Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1985401pxb; Thu, 11 Feb 2021 00:57:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJzS0zH8s6hrJNu1zgH+WQ7O+ve7YhuXYNM41ye8XlEF0wugPRYqLL1SjWZQY8eXs9oppeun X-Received: by 2002:a17:906:fcb5:: with SMTP id qw21mr7403401ejb.391.1613033835376; Thu, 11 Feb 2021 00:57:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613033835; cv=none; d=google.com; s=arc-20160816; b=Q32r4599UZEE6SNWAj8xrl5MrDWBwX8dgnPhPXFR+FY4MZB3CcMgxBUOX1+jSanDVl voPh84Sp0IwHMsg8PEfiPh7AxXzXVfaVAgRd0M06uiYAVYe1sU6q7yf4tJmP92Ib/vq4 bsmrgMiekip+fW3z0VhIWI7JtDw/1d4c6jeI+7Y8ZvxyqmW3GXeClCB4c7PBS2HwTzKv twUOI0yrtaHtfhBtYy6xfpGdMlvbRJOe3yInSa77SaPmHFjt6Xep4YDM2ayH4qIciE5Q ceYj1+YX8cGNWr+F1KcUoJNDwKx7/GDqTfL/N/YQA+Nfp1u24Qkt1Nm3WA56zmFMWj/a z1lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=INpI2grpc39RPI1/uGmN/swUxZd9s7IImMKnJJk5cp4=; b=kHXH4OyscFmsAeYQRLN7Mkl/SoTUUpE7u2XRJqO/0TXVE9awN/NRXA1rJp1Feffo4/ sHhMcWgONu5bh7VMTyXRB1rkXf/NuVNb8+h6ze18z/uQeF7eYuA1uIl7/kzqn4mCJqhs CHiFEJseBkRyDP6EjPkVqHgQrCcFMLW0jkoDBGN8Rlti3MMUK4hVlfn3WEddwxOovna+ +kNVR9Qy8j4+JKFxQYf7nsxcq+ad7I6fAp+aADWerX2l/ucpSw3m61lKksFJOzKNmGxu oOQgvy7DcGNkI/oOV0oUXNup5XiAcVOoMoQMM+T5wTaau19JjglaseZmZMs4WfY9qWGM 9dow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="MKwqC2I/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o9si3600711ejr.220.2021.02.11.00.56.52; Thu, 11 Feb 2021 00:57:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="MKwqC2I/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229642AbhBKIy3 (ORCPT + 99 others); Thu, 11 Feb 2021 03:54:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53284 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229533AbhBKIy1 (ORCPT ); Thu, 11 Feb 2021 03:54:27 -0500 Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com [IPv6:2a00:1450:4864:20::235]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 891C4C061756 for ; Thu, 11 Feb 2021 00:55:12 -0800 (PST) Received: by mail-lj1-x235.google.com with SMTP id r23so6485995ljh.1 for ; Thu, 11 Feb 2021 00:55:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=INpI2grpc39RPI1/uGmN/swUxZd9s7IImMKnJJk5cp4=; b=MKwqC2I/GRbddB3AUH+OcSDsUNhzA4P3u3q/nC+WxRHdmZAvm3ML7H1oRtcVEtO0Rv r9s10LKh/2MORlzerm19Dvia0+Kdb9YYzHqrej/s8C1nzns3wMSNHe5Y2sENj1FwvUt+ N5C+P1rbaeZRfeby7Q8o7wfOXU35hbC/q90WWGBaJWEXSkjM/ozuszciWmcKGHzCW77O cuUf08qebgIzSFFMPOSGGm31V9Flj5uZi/Pier3UeuHVehz2S8KGdaAtuuEyiUvphf5e FyG737ngsk3mD89lTxgnzWW3y6s2++N3aXNBWxTFk8Y82ZYCSvCYuJT1xZUwWKf7FH0a /OTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=INpI2grpc39RPI1/uGmN/swUxZd9s7IImMKnJJk5cp4=; b=rTkGpluCG9jlY0lwiJHhZRDPvDmFlwZzqW22kEEeWIvUadGKTvgNjWUi2rJ5RLTJN7 clj6wk6evsz0pxhpW2T6JfFuFY5pEhXsRfh8ezVr+CmzecX/1pmLz8Ne0tUH+01AeZId LanV7FsW5Q8Kw6QMXlBR4/cqw/RxZpcZbPyXFEWBciUVzgtKP7m6hsxEMiTbDl2UiTWa ZgSpC932S7F5NYZXH1aBzh5leGYh5wV229DywJ3cPWilMcwUFqeSoT8xeLLd8z6djxM4 gWQFSyYAy/pdHQw6wnI0sP36PepY98lSCgswumuLain8DaY9Xl/nv7TGftJFEEtKGvxJ Hlvw== X-Gm-Message-State: AOAM533V8oyj947aW5fysskIl7RP7MkfYIJKGk9SqQ9FKs6YY9oWfpIa snLWxMwC1KB0dEU7UmX8yfMrmT3IKu9LPLiacV3cww== X-Received: by 2002:a2e:880e:: with SMTP id x14mr4437278ljh.89.1613033710765; Thu, 11 Feb 2021 00:55:10 -0800 (PST) MIME-Version: 1.0 References: <20210209221443.78812-1-dlatypov@google.com> <20210209221443.78812-2-dlatypov@google.com> In-Reply-To: <20210209221443.78812-2-dlatypov@google.com> From: David Gow Date: Thu, 11 Feb 2021 16:54:59 +0800 Message-ID: Subject: Re: [PATCH v3 1/2] kunit: support failure from dynamic analysis tools To: Daniel Latypov Cc: Brendan Higgins , Alan Maguire , Linux Kernel Mailing List , KUnit Development , "open list:KERNEL SELFTEST FRAMEWORK" , Shuah Khan , Uriel Guajardo Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 10, 2021 at 6:14 AM Daniel Latypov wrote: > > From: Uriel Guajardo > > Add a kunit_fail_current_test() function to fail the currently running > test, if any, with an error message. > > This is largely intended for dynamic analysis tools like UBSAN and for > fakes. > E.g. say I had a fake ops struct for testing and I wanted my `free` > function to complain if it was called with an invalid argument, or > caught a double-free. Most return void and have no normal means of > signalling failure (e.g. super_operations, iommu_ops, etc.). > > Key points: > * Always update current->kunit_test so anyone can use it. > * commit 83c4e7a0363b ("KUnit: KASAN Integration") only updated it for > CONFIG_KASAN=y > > * Create a new header so non-test code doesn't have > to include all of (e.g. lib/ubsan.c) > > * Forward the file and line number to make it easier to track down > failures > > * Declare the helper function for nice __printf() warnings about mismatched > format strings even when KUnit is not enabled. > > Example output from kunit_fail_current_test("message"): > [15:19:34] [FAILED] example_simple_test > [15:19:34] # example_simple_test: initializing > [15:19:34] # example_simple_test: lib/kunit/kunit-example-test.c:24: message > [15:19:34] not ok 1 - example_simple_test > > Co-developed-by: Daniel Latypov > Signed-off-by: Uriel Guajardo > Signed-off-by: Daniel Latypov > --- > include/kunit/test-bug.h | 30 ++++++++++++++++++++++++++++++ > lib/kunit/test.c | 37 +++++++++++++++++++++++++++++++++---- > 2 files changed, 63 insertions(+), 4 deletions(-) > create mode 100644 include/kunit/test-bug.h > > diff --git a/include/kunit/test-bug.h b/include/kunit/test-bug.h > new file mode 100644 > index 000000000000..18b1034ec43a > --- /dev/null > +++ b/include/kunit/test-bug.h > @@ -0,0 +1,30 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +/* > + * KUnit API allowing dynamic analysis tools to interact with KUnit tests > + * > + * Copyright (C) 2020, Google LLC. > + * Author: Uriel Guajardo > + */ > + > +#ifndef _KUNIT_TEST_BUG_H > +#define _KUNIT_TEST_BUG_H > + > +#define kunit_fail_current_test(fmt, ...) \ > + __kunit_fail_current_test(__FILE__, __LINE__, fmt, ##__VA_ARGS__) > + > +#if IS_ENABLED(CONFIG_KUNIT) As the kernel test robot has pointed out on the second patch, this probably should be IS_BUILTIN(), otherwise this won't build if KUnit is a module, and the code calling it isn't. This does mean that things like UBSAN integration won't work if KUnit is a module, which is a shame. (It's worth noting that the KASAN integration worked around this by only calling inline functions, which would therefore be built-in even if the rest of KUnit was built as a module. I don't think it's quite as convenient to do that here, though.) > + > +extern __printf(3, 4) void __kunit_fail_current_test(const char *file, int line, > + const char *fmt, ...); > + > +#else > + > +static __printf(3, 4) void __kunit_fail_current_test(const char *file, int line, > + const char *fmt, ...) > +{ > +} > + > +#endif > + > + > +#endif /* _KUNIT_TEST_BUG_H */ > diff --git a/lib/kunit/test.c b/lib/kunit/test.c > index ec9494e914ef..5794059505cf 100644 > --- a/lib/kunit/test.c > +++ b/lib/kunit/test.c > @@ -7,6 +7,7 @@ > */ > > #include > +#include > #include > #include > #include > @@ -16,6 +17,38 @@ > #include "string-stream.h" > #include "try-catch-impl.h" > > +/* > + * Fail the current test and print an error message to the log. > + */ > +void __kunit_fail_current_test(const char *file, int line, const char *fmt, ...) > +{ > + va_list args; > + int len; > + char *buffer; > + > + if (!current->kunit_test) > + return; > + > + kunit_set_failure(current->kunit_test); > + > + /* kunit_err() only accepts literals, so evaluate the args first. */ > + va_start(args, fmt); > + len = vsnprintf(NULL, 0, fmt, args) + 1; > + va_end(args); > + > + buffer = kunit_kmalloc(current->kunit_test, len, GFP_KERNEL); > + if (!buffer) > + return; > + > + va_start(args, fmt); > + vsnprintf(buffer, len, fmt, args); > + va_end(args); > + > + kunit_err(current->kunit_test, "%s:%d: %s", file, line, buffer); > + kunit_kfree(current->kunit_test, buffer); > +} > +EXPORT_SYMBOL_GPL(__kunit_fail_current_test); > + > /* > * Append formatted message to log, size of which is limited to > * KUNIT_LOG_SIZE bytes (including null terminating byte). > @@ -273,9 +306,7 @@ static void kunit_try_run_case(void *data) > struct kunit_suite *suite = ctx->suite; > struct kunit_case *test_case = ctx->test_case; > > -#if (IS_ENABLED(CONFIG_KASAN) && IS_ENABLED(CONFIG_KUNIT)) > current->kunit_test = test; > -#endif /* IS_ENABLED(CONFIG_KASAN) && IS_ENABLED(CONFIG_KUNIT) */ > > /* > * kunit_run_case_internal may encounter a fatal error; if it does, > @@ -624,9 +655,7 @@ void kunit_cleanup(struct kunit *test) > spin_unlock(&test->lock); > kunit_remove_resource(test, res); > } > -#if (IS_ENABLED(CONFIG_KASAN) && IS_ENABLED(CONFIG_KUNIT)) > current->kunit_test = NULL; > -#endif /* IS_ENABLED(CONFIG_KASAN) && IS_ENABLED(CONFIG_KUNIT)*/ > } > EXPORT_SYMBOL_GPL(kunit_cleanup); > > -- > 2.30.0.478.g8a0d178c01-goog >