Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp762599iog; Fri, 24 Jun 2022 13:36:25 -0700 (PDT) X-Google-Smtp-Source: AGRyM1v/rP6FXl7kkO5Yl7E9mDLxO0kRn0z/OO6avUuBYZR/eX2LbnOqEpyqp0e7S+C5wtJvbqsw X-Received: by 2002:a05:6a00:2187:b0:50c:ef4d:ef3b with SMTP id h7-20020a056a00218700b0050cef4def3bmr928184pfi.83.1656102985230; Fri, 24 Jun 2022 13:36:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656102985; cv=none; d=google.com; s=arc-20160816; b=Y11oW/g7IWKyCDCxtCU8UZJxLf10FTkl6m+hEeTEYyjEiQ71yAaOTiusjEXYcTvL9c Q6EJoLT8MgxMGBoov6RQwG00t8ReKWu7MqJ3U0Ja7OXwJb26uNVrvTcT+vG6cItGrMLR NNhjdPl/ty7qFR+Iwuaj/yR5l5L5Yr9Rr6j7yUJz+a0MV+ux4dWjXfrbV/6bmGko6YkN Pkn5Ri3TCGGF+kOJpR5efvcjklegUPgsppEQtpQdzLviZ2peMg2ZqNB17L4emLZdmJHL AfA2IPGZODsBIz1ZsJzZ3ybJbNcXSFGxFTXZF9oeCOneb3XEoNYQNEcsLfX/6dke1bw3 3eCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=2msEZ0dVDXcDj5L8hyt44H9zZbx/b7DPwUiOodMKn/A=; b=zwCU+G5ih4hMz4JDEi3ZxDfQqD+H+uaYYf31tTnfcDUqjRkrfuRGjcqhzIxhfelKdt 20ZZy8S9hBzw6I9vH9edX2q9eq3E7v1lHm7ZIfJVVv6tHqh7p4XMHYCKQ1BQVWOAk+8t TomU5YX/LDY/++70ZgQpZaeVD3fiC1uTnspd/zmYkfZfdCWMoprS5FV9MdUhWHOfHfUg Aw0/Bpb8HbneIoSsCcoL3es8VLa00cnFHBJ6sAwQbk6L2rSnyRTsyT+QZ83ourYFkoBp S71dE5lODgtvgVI/Dp4dH+HuSzjP3SCnJj32HW4qvxbHF4owvN/MliSfYwSq13Mq9968 U0WQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=USSsVe2G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y19-20020aa79433000000b005254e98b56csi3797954pfo.153.2022.06.24.13.36.12; Fri, 24 Jun 2022 13:36:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=USSsVe2G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229893AbiFXU33 (ORCPT + 99 others); Fri, 24 Jun 2022 16:29:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41190 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229469AbiFXU32 (ORCPT ); Fri, 24 Jun 2022 16:29:28 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2AC4522F4; Fri, 24 Jun 2022 13:29:27 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 67582B82C0F; Fri, 24 Jun 2022 20:29:26 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6D6E6C34114; Fri, 24 Jun 2022 20:29:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1656102565; bh=O++sAY0uz8ogMjYc9G/jGVGDKWn+wwGZ/0EKb1rWQcc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=USSsVe2Gp4KnH6BmgaGjWm1xE1Ni0ksS9ro+zQM5XChfpdO2sNjxifbkyScj7rts5 E08gHTaTSHibL+a5BbG66vvZxvjI7FJBuFilDB5e7EY41HM+nT+bYlAh0IMuNcqjIg SrKAVw1dkCGo2T8+FELqVNrdVspxBclXyji85wEFHH30vo9N6HTKg1XpZahOKL1dyV Tar27HlDdhC6C32uy5Gjj9mw2EwMV20t5+xDQu/Okjst+85uyKZV0jI5Lqi6vjBuvG Z/jNghpWswgUrgmYA3raIspBBitHiOzTTrO8b3x4YmHjGfDfzbE3W1SaXgDyD/ij9V nszkQvCHCGhTQ== From: SeongJae Park To: Gautam Cc: sj@kernel.org, shuah@kernel.org, damon@lists.linux.dev, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] kselftests/damon: add support for checking secureboot status Date: Fri, 24 Jun 2022 20:29:21 +0000 Message-Id: <20220624202921.80867-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220624195239.7293-1-gautammenghani201@gmail.com> References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Gautam, On Sat, 25 Jun 2022 01:22:39 +0530 Gautam wrote: > The kernel is in lockdown mode when secureboot is enabled and hence > debugfs cannot be used. But the error printed after running tests does > not indicate this currently: > > >TAP version 13 > >1..6 > ># selftests: damon: debugfs_attrs.sh > ># cat: /sys/kernel/debug/damon/monitor_on: Operation not permitted > ># _debugfs_common.sh: line 48: [: =: unary operator expected > ># cat: /sys/kernel/debug/damon/attrs: Operation not permitted > ># _debugfs_common.sh: line 11: /sys/kernel/debug/damon/attrs: Operation > > not permitted > ># writing 1 2 3 4 5 to /sys/kernel/debug/damon/attrs doesn't return 0 > ># expected because: valid input > ># _debugfs_common.sh: line 16: /sys/kernel/debug/damon/attrs: Operation > > not permitted > >not ok 1 selftests: damon: debugfs_attrs.sh # exit=1 > > > After adding the check for secureboot, the output is as follows: > > >TAP version 13 > >1..6 > ># selftests: damon: debugfs_attrs.sh > ># debugfs cannot work with secureboot enabled > >not ok 1 selftests: damon: debugfs_attrs.sh # exit=1 > > > Signed-off-by: Gautam > --- > tools/testing/selftests/damon/_chk_dependency.sh | 10 ++++++++++ > 1 file changed, 10 insertions(+) > mode change 100644 => 100755 tools/testing/selftests/damon/_chk_dependency.sh > > diff --git a/tools/testing/selftests/damon/_chk_dependency.sh b/tools/testing/selftests/damon/_chk_dependency.sh > old mode 100644 > new mode 100755 > index 0189db81550b..6e45c1fe230e > --- a/tools/testing/selftests/damon/_chk_dependency.sh > +++ b/tools/testing/selftests/damon/_chk_dependency.sh > @@ -26,3 +26,13 @@ do > exit 1 > fi > done > + > +secureboot_error="Operation not permitted" > +for f in attrs target_ids monitor_on > +do > + status=$( cat "$DBGFS/$f" 2>&1 ) > + if [ "${status#*$secureboot_error}" != "$status" ]; then > + echo "debugfs cannot work with secureboot enabled" I think the check makes sense, but I think there could be more reasons for the read error other than secure boot. How about making the error mesage more clear for the error case and our guess? E.g., "permission for reading $DBGFS/$f denied; maybe secureboot enabled?" > + exit 1 This is not a test failure but we are just skipping the test as running the test here makes no sense. Hence I think '$ksft_skip' could be a better return code. Thanks, SJ > + fi > +done > -- > 2.36.1