|
|
|
data := bytes.Repeat([]byte("gVisor is awsome"), 100)
|
|
|
|
written, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Write failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Size should be same as written.
|
|
|
|
sizeStatOpts := vfs.StatOptions{Mask: linux.STATX_SIZE}
|
|
|
|
stat, err := fd.Stat(ctx, sizeStatOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Stat failed: %v", err)
|
|
|
|
}
|
|
|
|
if got, want := int64(stat.Size), written; got != want {
|
|
|
|
t.Errorf("fd.Stat got size %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Truncate down.
|
|
|
|
newSize := uint64(10)
|
|
|
|
if err := fd.SetStat(ctx, vfs.SetStatOptions{
|
|
|
|
Stat: linux.Statx{
|
|
|
|
Mask: linux.STATX_SIZE,
|
|
|
|
Size: newSize,
|
|
|
|
},
|
|
|
|
}); err != nil {
|
|
|
|
t.Errorf("fd.Truncate failed: %v", err)
|
|
|
|
}
|
|
|
|
// Size should be updated.
|
|
|
|
statAfterTruncateDown, err := fd.Stat(ctx, sizeStatOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Stat failed: %v", err)
|
|
|
|
}
|
|
|
|
if got, want := statAfterTruncateDown.Size, newSize; got != want {
|
|
|
|
t.Errorf("fd.Stat got size %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
// We should only read newSize worth of data.
|
|
|
|
buf := make([]byte, 1000)
|
|
|
|
if n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), 0, vfs.ReadOptions{}); err != nil && err != io.EOF {
|
|
|
|
t.Fatalf("fd.PRead failed: %v", err)
|
|
|
|
} else if uint64(n) != newSize {
|
|
|
|
t.Errorf("fd.PRead got size %d, want %d", n, newSize)
|
|
|
|
}
|
|
|
|
// Mtime and Ctime should be bumped.
|
|
|
|
if got := statAfterTruncateDown.Mtime.ToNsec(); got <= stat.Mtime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Mtime %v, want > %v", got, stat.Mtime)
|
|
|
|
}
|
|
|
|
if got := statAfterTruncateDown.Ctime.ToNsec(); got <= stat.Ctime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Ctime %v, want > %v", got, stat.Ctime)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Truncate up.
|
|
|
|
newSize = 100
|
|
|
|
if err := fd.SetStat(ctx, vfs.SetStatOptions{
|
|
|
|
Stat: linux.Statx{
|
|
|
|
Mask: linux.STATX_SIZE,
|
|
|
|
Size: newSize,
|
|
|
|
},
|
|
|
|
}); err != nil {
|
|
|
|
t.Errorf("fd.Truncate failed: %v", err)
|
|
|
|
}
|
|
|
|
// Size should be updated.
|
|
|
|
statAfterTruncateUp, err := fd.Stat(ctx, sizeStatOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Stat failed: %v", err)
|
|
|
|
}
|
|
|
|
if got, want := statAfterTruncateUp.Size, newSize; got != want {
|
|
|
|
t.Errorf("fd.Stat got size %d, want %d", got, want)
|
|
|
|
}
|
|
|
|
// We should read newSize worth of data.
|
|
|
|
buf = make([]byte, 1000)
|
|
|
|
if n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), 0, vfs.ReadOptions{}); err != nil && err != io.EOF {
|
|
|
|
t.Fatalf("fd.PRead failed: %v", err)
|
|
|
|
} else if uint64(n) != newSize {
|
|
|
|
t.Errorf("fd.PRead got size %d, want %d", n, newSize)
|
|
|
|
}
|
|
|
|
// Bytes should be null after 10, since we previously truncated to 10.
|
|
|
|
for i := uint64(10); i < newSize; i++ {
|
|
|
|
if buf[i] != 0 {
|
|
|
|
t.Errorf("fd.PRead got byte %d=%x, want 0", i, buf[i])
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Mtime and Ctime should be bumped.
|
|
|
|
if got := statAfterTruncateUp.Mtime.ToNsec(); got <= statAfterTruncateDown.Mtime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Mtime %v, want > %v", got, statAfterTruncateDown.Mtime)
|
|
|
|
}
|
|
|
|
if got := statAfterTruncateUp.Ctime.ToNsec(); got <= statAfterTruncateDown.Ctime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Ctime %v, want > %v", got, stat.Ctime)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Truncate to the current size.
|
|
|
|
newSize = statAfterTruncateUp.Size
|
|
|
|
if err := fd.SetStat(ctx, vfs.SetStatOptions{
|
|
|
|
Stat: linux.Statx{
|
|
|
|
Mask: linux.STATX_SIZE,
|
|
|
|
Size: newSize,
|
|
|
|
},
|
|
|
|
}); err != nil {
|
|
|
|
t.Errorf("fd.Truncate failed: %v", err)
|
|
|
|
}
|
|
|
|
statAfterTruncateNoop, err := fd.Stat(ctx, sizeStatOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("fd.Stat failed: %v", err)
|
|
|
|
}
|
|
|
|
// Mtime and Ctime should not be bumped, since operation is a noop.
|
|
|
|
if got := statAfterTruncateNoop.Mtime.ToNsec(); got != statAfterTruncateUp.Mtime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Mtime %v, want %v", got, statAfterTruncateUp.Mtime)
|
|
|
|
}
|
|
|
|
if got := statAfterTruncateNoop.Ctime.ToNsec(); got != statAfterTruncateUp.Ctime.ToNsec() {
|
|
|
|
t.Errorf("fd.Stat got Ctime %v, want %v", got, statAfterTruncateUp.Ctime)
|
|
|
|
}
|
|
|
|
}
|