Hi -

On Fri, Aug 12, 2011 at 02:14:01PM +0300, Timo Juhani Lindfors wrote:
> > alibi procedure, see https://bugzilla.redhat.com/show_bug.cgi?id=655904
> 
> Thanks. I can confirm that these instructions crash
> linux-image-3.0.0-1-amd64  3.0.0-1
>
> at least under xen.

OK.  So that confirms kernel bugs.  Perhaps you should fork this bug
against the kernel, and hope for the best.


> The README in the same directory talks about
> generating a whitelist of safe probe points.  [...]
> After this I get the following output:
> [...]
> $ sudo runtest whitelist.exp
> Running ./systemtap.stress/whitelist.exp ...
> Start a fresh stp_genwhitelist test.
> current_size_const is initialized as 107
> Current size of probes.pending is 963
> Start a probe test...
> [...]
> Completed one probe test.
> Current size of probes.pending is 0
> Running level increased to 3
> Exceed max running level limit.
> Remove all temporary files, unregister the service and return.

David, can you advise to what extent the results of this whitelist
test could be useful, for example to populate our blacklist?  The
number of non-inlined kernel functions is far greater than 963, so
perhaps this default test run just looked at those functions listed by
the various tapsets.  If so, one'd need to add gross patterns like
kernel.function("*").call to give the kernel a manlier workout.

- FChE



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to