If CONFIG_RANDOMIZE_BASE is enabled, kcov currently reports kernel addresses including the random offset which breaks the coverage-guided fuzzing on x86_64 and AArch64. Fix that by subtracting kaslr_offset() return value.
Alexander Popov (2): arm64: setup: introduce kaslr_offset() kcov: make kcov work properly with KASLR enabled arch/arm64/include/asm/setup.h | 19 +++++++++++++++++++ arch/arm64/include/uapi/asm/setup.h | 4 ++-- arch/arm64/kernel/setup.c | 8 ++++---- kernel/kcov.c | 8 +++++++- 4 files changed, 32 insertions(+), 7 deletions(-) create mode 100644 arch/arm64/include/asm/setup.h -- 2.7.4