Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<ol> <li><p>Spruce was intended to work as follows. It provides a set of tests that make the kernel module for a given file system execute as many paths in the code as possible. It allows to use some external analyzers (such as the tools from <a href="https://github.com/euspectre/kedr" rel="nofollow">KEDR framework</a>) to detect different kinds of errors: memory leaks, etc.</p> <p>All that was primarily intended for x86.</p> <p>While it might be possible to port the tests themselves to ARM, one will need to choose the analyzers that work on that platform too. KEDR tools are currently for x86 only but one may try <a href="http://www.mjmwired.net/kernel/Documentation/kmemleak.txt" rel="nofollow">Kmemleak</a>, <a href="http://www.mjmwired.net/kernel/Documentation/fault-injection/" rel="nofollow">Fault injection facilities</a> and other tools on ARM instead.</p></li> <li><p>Spruce seems to be a work in progress still. I see, you opened a ticket concerning ARM support in their issue tracker, I think, it is the right thing to do.</p></li> <li><p>I would also suggest to take a look at <a href="http://www.phoronix-test-suite.com/" rel="nofollow">Phoronix Test Suite</a>. It is currently widely used for testing and benchmarking, including the analysis of file system kernel modules. See <a href="http://www.phoronix.com/scan.php?page=article&amp;item=linux_312_fs&amp;num=1" rel="nofollow">this article</a> for example. It <a href="http://www.phoronix.com/scan.php?page=news_item&amp;px=ODc5NA" rel="nofollow">seems to work on ARM</a> although I haven't tried it there myself.</p></li> </ol>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload