Date
July 2, 2025, 11:10 a.m.
Failure - kselftest-seccomp - seccomp_seccomp_benchmark
<8>[ 147.028536] <LAVA_SIGNAL_STARTTC seccomp_seccomp_benchmark> exit=1<8>[ 147.040216] <LAVA_SIGNAL_ENDTC seccomp_seccomp_benchmark> seccomp_seccomp_benchmark_native_1_bitmap pass seccomp_seccomp_benchmark_native_1_filter pass seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass seccomp_seccomp_benchmark_entry_1_bitmapped pass seccomp_seccomp_benchmark_entry_2_bitmapped pass seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total fail seccomp_seccomp_benchmark fail
Failure - kselftest-seccomp - seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total
<8>[ 146.966984] <LAVA_SIGNAL_STARTTC seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total> Saw unexpected benchmark result. Try running again with more samples? Totals: pass:5 fail:2 xfail:0 xpass:0 skip:0 error:0 <8>[ 146.979100] <LAVA_SIGNAL_ENDTC seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total> seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total fail
Failure - kselftest-seccomp - seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4
<8>[ 146.761956] <LAVA_SIGNAL_STARTTC seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4> 1 bitmapped \u2248 2 bitmapped (1059 \u2248 1072): \u2714\uFE0F <8>[ 146.773765] <LAVA_SIGNAL_ENDTC seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4> seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf
<8>[ 146.592908] <LAVA_SIGNAL_STARTTC seccomp_seccomp_bpf> exit=1timeout set to 180 selftests: seccomp: seccomp_benchmark TAP version 13 1..7 # Running on: # Linux runner-ns46nmmj-project-40964107-concurrent-0 6.16.0-rc4-next-20250702 #1 SMP @1751454930 armv7l GNU/Linux # Current BPF sysctl settings: # grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory # grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory Pinned to CPU 2 of 2 # Calibrating sample size for 15 seconds worth of syscalls ... # Benchmarking 1795140 syscalls... # 16.572633168 - 1.077715584 = 15494917584 (15.5s) # getpid native: 8631 ns # 33.970783712 - 16.574489072 = 17396294640 (17.4s) # getpid RET_ALLOW 1 filter (bitmap): 9690 ns # 51.391393024 - 33.971655456 = 17419737568 (17.4s) # getpid RET_ALLOW 2 filters (bitmap): 9703 ns # 74.846778352 - 51.392276192 = 23454502160 (23.5s) # getpid RET_ALLOW 3 filters (full): 13065 ns # 99.427502832 - 74.847687296 = 24579815536 (24.6s) # getpid RET_ALLOW 4 filters (full): 13692 ns # Estimated total seccomp overhead for 1 bitmapped filter: 1059 ns # Estimated total seccomp overhead for 2 bitmapped filters: 1072 ns # Estimated total seccomp overhead for 3 full filters: 4434 ns # Estimated total seccomp overhead for 4 full filters: 5061 ns # Estimated seccomp entry overhead: 1046 ns # Estimated seccomp per-filter overhead (last 2 diff): 627 ns # Estimated seccomp per-filter overhead (filters / 4): 1003 ns # Expectations: # \tnative \u2264 1 bitmap (8631 \u2264 9690): \u2714\uFE0F ok 1 native \u2264 1 bitmap # \tnative \u2264 1 filter (8631 \u2264 13065): \u2714\uFE0F ok 2 native \u2264 1 filter # \tper-filter (last 2 diff) \u2248 per-filter (filters / 4) (627 \u2248 1003): \u274C not ok 3 per-filter (last 2 diff) \u2248 per-filter (filters / 4) # \t1 bitmapped \u2248 2 bitmapped (1059 \u2248 1072): \u2714\uFE0F ok 4 1 bitmapped \u2248 2 bitmapped # \tentry \u2248 1 bitmapped (1046 \u2248 1059): \u2714\uFE0F ok 5 entry \u2248 1 bitmapped # \tentry \u2248 2 bitmapped (1046 \u2248 1072): \u2714\uFE0F ok 6 entry \u2248 2 bitmapped # \tnative + entry + (per filter * 4) \u2248 4 filters total (12185 \u2248 13692): \u274C not ok 7 native + entry + (per filter * 4) \u2248 4 filters total # Saw unexpected benchmark result. Try running again with more samples? # Totals: pass:5 fail:2 xfail:0 xpass:0 skip:0 error:0 <8>[ 146.611776] <LAVA_SIGNAL_ENDTC seccomp_seccomp_bpf> seccomp_seccomp_bpf_global_kcmp pass seccomp_seccomp_bpf_global_mode_strict_support pass seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass seccomp_seccomp_bpf_global_no_new_privs_support pass seccomp_seccomp_bpf_global_mode_filter_support pass seccomp_seccomp_bpf_global_mode_filter_without_nnp pass seccomp_seccomp_bpf_global_filter_size_limits pass seccomp_seccomp_bpf_global_filter_chain_limits pass seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass seccomp_seccomp_bpf_global_ALLOW_all pass seccomp_seccomp_bpf_global_empty_prog pass seccomp_seccomp_bpf_global_log_all pass seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass seccomp_seccomp_bpf_global_KILL_all pass seccomp_seccomp_bpf_global_KILL_one pass seccomp_seccomp_bpf_global_KILL_one_arg_one pass seccomp_seccomp_bpf_global_KILL_one_arg_six pass seccomp_seccomp_bpf_global_KILL_thread pass seccomp_seccomp_bpf_global_KILL_process pass seccomp_seccomp_bpf_global_KILL_unknown pass seccomp_seccomp_bpf_global_arg_out_of_range pass seccomp_seccomp_bpf_global_ERRNO_valid pass seccomp_seccomp_bpf_global_ERRNO_zero pass seccomp_seccomp_bpf_global_ERRNO_capped pass seccomp_seccomp_bpf_global_ERRNO_order pass seccomp_seccomp_bpf_global_negative_ENOSYS_arm32_does_not_support_calling_syscall__1 skip seccomp_seccomp_bpf_global_seccomp_syscall pass seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass seccomp_seccomp_bpf_global_TSYNC_first pass seccomp_seccomp_bpf_global_syscall_restart fail seccomp_seccomp_bpf_global_filter_flag_log pass seccomp_seccomp_bpf_global_get_action_avail pass seccomp_seccomp_bpf_global_get_metadata pass seccomp_seccomp_bpf_global_user_notification_basic pass seccomp_seccomp_bpf_global_user_notification_with_tsync pass seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass seccomp_seccomp_bpf_global_user_notification_signal pass seccomp_seccomp_bpf_global_user_notification_closed_listener pass seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass seccomp_seccomp_bpf_global_user_notification_fault_recv pass seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass seccomp_seccomp_bpf_global_user_notification_continue pass seccomp_seccomp_bpf_global_user_notification_filter_empty pass seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty pass seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass seccomp_seccomp_bpf_global_user_notification_addfd pass seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass seccomp_seccomp_bpf_global_user_notification_sync pass seccomp_seccomp_bpf_global_user_notification_fifo pass seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification pass seccomp_seccomp_bpf_global_user_notification_wait_killable pass seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal pass seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader pass seccomp_seccomp_bpf_TRAP_dfl pass seccomp_seccomp_bpf_TRAP_ign pass seccomp_seccomp_bpf_TRAP_handler pass seccomp_seccomp_bpf_precedence_allow_ok pass seccomp_seccomp_bpf_precedence_kill_is_highest pass seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass seccomp_seccomp_bpf_precedence_trap_is_second pass seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass seccomp_seccomp_bpf_precedence_errno_is_third pass seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass seccomp_seccomp_bpf_precedence_trace_is_fourth pass seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass seccomp_seccomp_bpf_precedence_log_is_fifth pass seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS_arm32_does_not_support_calling_syscall__1 skip seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS_arm32_does_not_support_calling_syscall__1 skip seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_syscall_restart
<8>[ 142.968846] <LAVA_SIGNAL_STARTTC seccomp_seccomp_bpf_global_syscall_restart> RUN global.filter_flag_log ... OK global.filter_flag_log <8>[ 142.982713] <LAVA_SIGNAL_ENDTC seccomp_seccomp_bpf_global_syscall_restart> seccomp_seccomp_bpf_global_syscall_restart fail