aboutsummaryrefslogtreecommitdiffstats
path: root/sys/linux/dev_input.txt.warn
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2020-01-17 16:59:20 +0100
committerDmitry Vyukov <dvyukov@google.com>2020-01-18 21:02:24 +0100
commit773117bf811a6e7f9d13bb966dc4956774e88207 (patch)
treeac62d3fb1612ab43cedf7e79725f36793eec3270 /sys/linux/dev_input.txt.warn
parent2ec9a3ad9a10a5e5653d65b3d7f430c978ce4d69 (diff)
tools/syz-check: also check arm/arm64
They mostly duplicate the warnings we already have for amd64/386. But uncovered few very interesting local things (e.g. epoll_event is packed only on amd64, so arm/arm64 layout is wrong, but 386 is correct because int64 alignment is different). Update #590
Diffstat (limited to 'sys/linux/dev_input.txt.warn')
-rw-r--r--sys/linux/dev_input.txt.warn20
1 files changed, 10 insertions, 10 deletions
diff --git a/sys/linux/dev_input.txt.warn b/sys/linux/dev_input.txt.warn
index 4831ef759..d7167b709 100644
--- a/sys/linux/dev_input.txt.warn
+++ b/sys/linux/dev_input.txt.warn
@@ -1,13 +1,13 @@
bad-field-number: input_event: syz=4 kernel=5
-bad-field-size: input_event.time/__sec: syz=16 kernel=8 [amd64]
-bad-field-size: input_event.time/__sec: syz=8 kernel=4 [386]
-bad-field-offset: input_event.type/__usec: syz=16 kernel=8 [amd64]
-bad-field-size: input_event.type/__usec: syz=2 kernel=4 [386]
-bad-field-size: input_event.type/__usec: syz=2 kernel=8 [amd64]
-bad-field-offset: input_event.type/__usec: syz=8 kernel=4 [386]
-bad-field-offset: input_event.code/type: syz=10 kernel=8 [386]
-bad-field-offset: input_event.code/type: syz=18 kernel=16 [amd64]
-bad-field-offset: input_event.val/code: syz=12 kernel=10 [386]
-bad-field-offset: input_event.val/code: syz=20 kernel=18 [amd64]
+bad-field-size: input_event.time/__sec: syz=16 kernel=8 [amd64,arm64]
+bad-field-size: input_event.time/__sec: syz=8 kernel=4 [386,arm]
+bad-field-offset: input_event.type/__usec: syz=16 kernel=8 [amd64,arm64]
+bad-field-size: input_event.type/__usec: syz=2 kernel=4 [386,arm]
+bad-field-size: input_event.type/__usec: syz=2 kernel=8 [amd64,arm64]
+bad-field-offset: input_event.type/__usec: syz=8 kernel=4 [386,arm]
+bad-field-offset: input_event.code/type: syz=10 kernel=8 [386,arm]
+bad-field-offset: input_event.code/type: syz=18 kernel=16 [amd64,arm64]
+bad-field-offset: input_event.val/code: syz=12 kernel=10 [386,arm]
+bad-field-offset: input_event.val/code: syz=20 kernel=18 [amd64,arm64]
bad-field-size: input_event.val/code: syz=4 kernel=2
no-such-struct: ff_effect_u