Back to build
Raw log | Switch to full mode | Login

{ "shards": [ { "bot_dimensions": [ { "key": "caches", "value": [ "swarming_module_cache_vpython" ] }, { "key": "cores", "value": [ "8" ] }, { "key": "cpu", "value": [ "x86", "x86-64", "x86-64-Broadwell_GCE", "x86-64-avx2" ] }, { "key": "gce", "value": [ "1" ] }, { "key": "gpu", "value": [ "none" ] }, { "key": "id", "value": [ "gce-trusty-e833d7b0-us-east1-b-cfzn" ] }, { "key": "image", "value": [ "chrome-trusty-18091700-38cc06ee3ee" ] }, { "key": "inside_docker", "value": [ "0" ] }, { "key": "kvm", "value": [ "1" ] }, { "key": "machine_type", "value": [ "n1-standard-8" ] }, { "key": "os", "value": [ "Linux", "Ubuntu", "Ubuntu-14.04" ] }, { "key": "pool", "value": [ "Chrome" ] }, { "key": "python", "value": [ "2.7.6" ] }, { "key": "server_version", "value": [ "4216-cf4a3cd" ] }, { "key": "zone", "value": [ "us", "us-east", "us-east1", "us-east1-b" ] } ], "bot_id": "gce-trusty-e833d7b0-us-east1-b-cfzn", "bot_version": "c7f0c187ee2160053ce935aa86119b526086da1e165dea02547e2f5a35dc9e3f", "cipd_pins": { "client_package": { "package_name": "infra/tools/cipd/linux-amd64", "version": "nFftZl2kFquaI2EUmPGwzbc5sIbCocl9L55UeASqlLsC" }, "packages": [ { "package_name": "infra/python/cpython/linux-amd64", "path": ".swarming_module", "version": "46c0c897ca0f053799ee41fd148bb7a47232df47" }, { "package_name": "infra/tools/luci/logdog/butler/linux-amd64", "path": ".swarming_module", "version": "2737ea8ed9b958f4d5aa9ffe106115a649ada241" }, { "package_name": "infra/tools/luci/vpython-native/linux-amd64", "path": ".swarming_module", "version": "OAXVAmcUSrvDygYUrCDzv20LRono9938YOHPu0zKowgC" }, { "package_name": "infra/tools/luci/vpython/linux-amd64", "path": ".swarming_module", "version": "ucaOciwAE9aweCUDOrmSvyiwrjmbywuB0NzAGUXIHjAC" } ] }, "completed_ts": "2019-03-24T06:40:55.540067", "cost_saved_usd": 0.001135501012736655, "created_ts": "2019-03-24T19:14:13.501696", "deduped_from": "43c73f94fd324e11", "duration": 4.2861549854278564, "modified_ts": "2019-03-24T19:14:13.515175", "name": "sandbox_linux_unittests/Ubuntu-14.04/51a1b3f69d/Linux TSan Tests/35965", "output": "Additional test environment:\n CHROME_DEVEL_SANDBOX=/opt/chromium/chrome_sandbox\n CHROME_HEADLESS=1\n G_SLICE=always-malloc\n LANG=en_US.UTF-8\n NSS_DISABLE_ARENA_FREE_LIST=1\n NSS_DISABLE_UNLOAD=1\n TSAN_OPTIONS=symbolize=1 external_symbolizer_path=/b/s/w/ir/third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer handle_abort=1\nCommand: ./sandbox_linux_unittests --test-launcher-bot-mode --cfi-diag=0 --test-launcher-print-test-stdio=always --test-launcher-summary-output=/b/s/w/ioHQoz4Q/output.json --no-sandbox\n\nIMPORTANT DEBUGGING NOTE: batches of tests are run inside their\nown process. For debugging a test inside a debugger, use the\n--gtest_filter=<your_test_name> flag along with\n--single-process-tests.\nUsing sharding settings from environment. This is shard 0/1\nUsing 8 parallel jobs.\n[ RUN ] SyscallWrappers.BasicSyscalls\n[ OK ] SyscallWrappers.BasicSyscalls (0 ms)\n[1/148] SyscallWrappers.BasicSyscalls (0 ms)\n[ RUN ] SyscallWrappers.CloneBasic\n[ OK ] SyscallWrappers.CloneBasic (4 ms)\n[2/148] SyscallWrappers.CloneBasic (4 ms)\n[ RUN ] SyscallWrappers.CloneParentSettid\n[ OK ] SyscallWrappers.CloneParentSettid (3 ms)\n[3/148] SyscallWrappers.CloneParentSettid (3 ms)\n[ RUN ] SyscallWrappers.CloneChildSettid\n[ OK ] SyscallWrappers.CloneChildSettid (3 ms)\n[4/148] SyscallWrappers.CloneChildSettid (3 ms)\n[ RUN ] SyscallWrappers.GetRESUid\n[ OK ] SyscallWrappers.GetRESUid (0 ms)\n[5/148] SyscallWrappers.GetRESUid (0 ms)\n[ RUN ] SyscallWrappers.GetRESGid\n[ OK ] SyscallWrappers.GetRESGid (0 ms)\n[6/148] SyscallWrappers.GetRESGid (0 ms)\n[ RUN ] SyscallWrappers.LinuxSigSet\n[ OK ] SyscallWrappers.LinuxSigSet (0 ms)\n[7/148] SyscallWrappers.LinuxSigSet (0 ms)\n[ RUN ] Yama.GetStatus\nYama present: Y - enforcing: Y\n[ OK ] Yama.GetStatus (0 ms)\n[8/148] Yama.GetStatus (0 ms)\n[ RUN ] Yama.RestrictPtraceSucceedsWhenYamaPresent\n[ OK ] Yama.RestrictPtraceSucceedsWhenYamaPresent (8 ms)\n[9/148] Yama.RestrictPtraceSucceedsWhenYamaPresent (8 ms)\n[ RUN ] Yama.RestrictPtraceWorks\n[ OK ] Yama.RestrictPtraceWorks (32 ms)\n[10/148] Yama.RestrictPtraceWorks (32 ms)\n[ RUN ] BrokerFilePermission.WriteOnly\n[ OK ] BrokerFilePermission.WriteOnly (0 ms)\n[11/148] BrokerFilePermission.WriteOnly (0 ms)\n[ RUN ] BrokerFilePermission.ReadWrite\n[ OK ] BrokerFilePermission.ReadWrite (0 ms)\n[12/148] BrokerFilePermission.ReadWrite (0 ms)\n[ RUN ] BrokerFilePermission.ReadWriteCreate\n[ OK ] BrokerFilePermission.ReadWriteCreate (1 ms)\n[13/148] BrokerFilePermission.ReadWriteCreate (1 ms)\n[ RUN ] BrokerFilePermission.ReadWriteCreateTemporaryRecursive\n[ OK ] BrokerFilePermission.ReadWriteCreateTemporaryRecursive (0 ms)\n[14/148] BrokerFilePermission.ReadWriteCreateTemporaryRecursive (0 ms)\n[ RUN ] BrokerFilePermission.StatOnlyWithIntermediateDirs\n[ OK ] BrokerFilePermission.StatOnlyWithIntermediateDirs (0 ms)\n[15/148] BrokerFilePermission.StatOnlyWithIntermediateDirs (0 ms)\n[ RUN ] BrokerFilePermission.ValidatePath\n[ OK ] BrokerFilePermission.ValidatePath (0 ms)\n[16/148] BrokerFilePermission.ValidatePath (0 ms)\n[ RUN ] BrokerProcess.CreateAndDestroy\n[ OK ] BrokerProcess.CreateAndDestroy (14 ms)\n[17/148] BrokerProcess.CreateAndDestroy (14 ms)\n[ RUN ] BrokerProcess.TestOpenAccessNull\n[ OK ] BrokerProcess.TestOpenAccessNull (6 ms)\n[18/148] BrokerProcess.TestOpenAccessNull (6 ms)\n[ RUN ] BrokerProcess.OpenFilePermsWithClientCheck\n[ OK ] BrokerProcess.OpenFilePermsWithClientCheck (13 ms)\n[19/148] BrokerProcess.OpenFilePermsWithClientCheck (13 ms)\n[ RUN ] BrokerProcess.OpenOpenFilePermsNoClientCheck\n[ OK ] BrokerProcess.OpenOpenFilePermsNoClientCheck (14 ms)\n[20/148] BrokerProcess.OpenOpenFilePermsNoClientCheck (14 ms)\n[ RUN ] BPFDSL.Basic\n[ OK ] BPFDSL.Basic (3 ms)\n[21/148] BPFDSL.Basic (3 ms)\n[ RUN ] BPFDSL.BooleanLogic\n[ OK ] BPFDSL.BooleanLogic (4 ms)\n[22/148] BPFDSL.BooleanLogic (4 ms)\n[ RUN ] BPFDSL.MoreBooleanLogic\n[ OK ] BPFDSL.MoreBooleanLogic (5 ms)\n[23/148] BPFDSL.MoreBooleanLogic (5 ms)\n[ RUN ] BPFDSL.ArgSizeTest\n[ OK ] BPFDSL.ArgSizeTest (5 ms)\n[24/148] BPFDSL.ArgSizeTest (5 ms)\n[ RUN ] BPFDSL.NegativeConstantsTest\n[ OK ] BPFDSL.NegativeConstantsTest (4 ms)\n[25/148] BPFDSL.NegativeConstantsTest (4 ms)\n[ RUN ] BPFDSL.MaskTest\n[ OK ] BPFDSL.MaskTest (6 ms)\n[26/148] BPFDSL.MaskTest (6 ms)\n[ RUN ] BPFDSL.ElseIfTest\n[ OK ] BPFDSL.ElseIfTest (4 ms)\n[27/148] BPFDSL.ElseIfTest (4 ms)\n[ RUN ] BPFDSL.SwitchTest\n[ OK ] BPFDSL.SwitchTest (4 ms)\n[28/148] BPFDSL.SwitchTest (4 ms)\n[ RUN ] BPFDSL.IsAllowDeny\n[ OK ] BPFDSL.IsAllowDeny (0 ms)\n[29/148] BPFDSL.IsAllowDeny (0 ms)\n[ RUN ] BPFDSL.HasUnsafeTraps\n[ OK ] BPFDSL.HasUnsafeTraps (0 ms)\n[30/148] BPFDSL.HasUnsafeTraps (0 ms)\n[ RUN ] ScopedTemporaryFile.Basics\n[ OK ] ScopedTemporaryFile.Basics (0 ms)\n[31/148] ScopedTemporaryFile.Basics (0 ms)\n[ RUN ] TestUtils.HandlePostForkReturn\n[ OK ] TestUtils.HandlePostForkReturn (17 ms)\n[32/148] TestUtils.HandlePostForkReturn (17 ms)\n[ RUN ] UnitTests.DeathExitCode\n[ OK ] UnitTests.DeathExitCode (10 ms)\n[33/148] UnitTests.DeathExitCode (10 ms)\n[ RUN ] UnitTests.DeathBySignal\n[ OK ] UnitTests.DeathBySignal (14 ms)\n[34/148] UnitTests.DeathBySignal (14 ms)\n[ RUN ] UnitTests.DeathWithMessage\n[ OK ] UnitTests.DeathWithMessage (12 ms)\n[35/148] UnitTests.DeathWithMessage (12 ms)\n[ RUN ] UnitTests.SEGVDeathWithMessage\n[ OK ] UnitTests.SEGVDeathWithMessage (28 ms)\n[36/148] UnitTests.SEGVDeathWithMessage (28 ms)\n[ RUN ] UnitTests.NoisyTest\n[ OK ] UnitTests.NoisyTest (14 ms)\n[37/148] UnitTests.NoisyTest (14 ms)\n[ RUN ] SetuidSandboxClient.SandboxedClientAPI\n[ OK ] SetuidSandboxClient.SandboxedClientAPI (0 ms)\n[38/148] SetuidSandboxClient.SandboxedClientAPI (0 ms)\n[ RUN ] SetuidSandboxHost.SetupLaunchEnvironment\n[ OK ] SetuidSandboxHost.SetupLaunchEnvironment (1 ms)\n[39/148] SetuidSandboxHost.SetupLaunchEnvironment (1 ms)\n[ RUN ] SetuidSandboxHost.GetSandboxBinaryPath\n[ OK ] SetuidSandboxHost.GetSandboxBinaryPath (0 ms)\n[40/148] SetuidSandboxHost.GetSandboxBinaryPath (0 ms)\n[ RUN ] BrokerProcess.OpenFilePermsWithClientCheckNoEnt\n[ OK ] BrokerProcess.OpenFilePermsWithClientCheckNoEnt (15 ms)\n[41/148] BrokerProcess.OpenFilePermsWithClientCheckNoEnt (15 ms)\n[ RUN ] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt\n[ OK ] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt (14 ms)\n[42/148] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt (14 ms)\n[ RUN ] BrokerProcess.BadPathsClientCheck\n[ OK ] BrokerProcess.BadPathsClientCheck (10 ms)\n[43/148] BrokerProcess.BadPathsClientCheck (10 ms)\n[ RUN ] BrokerProcess.BadPathsNoClientCheck\n[ OK ] BrokerProcess.BadPathsNoClientCheck (15 ms)\n[44/148] BrokerProcess.BadPathsNoClientCheck (15 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoWithClientCheck\n[ OK ] BrokerProcess.OpenCpuinfoWithClientCheck (11 ms)\n[45/148] BrokerProcess.OpenCpuinfoWithClientCheck (11 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoNoClientCheck\n[ OK ] BrokerProcess.OpenCpuinfoNoClientCheck (12 ms)\n[46/148] BrokerProcess.OpenCpuinfoNoClientCheck (12 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoWithClientCheckRecursive\n[ OK ] BrokerProcess.OpenCpuinfoWithClientCheckRecursive (11 ms)\n[47/148] BrokerProcess.OpenCpuinfoWithClientCheckRecursive (11 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoNoClientCheckRecursive\n[ OK ] BrokerProcess.OpenCpuinfoNoClientCheckRecursive (11 ms)\n[48/148] BrokerProcess.OpenCpuinfoNoClientCheckRecursive (11 ms)\n[ RUN ] BrokerProcess.OpenFileRW\n[ OK ] BrokerProcess.OpenFileRW (11 ms)\n[49/148] BrokerProcess.OpenFileRW (11 ms)\n[ RUN ] BrokerProcess.BrokerDied\n[ OK ] BrokerProcess.BrokerDied (15 ms)\n[50/148] BrokerProcess.BrokerDied (15 ms)\n[ RUN ] Yama.RestrictPtraceIsDefault\n[ OK ] Yama.RestrictPtraceIsDefault (32 ms)\n[51/148] Yama.RestrictPtraceIsDefault (32 ms)\n[ RUN ] BrokerFilePermission.CreateGood\n[ OK ] BrokerFilePermission.CreateGood (13 ms)\n[52/148] BrokerFilePermission.CreateGood (13 ms)\n[ RUN ] BrokerFilePermission.CreateGoodRecursive\n[ OK ] BrokerFilePermission.CreateGoodRecursive (7 ms)\n[53/148] BrokerFilePermission.CreateGoodRecursive (7 ms)\n[ RUN ] BrokerFilePermission.CreateBad\n[ OK ] BrokerFilePermission.CreateBad (39 ms)\n[54/148] BrokerFilePermission.CreateBad (39 ms)\n[ RUN ] BrokerFilePermission.CreateBadRecursive\n[ OK ] BrokerFilePermission.CreateBadRecursive (28 ms)\n[55/148] BrokerFilePermission.CreateBadRecursive (28 ms)\n[ RUN ] BrokerFilePermission.CreateBadNotAbs\n[ OK ] BrokerFilePermission.CreateBadNotAbs (33 ms)\n[56/148] BrokerFilePermission.CreateBadNotAbs (33 ms)\n[ RUN ] BrokerFilePermission.CreateBadEmpty\n[ OK ] BrokerFilePermission.CreateBadEmpty (29 ms)\n[57/148] BrokerFilePermission.CreateBadEmpty (29 ms)\n[ RUN ] BrokerFilePermission.ReadOnly\n[ OK ] BrokerFilePermission.ReadOnly (0 ms)\n[58/148] BrokerFilePermission.ReadOnly (0 ms)\n[ RUN ] BrokerFilePermission.ReadOnlyRecursive\n[ OK ] BrokerFilePermission.ReadOnlyRecursive (0 ms)\n[59/148] BrokerFilePermission.ReadOnlyRecursive (0 ms)\n[ RUN ] BrokerFilePermission.ReadOnlyTruncate\n[ OK ] BrokerFilePermission.ReadOnlyTruncate (1 ms)\n[60/148] BrokerFilePermission.ReadOnlyTruncate (1 ms)\n[ RUN ] ProcUtil.CountOpenFds\n[ OK ] ProcUtil.CountOpenFds (1 ms)\n[61/148] ProcUtil.CountOpenFds (1 ms)\n[ RUN ] ProcUtil.HasOpenDirectory\n[ OK ] ProcUtil.HasOpenDirectory (0 ms)\n[62/148] ProcUtil.HasOpenDirectory (0 ms)\n[ RUN ] ProcUtil.HasOpenDirectoryWithFD\n[ OK ] ProcUtil.HasOpenDirectoryWithFD (0 ms)\n[63/148] ProcUtil.HasOpenDirectoryWithFD (0 ms)\n[ RUN ] ResourceLimits.NoFork\n[ OK ] ResourceLimits.NoFork (9 ms)\n[64/148] ResourceLimits.NoFork (9 ms)\n[ RUN ] ScopedProcess.ScopedProcessNormalExit\n[ OK ] ScopedProcess.ScopedProcessNormalExit (6 ms)\n[65/148] ScopedProcess.ScopedProcessNormalExit (6 ms)\n[ RUN ] ScopedProcess.ScopedProcessAbort\n[ OK ] ScopedProcess.ScopedProcessAbort (124 ms)\n[66/148] ScopedProcess.ScopedProcessAbort (124 ms)\n[ RUN ] ScopedProcess.ScopedProcessSignaled\n[ OK ] ScopedProcess.ScopedProcessSignaled (12 ms)\n[67/148] ScopedProcess.ScopedProcessSignaled (12 ms)\n[ RUN ] ScopedProcess.DiesForReal\n[ OK ] ScopedProcess.DiesForReal (8 ms)\n[68/148] ScopedProcess.DiesForReal (8 ms)\n[ RUN ] ScopedProcess.SynchronizationBasic\n[ OK ] ScopedProcess.SynchronizationBasic (17 ms)\n[69/148] ScopedProcess.SynchronizationBasic (17 ms)\n[ RUN ] ScopedProcess.SynchronizationWorks\n[ OK ] ScopedProcess.SynchronizationWorks (113 ms)\n[70/148] ScopedProcess.SynchronizationWorks (113 ms)\n[ RUN ] CodeGen.HashSanity\n[ OK ] CodeGen.HashSanity (26 ms)\n[71/148] CodeGen.HashSanity (26 ms)\n[ RUN ] ProgramTest.OneInstruction\n[ OK ] ProgramTest.OneInstruction (0 ms)\n[72/148] ProgramTest.OneInstruction (0 ms)\n[ RUN ] ProgramTest.SimpleBranch\n[ OK ] ProgramTest.SimpleBranch (0 ms)\n[73/148] ProgramTest.SimpleBranch (0 ms)\n[ RUN ] ProgramTest.AtypicalBranch\n[ OK ] ProgramTest.AtypicalBranch (0 ms)\n[74/148] ProgramTest.AtypicalBranch (0 ms)\n[ RUN ] ProgramTest.Complex\n[ OK ] ProgramTest.Complex (0 ms)\n[75/148] ProgramTest.Complex (0 ms)\n[ RUN ] ProgramTest.ConfusingTails\n[ OK ] ProgramTest.ConfusingTails (1 ms)\n[76/148] ProgramTest.ConfusingTails (1 ms)\n[ RUN ] ProgramTest.ConfusingTailsBasic\n[ OK ] ProgramTest.ConfusingTailsBasic (0 ms)\n[77/148] ProgramTest.ConfusingTailsBasic (0 ms)\n[ RUN ] ProgramTest.ConfusingTailsMergeable\n[ OK ] ProgramTest.ConfusingTailsMergeable (0 ms)\n[78/148] ProgramTest.ConfusingTailsMergeable (0 ms)\n[ RUN ] ProgramTest.InstructionFolding\n[ OK ] ProgramTest.InstructionFolding (0 ms)\n[79/148] ProgramTest.InstructionFolding (0 ms)\n[ RUN ] ProgramTest.FarBranches\n[ OK ] ProgramTest.FarBranches (119 ms)\n[80/148] ProgramTest.FarBranches (119 ms)\n[ RUN ] NamespaceSandboxTest.BasicUsage\n[ OK ] NamespaceSandboxTest.BasicUsage (0 ms)\n[81/148] NamespaceSandboxTest.BasicUsage (0 ms)\n[ RUN ] NamespaceSandboxTest.BasicUsageWithOptions\n[ OK ] NamespaceSandboxTest.BasicUsageWithOptions (0 ms)\n[82/148] NamespaceSandboxTest.BasicUsageWithOptions (0 ms)\n[ RUN ] NamespaceSandboxTest.ChrootAndDropCapabilities\n[ OK ] NamespaceSandboxTest.ChrootAndDropCapabilities (0 ms)\n[83/148] NamespaceSandboxTest.ChrootAndDropCapabilities (0 ms)\n[ RUN ] NamespaceSandboxTest.NestedNamespaceSandbox\n[ OK ] NamespaceSandboxTest.NestedNamespaceSandbox (1 ms)\n[84/148] NamespaceSandboxTest.NestedNamespaceSandbox (1 ms)\n[ RUN ] ForkInNewPidNamespace.CheckDoesNotReturnZero\n[ OK ] ForkInNewPidNamespace.CheckDoesNotReturnZero (9 ms)\n[85/148] ForkInNewPidNamespace.CheckDoesNotReturnZero (9 ms)\n[ RUN ] ForkInNewPidNamespace.BasicUsage\n[ OK ] ForkInNewPidNamespace.BasicUsage (9 ms)\n[86/148] ForkInNewPidNamespace.BasicUsage (9 ms)\n[ RUN ] ForkInNewPidNamespace.ExitWithSignal\n[ OK ] ForkInNewPidNamespace.ExitWithSignal (9 ms)\n[87/148] ForkInNewPidNamespace.ExitWithSignal (9 ms)\n[ RUN ] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers\n[ OK ] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers (10 ms)\n[88/148] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers (10 ms)\n[ RUN ] ProgramTest.JumpReuse\n[ OK ] ProgramTest.JumpReuse (6 ms)\n[89/148] ProgramTest.JumpReuse (6 ms)\n[ RUN ] ConsListTest.Basic\n[ OK ] ConsListTest.Basic (0 ms)\n[90/148] ConsListTest.Basic (0 ms)\n[ RUN ] SyscallSet.Monotonous\n[ OK ] SyscallSet.Monotonous (10 ms)\n[91/148] SyscallSet.Monotonous (10 ms)\n[ RUN ] SyscallSet.ValidSyscallRanges\n[ OK ] SyscallSet.ValidSyscallRanges (15 ms)\n[92/148] SyscallSet.ValidSyscallRanges (15 ms)\n[ RUN ] SyscallSet.InvalidSyscalls\n[ OK ] SyscallSet.InvalidSyscalls (16 ms)\n[93/148] SyscallSet.InvalidSyscalls (16 ms)\n[ RUN ] SyscallSet.ValidOnlyIsOnlyValid\n[ OK ] SyscallSet.ValidOnlyIsOnlyValid (11 ms)\n[94/148] SyscallSet.ValidOnlyIsOnlyValid (11 ms)\n[ RUN ] SyscallSet.InvalidOnlyIsOnlyInvalid\n[ OK ] SyscallSet.InvalidOnlyIsOnlyInvalid (12 ms)\n[95/148] SyscallSet.InvalidOnlyIsOnlyInvalid (12 ms)\n[ RUN ] SyscallSet.AllIsValidOnlyPlusInvalidOnly\n[ OK ] SyscallSet.AllIsValidOnlyPlusInvalidOnly (22 ms)\n[96/148] SyscallSet.AllIsValidOnlyPlusInvalidOnly (22 ms)\n[ RUN ] TestTrapRegistry.TrapIDs\n[ OK ] TestTrapRegistry.TrapIDs (0 ms)\n[97/148] TestTrapRegistry.TrapIDs (0 ms)\n[ RUN ] SandboxBPF.EnableUnsafeTrapsInSigSysHandler\n[ OK ] SandboxBPF.EnableUnsafeTrapsInSigSysHandler (11 ms)\n[98/148] SandboxBPF.EnableUnsafeTrapsInSigSysHandler (11 ms)\n[ RUN ] Syscall.ComplexSyscallSixArgs\n[ OK ] Syscall.ComplexSyscallSixArgs (0 ms)\n[99/148] Syscall.ComplexSyscallSixArgs (0 ms)\n[ RUN ] Trap.SigSysAction\n[ OK ] Trap.SigSysAction (12 ms)\n[100/148] Trap.SigSysAction (12 ms)\n[ RUN ] UnixDomainSocketTest.Fork\n[ OK ] UnixDomainSocketTest.Fork (23 ms)\n[101/148] UnixDomainSocketTest.Fork (23 ms)\n[ RUN ] UnixDomainSocketTest.Namespace\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.Namespace (8 ms)\n[102/148] UnixDomainSocketTest.Namespace (8 ms)\n[ RUN ] UnixDomainSocketTest.DoubleNamespace\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.DoubleNamespace (9 ms)\n[103/148] UnixDomainSocketTest.DoubleNamespace (9 ms)\n[ RUN ] UnixDomainSocketTest.ImpossiblePid\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.ImpossiblePid (11 ms)\n[104/148] UnixDomainSocketTest.ImpossiblePid (11 ms)\n[ RUN ] Credentials.DropAllCaps\n[ OK ] Credentials.DropAllCaps (10 ms)\n[105/148] Credentials.DropAllCaps (10 ms)\n[ RUN ] Credentials.MoveToNewUserNS\nUnprivileged CLONE_NEWUSER supported: false.\nThis kernel does not support unprivileged namespaces. USERNS tests will succeed without running.\n[ OK ] Credentials.MoveToNewUserNS (9 ms)\n[106/148] Credentials.MoveToNewUserNS (9 ms)\n[ RUN ] Credentials.CanCreateProcessInNewUserNS\n[ OK ] Credentials.CanCreateProcessInNewUserNS (7 ms)\n[107/148] Credentials.CanCreateProcessInNewUserNS (7 ms)\n[ RUN ] Credentials.UidIsPreserved\n[ OK ] Credentials.UidIsPreserved (9 ms)\n[108/148] Credentials.UidIsPreserved (9 ms)\n[ RUN ] Credentials.NestedUserNS\n[ OK ] Credentials.NestedUserNS (21 ms)\n[109/148] Credentials.NestedUserNS (21 ms)\n[ RUN ] Credentials.CanDetectRoot\n[ OK ] Credentials.CanDetectRoot (15 ms)\n[110/148] Credentials.CanDetectRoot (15 ms)\n[ RUN ] Credentials.DropFileSystemAccessIsSafe\n[ OK ] Credentials.DropFileSystemAccessIsSafe (12 ms)\n[111/148] Credentials.DropFileSystemAccessIsSafe (12 ms)\n[ RUN ] Credentials.CannotRegainPrivileges\n[ OK ] Credentials.CannotRegainPrivileges (10 ms)\n[112/148] Credentials.CannotRegainPrivileges (10 ms)\n[ RUN ] Credentials.SetCapabilities\n[ OK ] Credentials.SetCapabilities (10 ms)\n[113/148] Credentials.SetCapabilities (10 ms)\n[ RUN ] Credentials.SetCapabilitiesAndChroot\n[ OK ] Credentials.SetCapabilitiesAndChroot (9 ms)\n[114/148] Credentials.SetCapabilitiesAndChroot (9 ms)\n[ RUN ] Credentials.SetCapabilitiesMatchesLibCap2\n[ OK ] Credentials.SetCapabilitiesMatchesLibCap2 (7 ms)\n[115/148] Credentials.SetCapabilitiesMatchesLibCap2 (7 ms)\n[ RUN ] Credentials.DropFileSystemAccessPreservesTLS\n[ OK ] Credentials.DropFileSystemAccessPreservesTLS (9 ms)\n[116/148] Credentials.DropFileSystemAccessPreservesTLS (9 ms)\n[ RUN ] NamespaceUtils.KernelSupportsUnprivilegedNamespace\n[ OK ] NamespaceUtils.KernelSupportsUnprivilegedNamespace (12 ms)\n[117/148] NamespaceUtils.KernelSupportsUnprivilegedNamespace (12 ms)\n[ RUN ] NamespaceUtils.WriteToIdMapFile\n[ OK ] NamespaceUtils.WriteToIdMapFile (7 ms)\n[118/148] NamespaceUtils.WriteToIdMapFile (7 ms)\n[ RUN ] BrokerProcess.MkdirClient\n[ OK ] BrokerProcess.MkdirClient (106 ms)\n[119/148] BrokerProcess.MkdirClient (106 ms)\n[ RUN ] BrokerProcess.MkdirHost\n[ OK ] BrokerProcess.MkdirHost (94 ms)\n[120/148] BrokerProcess.MkdirHost (94 ms)\n[ RUN ] BrokerProcess.RmdirClient\n[ OK ] BrokerProcess.RmdirClient (89 ms)\n[121/148] BrokerProcess.RmdirClient (89 ms)\n[ RUN ] BrokerProcess.RmdirHost\n[ OK ] BrokerProcess.RmdirHost (89 ms)\n[122/148] BrokerProcess.RmdirHost (89 ms)\n[ RUN ] BrokerProcess.UnlinkClient\n[ OK ] BrokerProcess.UnlinkClient (65 ms)\n[123/148] BrokerProcess.UnlinkClient (65 ms)\n[ RUN ] BrokerProcess.UnlinkHost\n[ OK ] BrokerProcess.UnlinkHost (70 ms)\n[124/148] BrokerProcess.UnlinkHost (70 ms)\n[ RUN ] BrokerProcess.IsSyscallAllowed\n[ OK ] BrokerProcess.IsSyscallAllowed (2 ms)\n[125/148] BrokerProcess.IsSyscallAllowed (2 ms)\n[ RUN ] BrokerSimpleMessage.AddData\n[ OK ] BrokerSimpleMessage.AddData (1 ms)\n[126/148] BrokerSimpleMessage.AddData (1 ms)\n[ RUN ] BrokerSimpleMessage.SendAndRecvMsg\n[ OK ] BrokerSimpleMessage.SendAndRecvMsg (6 ms)\n[127/148] BrokerSimpleMessage.SendAndRecvMsg (6 ms)\n[ RUN ] BrokerSimpleMessage.SendRecvMsgSynchronous\n[ OK ] BrokerSimpleMessage.SendRecvMsgSynchronous (2 ms)\n[128/148] BrokerSimpleMessage.SendRecvMsgSynchronous (2 ms)\n[ RUN ] BrokerProcess.OpenComplexFlagsWithClientCheck\n[ OK ] BrokerProcess.OpenComplexFlagsWithClientCheck (12 ms)\n[129/148] BrokerProcess.OpenComplexFlagsWithClientCheck (12 ms)\n[ RUN ] BrokerProcess.OpenComplexFlagsNoClientCheck\n[ OK ] BrokerProcess.OpenComplexFlagsNoClientCheck (11 ms)\n[130/148] BrokerProcess.OpenComplexFlagsNoClientCheck (11 ms)\n[ RUN ] BrokerProcess.BrokerDiesOnClosedChannel\n[ OK ] BrokerProcess.BrokerDiesOnClosedChannel (21 ms)\n[131/148] BrokerProcess.BrokerDiesOnClosedChannel (21 ms)\n[ RUN ] BrokerProcess.CreateFile\n[ OK ] BrokerProcess.CreateFile (13 ms)\n[132/148] BrokerProcess.CreateFile (13 ms)\n[ RUN ] BrokerProcess.StatFileClient\n[ OK ] BrokerProcess.StatFileClient (119 ms)\n[133/148] BrokerProcess.StatFileClient (119 ms)\n[ RUN ] BrokerProcess.StatFileHost\n[ OK ] BrokerProcess.StatFileHost (113 ms)\n[134/148] BrokerProcess.StatFileHost (113 ms)\n[ RUN ] BrokerProcess.RenameFileClient\n[ OK ] BrokerProcess.RenameFileClient (55 ms)\n[135/148] BrokerProcess.RenameFileClient (55 ms)\n[ RUN ] BrokerProcess.RenameFileHost\n[ OK ] BrokerProcess.RenameFileHost (48 ms)\n[136/148] BrokerProcess.RenameFileHost (48 ms)\n[ RUN ] BrokerProcess.ReadlinkFileClient\n[ OK ] BrokerProcess.ReadlinkFileClient (42 ms)\n[137/148] BrokerProcess.ReadlinkFileClient (42 ms)\n[ RUN ] BrokerProcess.ReadlinkFileHost\n[ OK ] BrokerProcess.ReadlinkFileHost (47 ms)\n[138/148] BrokerProcess.ReadlinkFileHost (47 ms)\n[ RUN ] SandboxBPF.Tsync\n[ OK ] SandboxBPF.Tsync (41 ms)\n[139/148] SandboxBPF.Tsync (41 ms)\n[ RUN ] SandboxBPF.StartMultiThreadedAsSingleThreaded\n[ OK ] SandboxBPF.StartMultiThreadedAsSingleThreaded (2118 ms)\n[140/148] SandboxBPF.StartMultiThreadedAsSingleThreaded (2118 ms)\n[ RUN ] SandboxBPF.CreateDestroy\n[ OK ] SandboxBPF.CreateDestroy (0 ms)\n[141/148] SandboxBPF.CreateDestroy (0 ms)\n[ RUN ] SandboxBPF.ProcTaskFdDescriptorGetsClosed\n[ OK ] SandboxBPF.ProcTaskFdDescriptorGetsClosed (1 ms)\n[142/148] SandboxBPF.ProcTaskFdDescriptorGetsClosed (1 ms)\n[ RUN ] BPFTest.BPFTesterCompatibilityDelegateLeakTest\n[ OK ] BPFTest.BPFTesterCompatibilityDelegateLeakTest (0 ms)\n[143/148] BPFTest.BPFTesterCompatibilityDelegateLeakTest (0 ms)\n[ RUN ] Syscall.InvalidCallReturnsENOSYS\n[ OK ] Syscall.InvalidCallReturnsENOSYS (0 ms)\n[144/148] Syscall.InvalidCallReturnsENOSYS (0 ms)\n[ RUN ] Syscall.WellKnownEntryPoint\n[ OK ] Syscall.WellKnownEntryPoint (0 ms)\n[145/148] Syscall.WellKnownEntryPoint (0 ms)\n[ RUN ] Syscall.TrivialSyscallNoArgs\n[ OK ] Syscall.TrivialSyscallNoArgs (1 ms)\n[146/148] Syscall.TrivialSyscallNoArgs (1 ms)\n[ RUN ] Syscall.TrivialSyscallOneArg\n[ OK ] Syscall.TrivialSyscallOneArg (0 ms)\n[147/148] Syscall.TrivialSyscallOneArg (0 ms)\n[ RUN ] Syscall.TrivialFailingSyscall\n[ OK ] Syscall.TrivialFailingSyscall (0 ms)\n[148/148] Syscall.TrivialFailingSyscall (0 ms)\nSUCCESS: all tests passed.\nTests took 2 seconds.\n", "outputs_ref": { "isolated": "21bcfc7f6195a52fd7f888e3d1831bf2223d3d85", "isolatedserver": "https://isolateserver.appspot.com", "namespace": "default-gzip" }, "run_id": "43c73f94fd324e11", "server_versions": [ "4216-cf4a3cd" ], "started_ts": "2019-03-24T06:40:46.099666", "state": "COMPLETED", "tags": [ "build_is_experimental:false", "buildername:Linux TSan Tests", "buildnumber:35965", "cpu:x86-64", "data:51a1b3f69d1d3dce8a32605f9b67e30723158d40", "gpu:none", "master:chromium.memory", "name:sandbox_linux_unittests", "os:Ubuntu-14.04", "pool:Chrome", "priority:25", "project:chromium", "purpose:CI", "purpose:luci", "purpose:post-commit", "service_account:none", "slavename:swarm323-c4", "spec_name:chromium.ci:Linux TSan Tests", "stepname:sandbox_linux_unittests", "swarming.pool.template:none", "swarming.pool.version:d172b3da50f79bdc0892909417b8871a46e09913", "user:None" ], "task_id": "43c9f1758b7f5810" } ] }