blob: f23d9e334b6192c1fd2bc18013482d181f0c90f9 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
|
# Copyright 2018 syzkaller project authors. All rights reserved.
# Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file.
syz_emit_ethernet(len len[packet], packet ptr[in, array[int8]])
tcp_resources {
seq int32
ack int32
}
# These pseudo syscalls read a packet from tap device and extract tcp sequence and acknowledgement numbers from it.
# They also adds the inc arguments to the returned values, this way sequence numbers get incremented.
syz_extract_tcp_res(res ptr[out, tcp_resources], seq_inc int32, ack_inc int32)
syz_extract_tcp_res$synack(res ptr[out, tcp_resources], seq_inc const[1], ack_inc const[0])
|