Hay
Date
May 28, 2025, 8:08 a.m.

Environment
qemu-armv7
x15

<8>[  153.677413] <LAVA_SIGNAL_STARTTC seccomp_seccomp_bpf>
exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-nn8vmrs9z-project-40964107-concurrent-0 6.15.0-next-20250528 #1 SMP @1748420004 armv7l GNU/Linux
# Current BPF sysctl settings:
# grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory
# grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory
Pinned to CPU 2 of 2
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 1346355 syscalls...
# 14.829587712 - 1.021273392 = 13808314320 (13.8s)
# getpid native: 10256 ns
# 30.148266928 - 14.833504064 = 15314762864 (15.3s)
# getpid RET_ALLOW 1 filter (bitmap): 11374 ns
# 45.495271328 - 30.149640768 = 15345630560 (15.3s)
# getpid RET_ALLOW 2 filters (bitmap): 11397 ns
# 66.718965136 - 45.496683808 = 21222281328 (21.2s)
# getpid RET_ALLOW 3 filters (full): 15762 ns
# 88.717379328 - 66.720430576 = 21996948752 (22.0s)
# getpid RET_ALLOW 4 filters (full): 16338 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 1118 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 1141 ns
# Estimated total seccomp overhead for 3 full filters: 5506 ns
# Estimated total seccomp overhead for 4 full filters: 6082 ns
# Estimated seccomp entry overhead: 1095 ns
# Estimated seccomp per-filter overhead (last 2 diff): 576 ns
# Estimated seccomp per-filter overhead (filters / 4): 1246 ns
# Expectations:
# 	native ≤ 1 bitmap (10256 ≤ 11374): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (10256 ≤ 15762): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (576 ≈ 1246): ❌
not ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (1118 ≈ 1141): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (1095 ≈ 1118): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (1095 ≈ 1141): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (13655 ≈ 16338): ❌
not ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Saw unexpected benchmark result. Try running again with more samples?
# Totals: pass:5 fail:2 xfail:0 xpass:0 skip:0 error:0
<8>[  153.702801] <LAVA_SIGNAL_ENDTC seccomp_seccomp_bpf>
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart fail
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync pass
seccomp_seccomp_bpf_global_user_notification_fifo pass
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification pass
seccomp_seccomp_bpf_global_user_notification_wait_killable pass
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal pass
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader pass
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart fail
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync pass
seccomp_seccomp_bpf_global_user_notification_fifo pass
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification pass
seccomp_seccomp_bpf_global_user_notification_wait_killable pass
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal pass
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader pass
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normal[ 1257.718139] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-seccomp RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_[ 1257.777496] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_kcmp RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirec[ 1257.798980] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_strict_support RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate p[ 1257.825561] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TS[ 1257.873504] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_support RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_sibling[ 1257.894470] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_without_nnp RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_T[ 1257.915496] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_filter_size_limits RESULT=pass>
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretpro[ 1257.936676] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_filter_chain_limits RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_ur[ 1257.962860] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretp[ 1257.985076] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_get_seccomp RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_ur[ 1258.011718] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_ALLOW_all RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_bloc[ 1258.031829] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_empty_prog RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_ure[ 1258.051788] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_log_all RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_[ 1258.071655] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside RESULT=pass>
seccomp_seccomp_bpf fail