aboutsummaryrefslogtreecommitdiffstats
path: root/sys/linux/bpf.txt.warn
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2020-01-17 17:37:49 +0100
committerDmitry Vyukov <dvyukov@google.com>2020-01-18 21:02:24 +0100
commitd2f8d5ab46fe67b2f03387be9e6f38ffe5f227ba (patch)
treef5bfbe679147e06398db2601ec3b4ecb93d6c207 /sys/linux/bpf.txt.warn
parent773117bf811a6e7f9d13bb966dc4956774e88207 (diff)
sys/linux: fix sigset_t/sigaction layout on arm
Update #590
Diffstat (limited to 'sys/linux/bpf.txt.warn')
-rw-r--r--sys/linux/bpf.txt.warn26
1 files changed, 13 insertions, 13 deletions
diff --git a/sys/linux/bpf.txt.warn b/sys/linux/bpf.txt.warn
index 0f9c859d3..c968bf987 100644
--- a/sys/linux/bpf.txt.warn
+++ b/sys/linux/bpf.txt.warn
@@ -4,15 +4,15 @@ no-such-struct: bpf_map_lookup_arg
no-such-struct: bpf_map_update_arg
no-such-struct: bpf_map_delete_arg
no-such-struct: bpf_map_get_next_arg
+bad-field-number: bpf_prog: syz=21 kernel=20
bad-struct-size: bpf_prog: syz=116 kernel=40 [386]
bad-struct-size: bpf_prog: syz=120 kernel=40 [arm]
bad-struct-size: bpf_prog: syz=120 kernel=56 [amd64,arm64]
-bad-field-number: bpf_prog: syz=21 kernel=20
bad-field-size: bpf_prog.type/pages: syz=4 kernel=2
bad-bitfield: bpf_prog.ninsn/jited: size/offset: syz=0/0 kernel=1/0
bad-field-offset: bpf_prog.ninsn/jited: syz=4 kernel=2
bad-bitfield: bpf_prog.insns/jit_requested: size/offset: syz=0/0 kernel=1/1
-bad-field-size: bpf_prog.insns/jit_requested: syz=8 kernel=2
+bad-field-offset: bpf_prog.insns/jit_requested: syz=8 kernel=2
bad-bitfield: bpf_prog.license/gpl_compatible: size/offset: syz=0/0 kernel=1/2
bad-field-offset: bpf_prog.license/gpl_compatible: syz=16 kernel=2
bad-field-size: bpf_prog.license/gpl_compatible: syz=8 kernel=2
@@ -26,30 +26,30 @@ bad-bitfield: bpf_prog.log/blinded: size/offset: syz=0/0 kernel=1/5
bad-field-offset: bpf_prog.log/blinded: syz=32 kernel=2
bad-field-size: bpf_prog.log/blinded: syz=8 kernel=2
bad-bitfield: bpf_prog.kern_version/is_func: size/offset: syz=0/0 kernel=1/6
-bad-field-size: bpf_prog.kern_version/is_func: syz=4 kernel=2
bad-field-offset: bpf_prog.kern_version/is_func: syz=40 kernel=2
+bad-field-size: bpf_prog.kern_version/is_func: syz=4 kernel=2
bad-bitfield: bpf_prog.flags/kprobe_override: size/offset: syz=0/0 kernel=1/7
-bad-field-size: bpf_prog.flags/kprobe_override: syz=4 kernel=2
bad-field-offset: bpf_prog.flags/kprobe_override: syz=44 kernel=2
+bad-field-size: bpf_prog.flags/kprobe_override: syz=4 kernel=2
bad-bitfield: bpf_prog.prog_name/has_callchain_buf: size/offset: syz=0/0 kernel=1/8
-bad-field-size: bpf_prog.prog_name/has_callchain_buf: syz=16 kernel=2
bad-field-offset: bpf_prog.prog_name/has_callchain_buf: syz=48 kernel=2
+bad-field-size: bpf_prog.prog_name/has_callchain_buf: syz=16 kernel=2
bad-bitfield: bpf_prog.prog_ifindex/enforce_expected_attach_type: size/offset: syz=0/0 kernel=1/9
-bad-field-size: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=4 kernel=2
bad-field-offset: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=64 kernel=2
+bad-field-size: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=4 kernel=2
bad-field-offset: bpf_prog.expected_attach_type/type: syz=68 kernel=4
bad-field-offset: bpf_prog.btf_fd/expected_attach_type: syz=72 kernel=8
bad-field-offset: bpf_prog.func_info_rec_size/len: syz=76 kernel=12
-bad-field-size: bpf_prog.func_info/jited_len: syz=8 kernel=4
bad-field-offset: bpf_prog.func_info/jited_len: syz=80 kernel=16
-bad-field-size: bpf_prog.func_info_cnt/tag: syz=4 kernel=8
+bad-field-size: bpf_prog.func_info/jited_len: syz=8 kernel=4
bad-field-offset: bpf_prog.func_info_cnt/tag: syz=88 kernel=20
-bad-field-size: bpf_prog.line_info_rec_size/aux: syz=4 kernel=8 [amd64,arm64]
+bad-field-size: bpf_prog.func_info_cnt/tag: syz=4 kernel=8
bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=28 [386,arm]
bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=32 [amd64,arm64]
-bad-field-size: bpf_prog.line_info/orig_prog: syz=8 kernel=4 [386,arm]
+bad-field-size: bpf_prog.line_info_rec_size/aux: syz=4 kernel=8 [amd64,arm64]
bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=32 [386,arm]
bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=40 [amd64,arm64]
+bad-field-size: bpf_prog.line_info/orig_prog: syz=8 kernel=4 [386,arm]
bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=36 [386,arm]
bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=48 [amd64,arm64]
bad-field-size: bpf_prog.line_info_cnt/bpf_func: syz=4 kernel=8 [amd64,arm64]
@@ -75,18 +75,18 @@ no-such-struct: bpf_test_prog_arg
no-such-struct: bpf_obj_get_next_id_arg
no-such-struct: bpf_prog_get_fd_by_id_arg
no-such-struct: bpf_get_prog_info_arg
-bad-struct-size: bpf_prog_info: syz=192 kernel=208
bad-field-number: bpf_prog_info: syz=32 kernel=34
+bad-struct-size: bpf_prog_info: syz=192 kernel=208
no-such-struct: bpf_get_map_info_arg
-bad-struct-size: bpf_map_info: syz=40 kernel=80
bad-field-number: bpf_map_info: syz=7 kernel=13 [386]
bad-field-number: bpf_map_info: syz=7 kernel=14 [amd64,arm,arm64]
+bad-struct-size: bpf_map_info: syz=40 kernel=80
no-such-struct: bpf_get_btf_info_arg
no-such-struct: bpf_prog_query
bad-struct-size: bpf_raw_tracepoint: syz=16 kernel=8 [386,arm]
bad-field-size: bpf_raw_tracepoint.name/btp: syz=8 kernel=4 [386,arm]
-bad-field-size: bpf_raw_tracepoint.prog_fd/prog: syz=4 kernel=8 [amd64,arm64]
bad-field-offset: bpf_raw_tracepoint.prog_fd/prog: syz=8 kernel=4 [386,arm]
+bad-field-size: bpf_raw_tracepoint.prog_fd/prog: syz=4 kernel=8 [amd64,arm64]
no-such-struct: bpf_btf_load
no-such-struct: btf_type_int
no-such-struct: btf_type_ref_t