diff options
Diffstat (limited to 'sys/linux/bpf.txt.warn')
| -rw-r--r-- | sys/linux/bpf.txt.warn | 183 |
1 files changed, 95 insertions, 88 deletions
diff --git a/sys/linux/bpf.txt.warn b/sys/linux/bpf.txt.warn index f380144a0..3bb35f85d 100644 --- a/sys/linux/bpf.txt.warn +++ b/sys/linux/bpf.txt.warn @@ -1,88 +1,95 @@ -struct bpf_map_create_arg: no corresponding struct in kernel -struct bpf_map_get_fd_by_id_arg: no corresponding struct in kernel -struct bpf_map_lookup_arg: no corresponding struct in kernel -struct bpf_map_update_arg: no corresponding struct in kernel -struct bpf_map_delete_arg: no corresponding struct in kernel -struct bpf_map_get_next_arg: no corresponding struct in kernel -struct bpf_prog: bad number of fields: syz=21 kernel=20 -struct bpf_prog: bad size: syz=120 kernel=56 -field bpf_prog.type/pages: bad size: syz=4 kernel=2 -field bpf_prog.ninsn/jited: bad bit size/offset: syz=0/0 kernel=1/0 -field bpf_prog.ninsn/jited: bad offset: syz=4 kernel=2 -field bpf_prog.ninsn/jited: bad size: syz=4 kernel=2 -field bpf_prog.insns/jit_requested: bad bit size/offset: syz=0/0 kernel=1/1 -field bpf_prog.insns/jit_requested: bad offset: syz=8 kernel=2 -field bpf_prog.insns/jit_requested: bad size: syz=8 kernel=2 -field bpf_prog.license/gpl_compatible: bad bit size/offset: syz=0/0 kernel=1/2 -field bpf_prog.license/gpl_compatible: bad offset: syz=16 kernel=2 -field bpf_prog.license/gpl_compatible: bad size: syz=8 kernel=2 -field bpf_prog.loglev/cb_access: bad bit size/offset: syz=0/0 kernel=1/3 -field bpf_prog.loglev/cb_access: bad offset: syz=24 kernel=2 -field bpf_prog.loglev/cb_access: bad size: syz=4 kernel=2 -field bpf_prog.logsize/dst_needed: bad bit size/offset: syz=0/0 kernel=1/4 -field bpf_prog.logsize/dst_needed: bad offset: syz=28 kernel=2 -field bpf_prog.logsize/dst_needed: bad size: syz=4 kernel=2 -field bpf_prog.log/blinded: bad bit size/offset: syz=0/0 kernel=1/5 -field bpf_prog.log/blinded: bad offset: syz=32 kernel=2 -field bpf_prog.log/blinded: bad size: syz=8 kernel=2 -field bpf_prog.kern_version/is_func: bad bit size/offset: syz=0/0 kernel=1/6 -field bpf_prog.kern_version/is_func: bad offset: syz=40 kernel=2 -field bpf_prog.kern_version/is_func: bad size: syz=4 kernel=2 -field bpf_prog.flags/kprobe_override: bad bit size/offset: syz=0/0 kernel=1/7 -field bpf_prog.flags/kprobe_override: bad offset: syz=44 kernel=2 -field bpf_prog.flags/kprobe_override: bad size: syz=4 kernel=2 -field bpf_prog.prog_name/has_callchain_buf: bad bit size/offset: syz=0/0 kernel=1/8 -field bpf_prog.prog_name/has_callchain_buf: bad offset: syz=48 kernel=2 -field bpf_prog.prog_name/has_callchain_buf: bad size: syz=16 kernel=2 -field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad bit size/offset: syz=0/0 kernel=1/9 -field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad offset: syz=64 kernel=2 -field bpf_prog.prog_ifindex/enforce_expected_attach_type: bad size: syz=4 kernel=2 -field bpf_prog.expected_attach_type/type: bad offset: syz=68 kernel=4 -field bpf_prog.btf_fd/expected_attach_type: bad offset: syz=72 kernel=8 -field bpf_prog.func_info_rec_size/len: bad offset: syz=76 kernel=12 -field bpf_prog.func_info/jited_len: bad offset: syz=80 kernel=16 -field bpf_prog.func_info/jited_len: bad size: syz=8 kernel=4 -field bpf_prog.func_info_cnt/tag: bad offset: syz=88 kernel=20 -field bpf_prog.func_info_cnt/tag: bad size: syz=4 kernel=8 -field bpf_prog.line_info_rec_size/aux: bad offset: syz=92 kernel=32 -field bpf_prog.line_info_rec_size/aux: bad size: syz=4 kernel=8 -field bpf_prog.line_info/orig_prog: bad offset: syz=96 kernel=40 -field bpf_prog.line_info_cnt/bpf_func: bad offset: syz=104 kernel=48 -field bpf_prog.line_info_cnt/bpf_func: bad size: syz=4 kernel=8 -field bpf_prog.attach_btf_id/: bad offset: syz=108 kernel=56 -field bpf_prog.attach_btf_id/: bad size: syz=4 kernel=0 -struct bpf_insn_generic: no corresponding struct in kernel -struct bpf_insn_ldst: no corresponding struct in kernel -struct bpf_insn_alu: no corresponding struct in kernel -struct bpf_insn_jmp: no corresponding struct in kernel -struct bpf_insn_call_helper: no corresponding struct in kernel -struct bpf_insn_call_func: no corresponding struct in kernel -struct bpf_insn_exit: no corresponding struct in kernel -struct bpf_insn_init_r0: no corresponding struct in kernel -struct bpf_insn_map: no corresponding struct in kernel -struct bpf_insn_map_value: no corresponding struct in kernel -struct bpf_obj_pin_map: no corresponding struct in kernel -struct bpf_obj_pin_prog: no corresponding struct in kernel -struct bpf_obj_get: no corresponding struct in kernel -struct bpf_attach_arg: no corresponding struct in kernel -struct bpf_detach_arg: no corresponding struct in kernel -struct bpf_test_prog_arg: no corresponding struct in kernel -struct bpf_obj_get_next_id_arg: no corresponding struct in kernel -struct bpf_prog_get_fd_by_id_arg: no corresponding struct in kernel -struct bpf_get_prog_info_arg: no corresponding struct in kernel -struct bpf_prog_info: bad number of fields: syz=32 kernel=34 -struct bpf_prog_info: bad size: syz=192 kernel=208 -struct bpf_get_map_info_arg: no corresponding struct in kernel -struct bpf_map_info: bad number of fields: syz=7 kernel=13 -struct bpf_map_info: bad size: syz=40 kernel=80 -struct bpf_get_btf_info_arg: no corresponding struct in kernel -struct bpf_prog_query: no corresponding struct in kernel -field bpf_raw_tracepoint.prog_fd/prog: bad size: syz=4 kernel=8 -struct bpf_btf_load: no corresponding struct in kernel -struct btf_type_int: no corresponding struct in kernel -struct btf_type_ref_t: no corresponding struct in kernel -struct btf_type_array: no corresponding struct in kernel -struct btf_type_fwd: no corresponding struct in kernel -struct btf_type_func: no corresponding struct in kernel -struct btf_type_var: no corresponding struct in kernel -struct bpf_task_fd_query: no corresponding struct in kernel +no-such-struct: bpf_map_create_arg +no-such-struct: bpf_map_get_fd_by_id_arg +no-such-struct: bpf_map_lookup_arg +no-such-struct: bpf_map_update_arg +no-such-struct: bpf_map_delete_arg +no-such-struct: bpf_map_get_next_arg +bad-struct-size: bpf_prog: syz=120 kernel=40 [386] +bad-struct-size: bpf_prog: syz=120 kernel=56 [amd64] +bad-field-number: bpf_prog: syz=21 kernel=20 +bad-field-size: bpf_prog.type/pages: syz=4 kernel=2 +bad-bitfield: bpf_prog.ninsn/jited: size/offset: syz=0/0 kernel=1/0 +bad-field-offset: bpf_prog.ninsn/jited: syz=4 kernel=2 +bad-bitfield: bpf_prog.insns/jit_requested: size/offset: syz=0/0 kernel=1/1 +bad-field-size: bpf_prog.insns/jit_requested: syz=8 kernel=2 +bad-bitfield: bpf_prog.license/gpl_compatible: size/offset: syz=0/0 kernel=1/2 +bad-field-offset: bpf_prog.license/gpl_compatible: syz=16 kernel=2 +bad-field-size: bpf_prog.license/gpl_compatible: syz=8 kernel=2 +bad-bitfield: bpf_prog.loglev/cb_access: size/offset: syz=0/0 kernel=1/3 +bad-field-offset: bpf_prog.loglev/cb_access: syz=24 kernel=2 +bad-field-size: bpf_prog.loglev/cb_access: syz=4 kernel=2 +bad-bitfield: bpf_prog.logsize/dst_needed: size/offset: syz=0/0 kernel=1/4 +bad-field-offset: bpf_prog.logsize/dst_needed: syz=28 kernel=2 +bad-field-size: bpf_prog.logsize/dst_needed: syz=4 kernel=2 +bad-bitfield: bpf_prog.log/blinded: size/offset: syz=0/0 kernel=1/5 +bad-field-offset: bpf_prog.log/blinded: syz=32 kernel=2 +bad-field-size: bpf_prog.log/blinded: syz=8 kernel=2 +bad-bitfield: bpf_prog.kern_version/is_func: size/offset: syz=0/0 kernel=1/6 +bad-field-size: bpf_prog.kern_version/is_func: syz=4 kernel=2 +bad-field-offset: bpf_prog.kern_version/is_func: syz=40 kernel=2 +bad-bitfield: bpf_prog.flags/kprobe_override: size/offset: syz=0/0 kernel=1/7 +bad-field-size: bpf_prog.flags/kprobe_override: syz=4 kernel=2 +bad-field-offset: bpf_prog.flags/kprobe_override: syz=44 kernel=2 +bad-bitfield: bpf_prog.prog_name/has_callchain_buf: size/offset: syz=0/0 kernel=1/8 +bad-field-size: bpf_prog.prog_name/has_callchain_buf: syz=16 kernel=2 +bad-field-offset: bpf_prog.prog_name/has_callchain_buf: syz=48 kernel=2 +bad-bitfield: bpf_prog.prog_ifindex/enforce_expected_attach_type: size/offset: syz=0/0 kernel=1/9 +bad-field-size: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=4 kernel=2 +bad-field-offset: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=64 kernel=2 +bad-field-offset: bpf_prog.expected_attach_type/type: syz=68 kernel=4 +bad-field-offset: bpf_prog.btf_fd/expected_attach_type: syz=72 kernel=8 +bad-field-offset: bpf_prog.func_info_rec_size/len: syz=76 kernel=12 +bad-field-size: bpf_prog.func_info/jited_len: syz=8 kernel=4 +bad-field-offset: bpf_prog.func_info/jited_len: syz=80 kernel=16 +bad-field-size: bpf_prog.func_info_cnt/tag: syz=4 kernel=8 +bad-field-offset: bpf_prog.func_info_cnt/tag: syz=88 kernel=20 +bad-field-size: bpf_prog.line_info_rec_size/aux: syz=4 kernel=8 [amd64] +bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=28 [386] +bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=32 [amd64] +bad-field-size: bpf_prog.line_info/orig_prog: syz=8 kernel=4 [386] +bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=32 [386] +bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=40 [amd64] +bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=36 [386] +bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=48 [amd64] +bad-field-size: bpf_prog.line_info_cnt/bpf_func: syz=4 kernel=8 [amd64] +bad-field-offset: bpf_prog.attach_btf_id/: syz=108 kernel=40 [386] +bad-field-offset: bpf_prog.attach_btf_id/: syz=108 kernel=56 [amd64] +bad-field-size: bpf_prog.attach_btf_id/: syz=4 kernel=0 +no-such-struct: bpf_insn_generic +no-such-struct: bpf_insn_ldst +no-such-struct: bpf_insn_alu +no-such-struct: bpf_insn_jmp +no-such-struct: bpf_insn_call_helper +no-such-struct: bpf_insn_call_func +no-such-struct: bpf_insn_exit +no-such-struct: bpf_insn_init_r0 +no-such-struct: bpf_insn_map +no-such-struct: bpf_insn_map_value +no-such-struct: bpf_obj_pin_map +no-such-struct: bpf_obj_pin_prog +no-such-struct: bpf_obj_get +no-such-struct: bpf_attach_arg +no-such-struct: bpf_detach_arg +no-such-struct: bpf_test_prog_arg +no-such-struct: bpf_obj_get_next_id_arg +no-such-struct: bpf_prog_get_fd_by_id_arg +no-such-struct: bpf_get_prog_info_arg +bad-struct-size: bpf_prog_info: syz=192 kernel=208 +bad-field-number: bpf_prog_info: syz=32 kernel=34 +no-such-struct: bpf_get_map_info_arg +bad-struct-size: bpf_map_info: syz=40 kernel=80 +bad-field-number: bpf_map_info: syz=7 kernel=13 +no-such-struct: bpf_get_btf_info_arg +no-such-struct: bpf_prog_query +bad-struct-size: bpf_raw_tracepoint: syz=16 kernel=8 [386] +bad-field-size: bpf_raw_tracepoint.name/btp: syz=8 kernel=4 [386] +bad-field-size: bpf_raw_tracepoint.prog_fd/prog: syz=4 kernel=8 [amd64] +bad-field-offset: bpf_raw_tracepoint.prog_fd/prog: syz=8 kernel=4 [386] +no-such-struct: bpf_btf_load +no-such-struct: btf_type_int +no-such-struct: btf_type_ref_t +no-such-struct: btf_type_array +no-such-struct: btf_type_fwd +no-such-struct: btf_type_func +no-such-struct: btf_type_var +no-such-struct: bpf_task_fd_query |
