// Copyright 2019 The gVisor Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package tmpfs import ( "bytes" "fmt" "io" "sync/atomic" "testing" "gvisor.dev/gvisor/pkg/abi/linux" "gvisor.dev/gvisor/pkg/context" "gvisor.dev/gvisor/pkg/fspath" "gvisor.dev/gvisor/pkg/sentry/fs/lock" "gvisor.dev/gvisor/pkg/sentry/kernel/auth" "gvisor.dev/gvisor/pkg/sentry/kernel/contexttest" "gvisor.dev/gvisor/pkg/sentry/vfs" "gvisor.dev/gvisor/pkg/syserror" "gvisor.dev/gvisor/pkg/usermem" ) // nextFileID is used to generate unique file names. var nextFileID int64 // newTmpfsRoot creates a new tmpfs mount, and returns the root. If the error // is not nil, then cleanup should be called when the root is no longer needed. func newTmpfsRoot(ctx context.Context) (*vfs.VirtualFilesystem, vfs.VirtualDentry, func(), error) { creds := auth.CredentialsFromContext(ctx) vfsObj := &vfs.VirtualFilesystem{} if err := vfsObj.Init(); err != nil { return nil, vfs.VirtualDentry{}, nil, fmt.Errorf("VFS init: %v", err) } vfsObj.MustRegisterFilesystemType("tmpfs", FilesystemType{}, &vfs.RegisterFilesystemTypeOptions{ AllowUserMount: true, }) mntns, err := vfsObj.NewMountNamespace(ctx, creds, "", "tmpfs", &vfs.GetFilesystemOptions{}) if err != nil { return nil, vfs.VirtualDentry{}, nil, fmt.Errorf("failed to create tmpfs root mount: %v", err) } root := mntns.Root() return vfsObj, root, func() { root.DecRef() mntns.DecRef() }, nil } // newFileFD creates a new file in a new tmpfs mount, and returns the FD. If // the returned err is not nil, then cleanup should be called when the FD is no // longer needed. func newFileFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) { creds := auth.CredentialsFromContext(ctx) vfsObj, root, cleanup, err := newTmpfsRoot(ctx) if err != nil { return nil, nil, err } filename := fmt.Sprintf("tmpfs-test-file-%d", atomic.AddInt64(&nextFileID, 1)) // Create the file that will be write/read. fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{ Root: root, Start: root, Path: fspath.Parse(filename), }, &vfs.OpenOptions{ Flags: linux.O_RDWR | linux.O_CREAT | linux.O_EXCL, Mode: linux.ModeRegular | mode, }) if err != nil { cleanup() return nil, nil, fmt.Errorf("failed to create file %q: %v", filename, err) } return fd, cleanup, nil } // newDirFD is like newFileFD, but for directories. func newDirFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) { creds := auth.CredentialsFromContext(ctx) vfsObj, root, cleanup, err := newTmpfsRoot(ctx) if err != nil { return nil, nil, err } dirname := fmt.Sprintf("tmpfs-test-dir-%d", atomic.AddInt64(&nextFileID, 1)) // Create the dir. if err := vfsObj.MkdirAt(ctx, creds, &vfs.PathOperation{ Root: root, Start: root, Path: fspath.Parse(dirname), }, &vfs.MkdirOptions{ Mode: linux.ModeDirectory | mode, }); err != nil { cleanup() return nil, nil, fmt.Errorf("failed to create directory %q: %v", dirname, err) } // Open the dir and return it. fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{ Root: root, Start: root, Path: fspath.Parse(dirname), }, &vfs.OpenOptions{ Flags: linux.O_RDONLY | linux.O_DIRECTORY, }) if err != nil { cleanup() return nil, nil, fmt.Errorf("failed to open directory %q: %v", dirname, err) } return fd, cleanup, nil } // newPipeFD is like newFileFD, but for pipes. func newPipeFD(ctx context.Context, mode linux.FileMode) (*vfs.FileDescription, func(), error) { creds := auth.CredentialsFromContext(ctx) vfsObj, root, cleanup, err := newTmpfsRoot(ctx) if err != nil { return nil, nil, err } pipename := fmt.Sprintf("tmpfs-test-pipe-%d", atomic.AddInt64(&nextFileID, 1)) // Create the pipe. if err := vfsObj.MknodAt(ctx, creds, &vfs.PathOperation{ Root: root, Start: root, Path: fspath.Parse(pipename), }, &vfs.MknodOptions{ Mode: linux.ModeNamedPipe | mode, }); err != nil { cleanup() return nil, nil, fmt.Errorf("failed to create pipe %q: %v", pipename, err) } // Open the pipe and return it. fd, err := vfsObj.OpenAt(ctx, creds, &vfs.PathOperation{ Root: root, Start: root, Path: fspath.Parse(pipename), }, &vfs.OpenOptions{ Flags: linux.O_RDWR, }) if err != nil { cleanup() return nil, nil, fmt.Errorf("failed to open pipe %q: %v", pipename, err) } return fd, cleanup, nil } // Test that we can write some data to a file and read it back.` func TestSimpleWriteRead(t *testing.T) { ctx := contexttest.Context(t) fd, cleanup, err := newFileFD(ctx, 0644) if err != nil { t.Fatal(err) } defer cleanup() // Write. data := []byte("foobarbaz") n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{}) if err != nil { t.Fatalf("fd.Write failed: %v", err) } if n != int64(len(data)) { t.Errorf("fd.Write got short write length %d, want %d", n, len(data)) } if got, want := fd.Impl().(*regularFileFD).off, int64(len(data)); got != want { t.Errorf("fd.Write left offset at %d, want %d", got, want) } // Seek back to beginning. if _, err := fd.Seek(ctx, 0, linux.SEEK_SET); err != nil { t.Fatalf("fd.Seek failed: %v", err) } if got, want := fd.Impl().(*regularFileFD).off, int64(0); got != want { t.Errorf("fd.Seek(0) left offset at %d, want %d", got, want) } // Read. buf := make([]byte, len(data)) n, err = fd.Read(ctx, usermem.BytesIOSequence(buf), vfs.ReadOptions{}) if err != nil && err != io.EOF { t.Fatalf("fd.Read failed: %v", err) } if n != int64(len(data)) { t.Errorf("fd.Read got short read length %d, want %d", n, len(data)) } if got, want := string(buf), string(data); got != want { t.Errorf("Read got %q want %s", got, want) } if got, want := fd.Impl().(*regularFileFD).off, int64(len(data)); got != want { t.Errorf("fd.Write left offset at %d, want %d", got, want) } } func TestPWrite(t *testing.T) { ctx := contexttest.Context(t) fd, cleanup, err := newFileFD(ctx, 0644) if err != nil { t.Fatal(err) } defer cleanup() // Fill file with 1k 'a's. data := bytes.Repeat([]byte{'a'}, 1000) n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{}) if err != nil { t.Fatalf("fd.Write failed: %v", err) } if n != int64(len(data)) { t.Errorf("fd.Write got short write length %d, want %d", n, len(data)) } // Write "gVisor is awesome" at various offsets. buf := []byte("gVisor is awesome") offsets := []int{0, 1, 2, 10, 20, 50, 100, len(data) - 100, len(data) - 1, len(data), len(data) + 1} for _, offset := range offsets { name := fmt.Sprintf("PWrite offset=%d", offset) t.Run(name, func(t *testing.T) { n, err := fd.PWrite(ctx, usermem.BytesIOSequence(buf), int64(offset), vfs.WriteOptions{}) if err != nil { t.Errorf("fd.PWrite got err %v want nil", err) } if n != int64(len(buf)) { t.Errorf("fd.PWrite got %d bytes want %d", n, len(buf)) } // Update data to reflect expected file contents. if len(data) < offset+len(buf) { data = append(data, make([]byte, (offset+len(buf))-len(data))...) } copy(data[offset:], buf) // Read the whole file and compare with data. readBuf := make([]byte, len(data)) n, err = fd.PRead(ctx, usermem.BytesIOSequence(readBuf), 0, vfs.ReadOptions{}) if err != nil { t.Fatalf("fd.PRead failed: %v", err) } if n != int64(len(data)) { t.Errorf("fd.PRead got short read length %d, want %d", n, len(data)) } if got, want := string(readBuf), string(data); got != want { t.Errorf("PRead got %q want %s", got, want) } }) } } func TestLocks(t *testing.T) { ctx := contexttest.Context(t) fd, cleanup, err := newFileFD(ctx, 0644) if err != nil { t.Fatal(err) } defer cleanup() var ( uid1 lock.UniqueID uid2 lock.UniqueID // Non-blocking. block lock.Blocker ) uid1 = 123 uid2 = 456 if err := fd.Impl().LockBSD(ctx, uid1, lock.ReadLock, block); err != nil { t.Fatalf("fd.Impl().LockBSD failed: err = %v", err) } if err := fd.Impl().LockBSD(ctx, uid2, lock.ReadLock, block); err != nil { t.Fatalf("fd.Impl().LockBSD failed: err = %v", err) } if got, want := fd.Impl().LockBSD(ctx, uid2, lock.WriteLock, block), syserror.ErrWouldBlock; got != want { t.Fatalf("fd.Impl().LockBSD failed: got = %v, want = %v", got, want) } if err := fd.Impl().UnlockBSD(ctx, uid1); err != nil { t.Fatalf("fd.Impl().UnlockBSD failed: err = %v", err) } if err := fd.Impl().LockBSD(ctx, uid2, lock.WriteLock, block); err != nil { t.Fatalf("fd.Impl().LockBSD failed: err = %v", err) } rng1 := lock.LockRange{0, 1} rng2 := lock.LockRange{1, 2} if err := fd.Impl().LockPOSIX(ctx, uid1, lock.ReadLock, rng1, block); err != nil { t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err) } if err := fd.Impl().LockPOSIX(ctx, uid2, lock.ReadLock, rng2, block); err != nil { t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err) } if err := fd.Impl().LockPOSIX(ctx, uid1, lock.WriteLock, rng1, block); err != nil { t.Fatalf("fd.Impl().LockPOSIX failed: err = %v", err) } if got, want := fd.Impl().LockPOSIX(ctx, uid2, lock.ReadLock, rng1, block), syserror.ErrWouldBlock; got != want { t.Fatalf("fd.Impl().LockPOSIX failed: got = %v, want = %v", got, want) } if err := fd.Impl().UnlockPOSIX(ctx, uid1, rng1); err != nil { t.Fatalf("fd.Impl().UnlockPOSIX failed: err = %v", err) } } func TestPRead(t *testing.T) { ctx := contexttest.Context(t) fd, cleanup, err := newFileFD(ctx, 0644) if err != nil { t.Fatal(err) } defer cleanup() // Write 100 sequences of 'gVisor is awesome'. data := bytes.Repeat([]byte("gVisor is awsome"), 100) n, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{}) if err != nil { t.Fatalf("fd.Write failed: %v", err) } if n != int64(len(data)) { t.Errorf("fd.Write got short write length %d, want %d", n, len(data)) } // Read various sizes from various offsets. sizes := []int{0, 1, 2, 10, 20, 50, 100, 1000} offsets := []int{0, 1, 2, 10, 20, 50, 100, 1000, len(data) - 100, len(data) - 1, len(data), len(data) + 1} for _, size := range sizes { for _, offset := range offsets { name := fmt.Sprintf("PRead offset=%d size=%d", offset, size) t.Run(name, func(t *testing.T) { var ( wantRead []byte wantErr error ) if offset < len(data) { wantRead = data[offset:] } else if size > 0 { wantErr = io.EOF } if offset+size < len(data) { wantRead = wantRead[:size] } buf := make([]byte, size) n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), int64(offset), vfs.ReadOptions{}) if err != wantErr { t.Errorf("fd.PRead got err %v want %v", err, wantErr) } if n != int64(len(wantRead)) { t.Errorf("fd.PRead got %d bytes want %d", n, len(wantRead)) } if got := string(buf[:n]); got != string(wantRead) { t.Errorf("fd.PRead got %q want %q", got, string(wantRead)) } }) } } } func TestTruncate(t *testing.T) { ctx := contexttest.Context(t) fd, cleanup, err := newFileFD(ctx, 0644) if err != nil { t.Fatal(err) } defer cleanup() // Fill the file with some data. data := bytes.Repeat([]byte("gVisor is awsome"), 100) written, err := fd.Write(ctx, usermem.BytesIOSequence(data), vfs.WriteOptions{}) if err != nil { t.Fatalf("fd.Write failed: %v", err) } // Size should be same as written. sizeStatOpts := vfs.StatOptions{Mask: linux.STATX_SIZE} stat, err := fd.Stat(ctx, sizeStatOpts) if err != nil { t.Fatalf("fd.Stat failed: %v", err) } if got, want := int64(stat.Size), written; got != want { t.Errorf("fd.Stat got size %d, want %d", got, want) } // Truncate down. newSize := uint64(10) if err := fd.SetStat(ctx, vfs.SetStatOptions{ Stat: linux.Statx{ Mask: linux.STATX_SIZE, Size: newSize, }, }); err != nil { t.Errorf("fd.Truncate failed: %v", err) } // Size should be updated. statAfterTruncateDown, err := fd.Stat(ctx, sizeStatOpts) if err != nil { t.Fatalf("fd.Stat failed: %v", err) } if got, want := statAfterTruncateDown.Size, newSize; got != want { t.Errorf("fd.Stat got size %d, want %d", got, want) } // We should only read newSize worth of data. buf := make([]byte, 1000) if n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), 0, vfs.ReadOptions{}); err != nil && err != io.EOF { t.Fatalf("fd.PRead failed: %v", err) } else if uint64(n) != newSize { t.Errorf("fd.PRead got size %d, want %d", n, newSize) } // Mtime and Ctime should be bumped. if got := statAfterTruncateDown.Mtime.ToNsec(); got <= stat.Mtime.ToNsec() { t.Errorf("fd.Stat got Mtime %v, want > %v", got, stat.Mtime) } if got := statAfterTruncateDown.Ctime.ToNsec(); got <= stat.Ctime.ToNsec() { t.Errorf("fd.Stat got Ctime %v, want > %v", got, stat.Ctime) } // Truncate up. newSize = 100 if err := fd.SetStat(ctx, vfs.SetStatOptions{ Stat: linux.Statx{ Mask: linux.STATX_SIZE, Size: newSize, }, }); err != nil { t.Errorf("fd.Truncate failed: %v", err) } // Size should be updated. statAfterTruncateUp, err := fd.Stat(ctx, sizeStatOpts) if err != nil { t.Fatalf("fd.Stat failed: %v", err) } if got, want := statAfterTruncateUp.Size, newSize; got != want { t.Errorf("fd.Stat got size %d, want %d", got, want) } // We should read newSize worth of data. buf = make([]byte, 1000) if n, err := fd.PRead(ctx, usermem.BytesIOSequence(buf), 0, vfs.ReadOptions{}); err != nil && err != io.EOF { t.Fatalf("fd.PRead failed: %v", err) } else if uint64(n) != newSize { t.Errorf("fd.PRead got size %d, want %d", n, newSize) } // Bytes should be null after 10, since we previously truncated to 10. for i := uint64(10); i < newSize; i++ { if buf[i] != 0 { t.Errorf("fd.PRead got byte %d=%x, want 0", i, buf[i]) break } } // Mtime and Ctime should be bumped. if got := statAfterTruncateUp.Mtime.ToNsec(); got <= statAfterTruncateDown.Mtime.ToNsec() { t.Errorf("fd.Stat got Mtime %v, want > %v", got, statAfterTruncateDown.Mtime) } if got := statAfterTruncateUp.Ctime.ToNsec(); got <= statAfterTruncateDown.Ctime.ToNsec() { t.Errorf("fd.Stat got Ctime %v, want > %v", got, stat.Ctime) } // Truncate to the current size. newSize = statAfterTruncateUp.Size if err := fd.SetStat(ctx, vfs.SetStatOptions{ Stat: linux.Statx{ Mask: linux.STATX_SIZE, Size: newSize, }, }); err != nil { t.Errorf("fd.Truncate failed: %v", err) } statAfterTruncateNoop, err := fd.Stat(ctx, sizeStatOpts) if err != nil { t.Fatalf("fd.Stat failed: %v", err) } // Mtime and Ctime should not be bumped, since operation is a noop. if got := statAfterTruncateNoop.Mtime.ToNsec(); got != statAfterTruncateUp.Mtime.ToNsec() { t.Errorf("fd.Stat got Mtime %v, want %v", got, statAfterTruncateUp.Mtime) } if got := statAfterTruncateNoop.Ctime.ToNsec(); got != statAfterTruncateUp.Ctime.ToNsec() { t.Errorf("fd.Stat got Ctime %v, want %v", got, statAfterTruncateUp.Ctime) } }