public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* whitelist test of current tapset and all kernel.function("*") functions
@ 2006-11-15 19:50 Gui,Jian
  0 siblings, 0 replies; only message in thread
From: Gui,Jian @ 2006-11-15 19:50 UTC (permalink / raw)
  To: systemtap, prasadav, guanglei

[-- Attachment #1: Type: text/plain, Size: 1824 bytes --]

Hi,

I updated the whitelist case
(http://sourceware.org/ml/systemtap/2006-q4/msg00143.html)
and tested the probe points in current tapset and kernel functiosns.

Here are the results on my ppc64 box:

For current tapset:
    920 probes.all          -- initial probe points to be tested
      0 probes.failed       -- causing crash and unrecorded in probe.out
    455 probes.passed       -- whitelist,for those recorded at least once
    465 probes.untriggered  -- probed without crash but unrecorded

For all kernel.function("*") probe points:
   13119 probes.all
     100 probes.failed (more iterations shows "_read_lock" causes this crash)
    2415 probes.passed
   10604 probes.untriggered

Usages:
  0) Please jump to 6) directly if you use all default settings
  1) Define your list of probe points in a file named "probes.all";
     otherwise, it will be automatically extracted from
       stap -p2 -e 'probe kernel.function("*"){}
  2) Define your own workloads by changing the "benchs" list variable;
     otherwise, several LTP testcases will be used
  3) Define how may times you want the test to be iterated by changing
     MAX_RUNNING_LEVEL variable; otherwise, 3 is the default
  4) Define the group size for different iteration level by changing
     proper_current_size() function; otherwise, they will be set in
     a decreasing order based on the length of probes.all
  5) Remove /stp_genwhitelist_running if you want to start a test from
     the beginning after a system crash
  6) Start a test:
       runtest whitelist.exp

The coverage of probe points is still a problem. For tapset, there
are a lot of syscalls and NFS/RPC server probe points untriggered.
The total coverage is 50% for tapset and 18.4% for all kernel
functions(probe points in bug 3441 are removed).

Any idea? Thanks.

-Gui,Jian

[-- Attachment #2: gen_whitelist.tgz --]
[-- Type: application/octet-stream, Size: 12740 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-11-15 10:14 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-11-15 19:50 whitelist test of current tapset and all kernel.function("*") functions Gui,Jian

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).