From ebfe5a54b7a02fa9f10b71bcda74737fb8c7b50b Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Fri, 27 Apr 2018 14:16:47 +0200 Subject: syz-fuzzer: use proper pointer size when checking coverage --- syz-fuzzer/fuzzer_linux.go | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/syz-fuzzer/fuzzer_linux.go b/syz-fuzzer/fuzzer_linux.go index b91b7bac0..46f07e0ac 100644 --- a/syz-fuzzer/fuzzer_linux.go +++ b/syz-fuzzer/fuzzer_linux.go @@ -8,6 +8,7 @@ import ( "os" "syscall" "time" + "unsafe" "github.com/google/syzkaller/pkg/log" "github.com/google/syzkaller/sys/linux" @@ -153,7 +154,7 @@ func checkCompsSupported() (kcov, comps bool) { log.Logf(1, "KCOV_CHECK: KCOV_INIT_TRACE = %v", errno) return } - _, err = syscall.Mmap(fd, 0, int(coverSize*8), + _, err = syscall.Mmap(fd, 0, int(coverSize*unsafe.Sizeof(uintptr(0))), syscall.PROT_READ|syscall.PROT_WRITE, syscall.MAP_SHARED) if err != nil { log.Logf(1, "KCOV_CHECK: mmap = %v", err) -- cgit mrf-deployment