lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 9 Jun 2023 08:14:49 -0700
From:   Randy Dunlap <rdunlap@...radead.org>
To:     "Liu, Yujie" <yujie.liu@...el.com>,
        "masahiroy@...nel.org" <masahiroy@...nel.org>
Cc:     "Li, Philip" <philip.li@...el.com>,
        "linux-kbuild@...r.kernel.org" <linux-kbuild@...r.kernel.org>,
        lkp <lkp@...el.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [RFC] [kbuild test robot] random-order parallel building



On 6/9/23 01:41, Liu, Yujie wrote:
> Hi Masahiro,
> 
> On Fri, 2023-05-12 at 15:09 +0800, Philip Li wrote:
>> On Fri, May 12, 2023 at 12:25:13PM +0900, Masahiro Yamada wrote:
>>> Hello, maintainers of the kbuild test robot.
>>>
>>> I have a proposal for the 0day tests.
>> Thanks a lot for the proposal for the shuffle make, we will do some
>> investigation to try this random order parallel build. The gnu make
>> we currently use is 4.3, we will try the 4.4 to see any problem.
>>
>> For the timeline, we may provide update later this month.
> We've upgraded to make v4.4.1 in kernel test robot and enabled random-
> order parallel compiling in our randconfig build tests. The shuffle
> seed is generated by hashing the randconfig, so it changes overtime and
> can cover various random orders. We are still doing some internal
> testing and will put it online once everything is done.
> 

I have also been using it since this proposal was submitted.
I haven't seen any issues with it.

thanks.
-- 
~Randy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ