From 773117bf811a6e7f9d13bb966dc4956774e88207 Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Fri, 17 Jan 2020 16:59:20 +0100 Subject: tools/syz-check: also check arm/arm64 They mostly duplicate the warnings we already have for amd64/386. But uncovered few very interesting local things (e.g. epoll_event is packed only on amd64, so arm/arm64 layout is wrong, but 386 is correct because int64 alignment is different). Update #590 --- sys/linux/dev_snd_control.txt.warn | 3 +++ 1 file changed, 3 insertions(+) (limited to 'sys/linux/dev_snd_control.txt.warn') diff --git a/sys/linux/dev_snd_control.txt.warn b/sys/linux/dev_snd_control.txt.warn index 8e957d058..a2c325a2f 100644 --- a/sys/linux/dev_snd_control.txt.warn +++ b/sys/linux/dev_snd_control.txt.warn @@ -3,3 +3,6 @@ compiler: len target names_ptr refer to an array with variable-size elements (do bad-field-size: snd_ctl_elem_info.items/value: syz=4 kernel=128 bad-field-size: snd_ctl_elem_info.item/reserved: syz=4 kernel=64 bad-field-offset: snd_ctl_elem_info.item/reserved: syz=84 kernel=208 +bad-struct-size: snd_ctl_elem_value: syz=708 kernel=712 [arm] +bad-field-offset: snd_ctl_elem_value.value: syz=68 kernel=72 [arm] +bad-field-offset: snd_ctl_elem_value.reserved: syz=580 kernel=584 [arm] -- cgit mrf-deployment