-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BUG: test 29 is broken on aarch64 #418
Comments
Unless we can resolve this rather quickly, I think we may need to revert commit 1852fe3 in the release-2.5 branch simply so the various packagers don't see a bunch of test failures when preparing distro packages from a release branch. Thoughts @drakenclimber? |
I think I have an aarch64 box; I'll hack around with it this morning and see if I can uncover anything |
Test 29 seems to have been problematic from its inception. I went back to the commit 51c46f8 that initially added it, and the PFC looks to be incorrect from day 1.
Stating the obvious here - these rule lines have never been added to the filter in any incarnation of libseccomp:
Commit 1852fe3 broke the PFC generation and resulted in no PFC being generated at all. I did a little hacking, and it looks like the lookup of -10001 in the gperf code mapped to |
Based on the above findings, I think the safest and most prudent solution is:
|
Reverted in the release-2.5 branch in commit 970c2b4. Since the test has been effectively broken since its inception, I've changed the milestone on this to v2.6.0. There seems to be significant issues with the test, and I doubt we will cherry-pick then into the release-2.5 branch |
On LoongArch 64-bit the same failures happen too. |
hello, @drakenclimber . |
First off, thanks to everyone who spent time investigating this and thinking about solutions, that was helpful. I took a look at this today and @drakenclimber's investigation seems to have hit at the core problem: the bogus negative syscall number chosen for test 29 isn't actually bogus on a number of systems due to the PNR mapping. On aarch64 the bogus syscall number maps to a valid pseudo-syscall/PNR, Considering that test 29 is intended to attempt loading of a bogus negative syscall, I think the easiest solution is to choose a negative syscall number well outside the range of the PNR values. Preliminary testing has shown this to resolve the problem, I'll post a PR shortly. |
Fixed in commit 87876aa. Thanks everyone for all of the help! |
It appears that commit 1852fe3 uncovered an issue on aarch64:
The text was updated successfully, but these errors were encountered: