From a252f56d36e0c85a0106b341188fcb19e87fda15 Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Tue, 11 Jan 2022 16:45:00 +0100 Subject: sys/linux: update warn files Regenerate warn files on the latest kernel commit fe8152b38d3 and latest syzkaller commit with fresh kernel config files. --- sys/linux/bpf.txt.warn | 76 +++++++++++--------------------------------------- 1 file changed, 16 insertions(+), 60 deletions(-) (limited to 'sys/linux/bpf.txt.warn') diff --git a/sys/linux/bpf.txt.warn b/sys/linux/bpf.txt.warn index 7fd3380c2..71cb56914 100644 --- a/sys/linux/bpf.txt.warn +++ b/sys/linux/bpf.txt.warn @@ -1,4 +1,6 @@ no-such-struct: bpf_map_create_arg +no-such-struct: bpf_map_create_arg_base +no-such-struct: bpf_map_create_arg_bf no-such-struct: bpf_map_get_fd_by_id_arg no-such-struct: bpf_map_lookup_arg no-such-struct: bpf_map_update_arg @@ -9,70 +11,22 @@ no-such-struct: bpf_link_create_arg no-such-struct: bpf_link_update_arg no-such-struct: bpf_enable_stats_arg no-such-struct: bpf_iter_create_arg -bad-struct-size: bpf_prog: syz=116 kernel=40 [386] -bad-struct-size: bpf_prog: syz=120 kernel=40 [arm] -bad-struct-size: bpf_prog: syz=120 kernel=56 [amd64,arm64] -bad-field-size: bpf_prog.type/pages: syz=4 kernel=2 -bad-bitfield: bpf_prog.ninsn/jited: size/offset: syz=0/0 kernel=1/0 -bad-field-offset: bpf_prog.ninsn/jited: syz=4 kernel=2 -bad-bitfield: bpf_prog.insns/jit_requested: size/offset: syz=0/0 kernel=1/1 -bad-field-offset: bpf_prog.insns/jit_requested: syz=8 kernel=2 -bad-bitfield: bpf_prog.license/gpl_compatible: size/offset: syz=0/0 kernel=1/2 -bad-field-offset: bpf_prog.license/gpl_compatible: syz=16 kernel=2 -bad-field-size: bpf_prog.license/gpl_compatible: syz=8 kernel=2 -bad-bitfield: bpf_prog.loglev/cb_access: size/offset: syz=0/0 kernel=1/3 -bad-field-offset: bpf_prog.loglev/cb_access: syz=24 kernel=2 -bad-field-size: bpf_prog.loglev/cb_access: syz=4 kernel=2 -bad-bitfield: bpf_prog.logsize/dst_needed: size/offset: syz=0/0 kernel=1/4 -bad-field-offset: bpf_prog.logsize/dst_needed: syz=28 kernel=2 -bad-field-size: bpf_prog.logsize/dst_needed: syz=4 kernel=2 -bad-bitfield: bpf_prog.log/blinded: size/offset: syz=0/0 kernel=1/5 -bad-field-offset: bpf_prog.log/blinded: syz=32 kernel=2 -bad-field-size: bpf_prog.log/blinded: syz=8 kernel=2 -bad-bitfield: bpf_prog.kern_version/is_func: size/offset: syz=0/0 kernel=1/6 -bad-field-offset: bpf_prog.kern_version/is_func: syz=40 kernel=2 -bad-field-size: bpf_prog.kern_version/is_func: syz=4 kernel=2 -bad-bitfield: bpf_prog.flags/kprobe_override: size/offset: syz=0/0 kernel=1/7 -bad-field-offset: bpf_prog.flags/kprobe_override: syz=44 kernel=2 -bad-field-size: bpf_prog.flags/kprobe_override: syz=4 kernel=2 -bad-bitfield: bpf_prog.prog_name/has_callchain_buf: size/offset: syz=0/0 kernel=1/8 -bad-field-offset: bpf_prog.prog_name/has_callchain_buf: syz=48 kernel=2 -bad-field-size: bpf_prog.prog_name/has_callchain_buf: syz=16 kernel=2 -bad-bitfield: bpf_prog.prog_ifindex/enforce_expected_attach_type: size/offset: syz=0/0 kernel=1/9 -bad-field-offset: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=64 kernel=2 -bad-field-size: bpf_prog.prog_ifindex/enforce_expected_attach_type: syz=4 kernel=2 -bad-field-offset: bpf_prog.expected_attach_type/type: syz=68 kernel=4 -bad-field-offset: bpf_prog.btf_fd/expected_attach_type: syz=72 kernel=8 -bad-field-offset: bpf_prog.func_info_rec_size/len: syz=76 kernel=12 -bad-field-offset: bpf_prog.func_info/jited_len: syz=80 kernel=16 -bad-field-size: bpf_prog.func_info/jited_len: syz=8 kernel=4 -bad-field-offset: bpf_prog.func_info_cnt/tag: syz=88 kernel=20 -bad-field-size: bpf_prog.func_info_cnt/tag: syz=4 kernel=8 -bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=28 [386,arm] -bad-field-offset: bpf_prog.line_info_rec_size/aux: syz=92 kernel=32 [amd64,arm64] -bad-field-size: bpf_prog.line_info_rec_size/aux: syz=4 kernel=8 [amd64,arm64] -bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=32 [386,arm] -bad-field-offset: bpf_prog.line_info/orig_prog: syz=96 kernel=40 [amd64,arm64] -bad-field-size: bpf_prog.line_info/orig_prog: syz=8 kernel=4 [386,arm] -bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=36 [386,arm] -bad-field-offset: bpf_prog.line_info_cnt/bpf_func: syz=104 kernel=48 [amd64,arm64] -bad-field-size: bpf_prog.line_info_cnt/bpf_func: syz=4 kernel=8 [amd64,arm64] -bad-field-offset: bpf_prog.attach_btf_id/insns: syz=108 kernel=40 [386,arm] -bad-field-offset: bpf_prog.attach_btf_id/insns: syz=108 kernel=56 [amd64,arm64] -bad-field-size: bpf_prog.attach_btf_id/insns: syz=4 kernel=0 -bad-field-offset: bpf_prog.attach_prog_fd/insnsi: syz=112 kernel=40 [386,arm] -bad-field-offset: bpf_prog.attach_prog_fd/insnsi: syz=112 kernel=56 [amd64,arm64] -bad-field-size: bpf_prog.attach_prog_fd/insnsi: syz=4 kernel=0 +no-such-struct: bpf_prog_t no-such-struct: bpf_insn_generic no-such-struct: bpf_insn_ldst no-such-struct: bpf_insn_alu no-such-struct: bpf_insn_jmp no-such-struct: bpf_insn_call_helper no-such-struct: bpf_insn_call_func +no-such-struct: bpf_insn_call_kfunc no-such-struct: bpf_insn_exit no-such-struct: bpf_insn_init_r0 -no-such-struct: bpf_insn_map +no-such-struct: bpf_insn_map_fd +no-such-struct: bpf_insn_map_idx no-such-struct: bpf_insn_map_value +no-such-struct: bpf_insn_map_idx_value +no-such-struct: bpf_insn_cb_func +no-such-struct: bpf_insn_btf_id no-such-struct: bpf_obj_pin_map no-such-struct: bpf_obj_pin_prog no-such-struct: bpf_obj_get @@ -85,15 +39,17 @@ no-such-struct: bpf_map_get_next_id_arg no-such-struct: bpf_btf_get_next_id_arg no-such-struct: bpf_link_get_next_id_arg no-such-struct: bpf_prog_get_fd_by_id_arg +no-such-struct: bpf_prog_bind_map_arg no-such-struct: bpf_get_prog_info_arg -bad-field-number: bpf_prog_info: syz=32 kernel=34 -bad-struct-size: bpf_prog_info: syz=192 kernel=208 +bad-field-number: bpf_prog_info: syz=32 kernel=36 +bad-struct-size: bpf_prog_info: syz=192 kernel=224 no-such-struct: bpf_get_map_info_arg -bad-field-number: bpf_map_info: syz=7 kernel=14 -bad-struct-size: bpf_map_info: syz=40 kernel=80 +bad-field-number: bpf_map_info: syz=7 kernel=15 +bad-struct-size: bpf_map_info: syz=40 kernel=88 no-such-struct: bpf_get_btf_info_arg +bad-field-number: bpf_btf_info: syz=3 kernel=6 +bad-struct-size: bpf_btf_info: syz=16 kernel=32 no-such-struct: bpf_prog_query -no-such-struct: bpf_raw_tracepoint no-such-struct: bpf_btf_load no-such-struct: btf_type_int no-such-struct: btf_type_ref_t -- cgit mrf-deployment