Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1750231ybg; Sat, 19 Oct 2019 01:41:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqw9k8K19xVG3UD793Nw6Jo0NHgtkclR9+mHSQ2hIFv3EtxPa4aHn35j3GfkiITsZpuMDCmz X-Received: by 2002:a17:906:b781:: with SMTP id dt1mr12435766ejb.221.1571474508610; Sat, 19 Oct 2019 01:41:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571474508; cv=none; d=google.com; s=arc-20160816; b=A8xn9b+D0qzk2E93JDqHMgksYq8Mgws7touwIxVoQHNhm6XUgcdZzKdFtw5MwahLDB GMzdouJSCJWzkXJqgu+PCX8YwNrCD6ibLKO9g0zACKTtNkBsm2HXIKnGeZZ7q6NyDBTH 88PbDXl4fbq/bq2uJ/UR41pjAE5GgVdutnMBTzC74zdZmFACjwXNfvdIWP7GhzNwca5U 7Kfmyerl/DXw3gCvKkUuR7IJe9HLzCad99QX5cODAGPjUYc3mpvq40tl9WYN2YrRKpU1 b+JOP0mWHCND7jGrbb2FgJYDy3WPKXg82WuevHxU/6jQO/1BISOCVrtBAwwtomvf/eh0 roAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=motsc19EQOB2BsNPP/Zl52k5PH0CO29sc/5rSMpjWM0=; b=l2x60D9cXY01hvqAWhNSKlclqwanTfAly60oOYDJeDB00xo5PQSi8sxTihyjqNTVKj xpuVc7OI/1PsITte2O380379fRo9oPHpCVRGtMqt1hAI83h7SoMJEoAKfsMd9fkadjtL PWWhpJ8jj9C1IeIEwqB/QJB77wXPgNJqEQxDhvyy6eUQPOWXVgrPgixSPz5a2wTVhLXV ZQc8e++q8lCSf+4KpiI7HL4SdsYH8802QLI2mQKggPafW/WygTTWo8Rky6DInr0WLapU SescgzmgoyuqUIqXWDslop+1sXq1+kI/7PzwegFdH85Vm39bsl9trsY95uICoToSrddl 8nUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 34si6279627edk.26.2019.10.19.01.41.25; Sat, 19 Oct 2019 01:41:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437308AbfJRQZq (ORCPT + 99 others); Fri, 18 Oct 2019 12:25:46 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:59526 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2395015AbfJRQZq (ORCPT ); Fri, 18 Oct 2019 12:25:46 -0400 Received: from callcc.thunk.org (guestnat-104-133-0-98.corp.google.com [104.133.0.98] (may be forged)) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x9IGPKlL018043 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Oct 2019 12:25:20 -0400 Received: by callcc.thunk.org (Postfix, from userid 15806) id D1513420458; Fri, 18 Oct 2019 12:25:19 -0400 (EDT) Date: Fri, 18 Oct 2019 12:25:19 -0400 From: "Theodore Y. Ts'o" To: Brendan Higgins Cc: shuah@kernel.org, john.johansen@canonical.com, jmorris@namei.org, serge@hallyn.com, keescook@chromium.org, alan.maguire@oracle.com, yzaikin@google.com, davidgow@google.com, mcgrof@kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, kunit-dev@googlegroups.com, linux-kselftest@vger.kernel.org, Mike Salvatore Subject: Re: [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack Message-ID: <20191018162519.GH21137@mit.edu> References: <20191018001816.94460-1-brendanhiggins@google.com> <20191018004307.GA95597@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191018004307.GA95597@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 17, 2019 at 05:43:07PM -0700, Brendan Higgins wrote: > > +config SECURITY_APPARMOR_TEST > > + bool "Build KUnit tests for policy_unpack.c" > > + default n > > + depends on KUNIT && SECURITY_APPARMOR > > Ted, here is an example where doing select on direct dependencies is > tricky because SECURITY_APPARMOR has a number of indirect dependencies. Well, that could be solved by adding a select on all of the indirect dependencies. I did get your point about the fact that we could have cases where the indirect dependencies might conflict with one another. That's going to be a tough situation regardless of whether we have a sat-solver or a human who has to struggle with that situation. It's also going to be a bit sad because it means that we won't be able to create a single config that could be used to run all the kunit tests when a user pushes a change to a Gerrit server for review. :-/ I suppose that if we use a strict definition of "unit tests", and we assume that all of the tests impacted by a change in foo/bar/baz.c will be found in foo/bar/baz-test.c, or maybe foo/bar/*-test.c, we can automate the generation of the kunitconfig file, perhaps? The other sad bit about having mutually exclusive config options is that we can't easily "run all KUinit tests" for some kind of test spinner or zero-day bot. I'm not sure there's a good solution to that issue, though. - Ted