-
Notifications
You must be signed in to change notification settings - Fork 339
[llvm][cas] Implement a CAS stress tester #10606
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[llvm][cas] Implement a CAS stress tester #10606
Conversation
383ee3a
to
0efdf81
Compare
0efdf81
to
bf37beb
Compare
bf37beb
to
373b461
Compare
@swift-ci please test llvm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we are going to name this "llvm-cas-test" would we expect other kinds of testing functionality to be in this tool? I'm thinking of llvm-cas -check-lock-files
, since it's also more of a stress test than a general utility.
I'd also be fine keeping this focused on fuzzing, but then I would go back to llvm-cas-fuzzer or similar name.
The name change is because I removed the libfuzzer dependency as I only using the coverage guided random input generation which I don't think add any value. I guess we can still call it |
This is a basic tester for CAS ObjectStore that will insert random data into CAS and validate with several configurations randomly generated. It will check: * multi-threaded insertion * multi-process insertion * try randomly kill the subprocesses that are inserting data And make sure it doesn't leave CAS in an invalid state. Suggested usage: ``` LLVM_CAS_LOG=2 llvm-cas-test --cas=... --print-config ```
373b461
to
b804c9c
Compare
@swift-ci please test llvm |
This is a basic tester for CAS ObjectStore that will insert random data into CAS and validate with several configurations randomly generated. It will check:
And make sure it doesn't leave CAS in an invalid state. Suggested usage: