From 2a4c6c0dbed891610b6d10f663c797e9e80d1981 Mon Sep 17 00:00:00 2001 From: Alexander Potapenko Date: Wed, 17 Sep 2025 12:16:39 +0200 Subject: executor: sys/linux/: pkg/runtest: pkg/vminfo: add syz_kvm_assert_syzos_kvm_exit Implement a pseudo-syscall to check the value of kvm_run.exit_reason --- pkg/runtest/run.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'pkg/runtest') diff --git a/pkg/runtest/run.go b/pkg/runtest/run.go index 99c5f4698..f242fa137 100644 --- a/pkg/runtest/run.go +++ b/pkg/runtest/run.go @@ -556,7 +556,7 @@ func checkCallResult(req *runRequest, isC bool, run, call int, info *flatrpc.Pro if req.ExecOpts.EnvFlags&flatrpc.ExecEnvSignal != 0 { callName := req.Prog.Calls[call].Meta.CallName // Pseudo-syscalls that might not provide any coverage when invoked. - noCovSyscalls := []string{"syz_btf_id_by_name", "syz_kvm_assert_syzos_uexit"} + noCovSyscalls := []string{"syz_btf_id_by_name", "syz_kvm_assert_syzos_uexit", "syz_kvm_assert_syzos_kvm_exit"} isNoCov := slices.Contains(noCovSyscalls, callName) // Signal is always deduplicated, so we may not get any signal // on a second invocation of the same syscall. -- cgit mrf-deployment