diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2020-01-17 16:59:20 +0100 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2020-01-18 21:02:24 +0100 |
| commit | 773117bf811a6e7f9d13bb966dc4956774e88207 (patch) | |
| tree | ac62d3fb1612ab43cedf7e79725f36793eec3270 /sys/linux/dev_input.txt.warn | |
| parent | 2ec9a3ad9a10a5e5653d65b3d7f430c978ce4d69 (diff) | |
tools/syz-check: also check arm/arm64
They mostly duplicate the warnings we already have for amd64/386.
But uncovered few very interesting local things (e.g. epoll_event
is packed only on amd64, so arm/arm64 layout is wrong, but 386
is correct because int64 alignment is different).
Update #590
Diffstat (limited to 'sys/linux/dev_input.txt.warn')
| -rw-r--r-- | sys/linux/dev_input.txt.warn | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/sys/linux/dev_input.txt.warn b/sys/linux/dev_input.txt.warn index 4831ef759..d7167b709 100644 --- a/sys/linux/dev_input.txt.warn +++ b/sys/linux/dev_input.txt.warn @@ -1,13 +1,13 @@ bad-field-number: input_event: syz=4 kernel=5 -bad-field-size: input_event.time/__sec: syz=16 kernel=8 [amd64] -bad-field-size: input_event.time/__sec: syz=8 kernel=4 [386] -bad-field-offset: input_event.type/__usec: syz=16 kernel=8 [amd64] -bad-field-size: input_event.type/__usec: syz=2 kernel=4 [386] -bad-field-size: input_event.type/__usec: syz=2 kernel=8 [amd64] -bad-field-offset: input_event.type/__usec: syz=8 kernel=4 [386] -bad-field-offset: input_event.code/type: syz=10 kernel=8 [386] -bad-field-offset: input_event.code/type: syz=18 kernel=16 [amd64] -bad-field-offset: input_event.val/code: syz=12 kernel=10 [386] -bad-field-offset: input_event.val/code: syz=20 kernel=18 [amd64] +bad-field-size: input_event.time/__sec: syz=16 kernel=8 [amd64,arm64] +bad-field-size: input_event.time/__sec: syz=8 kernel=4 [386,arm] +bad-field-offset: input_event.type/__usec: syz=16 kernel=8 [amd64,arm64] +bad-field-size: input_event.type/__usec: syz=2 kernel=4 [386,arm] +bad-field-size: input_event.type/__usec: syz=2 kernel=8 [amd64,arm64] +bad-field-offset: input_event.type/__usec: syz=8 kernel=4 [386,arm] +bad-field-offset: input_event.code/type: syz=10 kernel=8 [386,arm] +bad-field-offset: input_event.code/type: syz=18 kernel=16 [amd64,arm64] +bad-field-offset: input_event.val/code: syz=12 kernel=10 [386,arm] +bad-field-offset: input_event.val/code: syz=20 kernel=18 [amd64,arm64] bad-field-size: input_event.val/code: syz=4 kernel=2 no-such-struct: ff_effect_u |
