Public bug reported: This is a scripted bug report about ADT failures while running linux tests for linux/4.4.0-208.240 on xenial. Whether this is caused by the dep8 tests of the tested source or the kernel has yet to be determined.
Testing failed on: amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/l/linux/20210405_165921_51e87@/log.gz i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/l/linux/20210405_171150_5e4c6@/log.gz ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/l/linux/20210405_171645_a1619@/log.gz s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/l/linux/20210402_051319_d4fe2@/log.gz 15:47:57 ERROR| [stderr] ====================================================================== 15:47:57 ERROR| [stderr] FAIL: test_160_setattr_CVE_2015_1350 (__main__.KernelSecurityTest) 15:47:57 ERROR| [stderr] Ensure unpriv user cannot strip setattr attributes via chown() (CVE-2015-1350) 15:47:57 ERROR| [stderr] ---------------------------------------------------------------------- 15:47:57 ERROR| [stderr] Traceback (most recent call last): 15:47:57 ERROR| [stderr] File "./test-kernel-security.py", line 1891, in test_160_setattr_CVE_2015_1350 15:47:57 ERROR| [stderr] self.assertShellOutputEquals(exp_output, ['sudo', '-u', user, 'getcap', testbin]) 15:47:57 ERROR| [stderr] File "/tmp/autopkgtest.UEYHB2/build.S4Z/src/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/testlib.py", line 1206, in assertShellOutputEquals 15:47:57 ERROR| [stderr] self.assertEqual(text, out, msg + result + report) 15:47:57 ERROR| [stderr] AssertionError: Got exit code 0. Looking for exact text "" (sudo -u ubuntu getcap /tmp/setattr-GwRjva/true) 15:47:57 ERROR| [stderr] Command: 'sudo', '-u', 'ubuntu', 'getcap', '/tmp/setattr-GwRjva/true' 15:47:57 ERROR| [stderr] Output: 15:47:57 ERROR| [stderr] /tmp/setattr-GwRjva/true = cap_sys_nice+ep 15:47:57 ERROR| [stderr] 15:47:57 ERROR| [stderr] 15:47:57 ERROR| [stderr] ---------------------------------------------------------------------- 15:47:57 ERROR| [stderr] Ran 125 tests in 24.852s 15:47:57 ERROR| [stderr] 15:47:57 ERROR| [stderr] FAILED (failures=1) ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Tags: kernel-adt-failure xenial ** Tags added: kernel-adt-failure ** Tags added: xenial ** Description changed: This is a scripted bug report about ADT failures while running linux tests for linux/4.4.0-208.240 on xenial. Whether this is caused by the dep8 tests of the tested source or the kernel has yet to be determined. Testing failed on: - amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/l/linux/20210405_165921_51e87@/log.gz - i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/l/linux/20210405_171150_5e4c6@/log.gz - ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/l/linux/20210405_171645_a1619@/log.gz - s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/l/linux/20210402_051319_d4fe2@/log.gz + amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/l/linux/20210405_165921_51e87@/log.gz + i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/l/linux/20210405_171150_5e4c6@/log.gz + ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/l/linux/20210405_171645_a1619@/log.gz + s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/l/linux/20210402_051319_d4fe2@/log.gz + + + 15:47:57 ERROR| [stderr] ====================================================================== + 15:47:57 ERROR| [stderr] FAIL: test_160_setattr_CVE_2015_1350 (__main__.KernelSecurityTest) + 15:47:57 ERROR| [stderr] Ensure unpriv user cannot strip setattr attributes via chown() (CVE-2015-1350) + 15:47:57 ERROR| [stderr] ---------------------------------------------------------------------- + 15:47:57 ERROR| [stderr] Traceback (most recent call last): + 15:47:57 ERROR| [stderr] File "./test-kernel-security.py", line 1891, in test_160_setattr_CVE_2015_1350 + 15:47:57 ERROR| [stderr] self.assertShellOutputEquals(exp_output, ['sudo', '-u', user, 'getcap', testbin]) + 15:47:57 ERROR| [stderr] File "/tmp/autopkgtest.UEYHB2/build.S4Z/src/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/testlib.py", line 1206, in assertShellOutputEquals + 15:47:57 ERROR| [stderr] self.assertEqual(text, out, msg + result + report) + 15:47:57 ERROR| [stderr] AssertionError: Got exit code 0. Looking for exact text "" (sudo -u ubuntu getcap /tmp/setattr-GwRjva/true) + 15:47:57 ERROR| [stderr] Command: 'sudo', '-u', 'ubuntu', 'getcap', '/tmp/setattr-GwRjva/true' + 15:47:57 ERROR| [stderr] Output: + 15:47:57 ERROR| [stderr] /tmp/setattr-GwRjva/true = cap_sys_nice+ep + 15:47:57 ERROR| [stderr] + 15:47:57 ERROR| [stderr] + 15:47:57 ERROR| [stderr] ---------------------------------------------------------------------- + 15:47:57 ERROR| [stderr] Ran 125 tests in 24.852s + 15:47:57 ERROR| [stderr] + 15:47:57 ERROR| [stderr] FAILED (failures=1) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1922596 Title: linux ADT test failure with linux/4.4.0-208.240 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1922596/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs