From 15be3cba18ad18776c6558e25792768113164e9d Mon Sep 17 00:00:00 2001 From: Aleksandr Nogikh Date: Fri, 8 Apr 2022 13:00:19 +0000 Subject: pkg/report: ignore eibrs mitigation warnings These are not normal warnings, but they look like real warnings for syzkaller. --- pkg/report/testdata/linux/report/647 | 9 +++++++++ 1 file changed, 9 insertions(+) create mode 100644 pkg/report/testdata/linux/report/647 (limited to 'pkg/report/testdata/linux') diff --git a/pkg/report/testdata/linux/report/647 b/pkg/report/testdata/linux/report/647 new file mode 100644 index 000000000..1bb3b5a2a --- /dev/null +++ b/pkg/report/testdata/linux/report/647 @@ -0,0 +1,9 @@ +TITLE: + + +[ 1.229302][ T0] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization +[ 1.230552][ T0] Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! +[ 1.232245][ T0] Spectre V2 : Mitigation: Enhanced IBRS +[ 1.232987][ T0] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch +[ 1.234308][ T0] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier +[ 1.235587][ T0] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl -- cgit mrf-deployment