1 # This file is sourced by init.sh, *before* its initialization.
3 # Copyright (C) 2010-2012 Free Software Foundation, Inc.
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18 # This goes hand in hand with the "exec 9>&2;" in tests/Makefile.am's
19 # TESTS_ENVIRONMENT definition.
22 # Having an unsearchable directory in PATH causes execve to fail with EACCES
23 # when applied to an unresolvable program name, contrary to the desired ENOENT.
24 # Avoid the problem by rewriting PATH to exclude unsearchable directories.
25 # Also, if PATH lacks /sbin and/or /usr/sbin, append it/them.
28 # FIXME: remove double quotes around $IFS when all tests use init.sh.
29 # They constitute a work-around for a bug in FreeBSD 8.1's /bin/sh.
30 local saved_IFS="$IFS"
39 test -z "$d" && d1=. || d1=$d
40 if ls -d "$d1/." > /dev/null 2>&1; then
41 new_path="$new_path$colon$d"
46 for d in /sbin /usr/sbin ; do
49 *) new_path="$new_path:$d" ;;
60 test "$INT_MAX" || fatal_ "running getlimits"
65 getfacl --version < /dev/null > /dev/null 2>&1 \
66 && setfacl --version < /dev/null > /dev/null 2>&1 \
67 || skip_ "This test requires getfacl and setfacl."
69 id -u bin > /dev/null 2>&1 \
70 || skip_ "This test requires a local user named bin."
75 test $# = 1 || framework_failure_
76 df --local "$1" >/dev/null 2>&1
81 local mount_list_fail='cannot read table of mounted file systems'
82 df 2>&1 | grep -F "$mount_list_fail" >/dev/null &&
83 skip_ "$mount_list_fail"
90 skip_ "This test must be run on a local file system."
93 # Skip this test if we're not in SELinux "enforcing" mode.
94 require_selinux_enforcing_()
96 test "$(getenforce)" = Enforcing \
97 || skip_ "This test is useful only with SELinux in Enforcing mode."
100 require_openat_support_()
102 # Skip this test if your system has neither the openat-style functions
103 # nor /proc/self/fd support with which to emulate them.
104 test -z "$CONFIG_HEADER" \
105 && skip_ 'internal error: CONFIG_HEADER not defined'
108 grep '^#define HAVE_OPENAT' "$CONFIG_HEADER" > /dev/null && _skip=no
109 test -d /proc/self/fd && _skip=no
110 if test $_skip = yes; then
111 skip_ 'this system lacks openat support'
117 local ulimit_works=yes
118 # Expect to be able to exec a program in 10MiB of virtual memory,
119 # (10MiB is usually plenty, but valgrind-wrapped date requires 19000KiB,
120 # so allow more in that case)
121 # but not in 20KiB. I chose "date". It must not be a shell built-in
122 # function, so you can't use echo, printf, true, etc.
123 # Of course, in coreutils, I could use $top_builddir/src/true,
124 # but this should be able to work for other projects, too.
126 case $(printenv LD_PRELOAD) in */valgrind/*) vm=22000;; *) vm=10000;; esac
128 ( ulimit -v $vm; date ) > /dev/null 2>&1 || ulimit_works=no
129 ( ulimit -v 20; date ) > /dev/null 2>&1 && ulimit_works=no
131 test $ulimit_works = no \
132 && skip_ "this shell lacks ulimit support"
135 require_readable_root_()
137 test -r / || skip_ "/ is not readable"
140 # Skip the current test if strace is not available or doesn't work
141 # with the named syscall. Usage: require_strace_ unlink
144 test $# = 1 || framework_failure_
146 strace -V < /dev/null > /dev/null 2>&1 ||
147 skip_ 'no strace program'
149 strace -qe "$1" echo > /dev/null 2>&1 ||
150 skip_ 'strace -qe "'"$1"'" does not work'
152 # On some linux/sparc64 systems, strace works fine on 32-bit executables,
153 # but prints only one line of output for every 64-bit executable.
154 strace -o log-help ls --help >/dev/null || framework_failure_
155 n_lines_help=$(wc -l < log-help)
157 if test $n_lines_help = 0 || test $n_lines_help = 1; then
158 skip_ 'strace produces no more than one line of output'
162 # Skip the current test if valgrind doesn't work.
165 valgrind --help >/dev/null || skip_ "requires valgrind"
170 setfacl -m user::rwx . \
171 || skip_ "setfacl does not work on the current file system"
174 # Require a controlling input 'terminal'.
175 require_controlling_input_terminal_()
177 tty -s || have_input_tty=no
178 test -t 0 || have_input_tty=no
179 if test "$have_input_tty" = no; then
180 skip_ 'requires controlling input terminal
181 This test must have a controlling input "terminal", so it may not be
182 run via "batch", "at", or "ssh". On some systems, it may not even be
183 run in the background.'
191 case " $built_programs " in
193 *) echo "$i: not built" 1>&2; skip_=yes ;;
197 test $skip_ = yes && skip_ "required program(s) not built"
200 require_file_system_bytes_free_()
203 local expr=$(stat -f --printf "$req / %S <= %a" .)
204 $AWK "BEGIN{ exit !($expr) }" \
205 || skip_ "this test needs at least $req bytes of free space"
210 # Make sure id -u succeeds.
212 || { echo "$0: cannot run 'id -u'" 1>&2; return 1; }
214 # Make sure it gives valid output.
218 echo "$0: invalid output ('$my_uid') from 'id -u'" 1>&2
224 get_process_status_()
226 sed -n '/^State:[ ]*\([[:alpha:]]\).*/s//\1/p' /proc/$1/status
229 # Convert an ls-style permission string, like drwxr----x and -rw-r-x-wx
230 # to the equivalent chmod --mode (-m) argument, (=,u=rwx,g=r,o=x and
231 # =,u=rw,g=rx,o=wx). Ignore ACLs.
236 *) echo "$0: wrong number of arguments" 1>&2
237 echo "Usage: $0 ls-style-mode-string" 1>&2
242 [ld-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxtT-]) ;;
243 [ld-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxtT-][+.]) ;;
244 *) echo "$0: invalid mode string: $rwx" 1>&2; return;;
247 # Perform these conversions:
252 # The 'T' and 't' ones are only valid for 'other'.
253 s='s/S/@/;s/s/x@/;s/@/s/'
254 t='s/T/@/;s/t/x@/;s/@/t/'
256 u=$(echo $rwx|sed 's/^.\(...\).*/,u=\1/;s/-//g;s/^,u=$//;'$s)
257 g=$(echo $rwx|sed 's/^....\(...\).*/,g=\1/;s/-//g;s/^,g=$//;'$s)
258 o=$(echo $rwx|sed 's/^.......\(...\).*/,o=\1/;s/-//g;s/^,o=$//;'$s';'$t)
262 # Set the global variable stty_reversible_ to a space-separated list of the
263 # reversible settings from stty.c. stty_reversible_ also starts and ends
265 stty_reversible_init_()
267 # Pad start with one space for the first option to match in query function.
268 stty_reversible_=' '$(perl -lne '/^ *{"(.*?)",.*\bREV\b/ and print $1' \
269 "$abs_top_srcdir"/src/stty.c | tr '\n' ' ')
270 # Ensure that there are at least 62, i.e., so we're alerted if
271 # reformatting the source empties the list.
272 test 62 -le $(echo "$stty_reversible_"|wc -w) \
273 || framework_failure_ "too few reversible settings"
276 # Test whether $1 is one of stty's reversible options.
277 stty_reversible_query_()
279 case $stty_reversible_ in
281 framework_failure_ "stty_reversible_init_() not called?";;
292 root) skip_ must be run as root ;;
293 non-root) skip_ must be run as non-root ;;
300 # When in a chroot of an SELinux-enabled system, but with a mock-simulated
301 # SELinux-*disabled* system, recognize that SELinux is disabled system wide:
302 grep 'selinuxfs$' /proc/filesystems > /dev/null \
303 || skip_ "this system lacks SELinux support"
305 # Independent of whether SELinux is enabled system-wide,
306 # the current file system may lack SELinux support.
309 skip_ "this system (or maybe just" \
310 "the current file system) lacks SELinux support"
317 if test "$RUN_VERY_EXPENSIVE_TESTS" != yes; then
318 skip_ 'very expensive: disabled by default
319 This test is very expensive, so it is disabled by default.
320 To run it anyway, rerun make check with the RUN_VERY_EXPENSIVE_TESTS
321 environment variable set to yes. E.g.,
323 env RUN_VERY_EXPENSIVE_TESTS=yes make check
325 or use the shortcut target of the toplevel Makefile,
327 make check-very-expensive
334 if test "$RUN_EXPENSIVE_TESTS" != yes; then
335 skip_ 'expensive: disabled by default
336 This test is relatively expensive, so it is disabled by default.
337 To run it anyway, rerun make check with the RUN_EXPENSIVE_TESTS
338 environment variable set to yes. E.g.,
340 env RUN_EXPENSIVE_TESTS=yes make check
342 or use the shortcut target of the toplevel Makefile,
349 # Test whether we can run our just-built rm setuidgid-to-root,
350 # i.e., that $NON_ROOT_USERNAME has access to the build directory.
351 setuidgid_has_perm_()
354 setuidgid $NON_ROOT_USERNAME env PATH="$PATH" rm --version |
357 case ":$rm_version:" in
358 :$PACKAGE_VERSION:) ;;
365 uid_is_privileged_ || skip_ "must be run as root"
366 NON_ROOT_USERNAME=${NON_ROOT_USERNAME=nobody}
367 NON_ROOT_GROUP=${NON_ROOT_GROUP=$(id -g $NON_ROOT_USERNAME)}
369 # When the current test invokes setuidgid, call setuidgid_has_perm_
370 # to check for a common problem.
371 grep '^[ ]*setuidgid' "../$0" \
372 && { setuidgid_has_perm_ \
373 || skip_ "user $NON_ROOT_USERNAME lacks execute permissions"; }
376 skip_if_root_() { uid_is_privileged_ && skip_ "must be run as non-root"; }
378 # Set 'groups' to a space-separated list of at least two groups
379 # of which the user is a member.
380 require_membership_in_two_groups_()
382 test $# = 0 || framework_failure_
384 groups=${COREUTILS_GROUPS-$( (id -G || /usr/xpg4/bin/id -G) 2>/dev/null)}
387 *) skip_ 'requires membership in two groups
388 this test requires that you be a member of more than one group,
389 but running 'id -G'\'' either failed or found just one. If you really
390 are a member of at least two groups, then rerun this test with
391 COREUTILS_GROUPS set in your environment to the space-separated list
392 of group names or numbers. E.g.,
394 env COREUTILS_GROUPS='\''users cdrom'\'' make check
401 # Is /proc/$PID/status supported?
402 require_proc_pid_status_()
407 grep '^State:[ ]*[S]' /proc/$pid/status > /dev/null 2>&1 ||
408 skip_ "/proc/$pid/status: missing or 'different'"
412 # Return nonzero if the specified path is on a file system for
413 # which FIEMAP support exists. Note some file systems (like ext3 and btrfs)
414 # only support FIEMAP for files, not directories.
417 if ! python < /dev/null; then
418 warn_ 'fiemap_capable_: python missing: assuming not fiemap capable'
421 python "$abs_srcdir"/tests/fiemap-capable "$@"
424 # Skip the current test if "." lacks d_type support.
425 require_dirent_d_type_()
428 || skip_ python missing: assuming no d_type support
430 # Manually exclude xfs, since the test would mistakenly report
431 # that it has d_type support: d_type == DT_DIR for "." and "..",
432 # but DT_UNKNOWN for all other types.
433 df -x xfs . > /dev/null 2>&1 \
434 || skip_ requires d_type support
436 python "$abs_srcdir"/tests/d_type-check \
437 || skip_ requires d_type support
440 # Skip the current test if we lack Perl.
444 $PERL -e 'use warnings' > /dev/null 2>&1 \
445 || skip_ 'configure did not find a usable version of Perl'
448 # Does the current (working-dir) file system support sparse files?
449 require_sparse_support_()
451 test $# = 0 || framework_failure_
452 # Test whether we can create a sparse file.
453 # For example, on Darwin6.5 with a file system of type hfs, it's not possible.
454 # NTFS requires 128K before a hole appears in a sparse file.
456 dd bs=1 seek=128K of=$t < /dev/null 2> /dev/null
460 if test $kb_size -ge 128; then
461 skip_ 'this file system does not support sparse files'
467 test $# = 1 || framework_failure_
468 if ! mkfifo "$1"; then
469 # Make an exception of this case -- usually we interpret framework-creation
470 # failure as a test failure. However, in this case, when running on a SunOS
471 # system using a disk NFS mounted from OpenBSD, the above fails like this:
472 # mkfifo: cannot make fifo 'fifo-10558': Not owner
473 skip_ 'unable to create a fifo'
477 # Disable the current test if the working directory seems to have
478 # the setgid bit set.
481 setgid_tmpdir=setgid-$$
482 (umask 77; mkdir $setgid_tmpdir)
483 perms=$(stat --printf %A $setgid_tmpdir)
487 drwxr-xr-x);; # Windows98 + DJGPP 2.03
488 *) skip_ 'this directory has the setgid bit set';;
492 skip_if_mcstransd_is_running_()
494 test $# = 0 || framework_failure_
496 # When mcstransd is running, you'll see only the 3-component
497 # version of file-system context strings. Detect that,
498 # and if it's running, skip this test.
499 __ctx=$(stat --printf='%C\n' .) || framework_failure_
501 *:*:*:*) ;; # four components is ok
502 *) # anything else probably means mcstransd is running
503 skip_ "unexpected context '$__ctx'; turn off mcstransd" ;;
507 # Skip the current test if umask doesn't work as usual.
508 # This test should be run in the temporary directory that ends
509 # up being removed via the trap commands.
510 working_umask_or_skip_()
515 perms=$(ls -l file1 file2 | sed 's/ .*//' | uniq)
520 '*) skip_ 'your build directory has unusual umask semantics'
524 # Retry a function requiring a sufficient delay to _pass_
525 # using a truncated exponential backoff method.
526 # Example: retry_delay_ dd_reblock_1 .1 6
527 # This example will call the dd_reblock_1 function with
528 # an initial delay of .1 second and call it at most 6 times
529 # with a max delay of 3.2s (doubled each time), or a total of 6.3s
530 # Note ensure you do _not_ quote the parameter to GNU sleep in
531 # your function, as it may contain separate values that sleep
532 # needs to accumulate.
540 local num_sleeps=$attempt
542 while test $attempt -le $max_n_tries; do
543 local delay=$($AWK -v n=$num_sleeps -v s="$init_delay" \
544 'BEGIN { print s * n }')
545 "$test_func" "$delay" && { time_fail=0; break; } || time_fail=1
546 attempt=$(expr $attempt + 1)
547 num_sleeps=$(expr $num_sleeps '*' 2)
549 test "$time_fail" = 0
552 # Call this with a list of programs under test immediately after
556 if test "$VERBOSE" = yes; then
564 # Are we running on GNU/Hurd?
567 test "$(uname)" = GNU \
568 || skip_ 'not running on GNU/Hurd'