693 lines
24 KiB
C++
693 lines
24 KiB
C++
|
/*
|
||
|
* Copyright (C) 2018 The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
#include <fcntl.h>
|
||
|
#include <stdint.h>
|
||
|
#include <stdio.h>
|
||
|
#include <sys/ioctl.h>
|
||
|
#include <sys/types.h>
|
||
|
#include <time.h>
|
||
|
#include <unistd.h>
|
||
|
|
||
|
#include <chrono>
|
||
|
#include <ctime>
|
||
|
#include <iostream>
|
||
|
#include <map>
|
||
|
#include <thread>
|
||
|
|
||
|
#include <android-base/file.h>
|
||
|
#include <android-base/scopeguard.h>
|
||
|
#include <android-base/strings.h>
|
||
|
#include <android-base/unique_fd.h>
|
||
|
#include <gtest/gtest.h>
|
||
|
#include <libdm/dm.h>
|
||
|
#include <libdm/loop_control.h>
|
||
|
#include "test_util.h"
|
||
|
#include "utility.h"
|
||
|
|
||
|
using namespace std;
|
||
|
using namespace std::chrono_literals;
|
||
|
using namespace android::dm;
|
||
|
using unique_fd = android::base::unique_fd;
|
||
|
|
||
|
TEST(libdm, HasMinimumTargets) {
|
||
|
DmTargetTypeInfo info;
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
ASSERT_TRUE(dm.GetTargetByName("linear", &info));
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmLinear) {
|
||
|
unique_fd tmp1(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp1, 0);
|
||
|
unique_fd tmp2(CreateTempFile("file_2", 4096));
|
||
|
ASSERT_GE(tmp2, 0);
|
||
|
|
||
|
// Create two different files. These will back two separate loop devices.
|
||
|
const char message1[] = "Hello! This is sector 1.";
|
||
|
const char message2[] = "Goodbye. This is sector 2.";
|
||
|
ASSERT_TRUE(android::base::WriteFully(tmp1, message1, sizeof(message1)));
|
||
|
ASSERT_TRUE(android::base::WriteFully(tmp2, message2, sizeof(message2)));
|
||
|
|
||
|
LoopDevice loop_a(tmp1, 10s);
|
||
|
ASSERT_TRUE(loop_a.valid());
|
||
|
LoopDevice loop_b(tmp2, 10s);
|
||
|
ASSERT_TRUE(loop_b.valid());
|
||
|
|
||
|
// Define a 2-sector device, with each sector mapping to the first sector
|
||
|
// of one of our loop devices.
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop_a.device(), 0));
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(1, 1, loop_b.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
ASSERT_EQ(2u, table.num_sectors());
|
||
|
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
ASSERT_FALSE(dev.path().empty());
|
||
|
|
||
|
auto& dm = DeviceMapper::Instance();
|
||
|
|
||
|
dev_t dev_number;
|
||
|
ASSERT_TRUE(dm.GetDeviceNumber(dev.name(), &dev_number));
|
||
|
ASSERT_NE(dev_number, 0);
|
||
|
|
||
|
std::string dev_string;
|
||
|
ASSERT_TRUE(dm.GetDeviceString(dev.name(), &dev_string));
|
||
|
ASSERT_FALSE(dev_string.empty());
|
||
|
|
||
|
// Note: a scope is needed to ensure that there are no open descriptors
|
||
|
// when we go to close the device.
|
||
|
{
|
||
|
unique_fd dev_fd(open(dev.path().c_str(), O_RDWR));
|
||
|
ASSERT_GE(dev_fd, 0);
|
||
|
|
||
|
// Test that each sector of our device is correctly mapped to each loop
|
||
|
// device.
|
||
|
char sector[512];
|
||
|
ASSERT_TRUE(android::base::ReadFully(dev_fd, sector, sizeof(sector)));
|
||
|
ASSERT_EQ(strncmp(sector, message1, sizeof(message1)), 0);
|
||
|
ASSERT_TRUE(android::base::ReadFully(dev_fd, sector, sizeof(sector)));
|
||
|
ASSERT_EQ(strncmp(sector, message2, sizeof(message2)), 0);
|
||
|
}
|
||
|
|
||
|
// Test GetTableStatus.
|
||
|
vector<DeviceMapper::TargetInfo> targets;
|
||
|
ASSERT_TRUE(dm.GetTableStatus(dev.name(), &targets));
|
||
|
ASSERT_EQ(targets.size(), 2);
|
||
|
EXPECT_EQ(strcmp(targets[0].spec.target_type, "linear"), 0);
|
||
|
EXPECT_TRUE(targets[0].data.empty());
|
||
|
EXPECT_EQ(targets[0].spec.sector_start, 0);
|
||
|
EXPECT_EQ(targets[0].spec.length, 1);
|
||
|
EXPECT_EQ(strcmp(targets[1].spec.target_type, "linear"), 0);
|
||
|
EXPECT_TRUE(targets[1].data.empty());
|
||
|
EXPECT_EQ(targets[1].spec.sector_start, 1);
|
||
|
EXPECT_EQ(targets[1].spec.length, 1);
|
||
|
|
||
|
// Test GetTargetType().
|
||
|
EXPECT_EQ(DeviceMapper::GetTargetType(targets[0].spec), std::string{"linear"});
|
||
|
EXPECT_EQ(DeviceMapper::GetTargetType(targets[1].spec), std::string{"linear"});
|
||
|
|
||
|
// Normally the TestDevice destructor would delete this, but at least one
|
||
|
// test should ensure that device deletion works.
|
||
|
ASSERT_TRUE(dev.Destroy());
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSuspendResume) {
|
||
|
unique_fd tmp1(CreateTempFile("file_suspend_resume", 512));
|
||
|
ASSERT_GE(tmp1, 0);
|
||
|
|
||
|
LoopDevice loop_a(tmp1, 10s);
|
||
|
ASSERT_TRUE(loop_a.valid());
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop_a.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
ASSERT_EQ(1u, table.num_sectors());
|
||
|
|
||
|
TempDevice dev("libdm-test-dm-suspend-resume", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
ASSERT_FALSE(dev.path().empty());
|
||
|
|
||
|
auto& dm = DeviceMapper::Instance();
|
||
|
|
||
|
// Test Set and Get status of device.
|
||
|
vector<DeviceMapper::TargetInfo> targets;
|
||
|
ASSERT_EQ(dm.GetState(dev.name()), DmDeviceState::ACTIVE);
|
||
|
|
||
|
ASSERT_TRUE(dm.ChangeState(dev.name(), DmDeviceState::SUSPENDED));
|
||
|
ASSERT_EQ(dm.GetState(dev.name()), DmDeviceState::SUSPENDED);
|
||
|
|
||
|
ASSERT_TRUE(dm.ChangeState(dev.name(), DmDeviceState::ACTIVE));
|
||
|
ASSERT_EQ(dm.GetState(dev.name()), DmDeviceState::ACTIVE);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmVerityArgsAvb2) {
|
||
|
std::string device = "/dev/block/platform/soc/1da4000.ufshc/by-name/vendor_a";
|
||
|
std::string algorithm = "sha1";
|
||
|
std::string digest = "4be7e823b8c40f7bd5c8ccd5123f0722c5baca21";
|
||
|
std::string salt = "cc99f81ecb9484220a003b0719ee59dcf9be7e5d";
|
||
|
|
||
|
DmTargetVerity target(0, 10000, 1, device, device, 4096, 4096, 125961, 125961, algorithm,
|
||
|
digest, salt);
|
||
|
target.UseFec(device, 2, 126955, 126955);
|
||
|
target.SetVerityMode("restart_on_corruption");
|
||
|
target.IgnoreZeroBlocks();
|
||
|
|
||
|
// Verity table from a walleye build.
|
||
|
std::string expected =
|
||
|
"1 /dev/block/platform/soc/1da4000.ufshc/by-name/vendor_a "
|
||
|
"/dev/block/platform/soc/1da4000.ufshc/by-name/vendor_a 4096 4096 125961 125961 sha1 "
|
||
|
"4be7e823b8c40f7bd5c8ccd5123f0722c5baca21 cc99f81ecb9484220a003b0719ee59dcf9be7e5d 10 "
|
||
|
"use_fec_from_device /dev/block/platform/soc/1da4000.ufshc/by-name/vendor_a fec_roots "
|
||
|
"2 fec_blocks 126955 fec_start 126955 restart_on_corruption ignore_zero_blocks";
|
||
|
EXPECT_EQ(target.GetParameterString(), expected);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSnapshotArgs) {
|
||
|
DmTargetSnapshot target1(0, 512, "base", "cow", SnapshotStorageMode::Persistent, 8);
|
||
|
if (DmTargetSnapshot::ReportsOverflow("snapshot")) {
|
||
|
EXPECT_EQ(target1.GetParameterString(), "base cow PO 8");
|
||
|
} else {
|
||
|
EXPECT_EQ(target1.GetParameterString(), "base cow P 8");
|
||
|
}
|
||
|
EXPECT_EQ(target1.name(), "snapshot");
|
||
|
|
||
|
DmTargetSnapshot target2(0, 512, "base", "cow", SnapshotStorageMode::Transient, 8);
|
||
|
EXPECT_EQ(target2.GetParameterString(), "base cow N 8");
|
||
|
EXPECT_EQ(target2.name(), "snapshot");
|
||
|
|
||
|
DmTargetSnapshot target3(0, 512, "base", "cow", SnapshotStorageMode::Merge, 8);
|
||
|
if (DmTargetSnapshot::ReportsOverflow("snapshot-merge")) {
|
||
|
EXPECT_EQ(target3.GetParameterString(), "base cow PO 8");
|
||
|
} else {
|
||
|
EXPECT_EQ(target3.GetParameterString(), "base cow P 8");
|
||
|
}
|
||
|
EXPECT_EQ(target3.name(), "snapshot-merge");
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSnapshotOriginArgs) {
|
||
|
DmTargetSnapshotOrigin target(0, 512, "base");
|
||
|
EXPECT_EQ(target.GetParameterString(), "base");
|
||
|
EXPECT_EQ(target.name(), "snapshot-origin");
|
||
|
}
|
||
|
|
||
|
class SnapshotTestHarness final {
|
||
|
public:
|
||
|
bool Setup();
|
||
|
bool Merge();
|
||
|
|
||
|
std::string origin_dev() const { return origin_dev_->path(); }
|
||
|
std::string snapshot_dev() const { return snapshot_dev_->path(); }
|
||
|
|
||
|
int base_fd() const { return base_fd_; }
|
||
|
|
||
|
static const uint64_t kBaseDeviceSize = 1024 * 1024;
|
||
|
static const uint64_t kCowDeviceSize = 1024 * 64;
|
||
|
static const uint64_t kSectorSize = 512;
|
||
|
|
||
|
private:
|
||
|
void SetupImpl();
|
||
|
void MergeImpl();
|
||
|
|
||
|
unique_fd base_fd_;
|
||
|
unique_fd cow_fd_;
|
||
|
unique_ptr<LoopDevice> base_loop_;
|
||
|
unique_ptr<LoopDevice> cow_loop_;
|
||
|
unique_ptr<TempDevice> origin_dev_;
|
||
|
unique_ptr<TempDevice> snapshot_dev_;
|
||
|
bool setup_ok_ = false;
|
||
|
bool merge_ok_ = false;
|
||
|
};
|
||
|
|
||
|
bool SnapshotTestHarness::Setup() {
|
||
|
SetupImpl();
|
||
|
return setup_ok_;
|
||
|
}
|
||
|
|
||
|
void SnapshotTestHarness::SetupImpl() {
|
||
|
base_fd_ = CreateTempFile("base_device", kBaseDeviceSize);
|
||
|
ASSERT_GE(base_fd_, 0);
|
||
|
cow_fd_ = CreateTempFile("cow_device", kCowDeviceSize);
|
||
|
ASSERT_GE(cow_fd_, 0);
|
||
|
|
||
|
base_loop_ = std::make_unique<LoopDevice>(base_fd_, 10s);
|
||
|
ASSERT_TRUE(base_loop_->valid());
|
||
|
cow_loop_ = std::make_unique<LoopDevice>(cow_fd_, 10s);
|
||
|
ASSERT_TRUE(cow_loop_->valid());
|
||
|
|
||
|
DmTable origin_table;
|
||
|
ASSERT_TRUE(origin_table.AddTarget(make_unique<DmTargetSnapshotOrigin>(
|
||
|
0, kBaseDeviceSize / kSectorSize, base_loop_->device())));
|
||
|
ASSERT_TRUE(origin_table.valid());
|
||
|
ASSERT_EQ(kBaseDeviceSize / kSectorSize, origin_table.num_sectors());
|
||
|
|
||
|
origin_dev_ = std::make_unique<TempDevice>("libdm-test-dm-snapshot-origin", origin_table);
|
||
|
ASSERT_TRUE(origin_dev_->valid());
|
||
|
ASSERT_FALSE(origin_dev_->path().empty());
|
||
|
|
||
|
// chunk size = 4K blocks.
|
||
|
DmTable snap_table;
|
||
|
ASSERT_TRUE(snap_table.AddTarget(make_unique<DmTargetSnapshot>(
|
||
|
0, kBaseDeviceSize / kSectorSize, base_loop_->device(), cow_loop_->device(),
|
||
|
SnapshotStorageMode::Persistent, 8)));
|
||
|
ASSERT_TRUE(snap_table.valid());
|
||
|
ASSERT_EQ(kBaseDeviceSize / kSectorSize, snap_table.num_sectors());
|
||
|
|
||
|
snapshot_dev_ = std::make_unique<TempDevice>("libdm-test-dm-snapshot", snap_table);
|
||
|
ASSERT_TRUE(snapshot_dev_->valid());
|
||
|
ASSERT_FALSE(snapshot_dev_->path().empty());
|
||
|
|
||
|
setup_ok_ = true;
|
||
|
}
|
||
|
|
||
|
bool SnapshotTestHarness::Merge() {
|
||
|
MergeImpl();
|
||
|
return merge_ok_;
|
||
|
}
|
||
|
|
||
|
void SnapshotTestHarness::MergeImpl() {
|
||
|
DmTable merge_table;
|
||
|
ASSERT_TRUE(merge_table.AddTarget(
|
||
|
make_unique<DmTargetSnapshot>(0, kBaseDeviceSize / kSectorSize, base_loop_->device(),
|
||
|
cow_loop_->device(), SnapshotStorageMode::Merge, 8)));
|
||
|
ASSERT_TRUE(merge_table.valid());
|
||
|
ASSERT_EQ(kBaseDeviceSize / kSectorSize, merge_table.num_sectors());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
ASSERT_TRUE(dm.LoadTableAndActivate("libdm-test-dm-snapshot", merge_table));
|
||
|
|
||
|
while (true) {
|
||
|
vector<DeviceMapper::TargetInfo> status;
|
||
|
ASSERT_TRUE(dm.GetTableStatus("libdm-test-dm-snapshot", &status));
|
||
|
ASSERT_EQ(status.size(), 1);
|
||
|
ASSERT_EQ(strncmp(status[0].spec.target_type, "snapshot-merge", strlen("snapshot-merge")),
|
||
|
0);
|
||
|
|
||
|
DmTargetSnapshot::Status merge_status;
|
||
|
ASSERT_TRUE(DmTargetSnapshot::ParseStatusText(status[0].data, &merge_status));
|
||
|
ASSERT_TRUE(merge_status.error.empty());
|
||
|
if (merge_status.sectors_allocated == merge_status.metadata_sectors) {
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
std::this_thread::sleep_for(250ms);
|
||
|
}
|
||
|
|
||
|
merge_ok_ = true;
|
||
|
}
|
||
|
|
||
|
bool CheckSnapshotAvailability() {
|
||
|
DmTargetTypeInfo info;
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
if (!dm.GetTargetByName("snapshot", &info)) {
|
||
|
cout << "snapshot module not enabled; skipping test" << std::endl;
|
||
|
return false;
|
||
|
}
|
||
|
if (!dm.GetTargetByName("snapshot-merge", &info)) {
|
||
|
cout << "snapshot-merge module not enabled; skipping test" << std::endl;
|
||
|
return false;
|
||
|
}
|
||
|
if (!dm.GetTargetByName("snapshot-origin", &info)) {
|
||
|
cout << "snapshot-origin module not enabled; skipping test" << std::endl;
|
||
|
return false;
|
||
|
}
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSnapshot) {
|
||
|
if (!CheckSnapshotAvailability()) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
SnapshotTestHarness harness;
|
||
|
ASSERT_TRUE(harness.Setup());
|
||
|
|
||
|
// Open the dm devices.
|
||
|
unique_fd origin_fd(open(harness.origin_dev().c_str(), O_RDONLY | O_CLOEXEC));
|
||
|
ASSERT_GE(origin_fd, 0);
|
||
|
unique_fd snapshot_fd(open(harness.snapshot_dev().c_str(), O_RDWR | O_CLOEXEC | O_SYNC));
|
||
|
ASSERT_GE(snapshot_fd, 0);
|
||
|
|
||
|
// Write to the first block of the snapshot device.
|
||
|
std::string data("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz");
|
||
|
ASSERT_TRUE(android::base::WriteFully(snapshot_fd, data.data(), data.size()));
|
||
|
ASSERT_EQ(lseek(snapshot_fd, 0, SEEK_SET), 0);
|
||
|
|
||
|
// We should get the same data back from the snapshot device.
|
||
|
std::string read(data.size(), '\0');
|
||
|
ASSERT_TRUE(android::base::ReadFully(snapshot_fd, read.data(), read.size()));
|
||
|
ASSERT_EQ(read, data);
|
||
|
|
||
|
// We should see the original data from the origin device.
|
||
|
std::string zeroes(data.size(), '\0');
|
||
|
ASSERT_TRUE(android::base::ReadFully(origin_fd, read.data(), read.size()));
|
||
|
ASSERT_EQ(lseek(snapshot_fd, 0, SEEK_SET), 0);
|
||
|
ASSERT_EQ(read, zeroes);
|
||
|
|
||
|
// We should also see the original data from the base device.
|
||
|
ASSERT_TRUE(android::base::ReadFully(harness.base_fd(), read.data(), read.size()));
|
||
|
ASSERT_EQ(lseek(harness.base_fd(), 0, SEEK_SET), 0);
|
||
|
ASSERT_EQ(read, zeroes);
|
||
|
|
||
|
// Now, perform the merge and wait.
|
||
|
ASSERT_TRUE(harness.Merge());
|
||
|
|
||
|
// Reading from the base device should give us the modified data.
|
||
|
ASSERT_TRUE(android::base::ReadFully(harness.base_fd(), read.data(), read.size()));
|
||
|
ASSERT_EQ(lseek(harness.base_fd(), 0, SEEK_SET), 0);
|
||
|
ASSERT_EQ(read, data);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSnapshotOverflow) {
|
||
|
if (!CheckSnapshotAvailability()) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
SnapshotTestHarness harness;
|
||
|
ASSERT_TRUE(harness.Setup());
|
||
|
|
||
|
// Open the dm devices.
|
||
|
unique_fd snapshot_fd(open(harness.snapshot_dev().c_str(), O_RDWR | O_CLOEXEC));
|
||
|
ASSERT_GE(snapshot_fd, 0);
|
||
|
|
||
|
// Fill the copy-on-write device until it overflows.
|
||
|
uint64_t bytes_remaining = SnapshotTestHarness::kCowDeviceSize;
|
||
|
uint8_t byte = 1;
|
||
|
while (bytes_remaining) {
|
||
|
std::string data(4096, char(byte));
|
||
|
if (!android::base::WriteFully(snapshot_fd, data.data(), data.size())) {
|
||
|
ASSERT_EQ(errno, EIO);
|
||
|
break;
|
||
|
}
|
||
|
bytes_remaining -= data.size();
|
||
|
}
|
||
|
|
||
|
// If writes succeed (because they are buffered), then we should expect an
|
||
|
// fsync to fail with EIO.
|
||
|
if (!bytes_remaining) {
|
||
|
ASSERT_EQ(fsync(snapshot_fd), -1);
|
||
|
ASSERT_EQ(errno, EIO);
|
||
|
}
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
|
||
|
vector<DeviceMapper::TargetInfo> target_status;
|
||
|
ASSERT_TRUE(dm.GetTableStatus("libdm-test-dm-snapshot", &target_status));
|
||
|
ASSERT_EQ(target_status.size(), 1);
|
||
|
ASSERT_EQ(strncmp(target_status[0].spec.target_type, "snapshot", strlen("snapshot")), 0);
|
||
|
|
||
|
DmTargetSnapshot::Status status;
|
||
|
ASSERT_TRUE(DmTargetSnapshot::ParseStatusText(target_status[0].data, &status));
|
||
|
if (DmTargetSnapshot::ReportsOverflow("snapshot")) {
|
||
|
ASSERT_EQ(status.error, "Overflow");
|
||
|
} else {
|
||
|
ASSERT_EQ(status.error, "Invalid");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST(libdm, ParseStatusText) {
|
||
|
DmTargetSnapshot::Status status;
|
||
|
|
||
|
// Bad inputs
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("X", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123/456", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123 456", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123 456", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123 456 789", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123 456/789", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123/456/789", &status));
|
||
|
EXPECT_FALSE(DmTargetSnapshot::ParseStatusText("123 / 456 789", &status));
|
||
|
|
||
|
// Good input
|
||
|
EXPECT_TRUE(DmTargetSnapshot::ParseStatusText("123/456 789", &status));
|
||
|
EXPECT_EQ(status.sectors_allocated, 123);
|
||
|
EXPECT_EQ(status.total_sectors, 456);
|
||
|
EXPECT_EQ(status.metadata_sectors, 789);
|
||
|
|
||
|
// Known error codes
|
||
|
EXPECT_TRUE(DmTargetSnapshot::ParseStatusText("Invalid", &status));
|
||
|
EXPECT_TRUE(DmTargetSnapshot::ParseStatusText("Merge failed", &status));
|
||
|
EXPECT_TRUE(DmTargetSnapshot::ParseStatusText("Overflow", &status));
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DmSnapshotMergePercent) {
|
||
|
DmTargetSnapshot::Status status;
|
||
|
|
||
|
// Correct input
|
||
|
status.sectors_allocated = 1000;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 0;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status), 1.0);
|
||
|
|
||
|
status.sectors_allocated = 500;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 0;
|
||
|
EXPECT_GE(DmTargetSnapshot::MergePercent(status), 49.0);
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status), 51.0);
|
||
|
|
||
|
status.sectors_allocated = 0;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 0;
|
||
|
EXPECT_GE(DmTargetSnapshot::MergePercent(status), 99.0);
|
||
|
|
||
|
status.sectors_allocated = 500;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 500;
|
||
|
EXPECT_GE(DmTargetSnapshot::MergePercent(status), 99.0);
|
||
|
|
||
|
status.sectors_allocated = 500;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 0;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status, 500), 1.0);
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status, 1000), 51.0);
|
||
|
EXPECT_GE(DmTargetSnapshot::MergePercent(status, 1000), 49.0);
|
||
|
|
||
|
// Robustness
|
||
|
status.sectors_allocated = 2000;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 0;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status), 0.0);
|
||
|
|
||
|
status.sectors_allocated = 2000;
|
||
|
status.total_sectors = 1000;
|
||
|
status.metadata_sectors = 2000;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status), 0.0);
|
||
|
|
||
|
status.sectors_allocated = 2000;
|
||
|
status.total_sectors = 0;
|
||
|
status.metadata_sectors = 2000;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status), 0.0);
|
||
|
|
||
|
status.sectors_allocated = 1000;
|
||
|
status.total_sectors = 0;
|
||
|
status.metadata_sectors = 1000;
|
||
|
EXPECT_LE(DmTargetSnapshot::MergePercent(status, 0), 0.0);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, CryptArgs) {
|
||
|
DmTargetCrypt target1(0, 512, "sha1", "abcdefgh", 50, "/dev/loop0", 100);
|
||
|
ASSERT_EQ(target1.name(), "crypt");
|
||
|
ASSERT_TRUE(target1.Valid());
|
||
|
ASSERT_EQ(target1.GetParameterString(), "sha1 abcdefgh 50 /dev/loop0 100");
|
||
|
|
||
|
DmTargetCrypt target2(0, 512, "sha1", "abcdefgh", 50, "/dev/loop0", 100);
|
||
|
target2.SetSectorSize(64);
|
||
|
target2.AllowDiscards();
|
||
|
target2.SetIvLargeSectors();
|
||
|
target2.AllowEncryptOverride();
|
||
|
ASSERT_EQ(target2.GetParameterString(),
|
||
|
"sha1 abcdefgh 50 /dev/loop0 100 4 allow_discards allow_encrypt_override "
|
||
|
"iv_large_sectors sector_size:64");
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DefaultKeyArgs) {
|
||
|
DmTargetDefaultKey target(0, 4096, "aes-xts-plain64", "abcdef0123456789", "/dev/loop0", 0);
|
||
|
target.SetSetDun();
|
||
|
ASSERT_EQ(target.name(), "default-key");
|
||
|
ASSERT_TRUE(target.Valid());
|
||
|
// TODO: Add case for wrapped key enabled
|
||
|
ASSERT_EQ(target.GetParameterString(),
|
||
|
"aes-xts-plain64 abcdef0123456789 0 /dev/loop0 0 3 allow_discards sector_size:4096 "
|
||
|
"iv_large_sectors");
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DefaultKeyLegacyArgs) {
|
||
|
DmTargetDefaultKey target(0, 4096, "AES-256-XTS", "abcdef0123456789", "/dev/loop0", 0);
|
||
|
target.SetUseLegacyOptionsFormat();
|
||
|
ASSERT_EQ(target.name(), "default-key");
|
||
|
ASSERT_TRUE(target.Valid());
|
||
|
ASSERT_EQ(target.GetParameterString(), "AES-256-XTS abcdef0123456789 /dev/loop0 0");
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DeleteDeviceWithTimeout) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
|
||
|
std::string path;
|
||
|
ASSERT_TRUE(dm.GetDmDevicePathByName("libdm-test-dm-linear", &path));
|
||
|
ASSERT_EQ(0, access(path.c_str(), F_OK));
|
||
|
|
||
|
ASSERT_TRUE(dm.DeleteDevice("libdm-test-dm-linear", 5s));
|
||
|
ASSERT_EQ(DmDeviceState::INVALID, dm.GetState("libdm-test-dm-linear"));
|
||
|
ASSERT_NE(0, access(path.c_str(), F_OK));
|
||
|
ASSERT_EQ(ENOENT, errno);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, IsDmBlockDevice) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
ASSERT_TRUE(android::base::StartsWith(loop.device(), "/dev/block"));
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
ASSERT_TRUE(dm.IsDmBlockDevice(dev.path()));
|
||
|
ASSERT_FALSE(dm.IsDmBlockDevice(loop.device()));
|
||
|
}
|
||
|
|
||
|
TEST(libdm, GetDmDeviceNameByPath) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
ASSERT_TRUE(android::base::StartsWith(loop.device(), "/dev/block"));
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
// Not a dm device, GetDmDeviceNameByPath will return std::nullopt.
|
||
|
ASSERT_FALSE(dm.GetDmDeviceNameByPath(loop.device()));
|
||
|
auto name = dm.GetDmDeviceNameByPath(dev.path());
|
||
|
ASSERT_EQ("libdm-test-dm-linear", *name);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, GetParentBlockDeviceByPath) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
ASSERT_TRUE(android::base::StartsWith(loop.device(), "/dev/block"));
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
ASSERT_FALSE(dm.GetParentBlockDeviceByPath(loop.device()));
|
||
|
auto sub_block_device = dm.GetParentBlockDeviceByPath(dev.path());
|
||
|
ASSERT_EQ(loop.device(), *sub_block_device);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DeleteDeviceDeferredNoReferences) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
|
||
|
std::string path;
|
||
|
ASSERT_TRUE(dm.GetDmDevicePathByName("libdm-test-dm-linear", &path));
|
||
|
ASSERT_EQ(0, access(path.c_str(), F_OK));
|
||
|
|
||
|
ASSERT_TRUE(dm.DeleteDeviceDeferred("libdm-test-dm-linear"));
|
||
|
|
||
|
ASSERT_TRUE(WaitForFileDeleted(path, 5s));
|
||
|
ASSERT_EQ(DmDeviceState::INVALID, dm.GetState("libdm-test-dm-linear"));
|
||
|
ASSERT_NE(0, access(path.c_str(), F_OK));
|
||
|
ASSERT_EQ(ENOENT, errno);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, DeleteDeviceDeferredWaitsForLastReference) {
|
||
|
unique_fd tmp(CreateTempFile("file_1", 4096));
|
||
|
ASSERT_GE(tmp, 0);
|
||
|
LoopDevice loop(tmp, 10s);
|
||
|
ASSERT_TRUE(loop.valid());
|
||
|
|
||
|
DmTable table;
|
||
|
ASSERT_TRUE(table.Emplace<DmTargetLinear>(0, 1, loop.device(), 0));
|
||
|
ASSERT_TRUE(table.valid());
|
||
|
TempDevice dev("libdm-test-dm-linear", table);
|
||
|
ASSERT_TRUE(dev.valid());
|
||
|
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
|
||
|
std::string path;
|
||
|
ASSERT_TRUE(dm.GetDmDevicePathByName("libdm-test-dm-linear", &path));
|
||
|
ASSERT_EQ(0, access(path.c_str(), F_OK));
|
||
|
|
||
|
{
|
||
|
// Open a reference to block device.
|
||
|
unique_fd fd(TEMP_FAILURE_RETRY(open(dev.path().c_str(), O_RDONLY | O_CLOEXEC)));
|
||
|
ASSERT_GE(fd.get(), 0);
|
||
|
|
||
|
ASSERT_TRUE(dm.DeleteDeviceDeferred("libdm-test-dm-linear"));
|
||
|
|
||
|
ASSERT_EQ(0, access(path.c_str(), F_OK));
|
||
|
}
|
||
|
|
||
|
// After release device will be removed.
|
||
|
ASSERT_TRUE(WaitForFileDeleted(path, 5s));
|
||
|
ASSERT_EQ(DmDeviceState::INVALID, dm.GetState("libdm-test-dm-linear"));
|
||
|
ASSERT_NE(0, access(path.c_str(), F_OK));
|
||
|
ASSERT_EQ(ENOENT, errno);
|
||
|
}
|
||
|
|
||
|
TEST(libdm, CreateEmptyDevice) {
|
||
|
DeviceMapper& dm = DeviceMapper::Instance();
|
||
|
ASSERT_TRUE(dm.CreateEmptyDevice("empty-device"));
|
||
|
auto guard =
|
||
|
android::base::make_scope_guard([&]() { dm.DeleteDeviceIfExists("empty-device", 5s); });
|
||
|
|
||
|
// Empty device should be in suspended state.
|
||
|
ASSERT_EQ(DmDeviceState::SUSPENDED, dm.GetState("empty-device"));
|
||
|
}
|