[PATCH v7 1/1] selftests/landlock: skip overlayfs test when kernel not support it

Mickaël Salaün mic at digikod.net
Mon Jan 9 16:05:40 UTC 2023


Please refresh with clang-format-14.

You might want to update the subject to:
selftests/landlock: Skip overlayfs tests when not supported


On 29/12/2022 22:41, Guenter Roeck wrote:
> On Thu, Dec 29, 2022 at 1:02 PM <jeffxu at chromium.org> wrote:
>>
>> From: Jeff Xu <jeffxu at google.com>
>>
>> Overlayfs can be disabled in kernel config, causing related tests to
>> fail. Add check for overlayfs’s supportability at runtime,
>> so we can call SKIP() when needed.
>>
>> Signed-off-by: Jeff Xu <jeffxu at google.com>
> 
> Reviewed-by: Guenter Roeck <groeck at chromium.org>
> 
>> ---
>>   tools/testing/selftests/landlock/fs_test.c | 51 ++++++++++++++++++++++
>>   1 file changed, 51 insertions(+)
>>
>> diff --git a/tools/testing/selftests/landlock/fs_test.c b/tools/testing/selftests/landlock/fs_test.c
>> index 21a2ce8fa739..34095fe2419b 100644
>> --- a/tools/testing/selftests/landlock/fs_test.c
>> +++ b/tools/testing/selftests/landlock/fs_test.c
>> @@ -11,6 +11,7 @@
>>   #include <fcntl.h>
>>   #include <linux/landlock.h>
>>   #include <sched.h>
>> +#include <stdio.h>
>>   #include <string.h>
>>   #include <sys/capability.h>
>>   #include <sys/mount.h>
>> @@ -62,6 +63,7 @@ static const char dir_s3d1[] = TMP_DIR "/s3d1";
>>   static const char dir_s3d2[] = TMP_DIR "/s3d1/s3d2";
>>   static const char dir_s3d3[] = TMP_DIR "/s3d1/s3d2/s3d3";
>>
>> +static const char proc_filesystems[] = "/proc/filesystems";

You can inline this string in the fopen() call for now.


>>   /*
>>    * layout1 hierarchy:
>>    *
>> @@ -169,6 +171,43 @@ static int remove_path(const char *const path)
>>          return err;
>>   }
>>
>> +static bool fgrep(FILE *inf, const char *str)
>> +{
>> +       char line[32];
>> +       int slen = strlen(str);
>> +
>> +       while (!feof(inf)) {
>> +               if (!fgets(line, sizeof(line), inf))
>> +                       break;
>> +               if (strncmp(line, str, slen))
>> +                       continue;
>> +
>> +               return true;
>> +       }
>> +
>> +       return false;
>> +}
>> +
>> +static bool supports_overlayfs(void)

You can move this two functions just before mkdir_parents().


>> +{
>> +       bool res;
>> +       FILE *inf = fopen(proc_filesystems, "r");
>> +
>> +       /*
>> +        * If fopen failed, return supported.
>> +        * This help detect missing file (shall not
>> +        * happen).

You can make this comment fit in two lines, with 80 columns.

>> +        */
>> +       if (!inf)
>> +               return true;
>> +
>> +       res = fgrep(inf, "nodev\toverlay\n");
>> +       fclose(inf);
>> +
>> +       return res;
>> +}
>> +
>> +
>>   static void prepare_layout(struct __test_metadata *const _metadata)
>>   {
>>          disable_caps(_metadata);
>> @@ -3404,6 +3443,9 @@ FIXTURE(layout2_overlay) {};
>>
>>   FIXTURE_SETUP(layout2_overlay)
>>   {
>> +       if (!supports_overlayfs())
>> +               SKIP(return, "overlayfs is not supported");
>> +
>>          prepare_layout(_metadata);
>>
>>          create_directory(_metadata, LOWER_BASE);
>> @@ -3440,6 +3482,9 @@ FIXTURE_SETUP(layout2_overlay)
>>
>>   FIXTURE_TEARDOWN(layout2_overlay)
>>   {
>> +       if (!supports_overlayfs())
>> +               SKIP(return, "overlayfs is not supported");

This looks good to me except the multiple supports_overlayfs() calls. 
Only the FIXTURE_SETUP() should be required. I guess some modifications 
of kselftest_harness.h are need to support that. I'd like to avoid 
touching TEST_F_FORK() which should be part of kselftest_harness.h


>> +
>>          EXPECT_EQ(0, remove_path(lower_do1_fl3));
>>          EXPECT_EQ(0, remove_path(lower_dl1_fl2));
>>          EXPECT_EQ(0, remove_path(lower_fl1));
>> @@ -3471,6 +3516,9 @@ FIXTURE_TEARDOWN(layout2_overlay)
>>
>>   TEST_F_FORK(layout2_overlay, no_restriction)
>>   {
>> +       if (!supports_overlayfs())
>> +               SKIP(return, "overlayfs is not supported");
>> +
>>          ASSERT_EQ(0, test_open(lower_fl1, O_RDONLY));
>>          ASSERT_EQ(0, test_open(lower_dl1, O_RDONLY));
>>          ASSERT_EQ(0, test_open(lower_dl1_fl2, O_RDONLY));
>> @@ -3634,6 +3682,9 @@ TEST_F_FORK(layout2_overlay, same_content_different_file)
>>          size_t i;
>>          const char *path_entry;
>>
>> +       if (!supports_overlayfs())
>> +               SKIP(return, "overlayfs is not supported");
>> +
>>          /* Sets rules on base directories (i.e. outside overlay scope). */
>>          ruleset_fd = create_ruleset(_metadata, ACCESS_RW, layer1_base);
>>          ASSERT_LE(0, ruleset_fd);
>> --
>> 2.39.0.314.g84b9a713c41-goog
>>



More information about the Linux-security-module-archive mailing list