Date
May 1, 2025, 8:40 a.m.
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty
RUN global.user_notification_filter_empty_threaded ... OK global.user_notification_filter_empty_threaded seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification
RUN global.user_notification_wait_killable ... seccomp_bpf.c:4718:user_notification_wait_killable:Expected listener (-1) >= 0 (0) user_notification_wait_killable: Test terminated by assertion FAIL global.user_notification_wait_killable seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_notification_fifo
RUN global.user_notification_wait_killable_pre_notification ... seccomp_bpf.c:4646:user_notification_wait_killable_pre_notification:Expected listener (-1) >= 0 (0) user_notification_wait_killable_pre_notification: Test terminated by assertion FAIL global.user_notification_wait_killable_pre_notification seccomp_seccomp_bpf_global_user_notification_fifo fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_notification_sync
RUN global.user_notification_fifo ... seccomp_bpf.c:4584:user_notification_fifo:Expected req.id (16215106120410181166) == baseid + i (16215106120410181164) seccomp_bpf.c:4584:user_notification_fifo:Expected req.id (16215106120410181164) == baseid + i (16215106120410181166) user_notification_fifo: Test failed FAIL global.user_notification_fifo seccomp_seccomp_bpf_global_user_notification_sync fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf
exit=1timeout set to 180 selftests: seccomp: seccomp_benchmark TAP version 13 1..7 # Running on: # Linux runner-nn8vmrs9z-project-40964107-concurrent-0 5.15.181-rc2 #1 SMP @1746089130 i686 GNU/Linux # Current BPF sysctl settings: # grep: /proc/sys/net/core/bpf_jit_enable: No such file or directory # grep: /proc/sys/net/core/bpf_jit_harden: No such file or directory Pinned to CPU 2 of 2 # Calibrating sample size for 15 seconds worth of syscalls ... # Benchmarking 19896135 syscalls... # 15.783740011 - 1.012895706 = 14770844305 (14.8s) # getpid native: 742 ns # 35.265923682 - 15.785797937 = 19480125745 (19.5s) # getpid RET_ALLOW 1 filter (bitmap): 979 ns # 54.555054670 - 35.266634991 = 19288419679 (19.3s) # getpid RET_ALLOW 2 filters (bitmap): 969 ns # 95.275585774 - 54.555891841 = 40719693933 (40.7s) # getpid RET_ALLOW 3 filters (full): 2046 ns # 142.741779782 - 95.276439265 = 47465340517 (47.5s) # getpid RET_ALLOW 4 filters (full): 2385 ns # Estimated total seccomp overhead for 1 bitmapped filter: 237 ns # Estimated total seccomp overhead for 2 bitmapped filters: 227 ns # Estimated total seccomp overhead for 3 full filters: 1304 ns # Estimated total seccomp overhead for 4 full filters: 1643 ns # Estimated seccomp entry overhead: 247 ns # Estimated seccomp per-filter overhead (last 2 diff): 339 ns # Estimated seccomp per-filter overhead (filters / 4): 349 ns # Expectations: # native ≤ 1 bitmap (742 ≤ 979): ✔️ ok 1 native ≤ 1 bitmap # native ≤ 1 filter (742 ≤ 2046): ✔️ ok 2 native ≤ 1 filter # per-filter (last 2 diff) ≈ per-filter (filters / 4) (339 ≈ 349): ✔️ ok 3 per-filter (last 2 diff) ≈ per-filter (filters / 4) # 1 bitmapped ≈ 2 bitmapped (237 ≈ 227): ✔️ ok 4 1 bitmapped ≈ 2 bitmapped # entry ≈ 1 bitmapped (247 ≈ 237): ✔️ ok 5 entry ≈ 1 bitmapped # entry ≈ 2 bitmapped (247 ≈ 227): ✔️ ok 6 entry ≈ 2 bitmapped # native + entry + (per filter * 4) ≈ 4 filters total (2345 ≈ 2385): ✔️ ok 7 native + entry + (per filter * 4) ≈ 4 filters total # Totals: pass:7 fail:0 xfail:0 xpass:0 skip:0 error:0 seccomp_seccomp_bpf_global_kcmp pass seccomp_seccomp_bpf_global_mode_strict_support pass seccomp_seccomp_bpf_global_mode_strict_cannot_call_prctl pass seccomp_seccomp_bpf_global_no_new_privs_support pass seccomp_seccomp_bpf_global_mode_filter_support pass seccomp_seccomp_bpf_global_mode_filter_without_nnp pass seccomp_seccomp_bpf_global_filter_size_limits pass seccomp_seccomp_bpf_global_filter_chain_limits pass seccomp_seccomp_bpf_global_mode_filter_cannot_move_to_strict pass seccomp_seccomp_bpf_global_mode_filter_get_seccomp pass seccomp_seccomp_bpf_global_ALLOW_all pass seccomp_seccomp_bpf_global_empty_prog pass seccomp_seccomp_bpf_global_log_all pass seccomp_seccomp_bpf_global_unknown_ret_is_kill_inside pass seccomp_seccomp_bpf_global_unknown_ret_is_kill_above_allow pass seccomp_seccomp_bpf_global_KILL_all pass seccomp_seccomp_bpf_global_KILL_one pass seccomp_seccomp_bpf_global_KILL_one_arg_one pass seccomp_seccomp_bpf_global_KILL_one_arg_six pass seccomp_seccomp_bpf_global_KILL_thread pass seccomp_seccomp_bpf_global_KILL_process pass seccomp_seccomp_bpf_global_KILL_unknown pass seccomp_seccomp_bpf_global_arg_out_of_range pass seccomp_seccomp_bpf_global_ERRNO_valid pass seccomp_seccomp_bpf_global_ERRNO_zero pass seccomp_seccomp_bpf_global_ERRNO_capped pass seccomp_seccomp_bpf_global_ERRNO_order pass seccomp_seccomp_bpf_global_negative_ENOSYS pass seccomp_seccomp_bpf_global_seccomp_syscall pass seccomp_seccomp_bpf_global_seccomp_syscall_mode_lock pass seccomp_seccomp_bpf_global_detect_seccomp_filter_flags pass seccomp_seccomp_bpf_global_TSYNC_first pass seccomp_seccomp_bpf_global_syscall_restart pass seccomp_seccomp_bpf_global_filter_flag_log pass seccomp_seccomp_bpf_global_get_action_avail pass seccomp_seccomp_bpf_global_get_metadata pass seccomp_seccomp_bpf_global_user_notification_basic pass seccomp_seccomp_bpf_global_user_notification_with_tsync pass seccomp_seccomp_bpf_global_user_notification_kill_in_middle pass seccomp_seccomp_bpf_global_user_notification_signal pass seccomp_seccomp_bpf_global_user_notification_closed_listener pass seccomp_seccomp_bpf_global_user_notification_child_pid_ns pass seccomp_seccomp_bpf_global_user_notification_sibling_pid_ns pass seccomp_seccomp_bpf_global_user_notification_fault_recv pass seccomp_seccomp_bpf_global_seccomp_get_notif_sizes pass seccomp_seccomp_bpf_global_user_notification_continue pass seccomp_seccomp_bpf_global_user_notification_filter_empty pass seccomp_seccomp_bpf_global_user_ioctl_notification_filter_empty fail seccomp_seccomp_bpf_global_user_notification_filter_empty_threaded pass seccomp_seccomp_bpf_global_user_notification_addfd pass seccomp_seccomp_bpf_global_user_notification_addfd_rlimit pass seccomp_seccomp_bpf_global_user_notification_sync fail seccomp_seccomp_bpf_global_user_notification_fifo fail seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail seccomp_seccomp_bpf_global_user_notification_wait_killable fail seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail seccomp_seccomp_bpf_TRAP_dfl pass seccomp_seccomp_bpf_TRAP_ign pass seccomp_seccomp_bpf_TRAP_handler pass seccomp_seccomp_bpf_precedence_allow_ok pass seccomp_seccomp_bpf_precedence_kill_is_highest pass seccomp_seccomp_bpf_precedence_kill_is_highest_in_any_order pass seccomp_seccomp_bpf_precedence_trap_is_second pass seccomp_seccomp_bpf_precedence_trap_is_second_in_any_order pass seccomp_seccomp_bpf_precedence_errno_is_third pass seccomp_seccomp_bpf_precedence_errno_is_third_in_any_order pass seccomp_seccomp_bpf_precedence_trace_is_fourth pass seccomp_seccomp_bpf_precedence_trace_is_fourth_in_any_order pass seccomp_seccomp_bpf_precedence_log_is_fifth pass seccomp_seccomp_bpf_precedence_log_is_fifth_in_any_order pass seccomp_seccomp_bpf_TRACE_poke_read_has_side_effects pass seccomp_seccomp_bpf_TRACE_poke_getpid_runs_normally pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_negative_ENOSYS pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_allowed pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_redirected pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_errno pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_syscall_faked pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_immediate pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_skip_after pass seccomp_seccomp_bpf_TRACE_syscall_ptrace_kill_after pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_negative_ENOSYS pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_allowed pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_redirected pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_errno pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_syscall_faked pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_immediate pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_skip_after pass seccomp_seccomp_bpf_TRACE_syscall_seccomp_kill_after pass seccomp_seccomp_bpf_TSYNC_siblings_fail_prctl pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_ancestor pass seccomp_seccomp_bpf_TSYNC_two_sibling_want_nnp pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_no_filter pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence pass seccomp_seccomp_bpf_TSYNC_two_siblings_with_one_divergence_no_tid_in_err pass seccomp_seccomp_bpf_TSYNC_two_siblings_not_under_filter pass seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_setoptions pass seccomp_seccomp_bpf_O_SUSPEND_SECCOMP_seize pass seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_allow___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_block_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf_URETPROBE_not_attached_uretprobe_default_block_with_uretprobe_syscall___NR_uretprobe_syscall_not_defined skip seccomp_seccomp_bpf fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader
RUN TRAP.dfl ... OK TRAP.dfl seccomp_seccomp_bpf_global_tsync_vs_dead_thread_leader fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal
RUN global.tsync_vs_dead_thread_leader ... seccomp_bpf.c:4893:tsync_vs_dead_thread_leader:Expected 0 (0) == status (768) tsync_vs_dead_thread_leader: Test failed FAIL global.tsync_vs_dead_thread_leader seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail
Failure - kselftest-seccomp - seccomp_seccomp_bpf_global_user_notification_wait_killable
RUN global.user_notification_wait_killable_fatal ... seccomp_bpf.c:4788:user_notification_wait_killable_fatal:Expected listener (-1) >= 0 (0) user_notification_wait_killable_fatal: Test terminated by assertion FAIL global.user_notification_wait_killable_fatal seccomp_seccomp_bpf_global_user_notification_wait_killable_pre_notification fail seccomp_seccomp_bpf_global_user_notification_wait_killable fail seccomp_seccomp_bpf_global_user_notification_wait_killable_fatal fail