Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp4710011rdb; Fri, 15 Sep 2023 09:53:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHjQmFG67Ev514RSsm3+H9l7ASAyGA2+n8LVIqpYAU6iVzGLr+oP7ix0xCHw+jm1cl4wVHt X-Received: by 2002:a05:6a00:179b:b0:68f:b7f6:f1df with SMTP id s27-20020a056a00179b00b0068fb7f6f1dfmr2617636pfg.5.1694796836920; Fri, 15 Sep 2023 09:53:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694796836; cv=none; d=google.com; s=arc-20160816; b=hwoM8W/uD5H/UcAsPQqSrTwcvnXs9ZkYFnyW54WpVVx+v7K/gZWSrbIBslDXH2gfZ/ RZVGTMWz2n9QkqM4zndQGDO0X3YgPmx5MhNggeNcsox/YJTZNuReiqt03SmHK1aSPtYR su+JeJ3AGGlJ5N+GdNONRkNmgXr9yf2uA/uJDgi6qiypF5wVNtOku4IyNWkshlXRRzkr MofddoszJR2bitpLqVPyKkOB/gSpJr1X2N39HmzL3cWiUBHXdgmIVT/G1YZ5zVbxPMMR bvzVYq1fIlfaY/h7MEOjS7FadlMUzXQwZLwN9ec86Hn6Rd7E18p1cnNGO41K1Onsk5qq HL9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=VYR6ep7rDCBduLCC6ALZ438i46Wvlrmilzt/WzHCta4=; fh=8L6yf48fC6wKC7G+Mo1FP1v9re1i6HyYfoVeDgoXVXI=; b=avhc1fkTLH+bFPMKTj1O0Wqz3OsmHq0wBsAxG6Y3heg01+C73Qn1tcsxTOl49SSZrD YUGq5U9yub8V8OMDNHzXZCEsy20oZI/USAtM0/Gw+ihl3yItVkpy7H5/FmF31NaGZOSq brHFUUyc1iAlJA2E8C9hTMFzBh/Xf2EchS5Su1UkmXwYOMuRY6mbF+hv7VqGesoGoNYL ybRhHu2JXZzPQoxOkU0ifKkgISDCDX2U2q2knZEUMv6FjWoSpGYVLDJGDPh4RQaqFb5i Hc/W2z795yXHEftGsR0LMCbVaypQ4DeeZXW++RsxeMP1SIiMgPSiwYU6uLo+cc5qTwzy +m1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fooishbar-org.20230601.gappssmtp.com header.s=20230601 header.b=McS20yfV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id o184-20020a62cdc1000000b0068e45c6ca3fsi3503410pfg.93.2023.09.15.09.53.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Sep 2023 09:53:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@fooishbar-org.20230601.gappssmtp.com header.s=20230601 header.b=McS20yfV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 0E533830D608; Fri, 15 Sep 2023 08:10:11 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235991AbjIOPJx (ORCPT + 99 others); Fri, 15 Sep 2023 11:09:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43534 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236019AbjIOPJw (ORCPT ); Fri, 15 Sep 2023 11:09:52 -0400 Received: from mail-ej1-x62e.google.com (mail-ej1-x62e.google.com [IPv6:2a00:1450:4864:20::62e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 828EC358D for ; Fri, 15 Sep 2023 08:08:56 -0700 (PDT) Received: by mail-ej1-x62e.google.com with SMTP id a640c23a62f3a-9adb9fa7200so418983166b.0 for ; Fri, 15 Sep 2023 08:08:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fooishbar-org.20230601.gappssmtp.com; s=20230601; t=1694790535; x=1695395335; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=VYR6ep7rDCBduLCC6ALZ438i46Wvlrmilzt/WzHCta4=; b=McS20yfVDz1gxpj8R7DrqOTYRyBS8x5oxHXNGHT4U8OgCy6Mco617iiPb/Ovpb+cTv pEGBcXZn1FFV6s0/KYwIUDCPHPgUCY8B7+T90zIsr0D6OTLK/6yNKCPKSEKgxZaqT+K9 FAtpJG6CXM3L/UdXztBbXjx+yTg2M9PCbfnaMcIAIFwpD636AZ7nkCRSvtGpiXqio/BM zgFkwvG82fI/9pUExiN6RxFSWz8TkUa9yI4vl5QPvpjKNJblk8w6pL4ZbV7pLog9v0pX yR6zI4Rc1T0vbVEYPATHnazNLP7mlr2HUqbYCp50TReQg/REtCBlOKuKPHgLspl1PfiS nm0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694790535; x=1695395335; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=VYR6ep7rDCBduLCC6ALZ438i46Wvlrmilzt/WzHCta4=; b=wUiiSQCgEIa97RDNjPVHMFpP/tBZ+WCbPMNkj5DI2VdE0Z7NbOjbuH6wOBp/TqyAEU WVE85H453d/J69NrmFVLzhfAJcujh0DjoajSKZpZvFsfc+0h1SQCwEnFHnP0sMPSWpJc N6DblrB7ERJlo2GO3XLWBDQ3YRj6u7IoCXFthbqiCMfpWwNU2/lt9raUUeOaVRbMa4j6 BGog8t81WCIDtxvuQYGlFqpeXsnPgBHMYxbSkz6o+AvbV4801OPud1SVamss+wvUmFwb zYmBAFbXSzosxUG36iyuaLnE5AadZsQ7ymJ6/WD/nU1GQBnz1itOLdNv3lVaeRsJ6xbk xQ1w== X-Gm-Message-State: AOJu0YxiqIhNTrDtoX2CVnICZ98FNJbjcGXZA+Dxi5lskTYBVhyCOfgJ E+JbwYxyk/o0s+AdBbGWokBk0XRa7PfLFZrQ1dLFLw== X-Received: by 2002:a17:907:1c8b:b0:9a9:f6e7:43fe with SMTP id nb11-20020a1709071c8b00b009a9f6e743femr7782839ejc.24.1694790534612; Fri, 15 Sep 2023 08:08:54 -0700 (PDT) MIME-Version: 1.0 References: <5fdf9d29-3f8d-0ee0-027f-57ff3a5cecb8@collabora.com> <9a2b1ad8-4359-4f12-b4f9-c1de477bc440@collabora.com> <5ejq3hjpoy3gxft2jbmoa5m656usetuxcs7g3ezyyiitj67rav@r5jhdz27foat> <550454b8-2e2c-c947-92c5-37f0367661c2@mailbox.org> In-Reply-To: From: Daniel Stone Date: Fri, 15 Sep 2023 16:08:42 +0100 Message-ID: Subject: Re: [PATCH v11] drm: Add initial ci/ subdirectory To: Maxime Ripard Cc: =?UTF-8?Q?Michel_D=C3=A4nzer?= , emma@anholt.net, linux-doc@vger.kernel.org, vignesh.raman@collabora.com, dri-devel@lists.freedesktop.org, alyssa@rosenzweig.io, jbrunet@baylibre.com, robdclark@google.com, corbet@lwn.net, khilman@baylibre.com, sergi.blanch.torne@collabora.com, david.heidelberg@collabora.com, linux-rockchip@lists.infradead.org, Daniel Stone , martin.blumenstingl@googlemail.com, robclark@freedesktop.org, Helen Koike , anholt@google.com, linux-mediatek@lists.infradead.org, matthias.bgg@gmail.com, linux-amlogic@lists.infradead.org, gustavo.padovan@collabora.com, linux-arm-kernel@lists.infradead.org, angelogioacchino.delregno@collabora.com, neil.armstrong@linaro.org, guilherme.gallo@collabora.com, linux-kernel@vger.kernel.org, tzimmermann@suse.de Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 15 Sep 2023 08:10:11 -0700 (PDT) Hey, On Thu, 14 Sept 2023 at 10:54, Maxime Ripard wrote: > On Tue, Sep 12, 2023 at 02:16:41PM +0100, Daniel Stone wrote: > > Hopefully less mangled formatting this time: turns out Thunderbird + > > plain text is utterly unreadable, so that's one less MUA that is > > actually usable to send email to kernel lists without getting shouted > > at. > > Sorry if it felt that way, it definitely wasn't my intention to shout at > you. Email is indeed kind of a pain to deal with, and I wanted to keep > the discussion going. My bad - I didn't mean you _at all_. I was thinking of other, much less pleasant, kernel maintainers, and the ongoing struggle of attempting to actually send well-formatted email to kernel lists in 2023. > > I don't quite see the same picture from your side though. For example, > > my reading of what you've said is that flaky tests are utterly > > unacceptable, as are partial runs, and we shouldn't pretend otherwise. > > With your concrete example (which is really helpful, so thanks), what > > happens to the MT8173 hdmi-inject test? Do we skip all MT8173 testing > > until it's perfect, or does MT8173 testing always fail because that > > test does? > > It's not clear to me why that test is even running in the first place? > There's been some confusion on my side here about what we're going to > test with this. You've mentioned Mesa and GPUs before, but that's a KMS > test so there must be more to it. > > Either way, it's a relevant test so I guess why not. It turns out that > the test is indeed flaky, I guess we could add it to the flaky tests > list. > > BUT > > I want to have every opportunity to fix whatever that failure is. Agreed so far! > So: > > - Is the test broken? If so, we should report it to IGT dev and remove > it from the test suite. > - If not, is that test failure have been reported to the driver author? > - If no answer/fix, we can add it to the flaky tests list, but do we > have some way to reproduce the test failure? > > The last part is especially critical. Looking at the list itself, I have > no idea what board, kernel version, configuration, or what the failure > rate was. Assuming I spend some time looking at the infra to find the > board and configuration, how many times do I have to run the tests to > expect to reproduce the failure (and thus consider it fixed if it > doesn't occur anymore). > > Like, with that board and test, if my first 100 runs of the test work > fine, is it reasonable for me to consider it fixed, or is it only > supposed to happen once every 1000 runs? > > So, ideally, having some (mandatory) metadata in the test lists with a > link to the bug report, the board (DT name?) it happened with, the > version and configuration it was first seen with, and an approximation > of the failure rate for every flaky test list. > > I understand that it's probably difficult to get that after the fact on > the tests that were already merged, but I'd really like to get that > enforced for every new test going forward. > > That should hopefully get us in a much better position to fix some of > those tests issues. And failing that, I can't see how that's > sustainable. OK yeah, and we're still agreed here. That is definitely the standard we should be aiming for. It is there for some - see drivers/gpu/drm/ci/xfails/rockchip-rk3288-skips.txt, but should be there for the rest, it's true. (The specific board/DT it was observed on can be easily retconned because we only run on one specific board type per driver, again to make things more predictable; we could go back and retrospectively add those in a header comment?) For flakes, it can be hard to pin them down, because, well, they're flaky. Usually when we add things in Mesa (sorry to keep coming back to Mesa - it's not to say that it's the objective best thing that everything should follow, only that it's the thing we have the most experience with that we know works well), we do a manual bisect and try to pin the blame on a specific merge request which looks like the most likely culprit. If nothing obvious jumps out, we just note when it was first observed and provide some sample job logs. But yeah, it should be more verbose. FWIW, the reason it wasn't done here - not to say that it shouldn't have been done better, but here we are - is that we just hammered a load of test runs, vacuumed up the results with a script, and that's what generated those files. Given the number of tests and devices, it was hard to narrow each down individually, but yeah, it is something which really wants further analysis and drilling into. It's a good to-do, and I agree it should be the standard going forward. > And Mesa does show what I'm talking about: > > $ find -name *-flakes.txt | xargs git diff --stat e58a10af640ba58b6001f5c5ad750b782547da76 > [...] > > In the history of Mesa, there's never been a single test removed from a > flaky test list. As Rob says, that's definitely wrong. But there is a good point in there: how do you know a test isn't flaky anymore? 100 runs is a reasonable benchmark, but 1000 is ideal. At a 1% failure rate, with 20 devices, that's just too many spurious false-fails to have a usable workflow. We do have some tools to make stress testing easier, but those need to be better documented. We'll fix that. The tools we have which also pull out the metadata etc also need documenting - right now they aren't because they're under _extremely_ heavy development, but they can be further enhanced to e.g. pull out the igt results automatically and point very clearly to the cause. Also on the to-do. > > Only maintainers can actually fix the drivers (or the tests tbf). But > > doing the testing does let us be really clear to everyone what the > > actual state is, and that way people can make informed decisions too. > > And the only way we're going to drive the test rate down is by the > > subsystem maintainers enforcing it. > > Just FYI, I'm not on the other side of the fence there, I'd really like > to have some kind of validation. I talked about it at XDC some years > ago, and discussed it several people at length over the years. So I'm > definitely not in the CI-is-bad camp. > > > Does that make sense on where I'm (and I think a lot of others are) > > coming from? > > That makes sense from your perspective, but it's not clear to me how you > can expect maintainers to own the tests if they were never involved in > the process. > > They are not in Cc of the flaky tests patches, they are not reported > that the bug is failing, how can they own that process if we never > reached out and involved them? > > We're all overworked, you can't expect them to just look at the flaky > test list every now and then and figure it out. Absolutely. We got acks (or at least not-nacks) from the driver developers, but yeah, they should absolutely be part of the loop for those updates. I don't think we can necessarily block on them though. Say we add vc4 KMS tests, then after a backmerge we start to see a bunch of flakes on it, but you're sitting on a beach for a couple of weeks. If we wait for you to get back, see it, and merge it, then that's two weeks of people submitting Rockchip driver changes and getting told that their changes failed CI. That's exactly what we want to avoid, because it erodes confidence and usefulness of CI when people expect failures and ignore them by default. So I would say that it's reasonable for expectations to be updated according to what actually happens in practice, but also to make sure that the maintainers are explicitly informed and kept in the loop, and not just surprised when they look at the lists and see a bunch of stuff happened without their knowledge. Again there's much more to be done on the tooling here. Part of it is CLI tools and automation, part of it is dashboards and easily-digestible reporting, and then there's integration with things like KernelCI. KCI(DB) is actually quite high up on the list, but we're mostly waiting until a lot of the KCI rework happens so we can actually properly integrate with the new system. Right now a lot of the tooling we have is pretty involved - for example, we do have ci-collate as a Python library which can inspect a number of pipelines, pull out detailed status and logs, etc, but it mostly needs to be used as a library with bespoke scripts, rather than a ready-made tool. Work on that is ongoing to make it way more clear and accessible though. So I think it sounds like we're on the same page and going exactly in the same direction, just that this is a starting point rather than the desired end state. And the main point is that having a set of xfails/flakes parachuted in with little to no context is trying to get an MVP bootstrapped, rather than how we expect things to go in future. Does that sound about right? Cheers, Daniel