aboutsummaryrefslogtreecommitdiffstats
path: root/sys/linux/bpf.txt.warn
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2019-12-22 19:34:12 +0100
committerDmitry Vyukov <dvyukov@google.com>2019-12-22 19:34:12 +0100
commit61f4e7ee54a1a1ae938c8ab2ee18bf16da1abab4 (patch)
tree9d6a6d895a2f54481ae996074efcbc1e90d46405 /sys/linux/bpf.txt.warn
parent8b96726707a5846209f943c978ccd7eeb1dd6f5e (diff)
tools/syz-check: check amd64 and 386 at the same time
Update #590
Diffstat (limited to 'sys/linux/bpf.txt.warn')
-rw-r--r--sys/linux/bpf.txt.warn183
1 files changed, 95 insertions, 88 deletions
diff --git a/sys/linux/bpf.txt.warn b/sys/linux/bpf.txt.warn
index f380144a0..3bb35f85d 100644
--- a/sys/linux/bpf.txt.warn
+++ b/sys/linux/bpf.txt.warn
@@ -1,88 +1,95 @@
-struct bpf_map_create_arg: no corresponding struct in kernel
-struct bpf_map_get_fd_by_id_arg: no corresponding struct in kernel
-struct bpf_map_lookup_arg: no corresponding struct in kernel
-struct bpf_map_update_arg: no corresponding struct in kernel
-struct bpf_map_delete_arg: no corresponding struct in kernel
-struct bpf_map_get_next_arg: no corresponding struct in kernel
-struct bpf_prog: bad number of fields: syz=21 kernel=20
-struct bpf_prog: bad size: syz=120 kernel=56
-field bpf_prog.type/pages: bad size: syz=4 kernel=2
-field bpf_prog.ninsn/jited: bad bit size/offset: syz=0/0 kernel=1/0
-field bpf_prog.ninsn/jited: bad offset: syz=4 kernel=2
-field bpf_prog.ninsn/jited: bad size: syz=4 kernel=2
-field bpf_prog.insns/jit_requested: bad bit size/offset: syz=0/0 kernel=1/1
-field bpf_prog.insns/jit_requested: bad offset: syz=8 kernel=2
-field bpf_prog.insns/jit_requested: bad size: syz=8 kernel=2
-field bpf_prog.license/gpl_compatible: bad bit size/offset: syz=0/0 kernel=1/2
-field bpf_prog.license/gpl_compatible: bad offset: syz=16 kernel=2
-field bpf_prog.license/gpl_compatible: bad size: syz=8 kernel=2
-field bpf_prog.loglev/cb_access: bad bit size/offset: syz=0/0 kernel=1/3
-field bpf_prog.loglev/cb_access: bad offset: syz=24 kernel=2
-field bpf_prog.loglev/cb_access: bad size: syz=4 kernel=2
-field bpf_prog.logsize/dst_needed: bad bit size/offset: syz=0/0 kernel=1/4
-field bpf_prog.logsize/dst_needed: bad offset: syz=28 kernel=2
-field bpf_prog.logsize/dst_needed: bad size: syz=4 kernel=2
-field bpf_prog.log/blinded: bad bit size/offset: syz=0/0 kernel=1/5
-field bpf_prog.log/blinded: bad offset: syz=32 kernel=2
-field bpf_prog.log/blinded: bad size: syz=8 kernel=2
-field bpf_prog.kern_version/is_func: bad bit size/offset: syz=0/0 kernel=1/6
-field bpf_prog.kern_version/is_func: bad offset: syz=40 kernel=2
-field bpf_prog.kern_version/is_func: bad size: syz=4 kernel=2
-field bpf_prog.flags/kprobe_override: bad bit size/offset: syz=0/0 kernel=1/7
-field bpf_prog.flags/kprobe_override: bad offset: syz=44 kernel=2
-field bpf_prog.flags/kprobe_override: bad size: syz=4 kernel=2
-field bpf_prog.prog_name/has_callchain_buf: bad bit size/offset: syz=0/0 kernel=1/8
-field bpf_prog.prog_name/has_callchain_buf: bad offset: syz=48 kernel=2
-field bpf_prog.prog_name/has_callchain_buf: bad size: syz=16 kernel=2
-field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad bit size/offset: syz=0/0 kernel=1/9
-field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad offset: syz=64 kernel=2
-field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad size: syz=4 kernel=2
-field bpf_prog.expected_attach_type/type: bad offset: syz=68 kernel=4
-field bpf_prog.btf_fd/expected_attach_type: bad offset: syz=72 kernel=8
-field bpf_prog.func_info_rec_size/len: bad offset: syz=76 kernel=12
-field bpf_prog.func_info/jited_len: bad offset: syz=80 kernel=16
-field bpf_prog.func_info/jited_len: bad size: syz=8 kernel=4
-field bpf_prog.func_info_cnt/tag: bad offset: syz=88 kernel=20
-field bpf_prog.func_info_cnt/tag: bad size: syz=4 kernel=8
-field bpf_prog.line_info_rec_size/aux: bad offset: syz=92 kernel=32
-field bpf_prog.line_info_rec_size/aux: bad size: syz=4 kernel=8
-field bpf_prog.line_info/orig_prog: bad offset: syz=96 kernel=40
-field bpf_prog.line_info_cnt/bpf_func: bad offset: syz=104 kernel=48
-field bpf_prog.line_info_cnt/bpf_func: bad size: syz=4 kernel=8
-field bpf_prog.attach_btf_id/: bad offset: syz=108 kernel=56
-field bpf_prog.attach_btf_id/: bad size: syz=4 kernel=0
-struct bpf_insn_generic: no corresponding struct in kernel
-struct bpf_insn_ldst: no corresponding struct in kernel
-struct bpf_insn_alu: no corresponding struct in kernel
-struct bpf_insn_jmp: no corresponding struct in kernel
-struct bpf_insn_call_helper: no corresponding struct in kernel
-struct bpf_insn_call_func: no corresponding struct in kernel
-struct bpf_insn_exit: no corresponding struct in kernel
-struct bpf_insn_init_r0: no corresponding struct in kernel
-struct bpf_insn_map: no corresponding struct in kernel
-struct bpf_insn_map_value: no corresponding struct in kernel
-struct bpf_obj_pin_map: no corresponding struct in kernel
-struct bpf_obj_pin_prog: no corresponding struct in kernel
-struct bpf_obj_get: no corresponding struct in kernel
-struct bpf_attach_arg: no corresponding struct in kernel
-struct bpf_detach_arg: no corresponding struct in kernel
-struct bpf_test_prog_arg: no corresponding struct in kernel
-struct bpf_obj_get_next_id_arg: no corresponding struct in kernel
-struct bpf_prog_get_fd_by_id_arg: no corresponding struct in kernel
-struct bpf_get_prog_info_arg: no corresponding struct in kernel
-struct bpf_prog_info: bad number of fields: syz=32 kernel=34
-struct bpf_prog_info: bad size: syz=192 kernel=208
-struct bpf_get_map_info_arg: no corresponding struct in kernel
-struct bpf_map_info: bad number of fields: syz=7 kernel=13
-struct bpf_map_info: bad size: syz=40 kernel=80
-struct bpf_get_btf_info_arg: no corresponding struct in kernel
-struct bpf_prog_query: no corresponding struct in kernel
-field bpf_raw_tracepoint.prog_fd/prog: bad size: syz=4 kernel=8
-struct bpf_btf_load: no corresponding struct in kernel
-struct btf_type_int: no corresponding struct in kernel
-struct btf_type_ref_t: no corresponding struct in kernel
-struct btf_type_array: no corresponding struct in kernel
-struct btf_type_fwd: no corresponding struct in kernel
-struct btf_type_func: no corresponding struct in kernel
-struct btf_type_var: no corresponding struct in kernel
-struct bpf_task_fd_query: no corresponding struct in kernel
+no-such-struct: bpf_map_create_arg
+no-such-struct: bpf_map_get_fd_by_id_arg
+no-such-struct: bpf_map_lookup_arg
+no-such-struct: bpf_map_update_arg
+no-such-struct: bpf_map_delete_arg
+no-such-struct: bpf_map_get_next_arg
+bad-struct-size: bpf_prog: syz=120 kernel=40 [386]
+bad-struct-size: bpf_prog: syz=120 kernel=56 [amd64]
+bad-field-number: bpf_prog: syz=21 kernel=20
+bad-field-size: bpf_prog.type/pages: syz=4 kernel=2
+bad-bitfield: bpf_prog.ninsn/jited: size/offset: syz=0/0 kernel=1/0
+bad-field-offset: bpf_prog.ninsn/jited: syz=4 kernel=2
+bad-bitfield: bpf_prog.insns/jit_requested: size/offset: syz=0/0 kernel=1/1
+bad-field-size: bpf_prog.insns/jit_requested: syz=8 kernel=2
+bad-bitfield: bpf_prog.license/gpl_compatible: size/offset: syz=0/0 kernel=1/2
+bad-field-offset: bpf_prog.license/gpl_compatible: syz=16 kernel=2
+bad-field-size: bpf_prog.license/gpl_compatible: syz=8 kernel=2
+bad-bitfield: bpf_prog.loglev/cb_access: size/offset: syz=0/0 kernel=1/3
+bad-field-offset: bpf_prog.loglev/cb_access: syz=24 kernel=2
+bad-field-size: bpf_prog.loglev/cb_access: syz=4 kernel=2
+bad-bitfield: bpf_prog.logsize/dst_needed: size/offset: syz=0/0 kernel=1/4
+bad-field-offset: bpf_prog.logsize/dst_needed: syz=28 kernel=2
+bad-field-size: bpf_prog.logsize/dst_needed: syz=4 kernel=2
+bad-bitfield: bpf_prog.log/blinded: size/offset: syz=0/0 kernel=1/5
+bad-field-offset: bpf_prog.log/blinded: syz=32 kernel=2
+bad-field-size: bpf_prog.log/blinded: syz=8 kernel=2
+bad-bitfield: bpf_prog.kern_version/is_func: size/offset: syz=0/0 kernel=1/6
+bad-field-size: bpf_prog.kern_version/is_func: syz=4 kernel=2
+bad-field-offset: bpf_prog.kern_version/is_func: syz=40 kernel=2
+bad-bitfield: bpf_prog.flags/kprobe_override: size/offset: syz=0/0 kernel=1/7
+bad-field-size: bpf_prog.flags/kprobe_override: syz=4 kernel=2
+bad-field-offset: bpf_prog.flags/kprobe_override: syz=44 kernel=2
+bad-bitfield: bpf_prog.prog_name/has_callchain_buf: size/offset: syz=0/0 kernel=1/8
+bad-field-size: bpf_prog.prog_name/has_callchain_buf: syz=16 kernel=2
+bad-field-offset: bpf_prog.prog_name/has_callchain_buf: syz=48 kernel=2
+bad-bitfield: bpf_prog.prog_ifindex/enforce_expected_attach_type: size/offset: syz=0/0 kernel=1/9
+bad-field-size: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=4 kernel=2
+bad-field-offset: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=64 kernel=2
+bad-field-offset: bpf_prog.expected_attach_type/type: syz=68 kernel=4
+bad-field-offset: bpf_prog.btf_fd/expected_attach_type: syz=72 kernel=8
+bad-field-offset: bpf_prog.func_info_rec_size/len: syz=76 kernel=12
+bad-field-size: bpf_prog.func_info/jited_len: syz=8 kernel=4
+bad-field-offset: bpf_prog.func_info/jited_len: syz=80 kernel=16
+bad-field-size: bpf_prog.func_info_cnt/tag: syz=4 kernel=8
+bad-field-offset: bpf_prog.func_info_cnt/tag: syz=88 kernel=20
+bad-field-size: bpf_prog.line_info_rec_size/aux: syz=4 kernel=8 [amd64]
+bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=28 [386]
+bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=32 [amd64]
+bad-field-size: bpf_prog.line_info/orig_prog: syz=8 kernel=4 [386]
+bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=32 [386]
+bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=40 [amd64]
+bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=36 [386]
+bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=48 [amd64]
+bad-field-size: bpf_prog.line_info_cnt/bpf_func: syz=4 kernel=8 [amd64]
+bad-field-offset: bpf_prog.attach_btf_id/: syz=108 kernel=40 [386]
+bad-field-offset: bpf_prog.attach_btf_id/: syz=108 kernel=56 [amd64]
+bad-field-size: bpf_prog.attach_btf_id/: syz=4 kernel=0
+no-such-struct: bpf_insn_generic
+no-such-struct: bpf_insn_ldst
+no-such-struct: bpf_insn_alu
+no-such-struct: bpf_insn_jmp
+no-such-struct: bpf_insn_call_helper
+no-such-struct: bpf_insn_call_func
+no-such-struct: bpf_insn_exit
+no-such-struct: bpf_insn_init_r0
+no-such-struct: bpf_insn_map
+no-such-struct: bpf_insn_map_value
+no-such-struct: bpf_obj_pin_map
+no-such-struct: bpf_obj_pin_prog
+no-such-struct: bpf_obj_get
+no-such-struct: bpf_attach_arg
+no-such-struct: bpf_detach_arg
+no-such-struct: bpf_test_prog_arg
+no-such-struct: bpf_obj_get_next_id_arg
+no-such-struct: bpf_prog_get_fd_by_id_arg
+no-such-struct: bpf_get_prog_info_arg
+bad-struct-size: bpf_prog_info: syz=192 kernel=208
+bad-field-number: bpf_prog_info: syz=32 kernel=34
+no-such-struct: bpf_get_map_info_arg
+bad-struct-size: bpf_map_info: syz=40 kernel=80
+bad-field-number: bpf_map_info: syz=7 kernel=13
+no-such-struct: bpf_get_btf_info_arg
+no-such-struct: bpf_prog_query
+bad-struct-size: bpf_raw_tracepoint: syz=16 kernel=8 [386]
+bad-field-size: bpf_raw_tracepoint.name/btp: syz=8 kernel=4 [386]
+bad-field-size: bpf_raw_tracepoint.prog_fd/prog: syz=4 kernel=8 [amd64]
+bad-field-offset: bpf_raw_tracepoint.prog_fd/prog: syz=8 kernel=4 [386]
+no-such-struct: bpf_btf_load
+no-such-struct: btf_type_int
+no-such-struct: btf_type_ref_t
+no-such-struct: btf_type_array
+no-such-struct: btf_type_fwd
+no-such-struct: btf_type_func
+no-such-struct: btf_type_var
+no-such-struct: bpf_task_fd_query