block.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304
  1. # vim: fileencoding=utf-8
  2. #
  3. # The Qubes OS Project, https://www.qubes-os.org/
  4. #
  5. # Copyright (C) 2016
  6. # Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  7. #
  8. # This program is free software; you can redistribute it and/or modify
  9. # it under the terms of the GNU General Public License as published by
  10. # the Free Software Foundation; either version 2 of the License, or
  11. # (at your option) any later version.
  12. #
  13. # This program is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License along
  19. # with this program; if not, write to the Free Software Foundation, Inc.,
  20. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. #
  22. import os
  23. import qubes.tests
  24. import qubes.qubesutils
  25. import subprocess
  26. # the same class for both dom0 and VMs
  27. class TC_00_List(qubes.tests.SystemTestsMixin, qubes.tests.QubesTestCase):
  28. template = None
  29. def setUp(self):
  30. super(TC_00_List, self).setUp()
  31. self.img_path = '/tmp/test.img'
  32. self.mount_point = '/tmp/test-dir'
  33. if self.template is not None:
  34. self.vm = self.qc.add_new_vm(
  35. "QubesAppVm",
  36. name=self.make_vm_name("vm"),
  37. template=self.qc.get_vm_by_name(self.template))
  38. self.vm.create_on_disk(verbose=False)
  39. self.vm.start()
  40. else:
  41. self.vm = self.qc[0]
  42. def tearDown(self):
  43. super(TC_00_List, self).tearDown()
  44. if self.template is None:
  45. if os.path.exists(self.mount_point):
  46. subprocess.call(['sudo', 'umount', self.mount_point])
  47. subprocess.call(['sudo', 'rmdir', self.mount_point])
  48. subprocess.call(['sudo', 'dmsetup', 'remove', 'test-dm'])
  49. if os.path.exists(self.img_path):
  50. loopdev = subprocess.check_output(['losetup', '-j',
  51. self.img_path])
  52. for dev in loopdev.splitlines():
  53. subprocess.call(
  54. ['sudo', 'losetup', '-d', dev.split(':')[0]])
  55. subprocess.call(['sudo', 'rm', '-f', self.img_path])
  56. def run_script(self, script, user="user"):
  57. if self.template is None:
  58. if user == "user":
  59. subprocess.check_call(script, shell=True)
  60. elif user == "root":
  61. subprocess.check_call(['sudo', 'sh', '-c', script])
  62. else:
  63. retcode = self.vm.run(script, user=user, wait=True)
  64. if retcode != 0:
  65. raise subprocess.CalledProcessError
  66. def test_000_list_loop(self):
  67. if self.template is None:
  68. self.skipTest('loop devices excluded in dom0')
  69. self.run_script(
  70. "set -e;"
  71. "truncate -s 128M {path}; "
  72. "losetup -f {path}; "
  73. "udevadm settle".format(path=self.img_path), user="root")
  74. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  75. found = False
  76. for dev in dev_list.keys():
  77. if dev_list[dev]['desc'] == self.img_path:
  78. self.assertTrue(dev.startswith(self.vm.name + ':loop'))
  79. self.assertEquals(dev_list[dev]['mode'], 'w')
  80. self.assertEquals(dev_list[dev]['size'], 1024 * 1024 * 128)
  81. self.assertEquals(
  82. dev_list[dev]['device'], '/dev/' + dev.split(':')[1])
  83. found = True
  84. if not found:
  85. self.fail("Device {} not found in {!r}".format(self.img_path, dev_list))
  86. def test_001_list_loop_mounted(self):
  87. if self.template is None:
  88. self.skipTest('loop devices excluded in dom0')
  89. self.run_script(
  90. "set -e;"
  91. "truncate -s 128M {path}; "
  92. "mkfs.ext4 -q -F {path}; "
  93. "mkdir -p {mntdir}; "
  94. "mount {path} {mntdir} -o loop; "
  95. "udevadm settle".format(
  96. path=self.img_path,
  97. mntdir=self.mount_point),
  98. user="root")
  99. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  100. for dev in dev_list.keys():
  101. if dev_list[dev]['desc'] == self.img_path:
  102. self.fail(
  103. 'Device {} ({}) should not be listed because is mounted'
  104. .format(dev, self.img_path))
  105. def test_010_list_dm(self):
  106. self.run_script(
  107. "set -e;"
  108. "truncate -s 128M {path}; "
  109. "loopdev=`losetup -f`; "
  110. "losetup $loopdev {path}; "
  111. "dmsetup create test-dm --table \"0 262144 linear $(cat "
  112. "/sys/block/$(basename $loopdev)/dev) 0\";"
  113. "udevadm settle".format(path=self.img_path), user="root")
  114. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  115. found = False
  116. for dev in dev_list.keys():
  117. if dev.startswith(self.vm.name + ':loop'):
  118. self.assertNotEquals(dev_list[dev]['desc'], self.img_path,
  119. "Device {} ({}) should not be listed as it is used in "
  120. "device-mapper".format(dev, self.img_path)
  121. )
  122. elif dev_list[dev]['desc'] == 'test-dm':
  123. self.assertEquals(dev_list[dev]['mode'], 'w')
  124. self.assertEquals(dev_list[dev]['size'], 1024 * 1024 * 128)
  125. self.assertEquals(
  126. dev_list[dev]['device'], '/dev/' + dev.split(':')[1])
  127. found = True
  128. if not found:
  129. self.fail("Device {} not found in {!r}".format('test-dm', dev_list))
  130. def test_011_list_dm_mounted(self):
  131. self.run_script(
  132. "set -e;"
  133. "truncate -s 128M {path}; "
  134. "loopdev=`losetup -f`; "
  135. "losetup $loopdev {path}; "
  136. "dmsetup create test-dm --table \"0 262144 linear $(cat "
  137. "/sys/block/$(basename $loopdev)/dev) 0\";"
  138. "mkfs.ext4 -q -F /dev/mapper/test-dm;"
  139. "mkdir -p {mntdir};"
  140. "mount /dev/mapper/test-dm {mntdir};"
  141. "udevadm settle".format(
  142. path=self.img_path,
  143. mntdir=self.mount_point),
  144. user="root")
  145. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  146. for dev in dev_list.keys():
  147. if dev.startswith(self.vm.name + ':loop'):
  148. self.assertNotEquals(dev_list[dev]['desc'], self.img_path,
  149. "Device {} ({}) should not be listed as it is used in "
  150. "device-mapper".format(dev, self.img_path)
  151. )
  152. else:
  153. self.assertNotEquals(dev_list[dev]['desc'], 'test-dm',
  154. "Device {} ({}) should not be listed as it is "
  155. "mounted".format(dev, 'test-dm')
  156. )
  157. def test_012_list_dm_delayed(self):
  158. self.run_script(
  159. "set -e;"
  160. "truncate -s 128M {path}; "
  161. "loopdev=`losetup -f`; "
  162. "losetup $loopdev {path}; "
  163. "udevadm settle; "
  164. "dmsetup create test-dm --table \"0 262144 linear $(cat "
  165. "/sys/block/$(basename $loopdev)/dev) 0\";"
  166. "udevadm settle".format(path=self.img_path), user="root")
  167. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  168. found = False
  169. for dev in dev_list.keys():
  170. if dev.startswith(self.vm.name + ':loop'):
  171. self.assertNotEquals(dev_list[dev]['desc'], self.img_path,
  172. "Device {} ({}) should not be listed as it is used in "
  173. "device-mapper".format(dev, self.img_path)
  174. )
  175. elif dev_list[dev]['desc'] == 'test-dm':
  176. self.assertEquals(dev_list[dev]['mode'], 'w')
  177. self.assertEquals(dev_list[dev]['size'], 1024 * 1024 * 128)
  178. self.assertEquals(
  179. dev_list[dev]['device'], '/dev/' + dev.split(':')[1])
  180. found = True
  181. if not found:
  182. self.fail("Device {} not found in {!r}".format('test-dm', dev_list))
  183. def test_013_list_dm_removed(self):
  184. self.run_script(
  185. "set -e;"
  186. "truncate -s 128M {path}; "
  187. "loopdev=`losetup -f`; "
  188. "losetup $loopdev {path}; "
  189. "dmsetup create test-dm --table \"0 262144 linear $(cat "
  190. "/sys/block/$(basename $loopdev)/dev) 0\";"
  191. "udevadm settle;"
  192. "dmsetup remove test-dm;"
  193. "udevadm settle".format(path=self.img_path), user="root")
  194. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  195. found = False
  196. for dev in dev_list.keys():
  197. if dev_list[dev]['desc'] == self.img_path:
  198. self.assertTrue(dev.startswith(self.vm.name + ':loop'))
  199. self.assertEquals(dev_list[dev]['mode'], 'w')
  200. self.assertEquals(dev_list[dev]['size'], 1024 * 1024 * 128)
  201. self.assertEquals(
  202. dev_list[dev]['device'], '/dev/' + dev.split(':')[1])
  203. found = True
  204. if not found:
  205. self.fail("Device {} not found in {!r}".format(self.img_path, dev_list))
  206. def test_020_list_loop_partition(self):
  207. if self.template is None:
  208. self.skipTest('loop devices excluded in dom0')
  209. self.run_script(
  210. "set -e;"
  211. "truncate -s 128M {path}; "
  212. "echo ,,L | sfdisk {path};"
  213. "loopdev=`losetup -f`; "
  214. "losetup -P $loopdev {path}; "
  215. "blockdev --rereadpt $loopdev; "
  216. "udevadm settle".format(path=self.img_path), user="root")
  217. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  218. found = False
  219. for dev in dev_list.keys():
  220. if dev_list[dev]['desc'] == self.img_path:
  221. self.assertTrue(dev.startswith(self.vm.name + ':loop'))
  222. self.assertEquals(dev_list[dev]['mode'], 'w')
  223. self.assertEquals(dev_list[dev]['size'], 1024 * 1024 * 128)
  224. self.assertEquals(
  225. dev_list[dev]['device'], '/dev/' + dev.split(':')[1])
  226. self.assertIn(dev + 'p1', dev_list)
  227. found = True
  228. if not found:
  229. self.fail("Device {} not found in {!r}".format(self.img_path, dev_list))
  230. def test_021_list_loop_partition_mounted(self):
  231. if self.template is None:
  232. self.skipTest('loop devices excluded in dom0')
  233. self.run_script(
  234. "set -e;"
  235. "truncate -s 128M {path}; "
  236. "echo ,,L | sfdisk {path};"
  237. "loopdev=`losetup -f`; "
  238. "losetup -P $loopdev {path}; "
  239. "blockdev --rereadpt $loopdev; "
  240. "mkfs.ext4 -q -F ${{loopdev}}p1; "
  241. "mkdir -p {mntdir}; "
  242. "mount ${{loopdev}}p1 {mntdir}; "
  243. "udevadm settle".format(
  244. path=self.img_path, mntdir=self.mount_point),
  245. user="root")
  246. dev_list = qubes.qubesutils.block_list_vm(self.vm)
  247. for dev in dev_list.keys():
  248. if dev_list[dev]['desc'] == self.img_path:
  249. self.fail(
  250. 'Device {} ({}) should not be listed because its '
  251. 'partition is mounted'
  252. .format(dev, self.img_path))
  253. elif dev.startswith(self.vm.name + ':loop') and dev.endswith('p1'):
  254. # FIXME: risky assumption that only tests create partitioned
  255. # loop devices
  256. self.fail(
  257. 'Device {} ({}) should not be listed because is mounted'
  258. .format(dev, self.img_path))
  259. def load_tests(loader, tests, pattern):
  260. try:
  261. qc = qubes.qubes.QubesVmCollection()
  262. qc.lock_db_for_reading()
  263. qc.load()
  264. qc.unlock_db()
  265. templates = [vm.name for vm in qc.values() if
  266. isinstance(vm, qubes.qubes.QubesTemplateVm)]
  267. except OSError:
  268. templates = []
  269. for template in templates:
  270. tests.addTests(loader.loadTestsFromTestCase(
  271. type(
  272. 'TC_00_List_' + template,
  273. (TC_00_List, qubes.tests.QubesTestCase),
  274. {'template': template})))
  275. return tests