<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in settings</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>7155cc45 - selftests/seccomp: Try to fit runtime of benchmark into timeout</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/seccomp/settings#7155cc45</link>
        <description>selftests/seccomp: Try to fit runtime of benchmark into timeoutThe seccomp benchmark runs five scenarios, one calibration run with noseccomp filters enabled then four further runs each adding a filter. Thecalibration run times itself for 15s and then each additional run executesfor the same number of times.Currently the seccomp tests, including the benchmark, run with an extended120s timeout but this is not sufficient to robustly run the tests on a lotof platforms. Sample timings from some recent runs:   Platform          Run 1  Run 2  Run 3  Run 4   ---------         -----  -----  -----  -----   PowerEdge R200    16.6s  16.6s  31.6s  37.4s   BBB (arm)         20.4s  20.4s  54.5s   Synquacer (arm64) 20.7s  23.7s  40.3sThe x86 runs from the PowerEdge are quite marginal and routinely fail, forthe successful run reported here the timed portions of the run are at117.2s leaving less than 3s of margin which is frequently breached. Theadded overhead of adding filters on the other platforms is such that thereis no prospect of their runs fitting into the 120s timeout, especiallyon 32 bit arm where there is no BPF JIT.While we could lower the time we calibrate for I&apos;m also already seeing thecurrently completing runs reporting issues with the per filter overheadsnot matching expectations:Let&apos;s instead raise the timeout to 180s which is only a 50% increase on thecurrent timeout which is itself not *too* large given that there&apos;s only twotests in this suite.Signed-off-by: Mark Brown &lt;broonie@kernel.org&gt;Signed-off-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/seccomp/settings</description>
        <pubDate>Mon, 25 Mar 2024 16:57:59 +0000</pubDate>
        <dc:creator>Mark Brown &lt;broonie@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>192cf322 - selftests/seccomp: Compare bitmap vs filter overhead</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/seccomp/settings#192cf322</link>
        <description>selftests/seccomp: Compare bitmap vs filter overheadAs part of the seccomp benchmarking, include the expectations withregard to the timing behavior of the constant action bitmaps, and reportinconsistencies better.Example output with constant action bitmaps on x86:$ sudo ./seccomp_benchmark 100000000Current BPF sysctl settings:net.core.bpf_jit_enable = 1net.core.bpf_jit_harden = 0Benchmarking 200000000 syscalls...129.359381409 - 0.008724424 = 129350656985 (129.4s)getpid native: 646 ns264.385890006 - 129.360453229 = 135025436777 (135.0s)getpid RET_ALLOW 1 filter (bitmap): 675 ns399.400511893 - 264.387045901 = 135013465992 (135.0s)getpid RET_ALLOW 2 filters (bitmap): 675 ns545.872866260 - 399.401718327 = 146471147933 (146.5s)getpid RET_ALLOW 3 filters (full): 732 ns696.337101319 - 545.874097681 = 150463003638 (150.5s)getpid RET_ALLOW 4 filters (full): 752 nsEstimated total seccomp overhead for 1 bitmapped filter: 29 nsEstimated total seccomp overhead for 2 bitmapped filters: 29 nsEstimated total seccomp overhead for 3 full filters: 86 nsEstimated total seccomp overhead for 4 full filters: 106 nsEstimated seccomp entry overhead: 29 nsEstimated seccomp per-filter overhead (last 2 diff): 20 nsEstimated seccomp per-filter overhead (filters / 4): 19 nsExpectations:	native &#8804; 1 bitmap (646 &#8804; 675): &#10004;&#65039;	native &#8804; 1 filter (646 &#8804; 732): &#10004;&#65039;	per-filter (last 2 diff) &#8776; per-filter (filters / 4) (20 &#8776; 19): &#10004;&#65039;	1 bitmapped &#8776; 2 bitmapped (29 &#8776; 29): &#10004;&#65039;	entry &#8776; 1 bitmapped (29 &#8776; 29): &#10004;&#65039;	entry &#8776; 2 bitmapped (29 &#8776; 29): &#10004;&#65039;	native + entry + (per filter * 4) &#8776; 4 filters total (755 &#8776; 752): &#10004;&#65039;[YiFei: Changed commit message to show stats for this patch series]Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;Link: https://lore.kernel.org/r/1b61df3db85c5f7f1b9202722c45e7b39df73ef2.1602431034.git.yifeifz2@illinois.edu

            List of files:
            /linux-6.15/tools/testing/selftests/seccomp/settings</description>
        <pubDate>Sun, 11 Oct 2020 15:47:45 +0000</pubDate>
        <dc:creator>Kees Cook &lt;keescook@chromium.org&gt;</dc:creator>
    </item>
<item>
        <title>bc32c9c8 - selftests/seccomp: use 90s as timeout</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/seccomp/settings#bc32c9c8</link>
        <description>selftests/seccomp: use 90s as timeoutAs seccomp_benchmark tries to calibrate how many samples will take morethan 5 seconds to execute, it may end up picking up a number of samplesthat take 10 (but up to 12) seconds. As the calibration will take doublethat time, it takes around 20 seconds. Then, it executes the whole thingagain, and then once more, with some added overhead. So, the thing mighttake more than 40 seconds, which is too close to the 45s timeout.That is very dependent on the system where it&apos;s executed, so may not beobserved always, but it has been observed on x86 VMs. Using a 90s timeoutseems safe enough.Signed-off-by: Thadeu Lima de Souza Cascardo &lt;cascardo@canonical.com&gt;Link: https://lore.kernel.org/r/20200601123202.1183526-1-cascardo@canonical.comSigned-off-by: Kees Cook &lt;keescook@chromium.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/seccomp/settings</description>
        <pubDate>Mon, 01 Jun 2020 19:50:12 +0000</pubDate>
        <dc:creator>Thadeu Lima de Souza Cascardo &lt;cascardo@canonical.com&gt;</dc:creator>
    </item>
</channel>
</rss>
