diff options
Diffstat (limited to 'user/node/openat-test.patch')
-rw-r--r-- | user/node/openat-test.patch | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/user/node/openat-test.patch b/user/node/openat-test.patch new file mode 100644 index 000000000..e75eb7e61 --- /dev/null +++ b/user/node/openat-test.patch @@ -0,0 +1,34 @@ +The strace-openat-openssl test fails on musl libc because of ldso's +attempted access of /etc/ld-musl-$ARCH.path. Additionally, at least on +gwyn, the spawned process attempts to determine its memory limits from +the current cgroup. + +*Also*, the openssl.cnf expected line fails because it happens in a +subprocess - hence the optional [pid ....] prefix. + +--- node-v18.20.8/test/parallel/test-strace-openat-openssl.js.old 2025-03-26 19:56:44.000000000 -0500 ++++ node-v18.20.8/test/parallel/test-strace-openat-openssl.js 2025-06-27 00:31:02.528830894 -0500 +@@ -29,7 +29,7 @@ + // stderr is the default for strace + const rl = createInterface({ input: strace.stderr }); + rl.on('line', (line) => { +- if (!line.startsWith('open')) { ++ if (line.match(/^(\[pid.+\] )?open/) === null) { + return; + } + +@@ -42,6 +42,14 @@ + if (file.match(/\/proc\/.+/) !== null) { + return; + } ++ // skip /sys/fs/cgroup/* ++ if (file.match(/\/sys\/fs\/cgroup\/.+/) !== null) { ++ return; ++ } ++ // skip /etc/ld-musl-$ARCH.path ++ if (file.match(/\/etc\/ld-musl-.+\.path/) !== null) { ++ return; ++ } + + assert(allowedOpenCalls.delete(file), `${file} is not in the list of allowed openat calls`); + }); |