Files
apfstests/common/attr
T
Dave Chinner 97a665b5fc xfs/189: noattr2 invalid for CRC enabled filesystems
Version 5 filesystems always have attr2 format enabled, and it
cannot be turned off via the noattr2 mount option. As such, attempts
to mount with noattr2 will be rejected and this causes cascading
failures within the test.

Hence detect if we've created a CRC enabled filesystem, and if this
is the case _notrun the test.

Signed-off-by: Dave Chinner <dchinner@redhat.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Dave Chinner <david@fromorbit.com>
2014-03-13 14:58:16 +11:00

239 lines
6.5 KiB
Plaintext

##/bin/bash
#-----------------------------------------------------------------------
# Copyright (c) 2000-2004 Silicon Graphics, Inc. All Rights Reserved.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
# USA
#
# Contact information: Silicon Graphics, Inc., 1500 Crittenden Lane,
# Mountain View, CA 94043, USA, or: http://www.sgi.com
#-----------------------------------------------------------------------
# common extended attribute and ACL support
# pick three unused user/group ids, store them as $acl[1-3]
#
_acl_setup_ids()
{
eval `(_cat_passwd; _cat_group) | awk -F: '
{ ids[$3]=1 }
END {
j=1
for(i=1; i<1000000 && j<=3;i++){
if (! (i in ids)) {
printf "acl%d=%d;", j, i;
j++
}
}
}'`
}
# filter for the acl ids selected above
#
_acl_filter_id()
{
sed \
-e "s/u:$acl1/u:id1/" \
-e "s/u:$acl2/u:id2/" \
-e "s/u:$acl3/u:id3/" \
-e "s/g:$acl1/g:id1/" \
-e "s/g:$acl2/g:id2/" \
-e "s/g:$acl3/g:id3/" \
-e "s/ $acl1 / id1 /" \
-e "s/ $acl2 / id2 /" \
-e "s/ $acl3 / id3 /"
}
_getfacl_filter_id()
{
sed \
-e "s/user:$acl1/user:id1/" \
-e "s/user:$acl2/user:id2/" \
-e "s/user:$acl3/user:id3/" \
-e "s/group:$acl1/group:id1/" \
-e "s/group:$acl2/group:id2/" \
-e "s/group:$acl3/group:id3/" \
-e "s/: $acl1/: id1/" \
-e "s/: $acl2/: id2/" \
-e "s/: $acl3/: id3/"
}
# filtered ls
#
_acl_ls()
{
_ls_l -n $* | awk '{ print $1, $3, $4, $NF }' | _acl_filter_id
}
#
_acl_list()
{
_file1=$1
if [ $HOSTOS = "IRIX" ]; then
ls -dD $_file1 | _acl_filter_id
else
chacl -l $_file1 | _acl_filter_id
fi
}
# create an ACL with n ACEs in it
#
_create_n_aces()
{
let n=$1-4
acl='u::rwx,g::rwx,o::rwx,m::rwx' # 4 ace acl start
while [ $n -ne 0 ]; do
acl="$acl,u:$n:rwx"
let n=$n-1
done
echo $acl
}
# filter user ace names to user ids
#
_filter_aces()
{
tmp_file=`mktemp /tmp/ace.XXXXXX`
(_cat_passwd; _cat_group) > $tmp_file
$AWK_PROG -v tmpfile=$tmp_file '
BEGIN {
FS=":"
while ( getline <tmpfile > 0 ) {
idlist[$1] = $3
}
}
/^user/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
/^u/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
/^default:user/ { if ($3 in idlist) sub($3, idlist[$3]); print; next}
{print}
'
rm -f $tmp_file
}
_filter_aces_notypes()
{
tr '\[' '\012' | tr ']' '\012' | tr ',' '\012' | _filter_aces|\
sed -e 's/u:/user:/' -e 's/g:/group:/' -e 's/o:/other:/' -e 's/m:/mask:/'
}
_require_acls()
{
if [ ! -x /bin/chacl -a ! -x /usr/bin/chacl -a ! -x /sbin/chacl ]; then
_notrun "chacl command not found"
fi
#
# Test if chacl is able to list ACLs on the target filesystems. On really
# old kernels the system calls might not be implemented at all, but the
# more common case is that the tested filesystem simply doesn't support
# ACLs.
#
touch $TEST_DIR/syscalltest
chacl -l $TEST_DIR/syscalltest > $TEST_DIR/syscalltest.out 2>&1
cat $TEST_DIR/syscalltest.out >> $seqres.full
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
_notrun "kernel does not support ACLs"
fi
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
_notrun "ACLs not supported by this filesystem type: $FSTYP"
fi
rm -f $TEST_DIR/syscalltest.out
}
_list_acl()
{
file=$1
ls -dD $file | _acl_filter_id
}
_require_attrs()
{
[ -n $ATTR_PROG ] || _notrun "attr command not found"
[ -n $GETFATTR_PROG ] || _notrun "getfattr command not found"
[ -n $SETFATTR_PROG ] || _notrun "setfattr command not found"
#
# Test if chacl is able to write an attribute on the target filesystems.
# On really old kernels the system calls might not be implemented at all,
# but the more common case is that the tested filesystem simply doesn't
# support attributes. Note that we can't simply list attributes as
# various security modules generate synthetic attributes not actually
# stored on disk.
#
touch $TEST_DIR/syscalltest
attr -s "user.xfstests" -V "attr" $TEST_DIR > $TEST_DIR/syscalltest.out 2>&1
cat $TEST_DIR/syscalltest.out >> $seqres.full
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
_notrun "kernel does not support attrs"
fi
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
_notrun "attrs not supported by this filesystem type: $FSTYP"
fi
rm -f $TEST_DIR/syscalltest.out
}
_require_attr_v1()
{
_scratch_mkfs_xfs_supported -i attr=1 >/dev/null 2>&1 \
|| _notrun "attr v1 not supported on $SCRATCH_DEV"
}
# check if we support the noattr2 mount option
_require_noattr2()
{
_scratch_mkfs_xfs > /dev/null 2>&1 \
|| _fail "_scratch_mkfs_xfs failed on $SCRATCH_DEV"
_mount -o noattr2 $SCRATCH_DEV > /dev/null 2>&1 \
|| _notrun "noattr2 mount option not supported on $SCRATCH_DEV"
_scratch_unmount
}
# getfattr -R returns info in readdir order which varies from fs to fs.
# This sorts the output by filename
_sort_getfattr_output()
{
awk '{a[FNR]=$0}END{n = asort(a); for(i=1; i <= n; i++) print a[i]"\n"}' RS=''
}
# set maximum total attr space based on fs type
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" ]; then
MAX_ATTRS=1000
else # Assume max ~1 block of attrs
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
# user.attribute_XXX="value.XXX" is about 32 bytes; leave some overhead
let MAX_ATTRS=$BLOCK_SIZE/40
fi
export MAX_ATTRS
# Set max attr value size based on fs type
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" -o "$FSTYP" == "btrfs" ]; then
MAX_ATTRVAL_SIZE=64
else # Assume max ~1 block of attrs
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
# leave a little overhead
let MAX_ATTRVAL_SIZE=$BLOCK_SIZE-256
fi
export MAX_ATTRVAL_SIZE
# make sure this script returns success
/bin/true