lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 11 Dec 2016 03:50:54 +0300 From: Alexander Popov <alex.popov@...ux.com> To: Catalin Marinas <catalin.marinas@....com>, Will Deacon <will.deacon@....com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Mark Rutland <mark.rutland@....com>, Rob Herring <robh@...nel.org>, Kefeng Wang <wangkefeng.wang@...wei.com>, AKASHI Takahiro <takahiro.akashi@...aro.org>, Jon Masters <jcm@...hat.com>, David Daney <david.daney@...ium.com>, Ganapatrao Kulkarni <gkulkarni@...iumnetworks.com>, Andrew Morton <akpm@...ux-foundation.org>, Dmitry Vyukov <dvyukov@...gle.com>, Nicolai Stange <nicstange@...il.com>, James Morse <james.morse@....com>, Andrey Ryabinin <aryabinin@...tuozzo.com>, Andrey Konovalov <andreyknvl@...gle.com>, Alexander Popov <alex.popov@...ux.com>, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, syzkaller <syzkaller@...glegroups.com> Subject: [PATCH 0/2] Make kcov work properly with KASLR enabled If CONFIG_RANDOMIZE_BASE is enabled, kcov currently reports kernel addresses including the random offset which breaks the coverage-guided fuzzing on x86_64 and AArch64. Fix that by subtracting kaslr_offset() return value. Alexander Popov (2): arm64: setup: introduce kaslr_offset() kcov: make kcov work properly with KASLR enabled arch/arm64/include/asm/setup.h | 19 +++++++++++++++++++ arch/arm64/include/uapi/asm/setup.h | 4 ++-- arch/arm64/kernel/setup.c | 8 ++++---- kernel/kcov.c | 8 +++++++- 4 files changed, 32 insertions(+), 7 deletions(-) create mode 100644 arch/arm64/include/asm/setup.h -- 2.7.4
Powered by blists - more mailing lists