From owner-freebsd-current@freebsd.org Thu Aug 8 16:15:28 2019 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 25F8DAA979 for ; Thu, 8 Aug 2019 16:15:28 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 464D4H6CnXz4WB7 for ; Thu, 8 Aug 2019 16:15:27 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id D523FAA978; Thu, 8 Aug 2019 16:15:27 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D3BE0AA977 for ; Thu, 8 Aug 2019 16:15:27 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.franken.de", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 464D4H3KlTz4WB5; Thu, 8 Aug 2019 16:15:27 +0000 (UTC) (envelope-from tuexen@freebsd.org) Received: from [IPv6:2a02:8109:1140:c3d:74b3:4ddc:d2a0:1393] (unknown [IPv6:2a02:8109:1140:c3d:74b3:4ddc:d2a0:1393]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id C9522721E281A; Thu, 8 Aug 2019 18:15:23 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: kernel module code coverage From: Michael Tuexen In-Reply-To: Date: Thu, 8 Aug 2019 18:15:23 +0200 Cc: "slavash@freebsd.org" , current Content-Transfer-Encoding: 7bit Message-Id: References: To: Alan Somers X-Mailer: Apple Mail (2.3445.104.11) X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail-n.franken.de X-Rspamd-Queue-Id: 464D4H3KlTz4WB5 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.91 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.91)[-0.910,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Aug 2019 16:15:28 -0000 > On 8. Aug 2019, at 15:52, Alan Somers wrote: > > On Thu, Aug 8, 2019 at 7:42 AM Michael Tuexen wrote: >> >> >> >>> On 8. Aug 2019, at 14:24, Slava Shwartsman wrote: >>> >>> Apparently, Bullseye are dropping support for FreeBSD. >>> >>> We are looking for an alternative for kernel module run time analysis. >>> Mostly interested in code coverage (for now). >>> >>> Any suggestions that work for you? >> Have you looked into /dev/kcov. This is used by SYZKALLER for getting >> coverage information from the kernel. >> >> Best regards >> Michael >>> >>> >>> Slava > > That's part of Matt Macy's gcov project, right?. However, while it > works for the kernel itself, it doesn't work for modules. > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=239194 > -Alan I think it came from Andrew... So you might assign the bug to him or at least get him in the loop. Best regards Michael