2019-12-12 19:19:18 +00:00
|
|
|
// Copyright 2019 The gVisor Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package kernfs_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
|
|
"gvisor.dev/gvisor/pkg/abi/linux"
|
2020-01-27 23:17:58 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/context"
|
|
|
|
"gvisor.dev/gvisor/pkg/sentry/contexttest"
|
2019-12-12 19:19:18 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs"
|
2020-01-21 22:25:14 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/sentry/fsimpl/testutil"
|
2019-12-12 19:19:18 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
|
|
|
|
"gvisor.dev/gvisor/pkg/sentry/vfs"
|
|
|
|
"gvisor.dev/gvisor/pkg/syserror"
|
2020-01-27 23:17:58 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/usermem"
|
2019-12-12 19:19:18 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const defaultMode linux.FileMode = 01777
|
|
|
|
const staticFileContent = "This is sample content for a static test file."
|
|
|
|
|
|
|
|
// RootDentryFn is a generator function for creating the root dentry of a test
|
|
|
|
// filesystem. See newTestSystem.
|
|
|
|
type RootDentryFn func(*auth.Credentials, *filesystem) *kernfs.Dentry
|
|
|
|
|
|
|
|
// newTestSystem sets up a minimal environment for running a test, including an
|
|
|
|
// instance of a test filesystem. Tests can control the contents of the
|
|
|
|
// filesystem by providing an appropriate rootFn, which should return a
|
|
|
|
// pre-populated root dentry.
|
2020-01-21 22:25:14 +00:00
|
|
|
func newTestSystem(t *testing.T, rootFn RootDentryFn) *testutil.System {
|
2019-12-12 19:19:18 +00:00
|
|
|
ctx := contexttest.Context(t)
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
2020-02-14 21:39:51 +00:00
|
|
|
v := &vfs.VirtualFilesystem{}
|
|
|
|
if err := v.Init(); err != nil {
|
|
|
|
t.Fatalf("VFS init: %v", err)
|
|
|
|
}
|
2019-12-27 08:12:14 +00:00
|
|
|
v.MustRegisterFilesystemType("testfs", &fsType{rootFn: rootFn}, &vfs.RegisterFilesystemTypeOptions{
|
|
|
|
AllowUserMount: true,
|
|
|
|
})
|
2019-12-12 19:19:18 +00:00
|
|
|
mns, err := v.NewMountNamespace(ctx, creds, "", "testfs", &vfs.GetFilesystemOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create testfs root mount: %v", err)
|
|
|
|
}
|
2020-01-21 22:25:14 +00:00
|
|
|
return testutil.NewSystem(ctx, t, v, mns)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type fsType struct {
|
|
|
|
rootFn RootDentryFn
|
|
|
|
}
|
|
|
|
|
|
|
|
type filesystem struct {
|
|
|
|
kernfs.Filesystem
|
|
|
|
}
|
|
|
|
|
|
|
|
type file struct {
|
|
|
|
kernfs.DynamicBytesFile
|
|
|
|
content string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fs *filesystem) newFile(creds *auth.Credentials, content string) *kernfs.Dentry {
|
|
|
|
f := &file{}
|
|
|
|
f.content = content
|
2019-12-26 22:42:19 +00:00
|
|
|
f.DynamicBytesFile.Init(creds, fs.NextIno(), f, 0777)
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
d := &kernfs.Dentry{}
|
|
|
|
d.Init(f)
|
|
|
|
return d
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f *file) Generate(ctx context.Context, buf *bytes.Buffer) error {
|
|
|
|
fmt.Fprintf(buf, "%s", f.content)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type attrs struct {
|
|
|
|
kernfs.InodeAttrs
|
|
|
|
}
|
|
|
|
|
2020-03-16 22:59:29 +00:00
|
|
|
func (*attrs) SetStat(context.Context, *vfs.Filesystem, *auth.Credentials, vfs.SetStatOptions) error {
|
2019-12-12 19:19:18 +00:00
|
|
|
return syserror.EPERM
|
|
|
|
}
|
|
|
|
|
|
|
|
type readonlyDir struct {
|
|
|
|
attrs
|
|
|
|
kernfs.InodeNotSymlink
|
|
|
|
kernfs.InodeNoDynamicLookup
|
|
|
|
kernfs.InodeDirectoryNoNewChildren
|
|
|
|
|
|
|
|
kernfs.OrderedChildren
|
|
|
|
dentry kernfs.Dentry
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fs *filesystem) newReadonlyDir(creds *auth.Credentials, mode linux.FileMode, contents map[string]*kernfs.Dentry) *kernfs.Dentry {
|
|
|
|
dir := &readonlyDir{}
|
|
|
|
dir.attrs.Init(creds, fs.NextIno(), linux.ModeDirectory|mode)
|
|
|
|
dir.OrderedChildren.Init(kernfs.OrderedChildrenOptions{})
|
|
|
|
dir.dentry.Init(dir)
|
|
|
|
|
|
|
|
dir.IncLinks(dir.OrderedChildren.Populate(&dir.dentry, contents))
|
|
|
|
|
|
|
|
return &dir.dentry
|
|
|
|
}
|
|
|
|
|
2020-02-14 01:56:34 +00:00
|
|
|
func (d *readonlyDir) Open(rp *vfs.ResolvingPath, vfsd *vfs.Dentry, opts vfs.OpenOptions) (*vfs.FileDescription, error) {
|
2019-12-12 19:19:18 +00:00
|
|
|
fd := &kernfs.GenericDirectoryFD{}
|
2020-02-14 01:56:34 +00:00
|
|
|
if err := fd.Init(rp.Mount(), vfsd, &d.OrderedChildren, &opts); err != nil {
|
2020-01-22 20:27:16 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2019-12-12 19:19:18 +00:00
|
|
|
return fd.VFSFileDescription(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type dir struct {
|
|
|
|
attrs
|
|
|
|
kernfs.InodeNotSymlink
|
|
|
|
kernfs.InodeNoDynamicLookup
|
|
|
|
|
|
|
|
fs *filesystem
|
|
|
|
dentry kernfs.Dentry
|
|
|
|
kernfs.OrderedChildren
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fs *filesystem) newDir(creds *auth.Credentials, mode linux.FileMode, contents map[string]*kernfs.Dentry) *kernfs.Dentry {
|
|
|
|
dir := &dir{}
|
|
|
|
dir.fs = fs
|
|
|
|
dir.attrs.Init(creds, fs.NextIno(), linux.ModeDirectory|mode)
|
|
|
|
dir.OrderedChildren.Init(kernfs.OrderedChildrenOptions{Writable: true})
|
|
|
|
dir.dentry.Init(dir)
|
|
|
|
|
|
|
|
dir.IncLinks(dir.OrderedChildren.Populate(&dir.dentry, contents))
|
|
|
|
|
|
|
|
return &dir.dentry
|
|
|
|
}
|
|
|
|
|
2020-02-14 01:56:34 +00:00
|
|
|
func (d *dir) Open(rp *vfs.ResolvingPath, vfsd *vfs.Dentry, opts vfs.OpenOptions) (*vfs.FileDescription, error) {
|
2019-12-12 19:19:18 +00:00
|
|
|
fd := &kernfs.GenericDirectoryFD{}
|
2020-02-14 01:56:34 +00:00
|
|
|
fd.Init(rp.Mount(), vfsd, &d.OrderedChildren, &opts)
|
2019-12-12 19:19:18 +00:00
|
|
|
return fd.VFSFileDescription(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *dir) NewDir(ctx context.Context, name string, opts vfs.MkdirOptions) (*vfs.Dentry, error) {
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
dir := d.fs.newDir(creds, opts.Mode, nil)
|
|
|
|
dirVFSD := dir.VFSDentry()
|
|
|
|
if err := d.OrderedChildren.Insert(name, dirVFSD); err != nil {
|
|
|
|
dir.DecRef()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
d.IncLinks(1)
|
|
|
|
return dirVFSD, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *dir) NewFile(ctx context.Context, name string, opts vfs.OpenOptions) (*vfs.Dentry, error) {
|
|
|
|
creds := auth.CredentialsFromContext(ctx)
|
|
|
|
f := d.fs.newFile(creds, "")
|
|
|
|
fVFSD := f.VFSDentry()
|
|
|
|
if err := d.OrderedChildren.Insert(name, fVFSD); err != nil {
|
|
|
|
f.DecRef()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return fVFSD, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (*dir) NewLink(context.Context, string, kernfs.Inode) (*vfs.Dentry, error) {
|
|
|
|
return nil, syserror.EPERM
|
|
|
|
}
|
|
|
|
|
|
|
|
func (*dir) NewSymlink(context.Context, string, string) (*vfs.Dentry, error) {
|
|
|
|
return nil, syserror.EPERM
|
|
|
|
}
|
|
|
|
|
|
|
|
func (*dir) NewNode(context.Context, string, vfs.MknodOptions) (*vfs.Dentry, error) {
|
|
|
|
return nil, syserror.EPERM
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fst *fsType) GetFilesystem(ctx context.Context, vfsObj *vfs.VirtualFilesystem, creds *auth.Credentials, source string, opt vfs.GetFilesystemOptions) (*vfs.Filesystem, *vfs.Dentry, error) {
|
|
|
|
fs := &filesystem{}
|
|
|
|
fs.Init(vfsObj)
|
|
|
|
root := fst.rootFn(creds, fs)
|
|
|
|
return fs.VFSFilesystem(), root.VFSDentry(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// -------------------- Remainder of the file are test cases --------------------
|
|
|
|
|
|
|
|
func TestBasic(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
"file1": fs.newFile(creds, staticFileContent),
|
|
|
|
})
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
sys.GetDentryOrDie(sys.PathOpAtRoot("file1")).DecRef()
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMkdirGetDentry(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
"dir1": fs.newDir(creds, 0755, nil),
|
|
|
|
})
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
pop := sys.PathOpAtRoot("dir1/a new directory")
|
2020-01-22 23:14:43 +00:00
|
|
|
if err := sys.VFS.MkdirAt(sys.Ctx, sys.Creds, pop, &vfs.MkdirOptions{Mode: 0755}); err != nil {
|
2019-12-12 19:19:18 +00:00
|
|
|
t.Fatalf("MkdirAt for PathOperation %+v failed: %v", pop, err)
|
|
|
|
}
|
|
|
|
sys.GetDentryOrDie(pop).DecRef()
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadStaticFile(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
"file1": fs.newFile(creds, staticFileContent),
|
|
|
|
})
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
pop := sys.PathOpAtRoot("file1")
|
2020-01-22 23:14:43 +00:00
|
|
|
fd, err := sys.VFS.OpenAt(sys.Ctx, sys.Creds, pop, &vfs.OpenOptions{
|
2020-01-22 20:27:16 +00:00
|
|
|
Flags: linux.O_RDONLY,
|
|
|
|
})
|
2019-12-12 19:19:18 +00:00
|
|
|
if err != nil {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("OpenAt for PathOperation %+v failed: %v", pop, err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
defer fd.DecRef()
|
|
|
|
|
|
|
|
content, err := sys.ReadToEnd(fd)
|
|
|
|
if err != nil {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("Read failed: %v", err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
if diff := cmp.Diff(staticFileContent, content); diff != "" {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("Read returned unexpected data:\n--- want\n+++ got\n%v", diff)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCreateNewFileInStaticDir(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
"dir1": fs.newDir(creds, 0755, nil),
|
|
|
|
})
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
pop := sys.PathOpAtRoot("dir1/newfile")
|
|
|
|
opts := &vfs.OpenOptions{Flags: linux.O_CREAT | linux.O_EXCL, Mode: defaultMode}
|
2020-01-22 23:14:43 +00:00
|
|
|
fd, err := sys.VFS.OpenAt(sys.Ctx, sys.Creds, pop, opts)
|
2019-12-12 19:19:18 +00:00
|
|
|
if err != nil {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("OpenAt(pop:%+v, opts:%+v) failed: %v", pop, opts, err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close the file. The file should persist.
|
|
|
|
fd.DecRef()
|
|
|
|
|
2020-01-22 23:14:43 +00:00
|
|
|
fd, err = sys.VFS.OpenAt(sys.Ctx, sys.Creds, pop, &vfs.OpenOptions{
|
2020-01-22 20:27:16 +00:00
|
|
|
Flags: linux.O_RDONLY,
|
|
|
|
})
|
2019-12-12 19:19:18 +00:00
|
|
|
if err != nil {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("OpenAt(pop:%+v) = %+v failed: %v", pop, fd, err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
fd.DecRef()
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDirFDReadWrite(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, nil)
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
pop := sys.PathOpAtRoot("/")
|
2020-01-22 23:14:43 +00:00
|
|
|
fd, err := sys.VFS.OpenAt(sys.Ctx, sys.Creds, pop, &vfs.OpenOptions{
|
2020-01-22 20:27:16 +00:00
|
|
|
Flags: linux.O_RDONLY,
|
|
|
|
})
|
2019-12-12 19:19:18 +00:00
|
|
|
if err != nil {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("OpenAt for PathOperation %+v failed: %v", pop, err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
defer fd.DecRef()
|
|
|
|
|
|
|
|
// Read/Write should fail for directory FDs.
|
2020-01-21 22:25:14 +00:00
|
|
|
if _, err := fd.Read(sys.Ctx, usermem.BytesIOSequence([]byte{}), vfs.ReadOptions{}); err != syserror.EISDIR {
|
|
|
|
t.Fatalf("Read for directory FD failed with unexpected error: %v", err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
2020-01-22 20:27:16 +00:00
|
|
|
if _, err := fd.Write(sys.Ctx, usermem.BytesIOSequence([]byte{}), vfs.WriteOptions{}); err != syserror.EBADF {
|
2020-01-21 22:25:14 +00:00
|
|
|
t.Fatalf("Write for directory FD failed with unexpected error: %v", err)
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDirFDIterDirents(t *testing.T) {
|
|
|
|
sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
|
|
|
|
return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
// Fill root with nodes backed by various inode implementations.
|
|
|
|
"dir1": fs.newReadonlyDir(creds, 0755, nil),
|
|
|
|
"dir2": fs.newDir(creds, 0755, map[string]*kernfs.Dentry{
|
|
|
|
"dir3": fs.newDir(creds, 0755, nil),
|
|
|
|
}),
|
|
|
|
"file1": fs.newFile(creds, staticFileContent),
|
|
|
|
})
|
|
|
|
})
|
2020-01-21 22:25:14 +00:00
|
|
|
defer sys.Destroy()
|
2019-12-12 19:19:18 +00:00
|
|
|
|
|
|
|
pop := sys.PathOpAtRoot("/")
|
2020-01-22 23:14:43 +00:00
|
|
|
sys.AssertAllDirentTypes(sys.ListDirents(pop), map[string]testutil.DirentType{
|
2020-01-21 22:25:14 +00:00
|
|
|
"dir1": linux.DT_DIR,
|
|
|
|
"dir2": linux.DT_DIR,
|
|
|
|
"file1": linux.DT_REG,
|
|
|
|
})
|
2019-12-12 19:19:18 +00:00
|
|
|
}
|