1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (c) 2019 The FreeBSD Foundation 5 * 6 * This software was developed by BFF Storage Systems, LLC under sponsorship 7 * from the FreeBSD Foundation. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28 * SUCH DAMAGE. 29 * 30 * $FreeBSD$ 31 */ 32 33 /* Tests for all things relating to extended attributes and FUSE */ 34 35 extern "C" { 36 #include <sys/types.h> 37 #include <sys/extattr.h> 38 #include <sys/wait.h> 39 #include <semaphore.h> 40 #include <signal.h> 41 #include <string.h> 42 } 43 44 #include "mockfs.hh" 45 #include "utils.hh" 46 47 using namespace testing; 48 49 const char FULLPATH[] = "mountpoint/some_file.txt"; 50 const char RELPATH[] = "some_file.txt"; 51 static sem_t killer_semaphore; 52 53 void* killer(void* target) { 54 pid_t pid = *(pid_t*)target; 55 sem_wait(&killer_semaphore); 56 if (verbosity > 1) 57 printf("Killing! pid %d\n", pid); 58 kill(pid, SIGINT); 59 60 return(NULL); 61 } 62 63 class Xattr: public FuseTest { 64 public: 65 void expect_listxattr(uint64_t ino, uint32_t size, ProcessMockerT r, 66 Sequence *seq = NULL) 67 { 68 if (seq == NULL) { 69 EXPECT_CALL(*m_mock, process( 70 ResultOf([=](auto in) { 71 return (in.header.opcode == FUSE_LISTXATTR && 72 in.header.nodeid == ino && 73 in.body.listxattr.size == size); 74 }, Eq(true)), 75 _) 76 ).WillOnce(Invoke(r)) 77 .RetiresOnSaturation(); 78 } else { 79 EXPECT_CALL(*m_mock, process( 80 ResultOf([=](auto in) { 81 return (in.header.opcode == FUSE_LISTXATTR && 82 in.header.nodeid == ino && 83 in.body.listxattr.size == size); 84 }, Eq(true)), 85 _) 86 ).InSequence(*seq) 87 .WillOnce(Invoke(r)) 88 .RetiresOnSaturation(); 89 } 90 } 91 92 void expect_removexattr(uint64_t ino, const char *attr, int error) 93 { 94 EXPECT_CALL(*m_mock, process( 95 ResultOf([=](auto in) { 96 const char *a = (const char*)in.body.bytes; 97 return (in.header.opcode == FUSE_REMOVEXATTR && 98 in.header.nodeid == ino && 99 0 == strcmp(attr, a)); 100 }, Eq(true)), 101 _) 102 ).WillOnce(Invoke(ReturnErrno(error))); 103 } 104 105 void expect_setxattr(uint64_t ino, const char *attr, const char *value, 106 ProcessMockerT r) 107 { 108 EXPECT_CALL(*m_mock, process( 109 ResultOf([=](auto in) { 110 const char *a = (const char*)in.body.bytes + 111 sizeof(fuse_setxattr_in); 112 const char *v = a + strlen(a) + 1; 113 return (in.header.opcode == FUSE_SETXATTR && 114 in.header.nodeid == ino && 115 0 == strcmp(attr, a) && 116 0 == strcmp(value, v)); 117 }, Eq(true)), 118 _) 119 ).WillOnce(Invoke(r)); 120 } 121 122 }; 123 124 class Getxattr: public Xattr {}; 125 126 class Listxattr: public Xattr {}; 127 128 /* Listxattr tests that need to use a signal */ 129 class ListxattrSig: public Listxattr { 130 public: 131 pthread_t m_killer_th; 132 pid_t m_child; 133 134 void SetUp() { 135 /* 136 * Mount with -o nointr so the mount can't get interrupted while 137 * waiting for a response from the server 138 */ 139 m_nointr = true; 140 FuseTest::SetUp(); 141 142 ASSERT_EQ(0, sem_init(&killer_semaphore, 0, 0)) << strerror(errno); 143 } 144 145 void TearDown() { 146 if (m_killer_th != NULL) { 147 pthread_join(m_killer_th, NULL); 148 } 149 150 sem_destroy(&killer_semaphore); 151 152 FuseTest::TearDown(); 153 } 154 }; 155 156 class Removexattr: public Xattr {}; 157 class Setxattr: public Xattr {}; 158 class RofsXattr: public Xattr { 159 public: 160 virtual void SetUp() { 161 m_ro = true; 162 Xattr::SetUp(); 163 } 164 }; 165 166 /* 167 * If the extended attribute does not exist on this file, the daemon should 168 * return ENOATTR (ENODATA on Linux, but it's up to the daemon to choose the 169 * correct errror code) 170 */ 171 TEST_F(Getxattr, enoattr) 172 { 173 char data[80]; 174 uint64_t ino = 42; 175 int ns = EXTATTR_NAMESPACE_USER; 176 ssize_t r; 177 178 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 179 expect_getxattr(ino, "user.foo", ReturnErrno(ENOATTR)); 180 181 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 182 ASSERT_EQ(-1, r); 183 ASSERT_EQ(ENOATTR, errno); 184 } 185 186 /* 187 * If the filesystem returns ENOSYS, then it will be treated as a permanent 188 * failure and all future VOP_GETEXTATTR calls will fail with EOPNOTSUPP 189 * without querying the filesystem daemon 190 */ 191 TEST_F(Getxattr, enosys) 192 { 193 char data[80]; 194 uint64_t ino = 42; 195 int ns = EXTATTR_NAMESPACE_USER; 196 ssize_t r; 197 198 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 2); 199 expect_getxattr(ino, "user.foo", ReturnErrno(ENOSYS)); 200 201 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 202 ASSERT_EQ(-1, r); 203 EXPECT_EQ(EOPNOTSUPP, errno); 204 205 /* Subsequent attempts should not query the filesystem at all */ 206 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 207 ASSERT_EQ(-1, r); 208 EXPECT_EQ(EOPNOTSUPP, errno); 209 } 210 211 /* 212 * On FreeBSD, if the user passes an insufficiently large buffer then the 213 * filesystem is supposed to copy as much of the attribute's value as will fit. 214 * 215 * On Linux, however, the filesystem is supposed to return ERANGE. 216 * 217 * libfuse specifies the Linux behavior. However, that's probably an error. 218 * It would probably be correct for the filesystem to use platform-dependent 219 * behavior. 220 * 221 * This test case covers a filesystem that uses the Linux behavior 222 * TODO: require FreeBSD Behavior. 223 */ 224 TEST_F(Getxattr, erange) 225 { 226 char data[10]; 227 uint64_t ino = 42; 228 int ns = EXTATTR_NAMESPACE_USER; 229 ssize_t r; 230 231 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 232 expect_getxattr(ino, "user.foo", ReturnErrno(ERANGE)); 233 234 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 235 ASSERT_EQ(-1, r); 236 ASSERT_EQ(ERANGE, errno); 237 } 238 239 /* 240 * If the user passes a 0-length buffer, then the daemon should just return the 241 * size of the attribute 242 */ 243 TEST_F(Getxattr, size_only) 244 { 245 uint64_t ino = 42; 246 int ns = EXTATTR_NAMESPACE_USER; 247 248 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 249 expect_getxattr(ino, "user.foo", 250 ReturnImmediate([](auto in __unused, auto& out) { 251 SET_OUT_HEADER_LEN(out, getxattr); 252 out.body.getxattr.size = 99; 253 }) 254 ); 255 256 ASSERT_EQ(99, extattr_get_file(FULLPATH, ns, "foo", NULL, 0)) 257 << strerror(errno);; 258 } 259 260 /* 261 * Successfully get an attribute from the system namespace 262 */ 263 TEST_F(Getxattr, system) 264 { 265 uint64_t ino = 42; 266 char data[80]; 267 const char value[] = "whatever"; 268 ssize_t value_len = strlen(value) + 1; 269 int ns = EXTATTR_NAMESPACE_SYSTEM; 270 ssize_t r; 271 272 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 273 expect_getxattr(ino, "system.foo", 274 ReturnImmediate([&](auto in __unused, auto& out) { 275 memcpy((void*)out.body.bytes, value, value_len); 276 out.header.len = sizeof(out.header) + value_len; 277 }) 278 ); 279 280 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 281 ASSERT_EQ(value_len, r) << strerror(errno); 282 EXPECT_STREQ(value, data); 283 } 284 285 /* 286 * Successfully get an attribute from the user namespace 287 */ 288 TEST_F(Getxattr, user) 289 { 290 uint64_t ino = 42; 291 char data[80]; 292 const char value[] = "whatever"; 293 ssize_t value_len = strlen(value) + 1; 294 int ns = EXTATTR_NAMESPACE_USER; 295 ssize_t r; 296 297 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 298 expect_getxattr(ino, "user.foo", 299 ReturnImmediate([&](auto in __unused, auto& out) { 300 memcpy((void*)out.body.bytes, value, value_len); 301 out.header.len = sizeof(out.header) + value_len; 302 }) 303 ); 304 305 r = extattr_get_file(FULLPATH, ns, "foo", data, sizeof(data)); 306 ASSERT_EQ(value_len, r) << strerror(errno); 307 EXPECT_STREQ(value, data); 308 } 309 310 /* 311 * If the filesystem returns ENOSYS, then it will be treated as a permanent 312 * failure and all future VOP_LISTEXTATTR calls will fail with EOPNOTSUPP 313 * without querying the filesystem daemon 314 */ 315 TEST_F(Listxattr, enosys) 316 { 317 uint64_t ino = 42; 318 int ns = EXTATTR_NAMESPACE_USER; 319 320 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 2); 321 expect_listxattr(ino, 0, ReturnErrno(ENOSYS)); 322 323 ASSERT_EQ(-1, extattr_list_file(FULLPATH, ns, NULL, 0)); 324 EXPECT_EQ(EOPNOTSUPP, errno); 325 326 /* Subsequent attempts should not query the filesystem at all */ 327 ASSERT_EQ(-1, extattr_list_file(FULLPATH, ns, NULL, 0)); 328 EXPECT_EQ(EOPNOTSUPP, errno); 329 } 330 331 /* 332 * Listing extended attributes failed because they aren't configured on this 333 * filesystem 334 */ 335 TEST_F(Listxattr, enotsup) 336 { 337 uint64_t ino = 42; 338 int ns = EXTATTR_NAMESPACE_USER; 339 340 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 341 expect_listxattr(ino, 0, ReturnErrno(ENOTSUP)); 342 343 ASSERT_EQ(-1, extattr_list_file(FULLPATH, ns, NULL, 0)); 344 ASSERT_EQ(ENOTSUP, errno); 345 } 346 347 /* 348 * On FreeBSD, if the user passes an insufficiently large buffer to 349 * extattr_list_file(2) or VOP_LISTEXTATTR(9), then the file system is supposed 350 * to copy as much of the attribute's value as will fit. 351 * 352 * On Linux, however, the file system is supposed to return ERANGE if an 353 * insufficiently large buffer is passed to listxattr(2). 354 * 355 * fusefs(5) must guarantee the usual FreeBSD behavior. 356 */ 357 TEST_F(Listxattr, erange) 358 { 359 uint64_t ino = 42; 360 int ns = EXTATTR_NAMESPACE_USER; 361 char attrs[9] = "user.foo"; 362 char expected[3] = {3, 'f', 'o'}; 363 char buf[3]; 364 365 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 366 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) 367 { 368 out.body.listxattr.size = sizeof(attrs); 369 SET_OUT_HEADER_LEN(out, listxattr); 370 })); 371 expect_listxattr(ino, sizeof(attrs), 372 ReturnImmediate([&](auto in __unused, auto& out) { 373 memcpy((void*)out.body.bytes, attrs, sizeof(attrs)); 374 out.header.len = sizeof(fuse_out_header) + sizeof(attrs); 375 })); 376 377 378 ASSERT_EQ(static_cast<ssize_t>(sizeof(buf)), 379 extattr_list_file(FULLPATH, ns, buf, sizeof(buf))); 380 ASSERT_EQ(0, memcmp(expected, buf, sizeof(buf))); 381 } 382 383 /* 384 * A buggy or malicious file system always returns ERANGE, even if we pass an 385 * appropriately sized buffer. That will send the kernel into an infinite 386 * loop. This test will ensure that the loop is interruptible by killing the 387 * blocked process with SIGINT. 388 */ 389 TEST_F(ListxattrSig, erange_forever) 390 { 391 uint64_t ino = 42; 392 uint32_t lie_size = 10; 393 int status; 394 395 fork(false, &status, [&] { 396 EXPECT_LOOKUP(FUSE_ROOT_ID, RELPATH) 397 .WillRepeatedly(Invoke( 398 ReturnImmediate([=](auto in __unused, auto& out) { 399 SET_OUT_HEADER_LEN(out, entry); 400 out.body.entry.attr.mode = S_IFREG | 0644; 401 out.body.entry.nodeid = ino; 402 out.body.entry.attr.nlink = 1; 403 out.body.entry.attr_valid = UINT64_MAX; 404 out.body.entry.entry_valid = UINT64_MAX; 405 }))); 406 EXPECT_CALL(*m_mock, process( 407 ResultOf([=](auto in) { 408 return (in.header.opcode == FUSE_LISTXATTR && 409 in.header.nodeid == ino && 410 in.body.listxattr.size == 0); 411 }, Eq(true)), 412 _) 413 ).WillRepeatedly(ReturnImmediate([=](auto i __unused, auto& out) 414 { 415 /* The file system requests 10 bytes, but it's a lie */ 416 out.body.listxattr.size = lie_size; 417 SET_OUT_HEADER_LEN(out, listxattr); 418 /* 419 * We can send the signal any time after fusefs enters 420 * VOP_LISTEXTATTR 421 */ 422 sem_post(&killer_semaphore); 423 })); 424 /* 425 * Even though the kernel faithfully respects our size request, 426 * we'll return ERANGE anyway. 427 */ 428 EXPECT_CALL(*m_mock, process( 429 ResultOf([=](auto in) { 430 return (in.header.opcode == FUSE_LISTXATTR && 431 in.header.nodeid == ino && 432 in.body.listxattr.size == lie_size); 433 }, Eq(true)), 434 _) 435 ).WillRepeatedly(ReturnErrno(ERANGE)); 436 437 ASSERT_EQ(0, pthread_create(&m_killer_th, NULL, killer, 438 &m_mock->m_child_pid)) 439 << strerror(errno); 440 441 }, [] { 442 /* Child process will block until it gets signaled */ 443 int ns = EXTATTR_NAMESPACE_USER; 444 char buf[3]; 445 extattr_list_file(FULLPATH, ns, buf, sizeof(buf)); 446 return 0; 447 } 448 ); 449 450 ASSERT_TRUE(WIFSIGNALED(status)); 451 } 452 453 /* 454 * Get the size of the list that it would take to list no extended attributes 455 */ 456 TEST_F(Listxattr, size_only_empty) 457 { 458 uint64_t ino = 42; 459 int ns = EXTATTR_NAMESPACE_USER; 460 461 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 462 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) { 463 out.body.listxattr.size = 0; 464 SET_OUT_HEADER_LEN(out, listxattr); 465 })); 466 467 ASSERT_EQ(0, extattr_list_file(FULLPATH, ns, NULL, 0)) 468 << strerror(errno); 469 } 470 471 /* 472 * Get the size of the list that it would take to list some extended 473 * attributes. Due to the format differences between a FreeBSD and a 474 * Linux/FUSE extended attribute list, fuse(4) will actually allocate a buffer 475 * and get the whole list, then convert it, just to figure out its size. 476 */ 477 TEST_F(Listxattr, size_only_nonempty) 478 { 479 uint64_t ino = 42; 480 int ns = EXTATTR_NAMESPACE_USER; 481 char attrs[9] = "user.foo"; 482 483 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 484 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) 485 { 486 out.body.listxattr.size = sizeof(attrs); 487 SET_OUT_HEADER_LEN(out, listxattr); 488 })); 489 490 expect_listxattr(ino, sizeof(attrs), 491 ReturnImmediate([=](auto in __unused, auto& out) { 492 size_t l = sizeof(attrs); 493 strlcpy((char*)out.body.bytes, attrs, l); 494 out.header.len = sizeof(fuse_out_header) + l; 495 }) 496 ); 497 498 ASSERT_EQ(4, extattr_list_file(FULLPATH, ns, NULL, 0)) 499 << strerror(errno); 500 } 501 502 /* 503 * The list of extended attributes grows in between the server's two calls to 504 * FUSE_LISTXATTR. 505 */ 506 TEST_F(Listxattr, size_only_race_bigger) 507 { 508 uint64_t ino = 42; 509 int ns = EXTATTR_NAMESPACE_USER; 510 char attrs0[9] = "user.foo"; 511 char attrs1[18] = "user.foo\0user.bar"; 512 Sequence seq; 513 514 EXPECT_LOOKUP(FUSE_ROOT_ID, RELPATH) 515 .WillRepeatedly(Invoke( 516 ReturnImmediate([=](auto in __unused, auto& out) { 517 SET_OUT_HEADER_LEN(out, entry); 518 out.body.entry.attr.mode = S_IFREG | 0644; 519 out.body.entry.nodeid = ino; 520 out.body.entry.attr.nlink = 1; 521 out.body.entry.attr_valid = UINT64_MAX; 522 out.body.entry.entry_valid = UINT64_MAX; 523 }))); 524 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) 525 { 526 out.body.listxattr.size = sizeof(attrs0); 527 SET_OUT_HEADER_LEN(out, listxattr); 528 }), &seq); 529 530 /* 531 * After the first FUSE_LISTXATTR the list grew, so the second 532 * operation returns ERANGE. 533 */ 534 expect_listxattr(ino, sizeof(attrs0), ReturnErrno(ERANGE), &seq); 535 536 /* And now the kernel retries */ 537 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) 538 { 539 out.body.listxattr.size = sizeof(attrs1); 540 SET_OUT_HEADER_LEN(out, listxattr); 541 }), &seq); 542 expect_listxattr(ino, sizeof(attrs1), 543 ReturnImmediate([&](auto in __unused, auto& out) { 544 memcpy((char*)out.body.bytes, attrs1, sizeof(attrs1)); 545 out.header.len = sizeof(fuse_out_header) + 546 sizeof(attrs1); 547 }), &seq 548 ); 549 550 /* Userspace should never know about the retry */ 551 ASSERT_EQ(8, extattr_list_file(FULLPATH, ns, NULL, 0)) 552 << strerror(errno); 553 } 554 555 /* 556 * The list of extended attributes shrinks in between the server's two calls to 557 * FUSE_LISTXATTR 558 */ 559 TEST_F(Listxattr, size_only_race_smaller) 560 { 561 uint64_t ino = 42; 562 int ns = EXTATTR_NAMESPACE_USER; 563 char attrs0[18] = "user.foo\0user.bar"; 564 char attrs1[9] = "user.foo"; 565 566 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 567 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) 568 { 569 out.body.listxattr.size = sizeof(attrs0); 570 SET_OUT_HEADER_LEN(out, listxattr); 571 })); 572 expect_listxattr(ino, sizeof(attrs0), 573 ReturnImmediate([&](auto in __unused, auto& out) { 574 strlcpy((char*)out.body.bytes, attrs1, sizeof(attrs1)); 575 out.header.len = sizeof(fuse_out_header) + 576 sizeof(attrs1); 577 }) 578 ); 579 580 ASSERT_EQ(4, extattr_list_file(FULLPATH, ns, NULL, 0)) 581 << strerror(errno); 582 } 583 584 TEST_F(Listxattr, size_only_really_big) 585 { 586 uint64_t ino = 42; 587 int ns = EXTATTR_NAMESPACE_USER; 588 589 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 590 expect_listxattr(ino, 0, ReturnImmediate([](auto i __unused, auto& out) { 591 out.body.listxattr.size = 16000; 592 SET_OUT_HEADER_LEN(out, listxattr); 593 })); 594 595 expect_listxattr(ino, 16000, 596 ReturnImmediate([](auto in __unused, auto& out) { 597 const char l[16] = "user.foobarbang"; 598 for (int i=0; i < 1000; i++) { 599 memcpy(&out.body.bytes[16 * i], l, 16); 600 } 601 out.header.len = sizeof(fuse_out_header) + 16000; 602 }) 603 ); 604 605 ASSERT_EQ(11000, extattr_list_file(FULLPATH, ns, NULL, 0)) 606 << strerror(errno); 607 } 608 609 /* 610 * List all of the user attributes of a file which has both user and system 611 * attributes 612 */ 613 TEST_F(Listxattr, user) 614 { 615 uint64_t ino = 42; 616 int ns = EXTATTR_NAMESPACE_USER; 617 char data[80]; 618 char expected[9] = {3, 'f', 'o', 'o', 4, 'b', 'a', 'n', 'g'}; 619 char attrs[28] = "user.foo\0system.x\0user.bang"; 620 621 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 622 expect_listxattr(ino, 0, 623 ReturnImmediate([&](auto in __unused, auto& out) { 624 out.body.listxattr.size = sizeof(attrs); 625 SET_OUT_HEADER_LEN(out, listxattr); 626 }) 627 ); 628 629 expect_listxattr(ino, sizeof(attrs), 630 ReturnImmediate([&](auto in __unused, auto& out) { 631 memcpy((void*)out.body.bytes, attrs, sizeof(attrs)); 632 out.header.len = sizeof(fuse_out_header) + sizeof(attrs); 633 })); 634 635 ASSERT_EQ(static_cast<ssize_t>(sizeof(expected)), 636 extattr_list_file(FULLPATH, ns, data, sizeof(data))) 637 << strerror(errno); 638 ASSERT_EQ(0, memcmp(expected, data, sizeof(expected))); 639 } 640 641 /* 642 * List all of the system attributes of a file which has both user and system 643 * attributes 644 */ 645 TEST_F(Listxattr, system) 646 { 647 uint64_t ino = 42; 648 int ns = EXTATTR_NAMESPACE_SYSTEM; 649 char data[80]; 650 char expected[2] = {1, 'x'}; 651 char attrs[28] = "user.foo\0system.x\0user.bang"; 652 653 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 654 expect_listxattr(ino, 0, 655 ReturnImmediate([&](auto in __unused, auto& out) { 656 out.body.listxattr.size = sizeof(attrs); 657 SET_OUT_HEADER_LEN(out, listxattr); 658 }) 659 ); 660 661 expect_listxattr(ino, sizeof(attrs), 662 ReturnImmediate([&](auto in __unused, auto& out) { 663 memcpy((void*)out.body.bytes, attrs, sizeof(attrs)); 664 out.header.len = sizeof(fuse_out_header) + sizeof(attrs); 665 })); 666 667 ASSERT_EQ(static_cast<ssize_t>(sizeof(expected)), 668 extattr_list_file(FULLPATH, ns, data, sizeof(data))) 669 << strerror(errno); 670 ASSERT_EQ(0, memcmp(expected, data, sizeof(expected))); 671 } 672 673 /* Fail to remove a nonexistent attribute */ 674 TEST_F(Removexattr, enoattr) 675 { 676 uint64_t ino = 42; 677 int ns = EXTATTR_NAMESPACE_USER; 678 679 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 680 expect_removexattr(ino, "user.foo", ENOATTR); 681 682 ASSERT_EQ(-1, extattr_delete_file(FULLPATH, ns, "foo")); 683 ASSERT_EQ(ENOATTR, errno); 684 } 685 686 /* 687 * If the filesystem returns ENOSYS, then it will be treated as a permanent 688 * failure and all future VOP_DELETEEXTATTR calls will fail with EOPNOTSUPP 689 * without querying the filesystem daemon 690 */ 691 TEST_F(Removexattr, enosys) 692 { 693 uint64_t ino = 42; 694 int ns = EXTATTR_NAMESPACE_USER; 695 696 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 2); 697 expect_removexattr(ino, "user.foo", ENOSYS); 698 699 ASSERT_EQ(-1, extattr_delete_file(FULLPATH, ns, "foo")); 700 EXPECT_EQ(EOPNOTSUPP, errno); 701 702 /* Subsequent attempts should not query the filesystem at all */ 703 ASSERT_EQ(-1, extattr_delete_file(FULLPATH, ns, "foo")); 704 EXPECT_EQ(EOPNOTSUPP, errno); 705 } 706 707 /* Successfully remove a user xattr */ 708 TEST_F(Removexattr, user) 709 { 710 uint64_t ino = 42; 711 int ns = EXTATTR_NAMESPACE_USER; 712 713 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 714 expect_removexattr(ino, "user.foo", 0); 715 716 ASSERT_EQ(0, extattr_delete_file(FULLPATH, ns, "foo")) 717 << strerror(errno); 718 } 719 720 /* Successfully remove a system xattr */ 721 TEST_F(Removexattr, system) 722 { 723 uint64_t ino = 42; 724 int ns = EXTATTR_NAMESPACE_SYSTEM; 725 726 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 727 expect_removexattr(ino, "system.foo", 0); 728 729 ASSERT_EQ(0, extattr_delete_file(FULLPATH, ns, "foo")) 730 << strerror(errno); 731 } 732 733 /* 734 * If the filesystem returns ENOSYS, then it will be treated as a permanent 735 * failure and all future VOP_SETEXTATTR calls will fail with EOPNOTSUPP 736 * without querying the filesystem daemon 737 */ 738 TEST_F(Setxattr, enosys) 739 { 740 uint64_t ino = 42; 741 const char value[] = "whatever"; 742 ssize_t value_len = strlen(value) + 1; 743 int ns = EXTATTR_NAMESPACE_USER; 744 ssize_t r; 745 746 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 2); 747 expect_setxattr(ino, "user.foo", value, ReturnErrno(ENOSYS)); 748 749 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 750 value_len); 751 ASSERT_EQ(-1, r); 752 EXPECT_EQ(EOPNOTSUPP, errno); 753 754 /* Subsequent attempts should not query the filesystem at all */ 755 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 756 value_len); 757 ASSERT_EQ(-1, r); 758 EXPECT_EQ(EOPNOTSUPP, errno); 759 } 760 761 /* 762 * SETXATTR will return ENOTSUP if the namespace is invalid or the filesystem 763 * as currently configured doesn't support extended attributes. 764 */ 765 TEST_F(Setxattr, enotsup) 766 { 767 uint64_t ino = 42; 768 const char value[] = "whatever"; 769 ssize_t value_len = strlen(value) + 1; 770 int ns = EXTATTR_NAMESPACE_USER; 771 ssize_t r; 772 773 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 774 expect_setxattr(ino, "user.foo", value, ReturnErrno(ENOTSUP)); 775 776 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 777 value_len); 778 ASSERT_EQ(-1, r); 779 EXPECT_EQ(ENOTSUP, errno); 780 } 781 782 /* 783 * Successfully set a user attribute. 784 */ 785 TEST_F(Setxattr, user) 786 { 787 uint64_t ino = 42; 788 const char value[] = "whatever"; 789 ssize_t value_len = strlen(value) + 1; 790 int ns = EXTATTR_NAMESPACE_USER; 791 ssize_t r; 792 793 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 794 expect_setxattr(ino, "user.foo", value, ReturnErrno(0)); 795 796 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 797 value_len); 798 ASSERT_EQ(value_len, r) << strerror(errno); 799 } 800 801 /* 802 * Successfully set a system attribute. 803 */ 804 TEST_F(Setxattr, system) 805 { 806 uint64_t ino = 42; 807 const char value[] = "whatever"; 808 ssize_t value_len = strlen(value) + 1; 809 int ns = EXTATTR_NAMESPACE_SYSTEM; 810 ssize_t r; 811 812 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 813 expect_setxattr(ino, "system.foo", value, ReturnErrno(0)); 814 815 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 816 value_len); 817 ASSERT_EQ(value_len, r) << strerror(errno); 818 } 819 820 TEST_F(RofsXattr, deleteextattr_erofs) 821 { 822 uint64_t ino = 42; 823 int ns = EXTATTR_NAMESPACE_USER; 824 825 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 826 827 ASSERT_EQ(-1, extattr_delete_file(FULLPATH, ns, "foo")); 828 ASSERT_EQ(EROFS, errno); 829 } 830 831 TEST_F(RofsXattr, setextattr_erofs) 832 { 833 uint64_t ino = 42; 834 const char value[] = "whatever"; 835 ssize_t value_len = strlen(value) + 1; 836 int ns = EXTATTR_NAMESPACE_USER; 837 ssize_t r; 838 839 expect_lookup(RELPATH, ino, S_IFREG | 0644, 0, 1); 840 841 r = extattr_set_file(FULLPATH, ns, "foo", (const void*)value, 842 value_len); 843 ASSERT_EQ(-1, r); 844 EXPECT_EQ(EROFS, errno); 845 } 846