[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1481417456-28826-1-git-send-email-alex.popov@linux.com>
Date: Sun, 11 Dec 2016 03:50:54 +0300
From: Alexander Popov <alex.popov@...ux.com>
To: Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will.deacon@....com>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
Mark Rutland <mark.rutland@....com>,
Rob Herring <robh@...nel.org>,
Kefeng Wang <wangkefeng.wang@...wei.com>,
AKASHI Takahiro <takahiro.akashi@...aro.org>,
Jon Masters <jcm@...hat.com>,
David Daney <david.daney@...ium.com>,
Ganapatrao Kulkarni <gkulkarni@...iumnetworks.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Dmitry Vyukov <dvyukov@...gle.com>,
Nicolai Stange <nicstange@...il.com>,
James Morse <james.morse@....com>,
Andrey Ryabinin <aryabinin@...tuozzo.com>,
Andrey Konovalov <andreyknvl@...gle.com>,
Alexander Popov <alex.popov@...ux.com>,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
syzkaller <syzkaller@...glegroups.com>
Subject: [PATCH 0/2] Make kcov work properly with KASLR enabled
If CONFIG_RANDOMIZE_BASE is enabled, kcov currently reports kernel addresses
including the random offset which breaks the coverage-guided fuzzing on x86_64 and
AArch64. Fix that by subtracting kaslr_offset() return value.
Alexander Popov (2):
arm64: setup: introduce kaslr_offset()
kcov: make kcov work properly with KASLR enabled
arch/arm64/include/asm/setup.h | 19 +++++++++++++++++++
arch/arm64/include/uapi/asm/setup.h | 4 ++--
arch/arm64/kernel/setup.c | 8 ++++----
kernel/kcov.c | 8 +++++++-
4 files changed, 32 insertions(+), 7 deletions(-)
create mode 100644 arch/arm64/include/asm/setup.h
--
2.7.4
Powered by blists - more mailing lists