Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp1687743ybj; Wed, 6 May 2020 03:29:07 -0700 (PDT) X-Google-Smtp-Source: APiQypKzL/KGKXctsfZ7+dWP2tnpuvxXn2dLb38ax6GmR2371Tl+2JPAp6g5yo5UyvjpvHE0zKSg X-Received: by 2002:a17:906:2b43:: with SMTP id b3mr6263439ejg.231.1588760946850; Wed, 06 May 2020 03:29:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588760946; cv=none; d=google.com; s=arc-20160816; b=uBU3LLTuxDy05bl+l8CC3/kn9yf3/tYOoSnnGzLModvBeruJZmMebs3V4s80wPdJaE /4PLMpiLYb0x+T1PmrFAfaHnT4Vm/yTX/ds0FtMKPcK2PBfR7XbiDItwSHZia/GCVMU7 iKBhQkIECw4awRPxPHSSQpm44eXKLe49iWYKbCGMjA0aIBbBM7nqrL1F3tHVlwsmC6LK rtXFlwHWAxE0NGU/mGndBWRI38bR0p3pnprWzWMSDIyPE3HvqIMt86e06HtCMDk5zdhw w5bcuGyuQVWKgFV9ooAwaSfLJ+LhdO0YIXrSS/nRPthQ1QTQxDozC2UtbYrLDUaxoYDJ Vy1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=JJrxKPKyOXug7kU6AgNPvK7plqXWXoHNTpGsuarqFzQ=; b=y3oM+kO4ZNjqUKRbK+tehVlxOXX0uq2//08CUVjPV5Egc6pqPTyqKIJPDkSNaCOKPh w/ynDIUpPyZzKuMlfyhIJSweVXmq1mi8v9C0h/8FO8vN3cS9LmgvM1wR9uOFLGHRIe2d HsvydogU2/+rYjQyfDwNgrz9sPeEAm+oPoYbK7lzzcsf+t54/mHBT1w0zbkfNzpbgG5c ckSrfAqc3ZF/Pomoj3eu57Irn+8qqW1ZhQLEzAYYGuzBX2iKtMi+9K0kGCqRgaI8xEqD bfI9o+NiRemr+DseHF3eRcKHlFTce171vJGKfuQBr/WfJ0Y3cYnUTAlx/mWb7QeFjEVZ uExA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=SekfQuef; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si80315edi.195.2020.05.06.03.28.43; Wed, 06 May 2020 03:29:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=SekfQuef; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728927AbgEFK0i (ORCPT + 99 others); Wed, 6 May 2020 06:26:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40348 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726354AbgEFK0h (ORCPT ); Wed, 6 May 2020 06:26:37 -0400 Received: from mail-ot1-x341.google.com (mail-ot1-x341.google.com [IPv6:2607:f8b0:4864:20::341]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 71158C061A0F for ; Wed, 6 May 2020 03:26:37 -0700 (PDT) Received: by mail-ot1-x341.google.com with SMTP id t3so926254otp.3 for ; Wed, 06 May 2020 03:26:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=JJrxKPKyOXug7kU6AgNPvK7plqXWXoHNTpGsuarqFzQ=; b=SekfQuefrtyx42HHqwoLFcYCcC79SWr0OXKjN7EgL6zWOvBD4g9cPXiiH/FrFQqf3+ rXiLd2HyZy7Crug0B37GaDRzSvbS3vckfqNUwMnTOMHElo1bbLCfVPCiKgn/JlI/ePjQ 1X3SckJefNGcuJF6emDdfsKWaYJ2F9lKQl5+mb7dYZE4FEnxtzFWITXIKRYG94g5TyiP NiN5Uu9/bRkcLzupI0Xze5lBibS/ucXP0ai46TdM8X4HDjYo5yPwdWDRcq6LjE3R7M25 1G34FwfG32DpPvmPQZOdJUWEN/HRuY/p9GPybH7I7SvuzDWRf1wJKsadqoEaC/3rIl4v kBFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=JJrxKPKyOXug7kU6AgNPvK7plqXWXoHNTpGsuarqFzQ=; b=TB50oAyM0VJ/M01tMJGq776EJDq0YboOevrye/gtEkYt9Y0Tuv45Yu94ac3DVOBJDP S58j2/2wKUZGousT4vKiv0la6n7b6MlA+bC5P6sw0lKpkUsn2GgnoK4uGUlya366zP3L y5S9IwZx0LPbkQ70pgRuB1/JESDDsarc8CmZtqqYAJykAtCPKQHWPLVr7EPC3HbC/3uo RdpxE7SJgcraOQRR8wfepRVi0j7E5M7kNd+qSiZIdpcgkIhkeFqzOGuVNm9TaLtm3K57 3RBUOnLyLmlhI8m1Zfj9ASFIDchu06I/btgOp0lJkt0kOwpvHR5bAerNOBSxV+cC+wT/ 9aBw== X-Gm-Message-State: AGi0PuZ31h9zyNMTrbjwY5SnKItS0XGU269suKAe8hu7GbWUzEWUjX98 ROUV6hJUnIsh+wGUo4tSt8F35TrsAusbDtVspULBdQ== X-Received: by 2002:a9d:68c5:: with SMTP id i5mr474295oto.251.1588760796552; Wed, 06 May 2020 03:26:36 -0700 (PDT) MIME-Version: 1.0 References: <20200505182821.47708-1-elver@google.com> In-Reply-To: From: Marco Elver Date: Wed, 6 May 2020 12:26:25 +0200 Message-ID: Subject: Re: [PATCH v2] kcsan: Add test suite To: David Gow Cc: "Paul E. McKenney" , Dmitry Vyukov , Alexander Potapenko , Andrey Konovalov , kasan-dev , Linux Kernel Mailing List , KUnit Development Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 6 May 2020 at 06:45, David Gow wrote: > > On Wed, May 6, 2020 at 2:30 AM Marco Elver wrote: > > > > This adds KCSAN test focusing on behaviour of the integrated runtime. > > Tests various race scenarios, and verifies the reports generated to > > console. Makes use of KUnit for test organization, and the Torture > > framework for test thread control. > > > > Signed-off-by: Marco Elver > > Thanks, this works much better on my setup: having an explicit error > for there not being enough CPUs is a lot better than hanging. It'd > still be nice to have these be "skipped" rather than "failed" at some > stage, but that's a nice-to-have for the future once we've implemented > such a thing in KUnit. Will keep an eye on KUnit adding support for this, and in future we can change it. Although I'd argue that these tests failing is a signal that a particular KCSAN based CI setup isn't terribly useful at finding data races, which can still be a valuable signal to have. > I'm still a little hesitant about non-deterministic tests in general =E2= =80=94 > even if they're only run when CONFIG_KCSAN is enabled, it's possible > that a future CI system could run under KCSAN and report false > breakages on unrelated patches. Given no such setup exists yet, > though, I think it's probably a problem for the future rather than a > blocker at the moment. True. But as noted above, it might also highlight an issue with the CI system's ability to detect data races if KCSAN is enabled, which is the whole point of having a KCSAN test setup. But yes, let's cross that bridge when such a system actually exists. > Regardless, I hit no unexpected issues in my testing, so, > > Tested-by: David Gow Thank you for testing! -- Marco