[zorg] r224445 - Add sanitizer-x86_64-linux-fast bot.

Kostya Serebryany kcc at google.com
Fri Dec 19 11:32:34 PST 2014


Chandler suggests that adding check-lld would be cool
(you need to make sure that ldd is checked out and that it's asan/msan
clean)
Can you do this?

On Fri, Dec 19, 2014 at 11:30 AM, Kostya Serebryany <kcc at google.com> wrote:
>
> Excellent, thanks!
> Do you already have some stats?  (average time, average # of CLs covered,
> etc).
> I wonder if we can make it work for every CL?
>
>
>
> On Wed, Dec 17, 2014 at 10:22 AM, Sergey Matveev <earthdok at google.com>
> wrote:
>>
>> Author: smatveev
>> Date: Wed Dec 17 12:22:17 2014
>> New Revision: 224445
>>
>> URL: http://llvm.org/viewvc/llvm-project?rev=224445&view=rev
>> Log:
>> Add sanitizer-x86_64-linux-fast bot.
>>
>> Add a new sanitizer bot. The host compiler is clang fixed at a specific
>> revision; it will not be rebuilt unless the revision number is changed in
>> the
>> bot config. The host compiler does incremental builds of
>> (A,M)San-instrumented
>> LLVM/clang, which are then tested with check-llvm, check-clang.
>>
>> Added:
>>     zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh   (with
>> props)
>> Modified:
>>     zorg/trunk/buildbot/osuosl/master/config/builders.py
>>     zorg/trunk/buildbot/osuosl/master/config/slaves.py
>>     zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_selector.py
>>
>> Modified: zorg/trunk/buildbot/osuosl/master/config/builders.py
>> URL:
>> http://llvm.org/viewvc/llvm-project/zorg/trunk/buildbot/osuosl/master/config/builders.py?rev=224445&r1=224444&r2=224445&view=diff
>>
>> ==============================================================================
>> --- zorg/trunk/buildbot/osuosl/master/config/builders.py (original)
>> +++ zorg/trunk/buildbot/osuosl/master/config/builders.py Wed Dec 17
>> 12:22:17 2014
>> @@ -661,6 +661,11 @@ def _get_sanitizer_builders():
>>             'builddir': "sanitizer-x86_64-linux-bootstrap",
>>             'factory': SanitizerBuilder.getSanitizerBuildFactory()},
>>
>> +          {'name': "sanitizer-x86_64-linux-fast",
>> +           'slavenames' :["sanitizer-buildbot3"],
>> +           'builddir': "sanitizer-x86_64-linux-fast",
>> +           'factory': SanitizerBuilder.getSanitizerBuildFactory()},
>> +
>>            #{'name': "llvm-clang-lld-x86_64-ubuntu-sanitize-address",
>>            # 'slavenames':["hexagon-build-03"],
>>            # 'builddir':"llvm-clang-lld-x86_64-ubuntu-sanitize-address",
>>
>> Modified: zorg/trunk/buildbot/osuosl/master/config/slaves.py
>> URL:
>> http://llvm.org/viewvc/llvm-project/zorg/trunk/buildbot/osuosl/master/config/slaves.py?rev=224445&r1=224444&r2=224445&view=diff
>>
>> ==============================================================================
>> --- zorg/trunk/buildbot/osuosl/master/config/slaves.py (original)
>> +++ zorg/trunk/buildbot/osuosl/master/config/slaves.py Wed Dec 17
>> 12:22:17 2014
>> @@ -153,10 +153,12 @@ def get_build_slaves():
>>          # AArch64 Clang, Juno ARM Development Platform
>>          create_slave("juno-aarch64-01", properties={'jobs': 4},
>> max_builds=1),
>>
>> -        # Ubuntu x86-64, 12x Intel(R) Xeon(R) CPU X5650 @ 2.67GHz
>> +        # Debian 7.7 x86_64 16-core GCE instance
>>          create_slave("sanitizer-buildbot1", properties={'jobs': 8},
>> max_builds=1),
>> -        # Ubuntu x86-64, 24x Intel(R) Xeon(R) CPU X5650 @ 2.67GHz
>> +        # Debian 7.7 x86_64 16-core GCE instance
>>          create_slave("sanitizer-buildbot2", properties={'jobs': 8},
>> max_builds=1),
>> +        # Debian 7.7 x86_64 8-core GCE instance
>> +        create_slave("sanitizer-buildbot3", properties={'jobs': 8},
>> max_builds=1),
>>
>>          # zEnterprise 196 (s390x), SLES 11 SP2
>>          create_slave("systemz-1", properties={'jobs': 4}, max_builds=1),
>>
>> Added: zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh
>> URL:
>> http://llvm.org/viewvc/llvm-project/zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh?rev=224445&view=auto
>>
>> ==============================================================================
>> --- zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh (added)
>> +++ zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh Wed Dec
>> 17 12:22:17 2014
>> @@ -0,0 +1,156 @@
>> +#!/usr/bin/env bash
>> +
>> +set -x
>> +set -e
>> +set -u
>> +
>> +HERE="$(cd $(dirname $0) && pwd)"
>> +. ${HERE}/buildbot_functions.sh
>> +
>> +ROOT=`pwd`
>> +PLATFORM=`uname`
>> +export PATH="/usr/local/bin:$PATH"
>> +
>> +if [ "$BUILDBOT_CLOBBER" != "" ]; then
>> +  echo @@@BUILD_STEP clobber@@@
>> +  rm -rf llvm
>> +  rm -rf llvm_build0
>> +fi
>> +
>> +HOST_CLANG_REVISION=223108
>> +
>> +MEMORY_SANITIZER_KIND="Memory"
>> +BUILDBOT_MSAN_ORIGINS=${BUILDBOT_MSAN_ORIGINS:-}
>> +if [ "$BUILDBOT_MSAN_ORIGINS" != "" ]; then
>> +    MEMORY_SANITIZER_KIND="MemoryWithOrigins"
>> +fi
>> +
>> +MAKE_JOBS=${MAX_MAKE_JOBS:-16}
>> +LLVM=$ROOT/llvm
>> +
>> +type -a gcc
>> +type -a g++
>> +CMAKE_COMMON_OPTIONS="-GNinja -DCMAKE_BUILD_TYPE=Release
>> -DLLVM_ENABLE_ASSERTIONS=ON -DLLVM_PARALLEL_LINK_JOBS=3"
>> +CMAKE_STAGE1_OPTIONS="${CMAKE_COMMON_OPTIONS}"
>> +
>> +# Stage 1
>> +
>> +if  [ -r host_clang_revision ] && \
>> +    [ "$(cat host_clang_revision)" == $HOST_CLANG_REVISION ]
>> +then
>> +  # Do nothing.
>> +  echo @@@BUILD_STEP using pre-built stage1 clang at
>> r$HOST_CLANG_REVISION@@@
>> +else
>> +  echo @@@BUILD_STEP sync to r$HOST_CLANG_REVISION@@@
>> +  REAL_BUILDBOT_REVISION=$BUILDBOT_REVISION
>> +  BUILDBOT_REVISION=$HOST_CLANG_REVISION
>> +  buildbot_update
>> +
>> +  echo @@@BUILD_STEP build stage1 clang at r$HOST_CLANG_REVISION@@@
>> +
>> +  rm -rf host_clang_revision
>> +
>> +  # CMake does not notice that the compiler itself has changed. Anyway,
>> +  # incremental builds of stage2 don't make sense if stage1 compiler has
>> +  # changed. Clobber the build trees.
>> +  rm -rf libcxx_build_msan
>> +  rm -rf llvm_build_msan
>> +  rm -rf llvm_build_asan
>> +
>> +  if [ ! -d llvm_build0 ]; then
>> +    mkdir llvm_build0
>> +  fi
>> +  # Build cxx/cxxabi to fool the compiler check in MSan stage 2.
>> +  (cd llvm_build0 && cmake ${CMAKE_STAGE1_OPTIONS} $LLVM && \
>> +    ninja clang compiler-rt llvm-symbolizer)
>> +  echo $HOST_CLANG_REVISION > host_clang_revision
>> +
>> +  BUILDBOT_REVISION=$REAL_BUILDBOT_REVISION
>> +fi
>> +
>> +echo @@@BUILD_STEP update@@@
>> +buildbot_update
>> +
>> +CLANG_PATH=$ROOT/llvm_build0/bin
>> +CMAKE_STAGE2_COMMON_OPTIONS="\
>> +  ${CMAKE_COMMON_OPTIONS} \
>> +  -DCMAKE_C_COMPILER=${CLANG_PATH}/clang \
>> +  -DCMAKE_CXX_COMPILER=${CLANG_PATH}/clang++ \
>> +  "
>> +LLVM_SYMBOLIZER_PATH=${CLANG_PATH}/llvm-symbolizer
>> +export ASAN_SYMBOLIZER_PATH=${LLVM_SYMBOLIZER_PATH}
>> +export MSAN_SYMBOLIZER_PATH=${LLVM_SYMBOLIZER_PATH}
>> +
>> +
>> +# Stage 2 / Memory Sanitizer
>> +
>> +echo @@@BUILD_STEP build libcxx/msan@@@
>> +if [ ! -d libcxx_build_msan ]; then
>> +  mkdir libcxx_build_msan
>> +fi
>> +
>> +(cd libcxx_build_msan && \
>> +  cmake \
>> +    ${CMAKE_STAGE2_COMMON_OPTIONS} \
>> +    -DLLVM_USE_SANITIZER=${MEMORY_SANITIZER_KIND} \
>> +    $LLVM && \
>> +  ninja cxx cxxabi) || echo @@@STEP_FAILURE@@@
>> +
>> +
>> +echo @@@BUILD_STEP build clang/msan@@@
>> +if [ ! -d llvm_build_msan ]; then
>> +  mkdir llvm_build_msan
>> +fi
>> +
>> +MSAN_LDFLAGS="-lc++abi -Wl,--rpath=${ROOT}/libcxx_build_msan/lib
>> -L${ROOT}/libcxx_build_msan/lib"
>> +# See http://llvm.org/bugs/show_bug.cgi?id=19071,
>> http://www.cmake.org/Bug/view.php?id=15264
>> +CMAKE_BUG_WORKAROUND_CFLAGS="$MSAN_LDFLAGS -fsanitize=memory -w"
>> +MSAN_CFLAGS="-I${ROOT}/libcxx_build_msan/include
>> -I${ROOT}/libcxx_build_msan/include/c++/v1 $CMAKE_BUG_WORKAROUND_CFLAGS"
>> +
>> +(cd llvm_build_msan && \
>> + cmake ${CMAKE_STAGE2_COMMON_OPTIONS} \
>> +   -DLLVM_USE_SANITIZER=${MEMORY_SANITIZER_KIND} \
>> +   -DLLVM_ENABLE_LIBCXX=ON \
>> +   -DCMAKE_C_FLAGS="${MSAN_CFLAGS}" \
>> +   -DCMAKE_CXX_FLAGS="${MSAN_CFLAGS}" \
>> +   -DCMAKE_EXE_LINKER_FLAGS="${MSAN_LDFLAGS}" \
>> +   $LLVM && \
>> + ninja clang) || echo @@@STEP_FAILURE@@@
>> +
>> +echo @@@BUILD_STEP check-llvm msan@@@
>> +
>> +(cd llvm_build_msan && ninja check-llvm) || echo @@@STEP_WARNINGS@@@
>> +
>> +echo @@@BUILD_STEP check-clang msan@@@
>> +
>> +(cd llvm_build_msan && ninja check-clang) || echo @@@STEP_FAILURE@@@
>> +
>> +
>> +# Stage 2 / AddressSanitizer
>> +
>> +echo @@@BUILD_STEP build clang/asan@@@
>> +
>> +# Turn on init-order checker as ASan runtime option.
>> +export
>> ASAN_OPTIONS="check_initialization_order=true:detect_stack_use_after_return=1:detect_leaks=1"
>> +CMAKE_ASAN_OPTIONS=" \
>> +  ${CMAKE_STAGE2_COMMON_OPTIONS} \
>> +  -DLLVM_USE_SANITIZER=Address \
>> +  "
>> +
>> +if [ ! -d llvm_build_asan ]; then
>> +  mkdir llvm_build_asan
>> +fi
>> +
>> +(cd llvm_build_asan && \
>> + cmake ${CMAKE_ASAN_OPTIONS} $LLVM && \
>> + ninja clang) || echo @@@STEP_FAILURE@@@
>> +
>> +
>> +echo @@@BUILD_STEP check-llvm asan@@@
>> +
>> +(cd llvm_build_asan && ninja check-llvm) || echo @@@STEP_FAILURE@@@
>> +
>> +
>> +echo @@@BUILD_STEP check-clang asan@@@
>> +
>> +(cd llvm_build_asan && ninja check-clang) || echo @@@STEP_FAILURE@@@
>>
>> Propchange: zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_fast.sh
>>
>> ------------------------------------------------------------------------------
>>     svn:executable = *
>>
>> Modified:
>> zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_selector.py
>> URL:
>> http://llvm.org/viewvc/llvm-project/zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_selector.py?rev=224445&r1=224444&r2=224445&view=diff
>>
>> ==============================================================================
>> --- zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_selector.py
>> (original)
>> +++ zorg/trunk/zorg/buildbot/builders/sanitizers/buildbot_selector.py Wed
>> Dec 17 12:22:17 2014
>> @@ -25,6 +25,7 @@ BOT_ASSIGNMENT = {
>>      'sanitizer-ppc64-linux1': bash('buildbot_cmake.sh'),
>>      'sanitizer-x86_64-linux': bash('buildbot_cmake.sh'),
>>      'sanitizer-x86_64-linux-bootstrap': bash('buildbot_bootstrap.sh'),
>> +    'sanitizer-x86_64-linux-fast': bash('buildbot_fast.sh'),
>>  }
>>
>>  BOT_ADDITIONAL_ENV = {
>> @@ -39,6 +40,7 @@ BOT_ADDITIONAL_ENV = {
>>      'sanitizer-ppc64-linux1': { 'HAVE_NINJA': '0' },
>>      'sanitizer-x86_64-linux': { 'BUILD_ANDROID' : '1', 'RUN_ANDROID' :
>> '1', 'HAVE_NINJA' : '1' },
>>      'sanitizer-x86_64-linux-bootstrap': {},
>> +    'sanitizer-x86_64-linux-fast': {},
>>  }
>>
>>  def Main():
>>
>>
>> _______________________________________________
>> llvm-commits mailing list
>> llvm-commits at cs.uiuc.edu
>> http://lists.cs.uiuc.edu/mailman/listinfo/llvm-commits
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20141219/b9646d5a/attachment.html>


More information about the llvm-commits mailing list