lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170608175144.205894cb@gandalf.local.home>
Date:   Thu, 8 Jun 2017 17:51:44 -0400
From:   Steven Rostedt <rostedt@...dmis.org>
To:     Shuah Khan <shuahkh@....samsung.com>
Cc:     Shuah Khan <shuah@...nel.org>,
        Masami Hiramatsu <mhiramat@...nel.org>,
        linux-kselftest@...r.kernel.org, Ingo Molnar <mingo@...hat.com>,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/7] selftests/ftrace: Some improvements of ftracetest

On Thu, 8 Jun 2017 15:44:08 -0600
Shuah Khan <shuahkh@....samsung.com> wrote:

> > Also, did you see my reply about having the right config? You have
> > HIST_TRIGGERS undefined but yet the histogram trigger tests all pass in
> > your report.  
> 
> I did see that one. Didn't get a chance to look at that yet. Do you expect
> the tests to be skipped in this case? Could it be that tests aren't run?
> I will look at this and let you know what I find on my test system.

Your first email showed that they passed, which would be hard to do
since the feature is not even enabled. ftracetest is very much set up
to look at the existing pseudo files to determine if a feature exists
or not, and if it does not, it returns "UNSUPPORTED". If it returned
PASSED when the feature is not enabled, that would be a big time bug in
the test.

> 
> > 
> > One more thing, is this 100% reproducible. That is, does it always fail?
> >   
> Failed the two times I tried.

Great to hear. I like reproducibility :-)

-- Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ