* Anyone running crashme?
@ 2003-01-17 1:26 Greg Lindahl
2003-01-17 7:41 ` Kevin D. Kissell
2003-01-20 19:44 ` Jun Sun
0 siblings, 2 replies; 4+ messages in thread
From: Greg Lindahl @ 2003-01-17 1:26 UTC (permalink / raw)
To: linux-mips
I've been running crashme a little against Linux mips, and from the
bugs I immediately found I suspect that no one's been running it.
Crashme generates random bytes and then executes them, catching the
resulting signals and generating more random bytes. The random number
seed is provided by the user, so that problems are repeatable.
If you like debugging, you can find the source at:
http://people.delphiforums.com/gjc/crashme.html
-- greg
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Anyone running crashme?
@ 2003-01-17 7:41 ` Kevin D. Kissell
0 siblings, 0 replies; 4+ messages in thread
From: Kevin D. Kissell @ 2003-01-17 7:41 UTC (permalink / raw)
To: Greg Lindahl, linux-mips
Actiually, we've been using crashme at MIPS
for several years now, both to torture the Linux
kernel and to push our chip designs into unexpected
corner cases. We found a fair number of kernel
bugs, and fixed them in our internal sources
(snapshots are generally available under
ftp://ftp.mips.com/pub/linux/mips/kernel )
and have pushed our fixes out toward the
mainline distributions. That's not to say that
they all get there.
Two things to watch out for: There is a class
of crashme misbehavior, usually manifest in
forked threads that do not terminate correctly
until the program is shut down, that arises not
from a kernel bug, but from a libc built with
downrev kernel headers. And if you have a
CPU that supports EJTAG, you either need to
make sure that your boot ROM has code at the
EJTAG debug exception vector that jumps to the
EJTAG kseg0 pseudo-vector used by the Linux
kernel (well, *our* Linux kernel anyway ;-),
or you need to put a filter in crashme to ensure
that it does not generate EJTAG debug breakpoint
instructions.
But I'm glad to see that someone else is using it.
----- Original Message -----
From: "Greg Lindahl" <lindahl@keyresearch.com>
To: <linux-mips@linux-mips.org>
Sent: Friday, January 17, 2003 2:26 AM
Subject: Anyone running crashme?
> I've been running crashme a little against Linux mips, and from the
> bugs I immediately found I suspect that no one's been running it.
> Crashme generates random bytes and then executes them, catching the
> resulting signals and generating more random bytes. The random number
> seed is provided by the user, so that problems are repeatable.
>
> If you like debugging, you can find the source at:
>
> http://people.delphiforums.com/gjc/crashme.html
>
> -- greg
>
>
>
>
>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Anyone running crashme?
@ 2003-01-17 7:41 ` Kevin D. Kissell
0 siblings, 0 replies; 4+ messages in thread
From: Kevin D. Kissell @ 2003-01-17 7:41 UTC (permalink / raw)
To: Greg Lindahl, linux-mips
Actiually, we've been using crashme at MIPS
for several years now, both to torture the Linux
kernel and to push our chip designs into unexpected
corner cases. We found a fair number of kernel
bugs, and fixed them in our internal sources
(snapshots are generally available under
ftp://ftp.mips.com/pub/linux/mips/kernel )
and have pushed our fixes out toward the
mainline distributions. That's not to say that
they all get there.
Two things to watch out for: There is a class
of crashme misbehavior, usually manifest in
forked threads that do not terminate correctly
until the program is shut down, that arises not
from a kernel bug, but from a libc built with
downrev kernel headers. And if you have a
CPU that supports EJTAG, you either need to
make sure that your boot ROM has code at the
EJTAG debug exception vector that jumps to the
EJTAG kseg0 pseudo-vector used by the Linux
kernel (well, *our* Linux kernel anyway ;-),
or you need to put a filter in crashme to ensure
that it does not generate EJTAG debug breakpoint
instructions.
But I'm glad to see that someone else is using it.
----- Original Message -----
From: "Greg Lindahl" <lindahl@keyresearch.com>
To: <linux-mips@linux-mips.org>
Sent: Friday, January 17, 2003 2:26 AM
Subject: Anyone running crashme?
> I've been running crashme a little against Linux mips, and from the
> bugs I immediately found I suspect that no one's been running it.
> Crashme generates random bytes and then executes them, catching the
> resulting signals and generating more random bytes. The random number
> seed is provided by the user, so that problems are repeatable.
>
> If you like debugging, you can find the source at:
>
> http://people.delphiforums.com/gjc/crashme.html
>
> -- greg
>
>
>
>
>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Anyone running crashme?
2003-01-17 1:26 Anyone running crashme? Greg Lindahl
2003-01-17 7:41 ` Kevin D. Kissell
@ 2003-01-20 19:44 ` Jun Sun
1 sibling, 0 replies; 4+ messages in thread
From: Jun Sun @ 2003-01-20 19:44 UTC (permalink / raw)
To: linux-mips; +Cc: jsun
I have crashme running on several boards here. The only problem
found is that kernel does not check for MDMX exception
for newer CPUs, which is already fixed in the tree.
Jun
On Thu, Jan 16, 2003 at 05:26:44PM -0800, Greg Lindahl wrote:
> I've been running crashme a little against Linux mips, and from the
> bugs I immediately found I suspect that no one's been running it.
> Crashme generates random bytes and then executes them, catching the
> resulting signals and generating more random bytes. The random number
> seed is provided by the user, so that problems are repeatable.
>
> If you like debugging, you can find the source at:
>
> http://people.delphiforums.com/gjc/crashme.html
>
> -- greg
>
>
>
>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2003-01-20 19:44 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-01-17 1:26 Anyone running crashme? Greg Lindahl
2003-01-17 7:41 ` Kevin D. Kissell
2003-01-17 7:41 ` Kevin D. Kissell
2003-01-20 19:44 ` Jun Sun
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.