From 08b12344149080c5f71deae8d8f63662d1a7be2d Mon Sep 17 00:00:00 2001 From: Alexander Potapenko Date: Wed, 10 Sep 2025 15:36:25 +0200 Subject: executor: introduce __no_stack_protector and use it for guest code When compiling the executor in syz-env-old, -fstack-protector may kick in and introduce global accesses that tools/check-syzos.sh reports. To prevent this, introduce the __no_stack_protector macro attribute that disable stack protection for the function in question, and use it for guest code. While at it, factor out some common definitions into common_kvm_syzos.h --- executor/common_kvm_amd64_syzos.h | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) (limited to 'executor/common_kvm_amd64_syzos.h') diff --git a/executor/common_kvm_amd64_syzos.h b/executor/common_kvm_amd64_syzos.h index 32e09e0ba..655e83ce3 100644 --- a/executor/common_kvm_amd64_syzos.h +++ b/executor/common_kvm_amd64_syzos.h @@ -3,21 +3,11 @@ // This file provides guest code running inside the AMD64 KVM. +#include "common_kvm_syzos.h" #include "kvm.h" #include #include -// Host will map the code in this section into the guest address space. -#define GUEST_CODE __attribute__((section("guest"))) - -// Prevent function inlining. This attribute is applied to every guest_handle_* function, -// making sure they remain small so that the compiler does not attempt to be too clever -// (e.g. generate switch tables). -#define noinline __attribute__((noinline)) - -// Start/end of the guest section. -extern char *__start_guest, *__stop_guest; - // Compilers will eagerly try to transform the switch statement in guest_main() // into a jump table, unless the cases are sparse enough. // We use prime numbers multiplied by 10 to prevent this behavior. -- cgit mrf-deployment