From nobody Sat Apr 5 15:51:08 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1738051094622489.942491970349; Mon, 27 Jan 2025 23:58:14 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1tcgTJ-00049y-Ji; Tue, 28 Jan 2025 02:57:21 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tcgT5-0003VD-Ro; Tue, 28 Jan 2025 02:57:11 -0500 Received: from isrv.corpit.ru ([86.62.121.231]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tcgT4-0000Ui-6W; Tue, 28 Jan 2025 02:57:07 -0500 Received: from tsrv.corpit.ru (tsrv.tls.msk.ru [192.168.177.2]) by isrv.corpit.ru (Postfix) with ESMTP id 8607CE1AEC; Tue, 28 Jan 2025 10:54:25 +0300 (MSK) Received: from localhost.tls.msk.ru (mjt.wg.tls.msk.ru [192.168.177.130]) by tsrv.corpit.ru (Postfix) with ESMTP id 011841A62D3; Tue, 28 Jan 2025 10:54:51 +0300 (MSK) Received: by localhost.tls.msk.ru (Postfix, from userid 1000) id D54175203D; Tue, 28 Jan 2025 10:54:50 +0300 (MSK) To: qemu-devel@nongnu.org Cc: qemu-stable@nongnu.org, Christian Schoenebeck , Greg Kurz , Michael Tokarev Subject: [Stable-8.2.9 11/45] tests/9p: add 'use-after-unlink' test Date: Mon, 27 Jan 2025 23:25:52 +0300 Message-Id: <20250127202630.3724367-11-mjt@tls.msk.ru> X-Mailer: git-send-email 2.39.5 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Michael Tokarev Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=86.62.121.231; envelope-from=mjt@tls.msk.ru; helo=isrv.corpit.ru X-Spam_score_int: -53 X-Spam_score: -5.4 X-Spam_bar: ----- X-Spam_report: (-5.4 / 5.0 requ) BAYES_00=-1.9, DATE_IN_PAST_06_12=1.543, RCVD_IN_DNSWL_HI=-5, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZM-MESSAGEID: 1738051096409019000 Content-Type: text/plain; charset="utf-8" After removing a file from the file system, we should still be able to work with the file if we already had it open before removal. As a first step we verify that it is possible to write to an unlinked file, as this is what already works. This test is extended later on after having fixed other use cases after unlink that are not working yet. Signed-off-by: Christian Schoenebeck Reviewed-by: Greg Kurz Message-Id: <3d6449d4df25bcdd3e807eff169f46f1385e5257.1732465720.git.qemu_o= ss@crudebyte.com> (cherry picked from commit 462db8fb1d405391b83a0d3099fdb9bfb85c2d92) Signed-off-by: Michael Tokarev (Mjt: context fix, pick it to stable so the next patch in this place applie= s) diff --git a/tests/qtest/virtio-9p-test.c b/tests/qtest/virtio-9p-test.c index 65e69491e5..7638c0a183 100644 --- a/tests/qtest/virtio-9p-test.c +++ b/tests/qtest/virtio-9p-test.c @@ -693,6 +693,45 @@ static void fs_unlinkat_hardlink(void *obj, void *data, g_assert(stat(real_file, &st_real) =3D=3D 0); } =20 +static void fs_use_after_unlink(void *obj, void *data, + QGuestAllocator *t_alloc) +{ + QVirtio9P *v9p =3D obj; + v9fs_set_allocator(t_alloc); + static const uint32_t write_count =3D P9_MAX_SIZE / 2; + g_autofree char *real_file =3D virtio_9p_test_path("09/doa_file"); + g_autofree char *buf =3D g_malloc0(write_count); + struct stat st_file; + uint32_t fid_file; + uint32_t count; + + tattach({ .client =3D v9p }); + + /* create a file "09/doa_file" and make sure it exists and is regular = */ + tmkdir({ .client =3D v9p, .atPath =3D "/", .name =3D "09" }); + tlcreate({ .client =3D v9p, .atPath =3D "09", .name =3D "doa_file" }); + g_assert(stat(real_file, &st_file) =3D=3D 0); + g_assert((st_file.st_mode & S_IFMT) =3D=3D S_IFREG); + + /* request a FID for that regular file that we can work with next */ + fid_file =3D twalk({ + .client =3D v9p, .fid =3D 0, .path =3D "09/doa_file" + }).newfid; + g_assert(fid_file !=3D 0); + + /* now first open the file in write mode before ... */ + tlopen({ .client =3D v9p, .fid =3D fid_file, .flags =3D O_WRONLY }); + /* ... removing the file from file system */ + tunlinkat({ .client =3D v9p, .atPath =3D "09", .name =3D "doa_file" }); + + /* file is removed, but we still have it open, so this should succeed = */ + count =3D twrite({ + .client =3D v9p, .fid =3D fid_file, .offset =3D 0, .count =3D writ= e_count, + .data =3D buf + }).count; + g_assert_cmpint(count, =3D=3D, write_count); +} + static void *assign_9p_local_driver(GString *cmd_line, void *arg) { virtio_9p_assign_local_driver(cmd_line, "security_model=3Dmapped-xattr= "); @@ -756,6 +795,8 @@ static void register_virtio_9p_test(void) qos_add_test("local/hardlink_file", "virtio-9p", fs_hardlink_file, &op= ts); qos_add_test("local/unlinkat_hardlink", "virtio-9p", fs_unlinkat_hardl= ink, &opts); + qos_add_test("local/use_after_unlink", "virtio-9p", fs_use_after_unlin= k, + &opts); } =20 libqos_init(register_virtio_9p_test); --=20 2.39.5