Hay
Date
May 1, 2025, 8:40 a.m.

Environment
dragonboard-410c
dragonboard-845c
juno-r2
qemu-arm64
qemu-armv7
qemu-i386
qemu-x86_64
x15
x86

# Current BPF sysctl settings:
# /proc/sys/net/core/bpf_jit_enable:1
# /proc/sys/net/core/bpf_jit_harden:0
Pinned to CPU 4 of 4
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 25879935 syscalls...
# 15.920115826 - 1.008838329 = 14911277497 (14.9s)
# getpid native: 576 ns
# 35.551950165 - 15.920540409 = 19631409756 (19.6s)
# getpid RET_ALLOW 1 filter (bitmap): 758 ns
# 55.183892517 - 35.552298967 = 19631593550 (19.6s)
# getpid RET_ALLOW 2 filters (bitmap): 758 ns
# 85.807598022 - 55.184240434 = 30623357588 (30.6s)
# getpid RET_ALLOW 3 filters (full): 1183 ns
# 120.828309702 - 85.807925522 = 35020384180 (35.0s)
# getpid RET_ALLOW 4 filters (full): 1353 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 182 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 182 ns
# Estimated total seccomp overhead for 3 full filters: 607 ns
# Estimated total seccomp overhead for 4 full filters: 777 ns
# Estimated seccomp entry overhead: 182 ns
# Estimated seccomp per-filter overhead (last 2 diff): 170 ns
# Estimated seccomp per-filter overhead (filters / 4): 148 ns
# Expectations:
# 	native ≤ 1 bitmap (576 ≤ 758): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (576 ≤ 1183): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (170 ≈ 148): ❌
not ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (182 ≈ 182): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (182 ≈ 182): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (182 ≈ 182): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (1438 ≈ 1353): ✔️
ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Saw unexpected benchmark result. Try running again with more samples?
# Totals: pass:6 fail:1 xfail:0 xpass:0 skip:0 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass[  981.097586] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-seccomp RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-j1aldqxs-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP PREEMPT @1746089128 aarch64 GNU/Linux
# Current BPF sysctl settings:
# /proc/sys/net/core/bpf_jit_enable:1
# /proc/sys/net/core/bpf_jit_harden:0
Pinned to CPU 8 of 8
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 82576440 syscalls...
# 15.830827281 - 1.004097809 = 14826729472 (14.8s)
# getpid native: 179 ns
# 32.837316196 - 15.831380510 = 17005935686 (17.0s)
# getpid RET_ALLOW 1 filter (bitmap): 205 ns
# 49.841895715 - 32.837798435 = 17004097280 (17.0s)
# getpid RET_ALLOW 2 filters (bitmap): 205 ns
# 73.521784778 - 49.842383996 = 23679400782 (23.7s)
# getpid RET_ALLOW 3 filters (full): 286 ns
# 103.625050974 - 73.522252955 = 30102798019 (30.1s)
# getpid RET_ALLOW 4 filters (full): 364 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 26 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 26 ns
# Estimated total seccomp overhead for 3 full filters: 107 ns
# Estimated total seccomp overhead for 4 full filters: 185 ns
# Estimated seccomp entry overhead: 26 ns
# Estimated seccomp per-filter overhead (last 2 diff): 78 ns
# Estimated seccomp per-filter overhead (filters / 4): 39 ns
# Expectations:
# 	native ≤ 1 bitmap (179 ≤ 205): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (179 ≤ 286): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (78 ≈ 39): ❌
not ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (26 ≈ 26): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (26 ≈ 26): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (26 ≈ 26): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (517 ≈ 364): ❌
not ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Saw unexpected benchmark result. Try running again with more samples?
# Totals: pass:5 fail:2 xfail:0 xpass:0 skip:0 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

# Current BPF sysctl se[ 1018.085124] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf RESULT=fail>
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pas[ 1013.720226] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-seccomp RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two[ 1013.831007] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_kcmp RESULT=pass>
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_[ 1013.868022] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_strict_support RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___[ 1013.906739] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with[ 1013.945756] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_no_new_privs_support RESULT=pass>
seccomp_seccomp_bpf fail

exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-j1aldqxs-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP PREEMPT @1746089128 aarch64 GNU/Linux
# Current BPF sysctl settings:
# /proc/sys/net/core/bpf_jit_enable:1
# /proc/sys/net/core/bpf_jit_harden:0
Pinned to CPU 2 of 2
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 3141495 syscalls...
# 14.336489429 - 1.048582465 = 13287906964 (13.3s)
# getpid native: 4229 ns
# 29.353677853 - 14.338709292 = 15014968561 (15.0s)
# getpid RET_ALLOW 1 filter (bitmap): 4779 ns
# 44.393281688 - 29.355001401 = 15038280287 (15.0s)
# getpid RET_ALLOW 2 filters (bitmap): 4786 ns
# 63.372697631 - 44.394830662 = 18977866969 (19.0s)
# getpid RET_ALLOW 3 filters (full): 6041 ns
# 83.397096490 - 63.374058449 = 20023038041 (20.0s)
# getpid RET_ALLOW 4 filters (full): 6373 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 550 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 557 ns
# Estimated total seccomp overhead for 3 full filters: 1812 ns
# Estimated total seccomp overhead for 4 full filters: 2144 ns
# Estimated seccomp entry overhead: 543 ns
# Estimated seccomp per-filter overhead (last 2 diff): 332 ns
# Estimated seccomp per-filter overhead (filters / 4): 400 ns
# Expectations:
# 	native ≤ 1 bitmap (4229 ≤ 4779): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (4229 ≤ 6041): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (332 ≈ 400): ❌
not ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (550 ≈ 557): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (543 ≈ 550): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (543 ≈ 557): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (6100 ≈ 6373): ✔️
ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Saw unexpected benchmark result. Try running again with more samples?
# Totals: pass:6 fail:1 xfail:0 xpass:0 skip:0 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-nn8vmrs9z-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP @1746089127 armv7l GNU/Linux
# Current BPF sysctl settings:
# grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory
# grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory
Pinned to CPU 2 of 2
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 15109095 syscalls...
# 16.059898784 - 1.026858288 = 15033040496 (15.0s)
# getpid native: 994 ns
# 37.149091552 - 16.061535088 = 21087556464 (21.1s)
# getpid RET_ALLOW 1 filter (bitmap): 1395 ns
# 58.192991088 - 37.149790400 = 21043200688 (21.0s)
# getpid RET_ALLOW 2 filters (bitmap): 1392 ns
# 97.496688624 - 58.193632160 = 39303056464 (39.3s)
# getpid RET_ALLOW 3 filters (full): 2601 ns
# 141.516050736 - 97.497408288 = 44018642448 (44.0s)
# getpid RET_ALLOW 4 filters (full): 2913 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 401 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 398 ns
# Estimated total seccomp overhead for 3 full filters: 1607 ns
# Estimated total seccomp overhead for 4 full filters: 1919 ns
# Estimated seccomp entry overhead: 404 ns
# Estimated seccomp per-filter overhead (last 2 diff): 312 ns
# Estimated seccomp per-filter overhead (filters / 4): 378 ns
# Expectations:
# 	native ≤ 1 bitmap (994 ≤ 1395): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (994 ≤ 2601): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (312 ≈ 378): ❌
not ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (401 ≈ 398): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (404 ≈ 401): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (404 ≈ 398): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (2646 ≈ 2913): ❌
not ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Saw unexpected benchmark result. Try running again with more samples?
# Totals: pass:5 fail:2 xfail:0 xpass:0 skip:0 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart fail
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS fail
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS fail
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-nn8vmrs9z-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP @1746089130 i686 GNU/Linux
# Current BPF sysctl settings:
# grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory
# grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory
Pinned to CPU 2 of 2
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 19896135 syscalls...
# 15.783740011 - 1.012895706 = 14770844305 (14.8s)
# getpid native: 742 ns
# 35.265923682 - 15.785797937 = 19480125745 (19.5s)
# getpid RET_ALLOW 1 filter (bitmap): 979 ns
# 54.555054670 - 35.266634991 = 19288419679 (19.3s)
# getpid RET_ALLOW 2 filters (bitmap): 969 ns
# 95.275585774 - 54.555891841 = 40719693933 (40.7s)
# getpid RET_ALLOW 3 filters (full): 2046 ns
# 142.741779782 - 95.276439265 = 47465340517 (47.5s)
# getpid RET_ALLOW 4 filters (full): 2385 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 237 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 227 ns
# Estimated total seccomp overhead for 3 full filters: 1304 ns
# Estimated total seccomp overhead for 4 full filters: 1643 ns
# Estimated seccomp entry overhead: 247 ns
# Estimated seccomp per-filter overhead (last 2 diff): 339 ns
# Estimated seccomp per-filter overhead (filters / 4): 349 ns
# Expectations:
# 	native ≤ 1 bitmap (742 ≤ 979): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (742 ≤ 2046): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (339 ≈ 349): ✔️
ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (237 ≈ 227): ✔️
ok 4 1 bitmapped ≈ 2 bitmapped
# 	entry ≈ 1 bitmapped (247 ≈ 237): ✔️
ok 5 entry ≈ 1 bitmapped
# 	entry ≈ 2 bitmapped (247 ≈ 227): ✔️
ok 6 entry ≈ 2 bitmapped
# 	native + entry + (per filter * 4) ≈ 4 filters total (2345 ≈ 2385): ✔️
ok 7 native + entry + (per filter * 4) ≈ 4 filters total
# Totals: pass:7 fail:0 xfail:0 xpass:0 skip:0 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf fail

exit=1timeout set to 180
selftests: seccomp: seccomp_benchmark
TAP version 13
1..7
# Running on:
# Linux runner-j2nyww-s-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP @1746089133 x86_64 GNU/Linux
# Current BPF sysctl settings:
# grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory
# grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory
Pinned to CPU 2 of 2
# Calibrating sample size for 15 seconds worth of syscalls ...
# Benchmarking 1196760 syscalls...
# 15.124497494 - 1.065556066 = 14058941428 (14.1s)
# getpid native: 11747 ns
# 30.453921425 - 15.127655914 = 15326265511 (15.3s)
# getpid RET_ALLOW 1 filter (bitmap): 12806 ns
# 45.536474897 - 30.455229413 = 15081245484 (15.1s)
# getpid RET_ALLOW 2 filters (bitmap): 12601 ns
# 64.654542543 - 45.537706524 = 19116836019 (19.1s)
# getpid RET_ALLOW 3 filters (full): 15973 ns
# 84.908692281 - 64.655869718 = 20252822563 (20.3s)
# getpid RET_ALLOW 4 filters (full): 16923 ns
# Estimated total seccomp overhead for 1 bitmapped filter: 1059 ns
# Estimated total seccomp overhead for 2 bitmapped filters: 854 ns
# Estimated total seccomp overhead for 3 full filters: 4226 ns
# Estimated total seccomp overhead for 4 full filters: 5176 ns
# Estimated seccomp entry overhead: 1264 ns
# Estimated seccomp per-filter overhead (last 2 diff): 950 ns
# Estimated seccomp per-filter overhead (filters / 4): 978 ns
# Expectations:
# 	native ≤ 1 bitmap (11747 ≤ 12806): ✔️
ok 1 native ≤ 1 bitmap
# 	native ≤ 1 filter (11747 ≤ 15973): ✔️
ok 2 native ≤ 1 filter
# 	per-filter (last 2 diff) ≈ per-filter (filters / 4) (950 ≈ 978): ✔️
ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4)
# 	1 bitmapped ≈ 2 bitmapped (1059 ≈ 854): ❌
not ok 4 1 bitmapped ≈ 2 bitmapped
# Skipping constant action bitmap expectations: they appear unsupported.
ok 5 # SKIP entry ≈ 1 bitmapped
ok 6 # SKIP entry ≈ 2 bitmapped
ok 7 # SKIP native + entry + (per filter * 4) ≈ 4 filters total
# 3 skipped test(s) detected. Consider enabling relevant config options to improve coverage.
# Totals: pass:3 fail:1 xfail:0 xpass:0 skip:3 error:0
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall pass
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow pass
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block pass
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall pass
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall pass
seccomp_seccomp_bpf fail

# Running on:
seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS_arm32_does_not_support_calling_syscall_1 skip
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart fail
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side[  891.405212] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-seccomp RESULT=pass>
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS fail
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_sibli[  891.555236] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_support RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filt[  891.576232] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_without_nnp RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_diverg[  891.597351] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_filter_size_limits RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_set[  891.618103] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_filter_chain_limits RESULT=pass>
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow__[  891.639251] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_no[  891.661041] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_get_seccomp RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip[  891.682525] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_ALLOW_all RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip
[  891.702423] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_empty_prog RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip
seccomp_seccomp_bpf[  891.722473] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_log_all RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attac[  891.742370] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretpr[  891.763763] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow RESULT=pass>
seccomp_seccomp_bpf fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal>

seccomp_seccomp_bpf_global_kcmp pass
seccomp_seccomp_bpf_global_mode_strict_support pass
seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass
seccomp_seccomp_bpf_global_no_new_privs_support pass
seccomp_seccomp_bpf_global_mode_filter_support pass
seccomp_seccomp_bpf_global_mode_filter_without_nnp pass
seccomp_seccomp_bpf_global_filter_size_limits pass
seccomp_seccomp_bpf_global_filter_chain_limits pass
seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass
seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass
seccomp_seccomp_bpf_global_ALLOW_all pass
seccomp_seccomp_bpf_global_empty_prog pass
seccomp_seccomp_bpf_global_log_all pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass
seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass
seccomp_seccomp_bpf_global_KILL_all pass
seccomp_seccomp_bpf_global_KILL_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_one pass
seccomp_seccomp_bpf_global_KILL_one_arg_six pass
seccomp_seccomp_bpf_global_KILL_thread pass
seccomp_seccomp_bpf_global_KILL_process pass
seccomp_seccomp_bpf_global_KILL_unknown pass
seccomp_seccomp_bpf_global_arg_out_of_range pass
seccomp_seccomp_bpf_global_ERRNO_valid pass
seccomp_seccomp_bpf_global_ERRNO_zero pass
seccomp_seccomp_bpf_global_ERRNO_capped pass
seccomp_seccomp_bpf_global_ERRNO_order pass
seccomp_seccomp_bpf_global_negative_ENOSYS pass
seccomp_seccomp_bpf_global_seccomp_syscall pass
seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass
seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass
seccomp_seccomp_bpf_global_TSYNC_first pass
seccomp_seccomp_bpf_global_syscall_restart pass
seccomp_seccomp_bpf_global_filter_flag_log pass
seccomp_seccomp_bpf_global_get_action_avail pass
seccomp_seccomp_bpf_global_get_metadata pass
seccomp_seccomp_bpf_global_user_notification_basic pass
seccomp_seccomp_bpf_global_user_notification_with_tsync pass
seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass
seccomp_seccomp_bpf_global_user_notification_signal pass
seccomp_seccomp_bpf_global_user_notification_closed_listener pass
seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass
seccomp_seccomp_bpf_global_user_notification_fault_recv pass
seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass
seccomp_seccomp_bpf_global_user_notification_continue pass
seccomp_seccomp_bpf_global_user_notification_filter_empty pass
seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass
seccomp_seccomp_bpf_global_user_notification_addfd pass
seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass
seccomp_seccomp_bpf_global_user_notification_sync fail
seccomp_seccomp_bpf_global_user_notification_fifo fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
seccomp_seccomp_bpf_global_user_notification_wait_killable fail
seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
seccomp_seccomp_bpf_TRAP_dfl pass
seccomp_seccomp_bpf_TRAP_ign pass
seccomp_seccomp_bpf_TRAP_handler pass
seccomp_seccomp_bpf_precedence_allow_ok pass
seccomp_seccomp_bpf_precedence_kill_is_highest pass
seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass
seccomp_seccomp_bpf_precedence_trap_is_second pass
seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass
seccomp_seccomp_bpf_precedence_errno_is_third pass
seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass
seccomp_seccomp_bpf_precedence_trace_is_fourth pass
seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass
seccomp_seccomp_bpf_precedence_log_is_fifth pass
seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass
seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass
seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass
seccomp_seccomp_bpf_TRACE_sysc[  808.689881] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-seccomp RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass
seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_[  808.765579] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass
seccomp_seccomp_bpf_TRACE_sysca[  808.785861] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_no_new_privs_support RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass
seccomp_seccomp_bpf[  808.805371] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_support RESULT=pass>
seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass
seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass
seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pas[  808.883546] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict RESULT=pass>
seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass
seccomp_seccomp_bpf_TSYNC_two_[  808.903846] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_mode_filter_get_seccomp RESULT=pass>
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass
seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_sei[  808.924491] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_ALLOW_all RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow pass
seccomp_seccomp_bpf_URETPROBE_atta[  808.943713] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_empty_prog RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall pass
seccomp_seccomp_bpf_URETPROBE_not_attached_uretpro[  808.982501] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block pass
seccomp_seccomp_bpf_URETPROBE_no[  809.004807] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow RESULT=pass>
seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretp[  809.026430] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=seccomp_seccomp_bpf_global_KILL_all RESULT=pass>
seccomp_seccomp_bpf fail