diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2019-01-31 10:57:46 +0100 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2019-01-31 11:35:53 +0100 |
| commit | 25e10a043498087f9427f0698b341d051c310fc4 (patch) | |
| tree | 7e7b9416711039e1d1f22ba216959cd94134a199 /sys/targets | |
| parent | 724adc544590747ce47c3be1b4a63951b7171188 (diff) | |
executor: remove ability to detect kernel bugs
This ability was never used but we maintain a bunch of code for it.
syzkaller also recently learned to spoof this error code
with some ptrace magic (probably intercepted control flow again
and exploited executor binary).
Drop all of it.
Diffstat (limited to 'sys/targets')
| -rw-r--r-- | sys/targets/common.go | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sys/targets/common.go b/sys/targets/common.go index 325e6ca88..0096bcf75 100644 --- a/sys/targets/common.go +++ b/sys/targets/common.go @@ -104,8 +104,8 @@ func (arch *UnixSanitizer) SanitizeCall(c *prog.Call) { } case "exit", "exit_group": code := c.Args[0].(*prog.ConstArg) - // These codes are reserved by executor. - if code.Val%128 == 67 || code.Val%128 == 68 { + // This code is reserved by executor. + if code.Val%128 == 67 { code.Val = 1 } } |
