lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 16 Sep 2013 12:25:35 +0200 From: Ingo Molnar <mingo@...nel.org> To: Peter Zijlstra <peterz@...radead.org> Cc: Dave Jones <davej@...hat.com>, Steven Rostedt <rostedt@...dmis.org>, Linux Kernel <linux-kernel@...r.kernel.org>, Frederic Weisbecker <fweisbec@...il.com> Subject: Re: trinity finds ftrace/perf bug. Film at 11. * Peter Zijlstra <peterz@...radead.org> wrote: > On Fri, Sep 13, 2013 at 10:16:38AM -0400, Dave Jones wrote: > > without the diff, it'll use all kinds of fds. this diff hardwires it to just use > > fd's from perf_event_open. I'll hack up a command line switch to do this in a better > > way at some point. > > > > Dave > > > > > > diff --git a/fds.c b/fds.c > > index cc1ca6d..f48c95e 100644 > > --- a/fds.c > > +++ b/fds.c > > @@ -119,6 +119,8 @@ static int get_new_random_fd(void) > > retry: > > i = rand() % 6; > > > > + i = 3; > > + > > if (do_specific_proto == TRUE) > > i = 1; > > I'm just not having much luck it seems, even after actually enabling > list debugging (D0H). Maybe Dave could send you his kernel config, to make sure you two run comparable kernel images? > What kind of hardware are you running this on? That's a possible variation too indeed. Also, Dave, do you run a single copy of Trinity, or multiple ones? Any special options for Peter to reproduce your crashes? Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists