This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1922596

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922596

Title:
  linux ADT test failure with linux/4.4.0-208.240

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  This is a scripted bug report about ADT failures while running linux
  tests for linux/4.4.0-208.240 on xenial. Whether this is caused by the
  dep8 tests of the tested source or the kernel has yet to be
  determined.

  Testing failed on:
      amd64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/l/linux/20210405_165921_51e87@/log.gz
      i386: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/l/linux/20210405_171150_5e4c6@/log.gz
      ppc64el: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/l/linux/20210405_171645_a1619@/log.gz
      s390x: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/l/linux/20210402_051319_d4fe2@/log.gz


  15:47:57 ERROR| [stderr] 
======================================================================
  15:47:57 ERROR| [stderr] FAIL: test_160_setattr_CVE_2015_1350 
(__main__.KernelSecurityTest)
  15:47:57 ERROR| [stderr] Ensure unpriv user cannot strip setattr attributes 
via chown() (CVE-2015-1350)
  15:47:57 ERROR| [stderr] 
----------------------------------------------------------------------
  15:47:57 ERROR| [stderr] Traceback (most recent call last):
  15:47:57 ERROR| [stderr]   File "./test-kernel-security.py", line 1891, in 
test_160_setattr_CVE_2015_1350
  15:47:57 ERROR| [stderr]     self.assertShellOutputEquals(exp_output, 
['sudo', '-u', user, 'getcap', testbin])
  15:47:57 ERROR| [stderr]   File 
"/tmp/autopkgtest.UEYHB2/build.S4Z/src/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/testlib.py",
 line 1206, in assertShellOutputEquals
  15:47:57 ERROR| [stderr]     self.assertEqual(text, out, msg + result + 
report)
  15:47:57 ERROR| [stderr] AssertionError: Got exit code 0. Looking for exact 
text "" (sudo -u ubuntu getcap /tmp/setattr-GwRjva/true)
  15:47:57 ERROR| [stderr] Command: 'sudo', '-u', 'ubuntu', 'getcap', 
'/tmp/setattr-GwRjva/true'
  15:47:57 ERROR| [stderr] Output:
  15:47:57 ERROR| [stderr] /tmp/setattr-GwRjva/true = cap_sys_nice+ep
  15:47:57 ERROR| [stderr] 
  15:47:57 ERROR| [stderr] 
  15:47:57 ERROR| [stderr] 
----------------------------------------------------------------------
  15:47:57 ERROR| [stderr] Ran 125 tests in 24.852s
  15:47:57 ERROR| [stderr] 
  15:47:57 ERROR| [stderr] FAILED (failures=1)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1922596/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to