19821f1d3SAlan Somers /*- 29821f1d3SAlan Somers * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 39821f1d3SAlan Somers * 49821f1d3SAlan Somers * Copyright (c) 2019 The FreeBSD Foundation 59821f1d3SAlan Somers * 69821f1d3SAlan Somers * This software was developed by BFF Storage Systems, LLC under sponsorship 79821f1d3SAlan Somers * from the FreeBSD Foundation. 89821f1d3SAlan Somers * 99821f1d3SAlan Somers * Redistribution and use in source and binary forms, with or without 109821f1d3SAlan Somers * modification, are permitted provided that the following conditions 119821f1d3SAlan Somers * are met: 129821f1d3SAlan Somers * 1. Redistributions of source code must retain the above copyright 139821f1d3SAlan Somers * notice, this list of conditions and the following disclaimer. 149821f1d3SAlan Somers * 2. Redistributions in binary form must reproduce the above copyright 159821f1d3SAlan Somers * notice, this list of conditions and the following disclaimer in the 169821f1d3SAlan Somers * documentation and/or other materials provided with the distribution. 179821f1d3SAlan Somers * 189821f1d3SAlan Somers * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 199821f1d3SAlan Somers * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 209821f1d3SAlan Somers * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 219821f1d3SAlan Somers * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 229821f1d3SAlan Somers * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 239821f1d3SAlan Somers * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 249821f1d3SAlan Somers * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 259821f1d3SAlan Somers * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 269821f1d3SAlan Somers * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 279821f1d3SAlan Somers * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 289821f1d3SAlan Somers * SUCH DAMAGE. 291fa8ebfbSAlan Somers * 301fa8ebfbSAlan Somers * $FreeBSD$ 319821f1d3SAlan Somers */ 329821f1d3SAlan Somers 339821f1d3SAlan Somers extern "C" { 349821f1d3SAlan Somers #include <fcntl.h> 359821f1d3SAlan Somers #include <unistd.h> 369821f1d3SAlan Somers } 379821f1d3SAlan Somers 389821f1d3SAlan Somers #include "mockfs.hh" 399821f1d3SAlan Somers #include "utils.hh" 409821f1d3SAlan Somers 419821f1d3SAlan Somers using namespace testing; 429821f1d3SAlan Somers 439821f1d3SAlan Somers class Release: public FuseTest { 449821f1d3SAlan Somers 459821f1d3SAlan Somers public: 469821f1d3SAlan Somers void expect_lookup(const char *relpath, uint64_t ino, int times) 479821f1d3SAlan Somers { 489821f1d3SAlan Somers FuseTest::expect_lookup(relpath, ino, S_IFREG | 0644, 0, times); 499821f1d3SAlan Somers } 50e0bec057SAlan Somers 51e0bec057SAlan Somers void expect_release(uint64_t ino, uint64_t lock_owner, 52e0bec057SAlan Somers uint32_t flags, int error) 53e0bec057SAlan Somers { 54e0bec057SAlan Somers EXPECT_CALL(*m_mock, process( 55e0bec057SAlan Somers ResultOf([=](auto in) { 5629edc611SAlan Somers return (in.header.opcode == FUSE_RELEASE && 5729edc611SAlan Somers in.header.nodeid == ino && 5829edc611SAlan Somers in.body.release.lock_owner == lock_owner && 5929edc611SAlan Somers in.body.release.fh == FH && 6029edc611SAlan Somers in.body.release.flags == flags); 61e0bec057SAlan Somers }, Eq(true)), 62e0bec057SAlan Somers _) 63e0bec057SAlan Somers ).WillOnce(Invoke(ReturnErrno(error))) 64e0bec057SAlan Somers .RetiresOnSaturation(); 65e0bec057SAlan Somers } 669821f1d3SAlan Somers }; 679821f1d3SAlan Somers 689821f1d3SAlan Somers class ReleaseWithLocks: public Release { 699821f1d3SAlan Somers virtual void SetUp() { 709821f1d3SAlan Somers m_init_flags = FUSE_POSIX_LOCKS; 719821f1d3SAlan Somers Release::SetUp(); 729821f1d3SAlan Somers } 739821f1d3SAlan Somers }; 749821f1d3SAlan Somers 759821f1d3SAlan Somers 769821f1d3SAlan Somers /* If a file descriptor is duplicated, only the last close causes RELEASE */ 779821f1d3SAlan Somers TEST_F(Release, dup) 789821f1d3SAlan Somers { 799821f1d3SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 809821f1d3SAlan Somers const char RELPATH[] = "some_file.txt"; 819821f1d3SAlan Somers uint64_t ino = 42; 829821f1d3SAlan Somers int fd, fd2; 839821f1d3SAlan Somers 849821f1d3SAlan Somers expect_lookup(RELPATH, ino, 1); 859821f1d3SAlan Somers expect_open(ino, 0, 1); 869f10f423SAlan Somers expect_flush(ino, 1, ReturnErrno(0)); 87f067b609SAlan Somers expect_release(ino, getpid(), O_RDONLY, 0); 889821f1d3SAlan Somers 899821f1d3SAlan Somers fd = open(FULLPATH, O_RDONLY); 909821f1d3SAlan Somers EXPECT_LE(0, fd) << strerror(errno); 919821f1d3SAlan Somers 929821f1d3SAlan Somers fd2 = dup(fd); 93*8e765737SAlan Somers ASSERT_LE(0, fd2) << strerror(errno); 949821f1d3SAlan Somers 959821f1d3SAlan Somers ASSERT_EQ(0, close(fd2)) << strerror(errno); 969821f1d3SAlan Somers ASSERT_EQ(0, close(fd)) << strerror(errno); 979821f1d3SAlan Somers } 989821f1d3SAlan Somers 999821f1d3SAlan Somers /* 1009821f1d3SAlan Somers * Some FUSE filesystem cache data internally and flush it on release. Such 1019821f1d3SAlan Somers * filesystems may generate errors during release. On Linux, these get 1029821f1d3SAlan Somers * returned by close(2). However, POSIX does not require close(2) to return 1039821f1d3SAlan Somers * this error. FreeBSD's fuse(4) should return EIO if it returns an error at 1049821f1d3SAlan Somers * all. 1059821f1d3SAlan Somers */ 1069821f1d3SAlan Somers /* http://pubs.opengroup.org/onlinepubs/9699919799/functions/close.html */ 1079821f1d3SAlan Somers TEST_F(Release, eio) 1089821f1d3SAlan Somers { 1099821f1d3SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 1109821f1d3SAlan Somers const char RELPATH[] = "some_file.txt"; 1119821f1d3SAlan Somers uint64_t ino = 42; 1129821f1d3SAlan Somers int fd; 1139821f1d3SAlan Somers 1149821f1d3SAlan Somers expect_lookup(RELPATH, ino, 1); 1159821f1d3SAlan Somers expect_open(ino, 0, 1); 1169f10f423SAlan Somers expect_flush(ino, 1, ReturnErrno(0)); 117f067b609SAlan Somers expect_release(ino, getpid(), O_WRONLY, EIO); 1189821f1d3SAlan Somers 1199821f1d3SAlan Somers fd = open(FULLPATH, O_WRONLY); 1209821f1d3SAlan Somers EXPECT_LE(0, fd) << strerror(errno); 1219821f1d3SAlan Somers 1229821f1d3SAlan Somers ASSERT_TRUE(0 == close(fd) || errno == EIO) << strerror(errno); 1239821f1d3SAlan Somers } 1249821f1d3SAlan Somers 1259821f1d3SAlan Somers /* 126e0bec057SAlan Somers * FUSE_RELEASE should contain the same flags used for FUSE_OPEN 127e0bec057SAlan Somers */ 128e0bec057SAlan Somers /* https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=236340 */ 129e0bec057SAlan Somers TEST_F(Release, DISABLED_flags) 130e0bec057SAlan Somers { 131e0bec057SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 132e0bec057SAlan Somers const char RELPATH[] = "some_file.txt"; 133e0bec057SAlan Somers uint64_t ino = 42; 134e0bec057SAlan Somers int fd; 135e0bec057SAlan Somers 136e0bec057SAlan Somers expect_lookup(RELPATH, ino, 1); 137e0bec057SAlan Somers expect_open(ino, 0, 1); 1389f10f423SAlan Somers expect_flush(ino, 1, ReturnErrno(0)); 139f067b609SAlan Somers expect_release(ino, getpid(), O_RDWR | O_APPEND, 0); 140e0bec057SAlan Somers 141e0bec057SAlan Somers fd = open(FULLPATH, O_RDWR | O_APPEND); 142e0bec057SAlan Somers EXPECT_LE(0, fd) << strerror(errno); 143e0bec057SAlan Somers 144e0bec057SAlan Somers ASSERT_EQ(0, close(fd)) << strerror(errno); 145e0bec057SAlan Somers } 146e0bec057SAlan Somers 147e0bec057SAlan Somers /* 1489821f1d3SAlan Somers * fuse(4) will issue multiple FUSE_OPEN operations for the same file if it's 1499821f1d3SAlan Somers * opened with different modes. Each FUSE_OPEN should get its own 1509821f1d3SAlan Somers * FUSE_RELEASE. 1519821f1d3SAlan Somers */ 1529821f1d3SAlan Somers TEST_F(Release, multiple_opens) 1539821f1d3SAlan Somers { 1549821f1d3SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 1559821f1d3SAlan Somers const char RELPATH[] = "some_file.txt"; 1569821f1d3SAlan Somers uint64_t ino = 42; 1579821f1d3SAlan Somers int fd, fd2; 1589821f1d3SAlan Somers 1599821f1d3SAlan Somers expect_lookup(RELPATH, ino, 2); 1609821f1d3SAlan Somers expect_open(ino, 0, 2); 1619f10f423SAlan Somers expect_flush(ino, 2, ReturnErrno(0)); 162f067b609SAlan Somers expect_release(ino, getpid(), O_RDONLY, 0); 1639821f1d3SAlan Somers 1649821f1d3SAlan Somers fd = open(FULLPATH, O_RDONLY); 1659821f1d3SAlan Somers EXPECT_LE(0, fd) << strerror(errno); 1669821f1d3SAlan Somers 167f067b609SAlan Somers expect_release(ino, getpid(), O_WRONLY, 0); 1689821f1d3SAlan Somers fd2 = open(FULLPATH, O_WRONLY); 1699821f1d3SAlan Somers EXPECT_LE(0, fd2) << strerror(errno); 1709821f1d3SAlan Somers 1719821f1d3SAlan Somers ASSERT_EQ(0, close(fd2)) << strerror(errno); 1729821f1d3SAlan Somers ASSERT_EQ(0, close(fd)) << strerror(errno); 1739821f1d3SAlan Somers } 1749821f1d3SAlan Somers 1759821f1d3SAlan Somers TEST_F(Release, ok) 1769821f1d3SAlan Somers { 1779821f1d3SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 1789821f1d3SAlan Somers const char RELPATH[] = "some_file.txt"; 1799821f1d3SAlan Somers uint64_t ino = 42; 1809821f1d3SAlan Somers int fd; 1819821f1d3SAlan Somers 1829821f1d3SAlan Somers expect_lookup(RELPATH, ino, 1); 1839821f1d3SAlan Somers expect_open(ino, 0, 1); 1849f10f423SAlan Somers expect_flush(ino, 1, ReturnErrno(0)); 185f067b609SAlan Somers expect_release(ino, getpid(), O_RDONLY, 0); 1869821f1d3SAlan Somers 1879821f1d3SAlan Somers fd = open(FULLPATH, O_RDONLY); 1889821f1d3SAlan Somers EXPECT_LE(0, fd) << strerror(errno); 1899821f1d3SAlan Somers 1909821f1d3SAlan Somers ASSERT_EQ(0, close(fd)) << strerror(errno); 1919821f1d3SAlan Somers } 1929821f1d3SAlan Somers 1939821f1d3SAlan Somers /* When closing a file with a POSIX file lock, release should release the lock*/ 194f067b609SAlan Somers TEST_F(ReleaseWithLocks, unlock_on_close) 1959821f1d3SAlan Somers { 1969821f1d3SAlan Somers const char FULLPATH[] = "mountpoint/some_file.txt"; 1979821f1d3SAlan Somers const char RELPATH[] = "some_file.txt"; 1989821f1d3SAlan Somers uint64_t ino = 42; 1999821f1d3SAlan Somers int fd; 2009821f1d3SAlan Somers struct flock fl; 2019821f1d3SAlan Somers pid_t pid = getpid(); 2029821f1d3SAlan Somers 2039821f1d3SAlan Somers expect_lookup(RELPATH, ino, 1); 2049821f1d3SAlan Somers expect_open(ino, 0, 1); 2059821f1d3SAlan Somers EXPECT_CALL(*m_mock, process( 2069821f1d3SAlan Somers ResultOf([=](auto in) { 20729edc611SAlan Somers return (in.header.opcode == FUSE_SETLK && 20829edc611SAlan Somers in.header.nodeid == ino && 20929edc611SAlan Somers in.body.setlk.fh == FH); 2109821f1d3SAlan Somers }, Eq(true)), 2119821f1d3SAlan Somers _) 212f067b609SAlan Somers ).WillOnce(Invoke(ReturnErrno(0))); 2139f10f423SAlan Somers expect_flush(ino, 1, ReturnErrno(0)); 21429edc611SAlan Somers expect_release(ino, static_cast<uint64_t>(pid), O_RDWR, 0); 2159821f1d3SAlan Somers 2169821f1d3SAlan Somers fd = open(FULLPATH, O_RDWR); 2179821f1d3SAlan Somers ASSERT_LE(0, fd) << strerror(errno); 2189821f1d3SAlan Somers fl.l_start = 0; 2199821f1d3SAlan Somers fl.l_len = 0; 2209821f1d3SAlan Somers fl.l_pid = pid; 2219821f1d3SAlan Somers fl.l_type = F_RDLCK; 2229821f1d3SAlan Somers fl.l_whence = SEEK_SET; 2239821f1d3SAlan Somers fl.l_sysid = 0; 2249821f1d3SAlan Somers ASSERT_NE(-1, fcntl(fd, F_SETLKW, &fl)) << strerror(errno); 2259821f1d3SAlan Somers 2269821f1d3SAlan Somers ASSERT_EQ(0, close(fd)) << strerror(errno); 2279821f1d3SAlan Somers } 228