mirror of
https://github.com/linux-apfs/apfstests.git
synced 2026-05-01 15:01:44 -07:00
97a665b5fc
Version 5 filesystems always have attr2 format enabled, and it cannot be turned off via the noattr2 mount option. As such, attempts to mount with noattr2 will be rejected and this causes cascading failures within the test. Hence detect if we've created a CRC enabled filesystem, and if this is the case _notrun the test. Signed-off-by: Dave Chinner <dchinner@redhat.com> Reviewed-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Dave Chinner <david@fromorbit.com>
239 lines
6.5 KiB
Plaintext
239 lines
6.5 KiB
Plaintext
##/bin/bash
|
|
#-----------------------------------------------------------------------
|
|
# Copyright (c) 2000-2004 Silicon Graphics, Inc. All Rights Reserved.
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
# USA
|
|
#
|
|
# Contact information: Silicon Graphics, Inc., 1500 Crittenden Lane,
|
|
# Mountain View, CA 94043, USA, or: http://www.sgi.com
|
|
#-----------------------------------------------------------------------
|
|
# common extended attribute and ACL support
|
|
|
|
# pick three unused user/group ids, store them as $acl[1-3]
|
|
#
|
|
_acl_setup_ids()
|
|
{
|
|
eval `(_cat_passwd; _cat_group) | awk -F: '
|
|
{ ids[$3]=1 }
|
|
END {
|
|
j=1
|
|
for(i=1; i<1000000 && j<=3;i++){
|
|
if (! (i in ids)) {
|
|
printf "acl%d=%d;", j, i;
|
|
j++
|
|
}
|
|
}
|
|
}'`
|
|
}
|
|
|
|
# filter for the acl ids selected above
|
|
#
|
|
_acl_filter_id()
|
|
{
|
|
sed \
|
|
-e "s/u:$acl1/u:id1/" \
|
|
-e "s/u:$acl2/u:id2/" \
|
|
-e "s/u:$acl3/u:id3/" \
|
|
-e "s/g:$acl1/g:id1/" \
|
|
-e "s/g:$acl2/g:id2/" \
|
|
-e "s/g:$acl3/g:id3/" \
|
|
-e "s/ $acl1 / id1 /" \
|
|
-e "s/ $acl2 / id2 /" \
|
|
-e "s/ $acl3 / id3 /"
|
|
}
|
|
|
|
_getfacl_filter_id()
|
|
{
|
|
sed \
|
|
-e "s/user:$acl1/user:id1/" \
|
|
-e "s/user:$acl2/user:id2/" \
|
|
-e "s/user:$acl3/user:id3/" \
|
|
-e "s/group:$acl1/group:id1/" \
|
|
-e "s/group:$acl2/group:id2/" \
|
|
-e "s/group:$acl3/group:id3/" \
|
|
-e "s/: $acl1/: id1/" \
|
|
-e "s/: $acl2/: id2/" \
|
|
-e "s/: $acl3/: id3/"
|
|
}
|
|
|
|
# filtered ls
|
|
#
|
|
_acl_ls()
|
|
{
|
|
_ls_l -n $* | awk '{ print $1, $3, $4, $NF }' | _acl_filter_id
|
|
}
|
|
|
|
#
|
|
_acl_list()
|
|
{
|
|
_file1=$1
|
|
|
|
if [ $HOSTOS = "IRIX" ]; then
|
|
ls -dD $_file1 | _acl_filter_id
|
|
else
|
|
chacl -l $_file1 | _acl_filter_id
|
|
fi
|
|
}
|
|
|
|
# create an ACL with n ACEs in it
|
|
#
|
|
_create_n_aces()
|
|
{
|
|
let n=$1-4
|
|
acl='u::rwx,g::rwx,o::rwx,m::rwx' # 4 ace acl start
|
|
while [ $n -ne 0 ]; do
|
|
acl="$acl,u:$n:rwx"
|
|
let n=$n-1
|
|
done
|
|
echo $acl
|
|
}
|
|
|
|
# filter user ace names to user ids
|
|
#
|
|
_filter_aces()
|
|
{
|
|
tmp_file=`mktemp /tmp/ace.XXXXXX`
|
|
|
|
(_cat_passwd; _cat_group) > $tmp_file
|
|
|
|
$AWK_PROG -v tmpfile=$tmp_file '
|
|
BEGIN {
|
|
FS=":"
|
|
while ( getline <tmpfile > 0 ) {
|
|
idlist[$1] = $3
|
|
}
|
|
}
|
|
/^user/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
|
|
/^u/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
|
|
/^default:user/ { if ($3 in idlist) sub($3, idlist[$3]); print; next}
|
|
{print}
|
|
'
|
|
rm -f $tmp_file
|
|
}
|
|
|
|
_filter_aces_notypes()
|
|
{
|
|
tr '\[' '\012' | tr ']' '\012' | tr ',' '\012' | _filter_aces|\
|
|
sed -e 's/u:/user:/' -e 's/g:/group:/' -e 's/o:/other:/' -e 's/m:/mask:/'
|
|
}
|
|
|
|
_require_acls()
|
|
{
|
|
if [ ! -x /bin/chacl -a ! -x /usr/bin/chacl -a ! -x /sbin/chacl ]; then
|
|
_notrun "chacl command not found"
|
|
fi
|
|
|
|
#
|
|
# Test if chacl is able to list ACLs on the target filesystems. On really
|
|
# old kernels the system calls might not be implemented at all, but the
|
|
# more common case is that the tested filesystem simply doesn't support
|
|
# ACLs.
|
|
#
|
|
touch $TEST_DIR/syscalltest
|
|
chacl -l $TEST_DIR/syscalltest > $TEST_DIR/syscalltest.out 2>&1
|
|
cat $TEST_DIR/syscalltest.out >> $seqres.full
|
|
|
|
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
|
|
_notrun "kernel does not support ACLs"
|
|
fi
|
|
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
|
|
_notrun "ACLs not supported by this filesystem type: $FSTYP"
|
|
fi
|
|
|
|
rm -f $TEST_DIR/syscalltest.out
|
|
}
|
|
|
|
_list_acl()
|
|
{
|
|
file=$1
|
|
|
|
ls -dD $file | _acl_filter_id
|
|
}
|
|
|
|
_require_attrs()
|
|
{
|
|
[ -n $ATTR_PROG ] || _notrun "attr command not found"
|
|
[ -n $GETFATTR_PROG ] || _notrun "getfattr command not found"
|
|
[ -n $SETFATTR_PROG ] || _notrun "setfattr command not found"
|
|
|
|
#
|
|
# Test if chacl is able to write an attribute on the target filesystems.
|
|
# On really old kernels the system calls might not be implemented at all,
|
|
# but the more common case is that the tested filesystem simply doesn't
|
|
# support attributes. Note that we can't simply list attributes as
|
|
# various security modules generate synthetic attributes not actually
|
|
# stored on disk.
|
|
#
|
|
touch $TEST_DIR/syscalltest
|
|
attr -s "user.xfstests" -V "attr" $TEST_DIR > $TEST_DIR/syscalltest.out 2>&1
|
|
cat $TEST_DIR/syscalltest.out >> $seqres.full
|
|
|
|
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
|
|
_notrun "kernel does not support attrs"
|
|
fi
|
|
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
|
|
_notrun "attrs not supported by this filesystem type: $FSTYP"
|
|
fi
|
|
|
|
rm -f $TEST_DIR/syscalltest.out
|
|
}
|
|
|
|
_require_attr_v1()
|
|
{
|
|
_scratch_mkfs_xfs_supported -i attr=1 >/dev/null 2>&1 \
|
|
|| _notrun "attr v1 not supported on $SCRATCH_DEV"
|
|
}
|
|
|
|
# check if we support the noattr2 mount option
|
|
_require_noattr2()
|
|
{
|
|
_scratch_mkfs_xfs > /dev/null 2>&1 \
|
|
|| _fail "_scratch_mkfs_xfs failed on $SCRATCH_DEV"
|
|
_mount -o noattr2 $SCRATCH_DEV > /dev/null 2>&1 \
|
|
|| _notrun "noattr2 mount option not supported on $SCRATCH_DEV"
|
|
_scratch_unmount
|
|
}
|
|
|
|
# getfattr -R returns info in readdir order which varies from fs to fs.
|
|
# This sorts the output by filename
|
|
_sort_getfattr_output()
|
|
{
|
|
awk '{a[FNR]=$0}END{n = asort(a); for(i=1; i <= n; i++) print a[i]"\n"}' RS=''
|
|
}
|
|
|
|
# set maximum total attr space based on fs type
|
|
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" ]; then
|
|
MAX_ATTRS=1000
|
|
else # Assume max ~1 block of attrs
|
|
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
|
|
# user.attribute_XXX="value.XXX" is about 32 bytes; leave some overhead
|
|
let MAX_ATTRS=$BLOCK_SIZE/40
|
|
fi
|
|
|
|
export MAX_ATTRS
|
|
|
|
# Set max attr value size based on fs type
|
|
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" -o "$FSTYP" == "btrfs" ]; then
|
|
MAX_ATTRVAL_SIZE=64
|
|
else # Assume max ~1 block of attrs
|
|
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
|
|
# leave a little overhead
|
|
let MAX_ATTRVAL_SIZE=$BLOCK_SIZE-256
|
|
fi
|
|
|
|
export MAX_ATTRVAL_SIZE
|
|
# make sure this script returns success
|
|
/bin/true
|