Enable COVERAGE and KCOV by default on arm64 and amd64.
This allows userspace to trace the kernel using the coverage sanitizer found in clang. It will also allow other coverage tools to be built as modules and attach into the same framework. Sponsored by: DARPA, AFRL
This commit is contained in:
parent
3ca1c423aa
commit
634a8a8873
@ -102,8 +102,8 @@ options MALLOC_DEBUG_MAXZONES=8 # Separate malloc(9) zones
|
||||
options VERBOSE_SYSINIT=0 # Support debug.verbose_sysinit, off by default
|
||||
|
||||
# Kernel Sanitizers
|
||||
#options COVERAGE # Generic kernel coverage. Used by KCOV
|
||||
#options KCOV # Kernel Coverage Sanitizer
|
||||
options COVERAGE # Generic kernel coverage. Used by KCOV
|
||||
options KCOV # Kernel Coverage Sanitizer
|
||||
# Warning: KUBSAN can result in a kernel too large for loader to load
|
||||
#options KUBSAN # Kernel Undefined Behavior Sanitizer
|
||||
|
||||
|
@ -94,8 +94,8 @@ options USB_DEBUG # enable debug msgs
|
||||
options VERBOSE_SYSINIT=0 # Support debug.verbose_sysinit, off by default
|
||||
|
||||
# Kernel Sanitizers
|
||||
#options COVERAGE # Generic kernel coverage. Used by KCOV
|
||||
#options KCOV # Kernel Coverage Sanitizer
|
||||
options COVERAGE # Generic kernel coverage. Used by KCOV
|
||||
options KCOV # Kernel Coverage Sanitizer
|
||||
# Warning: KUBSAN can result in a kernel too large for loader to load
|
||||
#options KUBSAN # Kernel Undefined Behavior Sanitizer
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user