Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp752879iog; Fri, 17 Jun 2022 12:49:42 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vZW9x37zwbv6w4XUCz0Mp8/E0yEOuP4jY8gmeM8D8MZsaLisCOnlB43G+ILj19JmgoLNBW X-Received: by 2002:a17:90b:4a46:b0:1e8:3d06:66c with SMTP id lb6-20020a17090b4a4600b001e83d06066cmr23519002pjb.6.1655495382344; Fri, 17 Jun 2022 12:49:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655495382; cv=none; d=google.com; s=arc-20160816; b=bSY43DdQ/kvA8U42+0OIEwhzgZ3GDpUpA3ArniZ3U6Zd/lqr+nqRCxhSnmTf/okBLF /jC6YMiqGGZ7w7y0q8L5J1AEQveQH/wtR2r6YJl2yLg0j3oSl/Uw0FpySLqG566a/Pzq aXX+b6NrNXz4NF1ChFah8wcMGRPwOK6lJfAGHRlsxy66h/97uW5FqsTT+o+9TY9NVzh7 QPqXBY5dEErlgrZbemgtXFIcTuaL5G9S9Z3MirH3MiH4KoILkk9jwTv7tJ7Y6QiXtZ4R 0bEBph1TJxbUu6tRfSk4GJUru5IRC/tfnaFhof9Vf81D6Q+U6Q+z5jGQkre3HI+g8wfc s9Cg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:cc :references:to:subject:dkim-signature; bh=EM4WuQB1JkdTQD8PY45ndgmJsVAA9Yd6J+wbPO6NpPg=; b=T5iUia+ikFm0unk9W7e0MsO9VbIVBbA7VC/7mLj9V+A0j1Yt916/CNPeXQryeSanmW g/WJx4q3qq21BhhyxsxDiBc9wmv48dtjD2aHDRm/lYJjx8/PNxXav/SpKWv6RrPOo8Bp 1R0i2ydK9QhOWUGCD23oEUbr+f+EXof1Gy0rhVnaKwIPXTn/0LxNMvom/MlbZ70L/en8 +YuJaKXDnUSsUFoGWq8C5jWpR8KfUYi6Dt5w/1llDv1HN6rZyqCE+pRUbOfHLBO3ca/c 4jGBZXQUnApalQu8N5EJ5MFNkvT53SLMOa1Uxi46Vmfhy0t0wLKu/k6kfX0SCWIyxNNR WlNQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=TcZ7SsxL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t12-20020a17090a4e4c00b001e893b0bd67si6463818pjl.182.2022.06.17.12.49.30; Fri, 17 Jun 2022 12:49:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=TcZ7SsxL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234849AbiFQTb5 (ORCPT + 99 others); Fri, 17 Jun 2022 15:31:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44136 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231304AbiFQTb4 (ORCPT ); Fri, 17 Jun 2022 15:31:56 -0400 Received: from mail-oa1-x2e.google.com (mail-oa1-x2e.google.com [IPv6:2001:4860:4864:20::2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E895D55498 for ; Fri, 17 Jun 2022 12:31:55 -0700 (PDT) Received: by mail-oa1-x2e.google.com with SMTP id 586e51a60fabf-1014b2752c1so6695095fac.11 for ; Fri, 17 Jun 2022 12:31:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=EM4WuQB1JkdTQD8PY45ndgmJsVAA9Yd6J+wbPO6NpPg=; b=TcZ7SsxLlJOf8PjxVePN9jg050m+yfM+JWoqwMqqcRQognupSR97SauP4yE0s235yb ddqXUpJ2jmqQ2cPn0LYI/eUMXwGCnQYZGxq09p1VvIOFWOKnXPLd6CCuPMPvgPP+a5Of YbzaWxRWjHeubq5L+RnC2r7UE+g4xISk26HfM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=EM4WuQB1JkdTQD8PY45ndgmJsVAA9Yd6J+wbPO6NpPg=; b=Ncwq4p+iUG6DeX3Vp3bCovN2zrBIC8ROAjSnTgzHTE9zSKILiI/rwE7r0kGI27+cj7 cweQtrkqgNI4Fj3p2WUftxGUMuozXoJJnIs+fFjeBXpZHnzr6r7Ab6mpF+UKXxkC5WOa RqI2w/H63tDii8jDbpasQ2tmodu/PZffuYgYHniIZ3vpHRhIKmeua3FR0qWXFxuxSE4m pDLIa8DgHnnHbleY3RxNUbidoTX23TaJAZ5wXOobFURNe4mW6+NLYHdjtZTI/vO1vBPN ZKdnaT9LTboJznSlonpHLsyFGzrgLIaaklG7zOzfJM/K1yt/of0E8fBaPSl39CB7dILG 1DpA== X-Gm-Message-State: AJIora/ScRXSd+qRmI69Uw3o4LtVMN2aGp7krfOU00YdNnagOhTUCiXc 9zhd/9KcU8QIMzbXxQKYP7D+dg== X-Received: by 2002:a05:6870:6097:b0:e1:a94d:9a38 with SMTP id t23-20020a056870609700b000e1a94d9a38mr6481520oae.191.1655494314848; Fri, 17 Jun 2022 12:31:54 -0700 (PDT) Received: from [192.168.1.128] ([38.15.45.1]) by smtp.gmail.com with ESMTPSA id w4-20020a9d3604000000b0060aeccf6b44sm2944399otb.41.2022.06.17.12.31.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 17 Jun 2022 12:31:54 -0700 (PDT) Subject: Re: [PATCH V3] selftests/vm: Add protection_keys tests to run_vmtests To: Kalpana Shetty , akpm@linux-foundation.org, shuah@kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220617111019.476-1-kalpana.shetty@amd.com> Cc: Shuah Khan From: Shuah Khan Message-ID: Date: Fri, 17 Jun 2022 13:31:52 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20220617111019.476-1-kalpana.shetty@amd.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/17/22 5:10 AM, Kalpana Shetty wrote: > Adding "protected_keys" tests to "run_vmtests.sh" would help out to run all VM related tests > from a single shell script. > > Signed-off-by: Kalpana Shetty > --- > Changes in V3: > Shuah Khan's review comments incorporated, added protection_keys binary check. > > tools/testing/selftests/vm/run_vmtests.sh | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/tools/testing/selftests/vm/run_vmtests.sh b/tools/testing/selftests/vm/run_vmtests.sh > index 41fce8bea929..b19c6b1b84c4 100755 > --- a/tools/testing/selftests/vm/run_vmtests.sh > +++ b/tools/testing/selftests/vm/run_vmtests.sh > @@ -179,4 +179,15 @@ run_test ./ksm_tests -N -m 1 > # KSM test with 2 NUMA nodes and merge_across_nodes = 0 > run_test ./ksm_tests -N -m 0 > > +# protection_keys tests > +if ./protection_keys_32 &> /dev/null > +then > + run_test ./protection_keys_32 > +fi > + > +if ./protection_keys_64 &> /dev/null > +then > + run_test ./protection_keys_64 > +fi > + > exit $exitcode > Why not use file test operators. -x works for this case. There is no need to run attempt to run the test. thanks, -- Shuah