syzkaller/csource
Dmitry Vyukov f810d08444 executor: protect against memory corruptions better
Fuzzer has figured out how to corrupt input/output shmem regions
abusing the text memcpy in syz_kvm_setup_cpu. It guessed a negative
text_size value that causes the memcpy to overwrite shmem regions.
Protect better against such cases:
1. Make text_size unsigned (there is already a check that it is less than 1000).
2. Map input region as readable only, we don't write to it.
3. Add address sanity check to segv_handler, if we see that we are writing
   into executable data, it's better to crash instantly.
2017-01-25 11:01:30 +01:00
..
common.go executor: protect against memory corruptions better 2017-01-25 11:01:30 +01:00
csource_test.go sys, executor: more kvm improvements 2017-01-12 11:57:17 +01:00
csource.go csource: use 0x%x format for printing bitfield addr and arg 2017-01-23 18:13:11 +01:00