diff options
| author | Aleksandr Nogikh <nogikh@google.com> | 2022-04-08 13:00:19 +0000 |
|---|---|---|
| committer | Aleksandr Nogikh <wp32pw@gmail.com> | 2022-04-08 15:39:05 +0200 |
| commit | 15be3cba18ad18776c6558e25792768113164e9d (patch) | |
| tree | ae8b1f2716cbe5a74da2adbf7f0b658aad45ed95 /pkg/report/testdata/linux | |
| parent | 6d4876960581a47991f66da682ad31dff76456aa (diff) | |
pkg/report: ignore eibrs mitigation warnings
These are not normal warnings, but they look like real warnings for syzkaller.
Diffstat (limited to 'pkg/report/testdata/linux')
| -rw-r--r-- | pkg/report/testdata/linux/report/647 | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/647 b/pkg/report/testdata/linux/report/647 new file mode 100644 index 000000000..1bb3b5a2a --- /dev/null +++ b/pkg/report/testdata/linux/report/647 @@ -0,0 +1,9 @@ +TITLE: + + +[ 1.229302][ T0] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization +[ 1.230552][ T0] Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! +[ 1.232245][ T0] Spectre V2 : Mitigation: Enhanced IBRS +[ 1.232987][ T0] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch +[ 1.234308][ T0] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier +[ 1.235587][ T0] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl |
