Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1110791ybb; Wed, 8 Apr 2020 16:59:02 -0700 (PDT) X-Google-Smtp-Source: APiQypJmDuWvwDxsNmtSrkzjNPu5CiaY9Ab+hEDvFA2wmon7NKugytxLOkI+UaLnWhQyUji0/8Lr X-Received: by 2002:a9d:6292:: with SMTP id x18mr7893659otk.241.1586390341907; Wed, 08 Apr 2020 16:59:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586390341; cv=none; d=google.com; s=arc-20160816; b=piqvRW/LUlR7xPzaQO0NVbosm0xJqxMYiz09aM1O0O1AHWKpRUpey2PF9kfXfGZe1m G+c0jqKi9rSiqncp/I/mLgs8GFhu0cCYiT9ZFc5Gx8h6Q7wJHfbdcBjGFnYlOPTaUQOd MNSYGAT81XlEVwnINq31at41fmtiLKOexeTLLAIipQTSkkDQBV5gEKtyd9li5OLUsaJz uIJEX+eN7xumyiV9jxVMv2wkAxg/E+bBt778VSeDvtegVTEf/4sXeVSIfuJxL8w3QiWM hsQGR38zz8phrcCdl2mKjjfX9UDrx2ga9gzWKpWpH/nzc0yqU9CPlXg663UG7XzyWVgP dpeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=1Oq7/ziphGlJEN6arW4JQL3RbwObLZMvSD7hOq9/R3A=; b=TwEvQ8jzoS1C0BNo33LDD77t8QnW77zBdG6e1irzXT0FNDAOoKNP6xRmScRWj2XuEH YaAW1P6z+a8496A45R/SCBJ0OCJtO/fTW5bPs4IamZTNjxSxJcMIUa5cHGOvvla0rwKT gY+f0akKxfgKwID585PtiqPEprVn5zngX0ZibwLduzD2XhIwI4Ljv6CPQERkAlfMd0Q4 AJt3aQHIi9xedM+3sH+kKyUrz/bgt/X/8ha70lkViDSTyZ0Ip+s1PDR5WerAmGHiFYBE Lg/73+iQB0dHjBKloKQz2adcea2K6sxvacEMFJio8XTHp4AJLjktTxIWFvNnMkCRyxjl bGwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c5si426244oto.50.2020.04.08.16.58.46; Wed, 08 Apr 2020 16:59:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726559AbgDHX6O (ORCPT + 99 others); Wed, 8 Apr 2020 19:58:14 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:53208 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726510AbgDHX6O (ORCPT ); Wed, 8 Apr 2020 19:58:14 -0400 Received: from 1.general.cascardo.us.vpn ([10.172.70.58] helo=localhost.localdomain) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jMKaC-0001Kx-Ef; Wed, 08 Apr 2020 23:58:12 +0000 From: Thadeu Lima de Souza Cascardo To: bpf@vger.kernel.org Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, keescook@chromium.org, luto@amacapital.net, wad@chromium.org, shuah@kernel.org Subject: [PATCH] selftests/seccomp: allow clock_nanosleep instead of nanosleep Date: Wed, 8 Apr 2020 20:57:53 -0300 Message-Id: <20200408235753.8566-1-cascardo@canonical.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org glibc 2.31 calls clock_nanosleep when its nanosleep function is used. So the restart_syscall fails after that. In order to deal with it, we trace clock_nanosleep and nanosleep. Then we check for either. This works just fine on systems with both glibc 2.30 and glibc 2.31, whereas it failed before on a system with glibc 2.31. Signed-off-by: Thadeu Lima de Souza Cascardo --- tools/testing/selftests/seccomp/seccomp_bpf.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccomp_bpf.c index 89fb3e0b552e..c0aa46ce14f6 100644 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c @@ -2803,12 +2803,13 @@ TEST(syscall_restart) offsetof(struct seccomp_data, nr)), #ifdef __NR_sigreturn - BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_sigreturn, 6, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_sigreturn, 7, 0), #endif - BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_read, 5, 0), - BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_exit, 4, 0), - BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_rt_sigreturn, 3, 0), - BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_nanosleep, 4, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_read, 6, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_exit, 5, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_rt_sigreturn, 4, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_nanosleep, 5, 0), + BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_clock_nanosleep, 4, 0), BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, __NR_restart_syscall, 4, 0), /* Allow __NR_write for easy logging. */ @@ -2895,7 +2896,8 @@ TEST(syscall_restart) ASSERT_EQ(PTRACE_EVENT_SECCOMP, (status >> 16)); ASSERT_EQ(0, ptrace(PTRACE_GETEVENTMSG, child_pid, NULL, &msg)); ASSERT_EQ(0x100, msg); - EXPECT_EQ(__NR_nanosleep, get_syscall(_metadata, child_pid)); + ret = get_syscall(_metadata, child_pid); + EXPECT_TRUE(ret == __NR_nanosleep || ret == __NR_clock_nanosleep); /* Might as well check siginfo for sanity while we're here. */ ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child_pid, NULL, &info)); -- 2.20.1