I confirmed the solution, it worked.
Also, I tried to submit the patch against the linux kernel (and/or
Seccomp-BPF subtree) following the official kernel guide
(https://www.kernel.org/doc/html/latest/process/submitting-patches.html)
but I couldn't even find the 33554432 value by doing:
git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
grep 33554432 -R linux
Got this:
linux/tools/power/x86/turbostat/turbostat.c:unsigned int irtl_time_units[] = {
1, 32, 1024, 32768, 1048576, 33554432, 0, 0 };
linux/drivers/idle/intel_idle.c: 1, 32, 1024, 32768, 1048576,
33554432, 0, 0
linux/drivers/pci/pcie/aspm.c: } else if (threshold_ns < 33554432) {
linux/drivers/atm/idt77252_tables.h:/* 33554432.00 => 255 */ 0xff, /* =>
352768.00 */
linux/drivers/atm/idt77252_tables.h:/* 335544320.00 => 255 */ 0xff, /* =>
352768.00 */
linux/drivers/atm/idt77252_tables.h:/* 3355443200.00 => 255 */ 0xff, /* =>
352768.00 */
linux/drivers/platform/x86/intel/pmc/core.c: * | 5 |
33554432 |
linux/drivers/iio/frequency/adf4371.c:#define ADF4371_MODULUS1
33554432ULL
linux/arch/arm/boot/dts/imx51-apf51.dts: clock-frequency
= <33554432>;
linux/arch/arm/kernel/insn.c: if (unlikely(offset < -33554432 || offset >
33554428)) {
linux/mm/slab_common.c: INIT_KMALLOC_INFO(33554432, 32M)
linux/sound/soc/codecs/rt1305.c: r0ohm = (rhl*10) / 33554432;
linux/sound/soc/codecs/rt1305.c: r0ohm = (rhl*10) / 33554432;
linux/sound/soc/codecs/twl4030.c: 8388608,
16777216, 33554432, 67108864};
None of which is an arm-specific constant for Seccomp-BPF.
I tried.
Once again, thank you for your help Paride Legovini, I would have never
found this on my own.
I gotta say, I'm very curious as to why this happens.
What does the bpf_jit_limit value actually mean?
I what what's BPF, I know what's JIT, I just don't know how they mix.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1956954
Title:
Can't load seccomp filter
Status in libseccomp package in Ubuntu:
Incomplete
Bug description:
After migrating from Ubuntu 20 amd64 to aarch64 I started experiencing
"can't load seccomp filter" when doing `apt update && apt upgrade` and
"Kernel refuses to turn on BPF filters" when using Puppeteer.
I wrote about it more extensively here:
https://stackoverflow.com/questions/69892137/after-a-few-days-i-can-
no-longer-start-puppeteer-until-i-restart-the-server
lsb_release -rd
---------------
Description: Ubuntu 20.04.3 LTS
Release: 20.04
apt-cache policy seccomp
---------------
seccomp:
Installed: (none)
Candidate: 2.5.1-1ubuntu1~20.04.2
Version table:
2.5.1-1ubuntu1~20.04.2 500
500 http://us-east-1.ec2.ports.ubuntu.com/ubuntu-ports
focal-updates/main arm64 Packages
500 http://ports.ubuntu.com/ubuntu-ports focal-security/main arm64
Packages
2.4.3-1ubuntu1 500
500 http://us-east-1.ec2.ports.ubuntu.com/ubuntu-ports focal/main
arm64 Packages
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1956954/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp