diff options
| author | Alexander Potapenko <glider@google.com> | 2025-05-12 16:03:45 +0200 |
|---|---|---|
| committer | Alexander Potapenko <glider@google.com> | 2025-05-12 15:38:13 +0000 |
| commit | f6671af7193a6d6860e38e17e108afb5934568dc (patch) | |
| tree | 1cd78eea64fb18d97302e52b5d498360104a6b44 /sys/linux | |
| parent | 77908e5f2ae80bee6d434bca762a25a0a5fc6a83 (diff) | |
executor: arm64: syzos: prevent jump table emission
When compiling SYZOS into the executor binary, the compiler often
attempts to emit a jump table, putting it into the data section
of the executor. SYZOS is unable to access that data and crashes.
Use primes multiplied by 10 to defeat the compiler's heuristics
for jump table emission.
Diffstat (limited to 'sys/linux')
| -rw-r--r-- | sys/linux/dev_kvm_arm64.txt | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/sys/linux/dev_kvm_arm64.txt b/sys/linux/dev_kvm_arm64.txt index ef9a1a4b7..d4dfde828 100644 --- a/sys/linux/dev_kvm_arm64.txt +++ b/sys/linux/dev_kvm_arm64.txt @@ -203,13 +203,13 @@ type syzos_api[NUM, PAYLOAD] { syzos_api_call [ uexit syzos_api[0, intptr] - code syzos_api[1, syzos_api_code] - msr syzos_api[2, syzos_api_msr] - smc syzos_api[3, syzos_api_smccc] - hvc syzos_api[4, syzos_api_smccc] - irq_setup syzos_api[5, syzos_api_irq_setup] - memwrite syzos_api[6, syzos_api_memwrite] - its_setup syzos_api[7, syzos_api_its_setup] - its_send_cmd syzos_api[8, syzos_api_its_send_cmd] - mrs syzos_api[9, syzos_api_mrs] + code syzos_api[10, syzos_api_code] + msr syzos_api[20, syzos_api_msr] + smc syzos_api[30, syzos_api_smccc] + hvc syzos_api[50, syzos_api_smccc] + irq_setup syzos_api[70, syzos_api_irq_setup] + memwrite syzos_api[110, syzos_api_memwrite] + its_setup syzos_api[130, syzos_api_its_setup] + its_send_cmd syzos_api[170, syzos_api_its_send_cmd] + mrs syzos_api[190, syzos_api_mrs] ] [varlen] |
