-
Notifications
You must be signed in to change notification settings - Fork 1
License
realmcu/vte
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Linux Test Project (Maintained by: Shubham Goyal <[email protected]>) The latest image is always available at http://ltp.sf.net About the Linux Test Project:: The Linux Test Project is a joint project with SGI, IBM, OSDL, and Bull with a goal to deliver test suites to the open source community that validate the reliability, robustness, and stability of Linux. The Linux Test Project is a collection of tools for testing the Linux kernel and related features. Our goal is to improve the Linux kernel by bringing test automation to the kernel testing effort. Interested open source contributors are encouraged to join the project. In the Package -------------- Here is a short description of what is included in this package INSTALL Installation documentation and quick start guide README This document CREDITS Credits to those who have contributed to the project. COPYING GNU General Public License VERSION LTP Version. Makefile Top level make file for LTP. runalltests.sh A simple script to run all of the packaged tests in sequential order and report the overall result. diskio.sh A simple script to run all the diskio tests that pertain to the CD-ROM and floppy disk file systems. networktests.sh A simple script to run all the network related tests that require another remote machine. doc/* Documentation for the project including man pages for some of the tools & library functions, as well as descriptions of every test. include/* lib/* The include and lib directories contain headers and codes for common routines used by many of the tests. We have tried to keep this to a minimum. testcases/* Contains all tests that run under the LTP as well as the "bin" directory, which has hardlinks to all the test executables. runtest/* It houses command lists that are used by ltp-pan for automated testing. pan/* The pan directory contains a simple, lightweight test harness. lpt-pan has the ability to run tests randomly and in parallel. See ltp-pan's man page for more information. scratch/* The scratch directory is a dumping ground for snippets and test cases that we found but haven't integrated into LTP yet. Feel free to suggest new snippets to be added, or take one of these and finish it off. testcases/kernel/containers/* Contains all the testcases related to container functionality ( e.g: sysvipc, utsname etc..) For further information on the each of the container functionality refer the following file: testcases/kernel/containers/README Warning! -------- Be careful with these tests! Don't run them on production systems. Growfiles, doio, and iogen in particular stress the I/O capabilities of systems and while they should not cause problems on properly functioning systems, they are intended to find (or cause) problems. Contact Information and Updates ------------------------------- URL: http://ltp.sf.net Questions and comments should be sent to the LTP mailing list located on the project page. Using KDUMP test automation suite --------------------------------- For more information on how to use the kdump test automation suite please refer to file testcases/kdump/README. Using NUMA test automation suite --------------------------------- For more information on how to use the 'numa' test automation suite please refer to file testcases/kernel/numa/README. --------------------------------- Enable CODE COVERAGE for your Kernel: --------------------------------- 1) Apply kernel-gcov patch(s) against the corresponding Kernel. They are available here: http://ltp.cvs.sourceforge.net/viewvc/ltp/utils/analysis/gcov-kernel/linux-2.*.*-gcov.patch?view=log, 2) Also enable the following options in your .config file before building the kernel CONFIG_GCOV_PROFILE=y CONFIG_GCOV_ALL=y CONFIG_GCOV_PROC=m CONFIG_GCOV_HAMMER=y --------------------------------- Enabling Kernel Configuration to test Containers/Namespaces --------------------------------- CONFIG_NAMESPACES=y CONFIG_UTS_NS=y CONFIG_IPC_NS=y CONFIG_USER_NS=y CONFIG_PID_NS=y CONFIG_NET_NS=y CONFIG_VETH=y CONFIG_MACVLAN=y The IPC namespaces do not automatically enable IPC, so you may also want to have: CONFIG_SYSVIPC=y CONFIG_SYSVIPC_SYSCTL=y CONFIG_POSIX_MQUEUE=y --------------------------------- Enabling Kernel Configuration to test Controllers --------------------------------- CONFIG_CGROUPS=y CONFIG_CGROUP_DEBUG=y CONFIG_CGROUP_NS=y CONFIG_GROUP_SCHED=y CONFIG_FAIR_GROUP_SCHED=y CONFIG_RT_GROUP_SCHED=y CONFIG_CGROUP_SCHED=y CONFIG_CGROUP_MEM_RES_CTLR=y CONFIG_LOCKDEP=y --------------------------------- Enabling Kernel Configuration to test Power Management features --------------------------------- CONFIG_CPU_FREQ=y CONFIG_CPU_FREQ_TABLE=y CONFIG_CPU_FREQ_DEBUG=y CONFIG_CPU_FREQ_STAT=y CONFIG_CPU_FREQ_STAT_DETAILS=y CONFIG_CPU_IDLE=y CONFIG_CPU_IDLE_GOV_LADDER=y CONFIG_CPU_IDLE_GOV_MENU=y CONFIG_SCHED_MC=y CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE=y CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE=y CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE=y CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND=y CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE=y CONFIG_CPU_FREQ_GOV_PERFORMANCE=y CONFIG_CPU_FREQ_GOV_POWERSAVE=y CONFIG_CPU_FREQ_GOV_USERSPACE=y CONFIG_CPU_FREQ_GOV_ONDEMAND=y CONFIG_CPU_FREQ_GOV_CONSERVATIVE=y --------------------------------- Enabling Kernel Configuration to test filecaps security feature --------------------------------- CONFIG_SECURITY_FILE_CAPABILITIES=y --------------------------------- Enabling Kernel Configuration to test p9auth security feature --------------------------------- CONFIG_CRYPTO=y CONFIG_STAGING=y # CONFIG_STAGING_EXCLUDE_BUILD is not set CONFIG_PLAN9AUTH=m (Or CONFIG_PLAN9AUTH=y) You also will need openssl installed. You will also need to have an user named 'ltp' created to execute this test. --------------------------------- Enabling Kernel Configuration to test SELinux security feature --------------------------------- Your Kernel should have been built with the following options to test SELinux: CONFIG_SECURITY=y CONFIG_SECURITY_NETWORK=y CONFIG_SECURITY_NETWORK_XFRM=y CONFIG_SECURITY_DEFAULT_MMAP_MIN_ADDR=0 This has to be set to a positive value if you want to test this check. Fedora kernels set it to 65536. CONFIG_SECURITY_SELINUX=y CONFIG_SECURITY_SELINUX_BOOTPARAM=y CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE=1 CONFIG_SECURITY_SELINUX_DEVELOP=y CONFIG_SECURITY_SELINUX_AVC_STATS=y CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1 CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT=y CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX=y You don't want this one unless you are running Fedora 3 or 4. On anything newer, it will cause unnecessary policy expansion. CONFIG_SECURITY_SMACK=y CONFIG_SECURITY_SELINUX=y By default, if you boot with multiple LSMs compiled into the kernel, the kernel won't boot succesfully - there can be only one (aside from explicit internal "stacking" e.g. as is done for combining SELinux or Smack with capabilities). Unless you use the security= option to select one at boot. SELinux and Smack will honor the security= option. --------------------------------- --------------------------------- Enabling Kernel Configuration to test SMACK security feature --------------------------------- CONFIG_NETLABEL=y CONFIG_SECURITY=y CONFIG_SECURITY_NETWORK=y CONFIG_SECURITY_SMACK=y CONFIG_SECURITY_SELINUX should not be set For more information to build/install/run these tests, look through: ltp/testcases/kernel/security/smack/README --------------------------------- --------------------------------- Enablement for Enhancement to kexec/kdump for implementing the following features: - Backup/restore memory used by the original kernel before/after kexec. - Save/restore CPU state before/after kexec. Now, only the i386 architecture is supported. More from the following git logs: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3ab83521378268044a448113c6aa9a9e245f4d2f, http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89081d17f7bb81d89fa1aa9b70f821c5cf4d39e9, --------------------------------- CONFIG_X86_32=y CONFIG_RELOCATABLE=y CONFIG_KEXEC=y CONFIG_CRASH_DUMP=y CONFIG_PM=y CONFIG_HIBERNATION=y CONFIG_KEXEC_JUMP=y --------------------------------- Enabling HOTPLUG for your Kernels --------------------------------- CONFIG_HOTPLUG=y CONFIG_HOTPLUG_CPU=y CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=y CONFIG_ACPI_HOTPLUG_CPU=y CONFIG_HOTPLUG_PCI_PCIE=y CONFIG_HOTPLUG_PCI=y CONFIG_HOTPLUG_PCI_FAKE=y CONFIG_HOTPLUG_PCI_COMPAQ=y CONFIG_HOTPLUG_PCI_COMPAQ_NVRAM=y CONFIG_HOTPLUG_PCI_IBM=y CONFIG_HOTPLUG_PCI_ACPI=y CONFIG_HOTPLUG_PCI_ACPI_IBM=y CONFIG_HOTPLUG_PCI_CPCI=y CONFIG_HOTPLUG_PCI_CPCI_ZT5550=y CONFIG_HOTPLUG_PCI_CPCI_GENERIC=y CONFIG_HOTPLUG_PCI_SHPC=y --------------------------------- Video For Linux Two API testing Requirements: You need to have a video device (i.e. webcam, tuner card, etc.) connected to your system and available under /dev/video0. If you don't have any hardware device available, you can still test the "Virtual Video Driver". To compile this you need to compile your kernel with CONFIG_VIDEO_VIVI=m under: -> Device Drivers -> Multimedia devices -> Video For Linux -> Video capture adapters -> Virtual Video Driver The tests also require CUnit Framework to be installed before compiling the tests. Download & Install the same from: http://sourceforge.net/projects/cunit/ --------------------------------- --------------------------------- Native language support (nls) testsuite requirements ---------------------------------------------------- CONFIG_NLS=m CONFIG_BLOCK=y --------------------------------- Enabling Controller area network (CAN) protocol support for your Kernels --------------------------------- CONFIG_NET=y CONFIG_CAN=m CONFIG_CAN_RAW=m CONFIG_CAN_BCM=m # CAN Device Drivers CONFIG_CAN_VCAN=m --------------------------------- Enabling Fault Injection Support for your kernel (version 2.6.29). Please check with the original kernel for the fault injection types it supports. Following supports will be available: /sys/kernel/debug/fail_io_timeout/interval /sys/kernel/debug/fail_io_timeout/probability /sys/kernel/debug/fail_io_timeout/reject-end /sys/kernel/debug/fail_io_timeout/reject-start /sys/kernel/debug/fail_io_timeout/require-end /sys/kernel/debug/fail_io_timeout/require-start /sys/kernel/debug/fail_io_timeout/space /sys/kernel/debug/fail_io_timeout/stacktrace-depth /sys/kernel/debug/fail_io_timeout/task-filter /sys/kernel/debug/fail_io_timeout/times /sys/kernel/debug/fail_io_timeout/verbose /sys/kernel/debug/fail_make_request/interval /sys/kernel/debug/fail_make_request/probability /sys/kernel/debug/fail_make_request/reject-end /sys/kernel/debug/fail_make_request/reject-start /sys/kernel/debug/fail_make_request/require-end /sys/kernel/debug/fail_make_request/require-start /sys/kernel/debug/fail_make_request/space /sys/kernel/debug/fail_make_request/stacktrace-depth /sys/kernel/debug/fail_make_request/task-filter /sys/kernel/debug/fail_make_request/times /sys/kernel/debug/fail_make_request/verbose /sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem /sys/kernel/debug/fail_page_alloc/ignore-gfp-wait /sys/kernel/debug/fail_page_alloc/interval /sys/kernel/debug/fail_page_alloc/min-order /sys/kernel/debug/fail_page_alloc/probability /sys/kernel/debug/fail_page_alloc/reject-end /sys/kernel/debug/fail_page_alloc/reject-start /sys/kernel/debug/fail_page_alloc/require-end /sys/kernel/debug/fail_page_alloc/require-start /sys/kernel/debug/fail_page_alloc/space /sys/kernel/debug/fail_page_alloc/stacktrace-depth /sys/kernel/debug/fail_page_alloc/task-filter /sys/kernel/debug/fail_page_alloc/times /sys/kernel/debug/fail_page_alloc/verbose /sys/kernel/debug/failslab/ignore-gfp-wait /sys/kernel/debug/failslab/interval /sys/kernel/debug/failslab/probability /sys/kernel/debug/failslab/reject-end /sys/kernel/debug/failslab/reject-start /sys/kernel/debug/failslab/require-end /sys/kernel/debug/failslab/require-start /sys/kernel/debug/failslab/space /sys/kernel/debug/failslab/stacktrace-depth /sys/kernel/debug/failslab/task-filter /sys/kernel/debug/failslab/times /sys/kernel/debug/failslab/verbose when the below kernel config options are set: CONFIG_FAULT_INJECTION=y CONFIG_DEBUG_KERNEL=y CONFIG_FAILSLAB=y (Fault-injection capability for kmalloc) (CONFIG_SLAB=y || CONFIG_SLUB=y) if CONFIG_FAILSLAB=y CONFIG_FAIL_PAGE_ALLOC=y (Fault-injection capabilitiy for alloc_pages()) CONFIG_FAIL_MAKE_REQUEST=y (Fault-injection capability for disk IO) CONFIG_BLOCK=y if CONFIG_FAIL_MAKE_REQUEST=y CONFIG_FAIL_IO_TIMEOUT=y (Faul-injection capability for faking disk interrupts) CONFIG_BLOCK=y if CONFIG_FAIL_IO_TIMEOUT=y CONFIG_FAULT_INJECTION_DEBUG_FS=y (Debugfs entries for fault-injection capabilities) (CONFIG_SYSFS=y && CONFIG_DEBUG_FS=y) if CONFIG_FAULT_INJECTION_DEBUG_FS=y CONFIG_FAULT_INJECTION_STACKTRACE_FILTER=y (stacktrace filter for fault-injection capabilities) (CONFIG_FAULT_INJECTION_DEBUG_FS=y && CONFIG_STACKTRACE_SUPPORT=y && !CONFIG_X86_64) if CONFIG_FAULT_INJECTION_STACKTRACE_FILTER=y For more information on Fault injection, please refer to: linux-2.6/Documentation/fault-injection/fault-injection.txt, You should also have made the following entries in your /etc/fstab file once the kernel is booted with the above CONFIG options set: debugfs /sys/kernel/debug/ debugfs # How the Kernel Fault Injection works for LTP ? 1) Build Kernel with all the above possible kernel CONFIG Options, 2) Create the above entry in /etc/fstab file, 3) Reboot in the new kernel, 4) Goto LTPROOT. Build and Install LTP as per ltp/INSTALL file, 5) Choose your own test(or default) to run with fault injection as follows: ./runltp -f <command_file> -F <LOOPS>,<FAULT_PROBABILITY> The algorithm functions like: loop (for each testcase) begin execute_testcase(inside_stable_kernel) begin insert_fault_into_kernel() loop X Times begin execute_testcase(inside_fault_kernel) end restore_kernel_to_normal() end end # External TODOs: 1) Add or modify testcases when relevant kernel functionality changes. --------------------------------- --------------------------------- Enabling Kernel Configuration to test ext4 new features --------------------------------- CONFIG_EXT4_FS=y CONFIG_EXT4DEV_COMPAT=y CONFIG_EXT4_FS_XATTR=y CONFIG_EXT4_FS_POSIX_ACL=y CONFIG_EXT4_FS_SECURITY=y Beside that, the following packages are necessary. e2fsprogs e2fsprogs-devel e2fsprogs-libs And the version of packages must be 1.41.4 or above. For more information to build/install/run these tests, look through: ltp/testcases/kernel/fs/ext4-new-features/README ---------------------------------
About
No description, website, or topics provided.
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published