[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #30801 [Core Tor/Tor]: Investigate running CI with hardened dependencies vs running CI with valgrind
#30801: Investigate running CI with hardened dependencies vs running CI with
valgrind
------------------------------+--------------------------------
Reporter: nickm | Owner: (none)
Type: task | Status: new
Priority: Medium | Milestone: Tor: 0.4.2.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: tor-ci
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------+--------------------------------
In #30674, we investigated why running with --enable-fragile-hardening had
missed a memory leak that valgrind could successfully catch. The answer
turned out to be that we had not compiled our dependencies with sanitizers
enabled -- so they didn't catch memory leaks that happened inside our
dependencies.
Assuming we want CI to catch this kind of bug (and we do!) the
alternatives seem to be: build our dependencies with sanitizers, or run
with valgrind.
Teor made the following notes about deployment and evaluations:
> Hardened dependencies:
> 1. We know we can harden dependencies
> 2. Hardened dependencies may cause CI failures due to bugs in
dependencies
> 3. Hardened dependencies may be slower
> 4. We probably won't rebuild libc and other large libraries in hardened
mode
> 5. We don't know if valgrind or hardened builds provide better coverage
of the kinds of coding errors we typically make
> 6. It might be complicated to configure builds for all our dependencies
> 7. We can't harden our chutney, stem, and sbws CIs, because they use
pre-built binaries
>
> Valgrind:
> 1. We don't know if valgrind runs well in Travis CI
> 2. Valgrind may cause CI failures due to bugs in dependencies
> 3. Valgrind may be slower
> 4. Valgrind instruments all the code, no matter which library it's in
> 5. We don't know if valgrind or hardened builds provide better coverage
of the kinds of coding errors we typically make
> 6. Valgrind is simple to configure
> 7. We can run valgrind on the pre-built binaries in our chutney, stem,
and sbws CIs
We should come to a decision here and take action.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30801>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs