diff options
| author | Aleksandr Nogikh <nogikh@google.com> | 2021-09-03 16:20:07 +0000 |
|---|---|---|
| committer | Aleksandr Nogikh <wp32pw@gmail.com> | 2021-09-22 15:40:02 +0200 |
| commit | 1c202847db0380015a8920bfd21375c2d9f28ddb (patch) | |
| tree | 6693da3a936398a9ac6678842ac181c5f0e3e429 /prog/decodeexec.go | |
| parent | a7ce77be27d8e3728b97122a005bc5b23298cfc3 (diff) | |
all: refactor fault injection into call props
Now that call properties mechanism is implemented, we can refactor
fault injection.
Unfortunately, it is impossible to remove all traces of the previous apprach.
In reprolist and while performing syz-ci jobs, syzkaller still needs to
parse the old format.
Remove the old prog options-based approach whenever possible and replace
it with the use of call properties.
Diffstat (limited to 'prog/decodeexec.go')
| -rw-r--r-- | prog/decodeexec.go | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/prog/decodeexec.go b/prog/decodeexec.go index ff1ab5727..f803d5b4c 100644 --- a/prog/decodeexec.go +++ b/prog/decodeexec.go @@ -115,13 +115,14 @@ func (dec *execDecoder) parse() { case execInstrEOF: dec.commitCall() return + case execInstrSetProps: + dec.readCallProps(&dec.call.Props) default: dec.commitCall() if instr >= uint64(len(dec.target.Syscalls)) { dec.setErr(fmt.Errorf("bad syscall %v", instr)) return } - dec.readCallProps(&dec.call.Props) dec.call.Meta = dec.target.Syscalls[instr] dec.call.Index = dec.read() for i := dec.read(); i > 0; i-- { |
