Build failed in Jenkins: sru_kernel-quantal-generic_armhf-omap4_panda_ES-serial #60
Jenkins Notification
devnull at canonical.com
Thu Nov 8 02:24:56 UTC 2012
See <http://10.97.0.1:8080/job/sru_kernel-quantal-generic_armhf-omap4_panda_ES-serial/60/>
------------------------------------------
[...truncated 4352 lines...]
21:24:11 ERROR| [stderr] Sysctl to disable module loading exists ... ok
21:24:11 ERROR| [stderr] test_091_symlink_following_in_sticky_directories (__main__.KernelSecurityTest)
21:24:33 ERROR| [stderr] Symlinks not followable across differing uids in sticky directories ... ok
21:24:33 ERROR| [stderr] test_092_hardlink_restriction (__main__.KernelSecurityTest)
21:24:36 ERROR| [stderr] Hardlink disallowed for unreadable/unwritable sources ... ok
21:24:36 ERROR| [stderr] test_093_ptrace_restriction (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] ptrace allowed only on children or declared processes ... ok
21:24:39 ERROR| [stderr] test_093_ptrace_restriction_extras (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] ptrace from thread on tracee that used prctl(PR_SET_PTRACER) ... ok
21:24:39 ERROR| [stderr] test_093_ptrace_restriction_parent_via_thread (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] ptrace of child works from parent threads (LP: #737676) ... ok
21:24:39 ERROR| [stderr] test_093_ptrace_restriction_prctl_via_thread (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] prctl(PR_SET_PTRACER) works from threads (LP: #729839) ... ok
21:24:39 ERROR| [stderr] test_094_rare_net_autoload (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] rare network modules do not autoload ... FAIL
21:24:39 ERROR| [stderr] test_095_kernel_symbols_acl (__main__.KernelSecurityTest)
21:24:39 ERROR| [stderr] /proc/sys/kernel/kptr_restrict is enabled ... ok
21:24:39 ERROR| [stderr] test_095_kernel_symbols_missing (__main__.KernelSecurityTest)
21:24:41 ERROR| [stderr] kernel addresses in kallsyms and modules are zeroed out ... ok
21:24:41 ERROR| [stderr] test_096_boot_symbols_unreadable (__main__.KernelSecurityTest)
21:24:41 ERROR| [stderr] kernel addresses in /boot are not world readable ... ok
21:24:41 ERROR| [stderr] test_096_proc_entries_unreadable (__main__.KernelSecurityTest)
21:24:41 ERROR| [stderr] sensitive files in /proc are not world readable ... ok
21:24:41 ERROR| [stderr] test_100_keep_acpi_method_disabled (__main__.KernelSecurityTest)
21:24:41 ERROR| [stderr] /sys/kernel/debug/acpi/custom_method stays disabled ... ok
21:24:41 ERROR| [stderr] test_101_proc_fd_leaks (__main__.KernelSecurityTest)
21:24:52 ERROR| [stderr] /proc/$pid/ DAC bypass on setuid (CVE-2011-1020) ... ok
21:24:52 ERROR| [stderr] test_110_seccomp_filter (__main__.KernelSecurityTest)
21:24:53 ERROR| [stderr] seccomp_filter works ... ok
21:24:53 ERROR| [stderr] test_120_smep_works (__main__.KernelSecurityTest)
21:24:53 ERROR| [stderr] SMEP works ... ok
21:24:53 ERROR| [stderr]
21:24:53 ERROR| [stderr] ======================================================================
21:24:53 ERROR| [stderr] FAIL: test_072_config_debug_rodata (__main__.KernelSecurityTest)
21:24:53 ERROR| [stderr] CONFIG_DEBUG_RODATA enabled
21:24:53 ERROR| [stderr] ----------------------------------------------------------------------
21:24:53 ERROR| [stderr] Traceback (most recent call last):
21:24:53 ERROR| [stderr] File "./test-kernel-security.py", line 664, in test_072_config_debug_rodata
21:24:53 ERROR| [stderr] self.assertEqual(self._test_config('DEBUG_RODATA'), expected)
21:24:53 ERROR| [stderr] AssertionError: True != False
21:24:53 ERROR| [stderr]
21:24:53 ERROR| [stderr] ======================================================================
21:24:53 ERROR| [stderr] FAIL: test_094_rare_net_autoload (__main__.KernelSecurityTest)
21:24:53 ERROR| [stderr] rare network modules do not autoload
21:24:53 ERROR| [stderr] ----------------------------------------------------------------------
21:24:53 ERROR| [stderr] Traceback (most recent call last):
21:24:53 ERROR| [stderr] File "./test-kernel-security.py", line 1278, in test_094_rare_net_autoload
21:24:53 ERROR| [stderr] self.assertEqual(detail.errno, 97, msg=af)
21:24:53 ERROR| [stderr] AssertionError: ax25
21:24:53 ERROR| [stderr]
21:24:53 ERROR| [stderr] ----------------------------------------------------------------------
21:24:53 ERROR| [stderr] Ran 52 tests in 72.775s
21:24:53 ERROR| [stderr]
21:24:53 ERROR| [stderr] FAILED (failures=2)
21:24:53 WARNI| Programs crashed during test execution
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32079 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32047 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32089 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32084 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32077 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32057 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32051 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32045 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32062 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32094 for more info
21:24:53 WARNI| Please verify /home/ubuntu/autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.guard-page.32108 for more info
21:24:53 ERROR| child process failed
21:24:54 INFO | ERROR ubuntu_qrt_kernel_security.test-kernel-security.py ubuntu_qrt_kernel_security.test-kernel-security.py timestamp=1352341494 localtime=Nov 07 21:24:54 Command <python ./test-kernel-security.py -v> failed, rc=1, Command returned non-zero exit status
* Command:
python ./test-kernel-security.py -v
Exit status: 1
Duration: 73.4990990162
stdout:
Running test: './test-kernel-security.py' distro: 'Ubuntu 12.10' kernel: '3.5.0-214.21 (Ubuntu 3.5.0-214.21-omap4 3.5.7)' arch: 'armhf' uid: 0/0 SUDO_USER: 'ubuntu')
(4.7.2 (Ubuntu/Linaro 4.7.2-2ubuntu1)) (skipped: only x86) (32768) (/proc/1/personality) (skipped: only x86) (skipped: only x86) (using 0xac57ce00L) (exit code 0) (skipped: only Intrepid through Lucid) (32768) (skipped: only x86 on 3.0 kernel) (skipped: CPU does not support SMEP)
stderr:
test_000_make (__main__.KernelSecurityTest)
Prepare to build helper tools ... ok
test_010_proc_maps (__main__.KernelSecurityTest)
/proc/$pid/maps is correctly protected ... ok
test_020_aslr_00_proc (__main__.KernelSecurityTest)
ASLR enabled ... ok
test_020_aslr_dapper_stack (__main__.KernelSecurityTest)
ASLR of stack ... ok
test_021_aslr_dapper_libs (__main__.KernelSecurityTest)
ASLR of libs ... ok
test_021_aslr_dapper_mmap (__main__.KernelSecurityTest)
ASLR of mmap ... ok
test_022_aslr_hardy_text (__main__.KernelSecurityTest)
ASLR of text ... ok
test_022_aslr_hardy_vdso (__main__.KernelSecurityTest)
ASLR of vdso ... ok
test_022_aslr_intrepid_brk (__main__.KernelSecurityTest)
ASLR of brk ... ok
test_030_mmap_min (__main__.KernelSecurityTest)
Low memory allocation respects mmap_min_addr ... ok
test_031_apparmor (__main__.KernelSecurityTest)
AppArmor loaded ... ok
test_031_seccomp (__main__.KernelSecurityTest)
PR_SET_SECCOMP works ... ok
test_032_dev_kmem (__main__.KernelSecurityTest)
/dev/kmem not available ... ok
test_033_syn_cookies (__main__.KernelSecurityTest)
SYN cookies is enabled ... ok
test_040_pcaps (__main__.KernelSecurityTest)
init's CAPABILITY list is clean ... ok
test_050_personality (__main__.KernelSecurityTest)
init missing READ_IMPLIES_EXEC ... ok
test_060_nx (__main__.KernelSecurityTest)
NX bit is working ... ok
test_061_guard_page (__main__.KernelSecurityTest)
Userspace stack guard page exists (CVE-2010-2240) ... ok
test_070_config_brk (__main__.KernelSecurityTest)
CONFIG_COMPAT_BRK disabled ... ok
test_070_config_devkmem (__main__.KernelSecurityTest)
CONFIG_DEVKMEM disabled ... ok
test_070_config_seccomp (__main__.KernelSecurityTest)
CONFIG_SECCOMP enabled ... ok
test_070_config_security (__main__.KernelSecurityTest)
CONFIG_SECURITY enabled ... ok
test_070_config_security_selinux (__main__.KernelSecurityTest)
CONFIG_SECURITY_SELINUX enabled ... ok
test_070_config_syn_cookies (__main__.KernelSecurityTest)
CONFIG_SYN_COOKIES enabled ... ok
test_071_config_seccomp (__main__.KernelSecurityTest)
CONFIG_SECCOMP enabled ... ok
test_072_config_compat_vdso (__main__.KernelSecurityTest)
CONFIG_COMPAT_VDSO disabled ... ok
test_072_config_debug_rodata (__main__.KernelSecurityTest)
CONFIG_DEBUG_RODATA enabled ... FAIL
test_072_config_debug_set_module_ronx (__main__.KernelSecurityTest)
CONFIG_DEBUG_SET_MODULE_RONX enabled ... ok
test_072_config_security_apparmor (__main__.KernelSecurityTest)
CONFIG_SECURITY_APPARMOR enabled ... ok
test_072_config_strict_devmem (__main__.KernelSecurityTest)
CONFIG_STRICT_DEVMEM enabled ... ok
test_072_strict_devmem (__main__.KernelSecurityTest)
/dev/mem unreadable for kernel memory ... ok
test_073_config_security_file_capabilities (__main__.KernelSecurityTest)
CONFIG_SECURITY_FILE_CAPABILITIES enabled ... ok
test_073_config_security_smack (__main__.KernelSecurityTest)
CONFIG_SECURITY_SMACK enabled ... ok
test_074_config_security_default_mmap_min_addr (__main__.KernelSecurityTest)
CONFIG_DEFAULT_MMAP_MIN_ADDR ... ok
test_075_config_stack_protector (__main__.KernelSecurityTest)
CONFIG_CC_STACKPROTECTOR set ... ok
test_082_stack_guard_kernel (__main__.KernelSecurityTest)
Kernel stack guard ... ok
test_090_module_blocking (__main__.KernelSecurityTest)
Sysctl to disable module loading exists ... ok
test_091_symlink_following_in_sticky_directories (__main__.KernelSecurityTest)
Symlinks not followable across differing uids in sticky directories ... ok
test_092_hardlink_restriction (__main__.KernelSecurityTest)
Hardlink disallowed for unreadable/unwritable sources ... ok
test_093_ptrace_restriction (__main__.KernelSecurityTest)
ptrace allowed only on children or declared processes ... ok
test_093_ptrace_restriction_extras (__main__.KernelSecurityTest)
ptrace from thread on tracee that used prctl(PR_SET_PTRACER) ... ok
test_093_ptrace_restriction_parent_via_thread (__main__.KernelSecurityTest)
ptrace of child works from parent threads (LP: #737676) ... ok
test_093_ptrace_restriction_prctl_via_thread (__main__.KernelSecurityTest)
prctl(PR_SET_PTRACER) works from threads (LP: #729839) ... ok
test_094_rare_net_autoload (__main__.KernelSecurityTest)
rare network modules do not autoload ... FAIL
test_095_kernel_symbols_acl (__main__.KernelSecurityTest)
/proc/sys/kernel/kptr_restrict is enabled ... ok
test_095_kernel_symbols_missing (__main__.KernelSecurityTest)
kernel addresses in kallsyms and modules are zeroed out ... ok
test_096_boot_symbols_unreadable (__main__.KernelSecurityTest)
kernel addresses in /boot are not world readable ... ok
test_096_proc_entries_unreadable (__main__.KernelSecurityTest)
sensitive files in /proc are not world readable ... ok
test_100_keep_acpi_method_disabled (__main__.KernelSecurityTest)
/sys/kernel/debug/acpi/custom_method stays disabled ... ok
test_101_proc_fd_leaks (__main__.KernelSecurityTest)
/proc/$pid/ DAC bypass on setuid (CVE-2011-1020) ... ok
test_110_seccomp_filter (__main__.KernelSecurityTest)
seccomp_filter works ... ok
test_120_smep_works (__main__.KernelSecurityTest)
SMEP works ... ok
======================================================================
FAIL: test_072_config_debug_rodata (__main__.KernelSecurityTest)
CONFIG_DEBUG_RODATA enabled
----------------------------------------------------------------------
Traceback (most recent call last):
File "./test-kernel-security.py", line 664, in test_072_config_debug_rodata
self.assertEqual(self._test_config('DEBUG_RODATA'), expected)
AssertionError: True != False
======================================================================
FAIL: test_094_rare_net_autoload (__main__.KernelSecurityTest)
rare network modules do not autoload
----------------------------------------------------------------------
Traceback (most recent call last):
File "./test-kernel-security.py", line 1278, in test_094_rare_net_autoload
self.assertEqual(detail.errno, 97, msg=af)
AssertionError: ax25
----------------------------------------------------------------------
Ran 52 tests in 72.775s
FAILED (failures=2)
21:24:54 INFO | END ERROR ubuntu_qrt_kernel_security.test-kernel-security.py ubuntu_qrt_kernel_security.test-kernel-security.py timestamp=1352341494 localtime=Nov 07 21:24:54
21:24:54 INFO | END GOOD ---- ---- timestamp=1352341494 localtime=Nov 07 21:24:54
+ export TEST_NAME=ubuntu_qrt_kernel_security
+ . ./kernel-testing/job-postprocessing
+ [ = true ]
+ sudo autotest/client/tools/results2junit.py autotest/client/results/default
+ sudo chown -R ubuntu.ubuntu autotest/client/results
+ tar jcf ubuntu_qrt_kernel_security-results.tbz2 autotest/client/results
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32079/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32079/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32047/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32047/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32089/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32089/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32084/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32084/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32077/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32077/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32057/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32057/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32051/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32051/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32045/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32045/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32062/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test.32062/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32094/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.nx-test-pie.32094/core: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.guard-page.32108/report: Cannot stat: Permission denied
tar: autotest/client/results/default/ubuntu_qrt_kernel_security.test-kernel-security.py/debug/crash.guard-page.32108/core: Cannot stat: Permission denied
tar: Exiting with failure status due to previous errors
+ [ -n ]
+ autotest/client/tools/glue_testsuites /tmp/workspace/autotest-results.ubuntu_ecryptfs.xml /tmp/workspace/autotest-results.ubuntu_qrt_apparmor.xml /tmp/workspace/autotest-results.ubuntu_qrt_kernel_aslr_collisions.xml /tmp/workspace/autotest-results.ubuntu_qrt_kernel_hardening.xml /tmp/workspace/autotest-results.ubuntu_qrt_kernel_panic.xml /tmp/workspace/autotest-results.ubuntu_qrt_kernel_security.xml
+ RCTEMP=0
+ SSH_PARMS=
+ return 0
+ exit 0
+ exit 0
[locks-and-latches] Releasing all the locks
[locks-and-latches] All the locks released
Archiving artifacts
Recording test results
No test report files were found. Configuration error?
Build step 'Publish JUnit test result report' changed build result to FAILURE
Description set:
More information about the ubuntu-testing-notifications
mailing list