Module Name: src Committed By: kamil Date: Wed May 22 08:31:26 UTC 2019
Modified Files: src/share/mk: bsd.sys.mk src/sys/arch/amd64/conf: Makefile.amd64 Log Message: Allow to use KCOV + kASan together Stop instrumenting KCOV files with kASan and the other way around. This fixes booting of the setup of using them together. In theory the checks could be more fine grained, however there is no good reason (except extra DIAGNISTIC) for running a kernel sanitizer without kernel coverage. Patch by <R3x> To generate a diff of this commit: cvs rdiff -u -r1.291 -r1.292 src/share/mk/bsd.sys.mk cvs rdiff -u -r1.76 -r1.77 src/sys/arch/amd64/conf/Makefile.amd64 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/share/mk/bsd.sys.mk diff -u src/share/mk/bsd.sys.mk:1.291 src/share/mk/bsd.sys.mk:1.292 --- src/share/mk/bsd.sys.mk:1.291 Sat Feb 23 03:10:06 2019 +++ src/share/mk/bsd.sys.mk Wed May 22 08:31:25 2019 @@ -1,4 +1,4 @@ -# $NetBSD: bsd.sys.mk,v 1.291 2019/02/23 03:10:06 kamil Exp $ +# $NetBSD: bsd.sys.mk,v 1.292 2019/05/22 08:31:25 kamil Exp $ # # Build definitions used for NetBSD source tree builds. @@ -242,7 +242,7 @@ CFLAGS+= ${KLEAKFLAGS.${.IMPSRC:T}:U${KL .if ${KCOV:U0} > 0 KCOVFLAGS= -fsanitize-coverage=trace-pc -.for f in subr_kcov.c subr_lwp_specificdata.c subr_specificdata.c +.for f in subr_kcov.c subr_lwp_specificdata.c subr_specificdata.c subr_asan.c KCOVFLAGS.${f}= # empty .endfor CFLAGS+= ${KCOVFLAGS.${.IMPSRC:T}:U${KCOVFLAGS}} Index: src/sys/arch/amd64/conf/Makefile.amd64 diff -u src/sys/arch/amd64/conf/Makefile.amd64:1.76 src/sys/arch/amd64/conf/Makefile.amd64:1.77 --- src/sys/arch/amd64/conf/Makefile.amd64:1.76 Sun Feb 24 08:02:45 2019 +++ src/sys/arch/amd64/conf/Makefile.amd64 Wed May 22 08:31:25 2019 @@ -1,4 +1,4 @@ -# $NetBSD: Makefile.amd64,v 1.76 2019/02/24 08:02:45 maxv Exp $ +# $NetBSD: Makefile.amd64,v 1.77 2019/05/22 08:31:25 kamil Exp $ # Makefile for NetBSD # @@ -54,7 +54,7 @@ KASANFLAGS= -fsanitize=kernel-address \ --param asan-globals=1 --param asan-stack=1 \ -fsanitize-address-use-after-scope \ -fasan-shadow-offset=0xDFFF900000000000 -.for f in subr_asan.c +.for f in subr_asan.c subr_kcov.c subr_lwp_specificdata.c subr_specificdata.c KASANFLAGS.${f}= # empty .endfor CFLAGS+= ${KASANFLAGS.${.IMPSRC:T}:U${KASANFLAGS}}