Back to build
Raw log | Switch to full mode | Login

{ "shards": [ { "bot_dimensions": [ { "key": "caches", "value": [ "swarming_module_cache_vpython" ] }, { "key": "cores", "value": [ "8" ] }, { "key": "cpu", "value": [ "x86", "x86-64", "x86-64-Broadwell_GCE", "x86-64-avx2" ] }, { "key": "gce", "value": [ "1" ] }, { "key": "gpu", "value": [ "none" ] }, { "key": "id", "value": [ "gce-trusty-e833d7b0-us-west1-a-vshj" ] }, { "key": "image", "value": [ "chrome-trusty-18091700-38cc06ee3ee" ] }, { "key": "inside_docker", "value": [ "0" ] }, { "key": "kvm", "value": [ "1" ] }, { "key": "machine_type", "value": [ "n1-standard-8" ] }, { "key": "os", "value": [ "Linux", "Ubuntu", "Ubuntu-14.04" ] }, { "key": "pool", "value": [ "Chrome" ] }, { "key": "python", "value": [ "2.7.6" ] }, { "key": "server_version", "value": [ "4201-b04f7f8" ] }, { "key": "zone", "value": [ "us", "us-west", "us-west1", "us-west1-a" ] } ], "bot_id": "gce-trusty-e833d7b0-us-west1-a-vshj", "bot_version": "51d929b905e4fffb3652f17e0ff8dceb0f7077275d215d276fb6c5a2f238b3f7", "cipd_pins": { "client_package": { "package_name": "infra/tools/cipd/linux-amd64", "version": "nFftZl2kFquaI2EUmPGwzbc5sIbCocl9L55UeASqlLsC" }, "packages": [ { "package_name": "infra/python/cpython/linux-amd64", "path": ".swarming_module", "version": "46c0c897ca0f053799ee41fd148bb7a47232df47" }, { "package_name": "infra/tools/luci/logdog/butler/linux-amd64", "path": ".swarming_module", "version": "2737ea8ed9b958f4d5aa9ffe106115a649ada241" }, { "package_name": "infra/tools/luci/vpython-native/linux-amd64", "path": ".swarming_module", "version": "OAXVAmcUSrvDygYUrCDzv20LRono9938YOHPu0zKowgC" }, { "package_name": "infra/tools/luci/vpython/linux-amd64", "path": ".swarming_module", "version": "ucaOciwAE9aweCUDOrmSvyiwrjmbywuB0NzAGUXIHjAC" } ] }, "completed_ts": "2019-03-18T20:17:12.713843", "cost_saved_usd": 0.0012144359350340906, "created_ts": "2019-03-19T15:18:08.784434", "deduped_from": "43ab44ccfe82e711", "duration": 4.3888819217681885, "modified_ts": "2019-03-19T15:18:08.798238", "name": "sandbox_linux_unittests/Ubuntu-14.04/0a7a89120e/Linux TSan Tests/35729", "output": "Additional test environment:\n CHROME_DEVEL_SANDBOX=/opt/chromium/chrome_sandbox\n CHROME_HEADLESS=1\n G_SLICE=always-malloc\n LANG=en_US.UTF-8\n NSS_DISABLE_ARENA_FREE_LIST=1\n NSS_DISABLE_UNLOAD=1\n TSAN_OPTIONS=symbolize=1 external_symbolizer_path=/b/s/w/ir/third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer handle_abort=1\nCommand: ./sandbox_linux_unittests --test-launcher-bot-mode --cfi-diag=0 --test-launcher-print-test-stdio=always --test-launcher-summary-output=/b/s/w/iokQr2wh/output.json --no-sandbox\n\nIMPORTANT DEBUGGING NOTE: batches of tests are run inside their\nown process. For debugging a test inside a debugger, use the\n--gtest_filter=<your_test_name> flag along with\n--single-process-tests.\nUsing sharding settings from environment. This is shard 0/1\nUsing 8 parallel jobs.\n[ RUN ] SyscallWrappers.BasicSyscalls\n[ OK ] SyscallWrappers.BasicSyscalls (0 ms)\n[1/148] SyscallWrappers.BasicSyscalls (0 ms)\n[ RUN ] SyscallWrappers.CloneBasic\n[ OK ] SyscallWrappers.CloneBasic (6 ms)\n[2/148] SyscallWrappers.CloneBasic (6 ms)\n[ RUN ] SyscallWrappers.CloneParentSettid\n[ OK ] SyscallWrappers.CloneParentSettid (4 ms)\n[3/148] SyscallWrappers.CloneParentSettid (4 ms)\n[ RUN ] SyscallWrappers.CloneChildSettid\n[ OK ] SyscallWrappers.CloneChildSettid (4 ms)\n[4/148] SyscallWrappers.CloneChildSettid (4 ms)\n[ RUN ] SyscallWrappers.GetRESUid\n[ OK ] SyscallWrappers.GetRESUid (0 ms)\n[5/148] SyscallWrappers.GetRESUid (0 ms)\n[ RUN ] SyscallWrappers.GetRESGid\n[ OK ] SyscallWrappers.GetRESGid (0 ms)\n[6/148] SyscallWrappers.GetRESGid (0 ms)\n[ RUN ] SyscallWrappers.LinuxSigSet\n[ OK ] SyscallWrappers.LinuxSigSet (0 ms)\n[7/148] SyscallWrappers.LinuxSigSet (0 ms)\n[ RUN ] Yama.GetStatus\nYama present: Y - enforcing: Y\n[ OK ] Yama.GetStatus (1 ms)\n[8/148] Yama.GetStatus (1 ms)\n[ RUN ] Yama.RestrictPtraceSucceedsWhenYamaPresent\n[ OK ] Yama.RestrictPtraceSucceedsWhenYamaPresent (7 ms)\n[9/148] Yama.RestrictPtraceSucceedsWhenYamaPresent (7 ms)\n[ RUN ] Yama.RestrictPtraceWorks\n[ OK ] Yama.RestrictPtraceWorks (57 ms)\n[10/148] Yama.RestrictPtraceWorks (57 ms)\n[ RUN ] BrokerFilePermission.WriteOnly\n[ OK ] BrokerFilePermission.WriteOnly (1 ms)\n[11/148] BrokerFilePermission.WriteOnly (1 ms)\n[ RUN ] BrokerFilePermission.ReadWrite\n[ OK ] BrokerFilePermission.ReadWrite (0 ms)\n[12/148] BrokerFilePermission.ReadWrite (0 ms)\n[ RUN ] BrokerFilePermission.ReadWriteCreate\n[ OK ] BrokerFilePermission.ReadWriteCreate (0 ms)\n[13/148] BrokerFilePermission.ReadWriteCreate (0 ms)\n[ RUN ] BrokerFilePermission.ReadWriteCreateTemporaryRecursive\n[ OK ] BrokerFilePermission.ReadWriteCreateTemporaryRecursive (1 ms)\n[14/148] BrokerFilePermission.ReadWriteCreateTemporaryRecursive (1 ms)\n[ RUN ] BrokerFilePermission.StatOnlyWithIntermediateDirs\n[ OK ] BrokerFilePermission.StatOnlyWithIntermediateDirs (0 ms)\n[15/148] BrokerFilePermission.StatOnlyWithIntermediateDirs (0 ms)\n[ RUN ] BrokerFilePermission.ValidatePath\n[ OK ] BrokerFilePermission.ValidatePath (0 ms)\n[16/148] BrokerFilePermission.ValidatePath (0 ms)\n[ RUN ] BrokerProcess.CreateAndDestroy\n[ OK ] BrokerProcess.CreateAndDestroy (11 ms)\n[17/148] BrokerProcess.CreateAndDestroy (11 ms)\n[ RUN ] BrokerProcess.TestOpenAccessNull\n[ OK ] BrokerProcess.TestOpenAccessNull (12 ms)\n[18/148] BrokerProcess.TestOpenAccessNull (12 ms)\n[ RUN ] BrokerProcess.OpenFilePermsWithClientCheck\n[ OK ] BrokerProcess.OpenFilePermsWithClientCheck (17 ms)\n[19/148] BrokerProcess.OpenFilePermsWithClientCheck (17 ms)\n[ RUN ] BrokerProcess.OpenOpenFilePermsNoClientCheck\n[ OK ] BrokerProcess.OpenOpenFilePermsNoClientCheck (21 ms)\n[20/148] BrokerProcess.OpenOpenFilePermsNoClientCheck (21 ms)\n[ RUN ] Yama.RestrictPtraceIsDefault\n[ OK ] Yama.RestrictPtraceIsDefault (36 ms)\n[21/148] Yama.RestrictPtraceIsDefault (36 ms)\n[ RUN ] BrokerFilePermission.CreateGood\n[ OK ] BrokerFilePermission.CreateGood (9 ms)\n[22/148] BrokerFilePermission.CreateGood (9 ms)\n[ RUN ] BrokerFilePermission.CreateGoodRecursive\n[ OK ] BrokerFilePermission.CreateGoodRecursive (13 ms)\n[23/148] BrokerFilePermission.CreateGoodRecursive (13 ms)\n[ RUN ] BrokerFilePermission.CreateBad\n[ OK ] BrokerFilePermission.CreateBad (23 ms)\n[24/148] BrokerFilePermission.CreateBad (23 ms)\n[ RUN ] BrokerFilePermission.CreateBadRecursive\n[ OK ] BrokerFilePermission.CreateBadRecursive (25 ms)\n[25/148] BrokerFilePermission.CreateBadRecursive (25 ms)\n[ RUN ] BrokerFilePermission.CreateBadNotAbs\n[ OK ] BrokerFilePermission.CreateBadNotAbs (42 ms)\n[26/148] BrokerFilePermission.CreateBadNotAbs (42 ms)\n[ RUN ] BrokerFilePermission.CreateBadEmpty\n[ OK ] BrokerFilePermission.CreateBadEmpty (23 ms)\n[27/148] BrokerFilePermission.CreateBadEmpty (23 ms)\n[ RUN ] BrokerFilePermission.ReadOnly\n[ OK ] BrokerFilePermission.ReadOnly (0 ms)\n[28/148] BrokerFilePermission.ReadOnly (0 ms)\n[ RUN ] BrokerFilePermission.ReadOnlyRecursive\n[ OK ] BrokerFilePermission.ReadOnlyRecursive (0 ms)\n[29/148] BrokerFilePermission.ReadOnlyRecursive (0 ms)\n[ RUN ] BrokerFilePermission.ReadOnlyTruncate\n[ OK ] BrokerFilePermission.ReadOnlyTruncate (0 ms)\n[30/148] BrokerFilePermission.ReadOnlyTruncate (0 ms)\n[ RUN ] ScopedTemporaryFile.Basics\n[ OK ] ScopedTemporaryFile.Basics (1 ms)\n[31/148] ScopedTemporaryFile.Basics (1 ms)\n[ RUN ] TestUtils.HandlePostForkReturn\n[ OK ] TestUtils.HandlePostForkReturn (8 ms)\n[32/148] TestUtils.HandlePostForkReturn (8 ms)\n[ RUN ] UnitTests.DeathExitCode\n[ OK ] UnitTests.DeathExitCode (14 ms)\n[33/148] UnitTests.DeathExitCode (14 ms)\n[ RUN ] UnitTests.DeathBySignal\n[ OK ] UnitTests.DeathBySignal (12 ms)\n[34/148] UnitTests.DeathBySignal (12 ms)\n[ RUN ] UnitTests.DeathWithMessage\n[ OK ] UnitTests.DeathWithMessage (24 ms)\n[35/148] UnitTests.DeathWithMessage (24 ms)\n[ RUN ] UnitTests.SEGVDeathWithMessage\n[ OK ] UnitTests.SEGVDeathWithMessage (34 ms)\n[36/148] UnitTests.SEGVDeathWithMessage (34 ms)\n[ RUN ] UnitTests.NoisyTest\n[ OK ] UnitTests.NoisyTest (21 ms)\n[37/148] UnitTests.NoisyTest (21 ms)\n[ RUN ] SetuidSandboxClient.SandboxedClientAPI\n[ OK ] SetuidSandboxClient.SandboxedClientAPI (0 ms)\n[38/148] SetuidSandboxClient.SandboxedClientAPI (0 ms)\n[ RUN ] SetuidSandboxHost.SetupLaunchEnvironment\n[ OK ] SetuidSandboxHost.SetupLaunchEnvironment (1 ms)\n[39/148] SetuidSandboxHost.SetupLaunchEnvironment (1 ms)\n[ RUN ] SetuidSandboxHost.GetSandboxBinaryPath\n[ OK ] SetuidSandboxHost.GetSandboxBinaryPath (0 ms)\n[40/148] SetuidSandboxHost.GetSandboxBinaryPath (0 ms)\n[ RUN ] BPFDSL.Basic\n[ OK ] BPFDSL.Basic (3 ms)\n[41/148] BPFDSL.Basic (3 ms)\n[ RUN ] BPFDSL.BooleanLogic\n[ OK ] BPFDSL.BooleanLogic (3 ms)\n[42/148] BPFDSL.BooleanLogic (3 ms)\n[ RUN ] BPFDSL.MoreBooleanLogic\n[ OK ] BPFDSL.MoreBooleanLogic (2 ms)\n[43/148] BPFDSL.MoreBooleanLogic (2 ms)\n[ RUN ] BPFDSL.ArgSizeTest\n[ OK ] BPFDSL.ArgSizeTest (3 ms)\n[44/148] BPFDSL.ArgSizeTest (3 ms)\n[ RUN ] BPFDSL.NegativeConstantsTest\n[ OK ] BPFDSL.NegativeConstantsTest (2 ms)\n[45/148] BPFDSL.NegativeConstantsTest (2 ms)\n[ RUN ] BPFDSL.MaskTest\n[ OK ] BPFDSL.MaskTest (4 ms)\n[46/148] BPFDSL.MaskTest (4 ms)\n[ RUN ] BPFDSL.ElseIfTest\n[ OK ] BPFDSL.ElseIfTest (2 ms)\n[47/148] BPFDSL.ElseIfTest (2 ms)\n[ RUN ] BPFDSL.SwitchTest\n[ OK ] BPFDSL.SwitchTest (3 ms)\n[48/148] BPFDSL.SwitchTest (3 ms)\n[ RUN ] BPFDSL.IsAllowDeny\n[ OK ] BPFDSL.IsAllowDeny (0 ms)\n[49/148] BPFDSL.IsAllowDeny (0 ms)\n[ RUN ] BPFDSL.HasUnsafeTraps\n[ OK ] BPFDSL.HasUnsafeTraps (0 ms)\n[50/148] BPFDSL.HasUnsafeTraps (0 ms)\n[ RUN ] BrokerProcess.OpenFilePermsWithClientCheckNoEnt\n[ OK ] BrokerProcess.OpenFilePermsWithClientCheckNoEnt (24 ms)\n[51/148] BrokerProcess.OpenFilePermsWithClientCheckNoEnt (24 ms)\n[ RUN ] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt\n[ OK ] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt (19 ms)\n[52/148] BrokerProcess.OpenOpenFilePermsNoClientCheckNoEnt (19 ms)\n[ RUN ] BrokerProcess.BadPathsClientCheck\n[ OK ] BrokerProcess.BadPathsClientCheck (15 ms)\n[53/148] BrokerProcess.BadPathsClientCheck (15 ms)\n[ RUN ] BrokerProcess.BadPathsNoClientCheck\n[ OK ] BrokerProcess.BadPathsNoClientCheck (11 ms)\n[54/148] BrokerProcess.BadPathsNoClientCheck (11 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoWithClientCheck\n[ OK ] BrokerProcess.OpenCpuinfoWithClientCheck (13 ms)\n[55/148] BrokerProcess.OpenCpuinfoWithClientCheck (13 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoNoClientCheck\n[ OK ] BrokerProcess.OpenCpuinfoNoClientCheck (11 ms)\n[56/148] BrokerProcess.OpenCpuinfoNoClientCheck (11 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoWithClientCheckRecursive\n[ OK ] BrokerProcess.OpenCpuinfoWithClientCheckRecursive (12 ms)\n[57/148] BrokerProcess.OpenCpuinfoWithClientCheckRecursive (12 ms)\n[ RUN ] BrokerProcess.OpenCpuinfoNoClientCheckRecursive\n[ OK ] BrokerProcess.OpenCpuinfoNoClientCheckRecursive (18 ms)\n[58/148] BrokerProcess.OpenCpuinfoNoClientCheckRecursive (18 ms)\n[ RUN ] BrokerProcess.OpenFileRW\n[ OK ] BrokerProcess.OpenFileRW (14 ms)\n[59/148] BrokerProcess.OpenFileRW (14 ms)\n[ RUN ] BrokerProcess.BrokerDied\n[ OK ] BrokerProcess.BrokerDied (52 ms)\n[60/148] BrokerProcess.BrokerDied (52 ms)\n[ RUN ] ProcUtil.CountOpenFds\n[ OK ] ProcUtil.CountOpenFds (1 ms)\n[61/148] ProcUtil.CountOpenFds (1 ms)\n[ RUN ] ProcUtil.HasOpenDirectory\n[ OK ] ProcUtil.HasOpenDirectory (0 ms)\n[62/148] ProcUtil.HasOpenDirectory (0 ms)\n[ RUN ] ProcUtil.HasOpenDirectoryWithFD\n[ OK ] ProcUtil.HasOpenDirectoryWithFD (1 ms)\n[63/148] ProcUtil.HasOpenDirectoryWithFD (1 ms)\n[ RUN ] ResourceLimits.NoFork\n[ OK ] ResourceLimits.NoFork (29 ms)\n[64/148] ResourceLimits.NoFork (29 ms)\n[ RUN ] ScopedProcess.ScopedProcessNormalExit\n[ OK ] ScopedProcess.ScopedProcessNormalExit (12 ms)\n[65/148] ScopedProcess.ScopedProcessNormalExit (12 ms)\n[ RUN ] ScopedProcess.ScopedProcessAbort\n[ OK ] ScopedProcess.ScopedProcessAbort (222 ms)\n[66/148] ScopedProcess.ScopedProcessAbort (222 ms)\n[ RUN ] ScopedProcess.ScopedProcessSignaled\n[ OK ] ScopedProcess.ScopedProcessSignaled (16 ms)\n[67/148] ScopedProcess.ScopedProcessSignaled (16 ms)\n[ RUN ] ScopedProcess.DiesForReal\n[ OK ] ScopedProcess.DiesForReal (7 ms)\n[68/148] ScopedProcess.DiesForReal (7 ms)\n[ RUN ] ScopedProcess.SynchronizationBasic\n[ OK ] ScopedProcess.SynchronizationBasic (20 ms)\n[69/148] ScopedProcess.SynchronizationBasic (20 ms)\n[ RUN ] ScopedProcess.SynchronizationWorks\n[ OK ] ScopedProcess.SynchronizationWorks (109 ms)\n[70/148] ScopedProcess.SynchronizationWorks (109 ms)\n[ RUN ] ProgramTest.JumpReuse\n[ OK ] ProgramTest.JumpReuse (6 ms)\n[71/148] ProgramTest.JumpReuse (6 ms)\n[ RUN ] ConsListTest.Basic\n[ OK ] ConsListTest.Basic (0 ms)\n[72/148] ConsListTest.Basic (0 ms)\n[ RUN ] SyscallSet.Monotonous\n[ OK ] SyscallSet.Monotonous (17 ms)\n[73/148] SyscallSet.Monotonous (17 ms)\n[ RUN ] SyscallSet.ValidSyscallRanges\n[ OK ] SyscallSet.ValidSyscallRanges (15 ms)\n[74/148] SyscallSet.ValidSyscallRanges (15 ms)\n[ RUN ] SyscallSet.InvalidSyscalls\n[ OK ] SyscallSet.InvalidSyscalls (17 ms)\n[75/148] SyscallSet.InvalidSyscalls (17 ms)\n[ RUN ] SyscallSet.ValidOnlyIsOnlyValid\n[ OK ] SyscallSet.ValidOnlyIsOnlyValid (9 ms)\n[76/148] SyscallSet.ValidOnlyIsOnlyValid (9 ms)\n[ RUN ] SyscallSet.InvalidOnlyIsOnlyInvalid\n[ OK ] SyscallSet.InvalidOnlyIsOnlyInvalid (10 ms)\n[77/148] SyscallSet.InvalidOnlyIsOnlyInvalid (10 ms)\n[ RUN ] SyscallSet.AllIsValidOnlyPlusInvalidOnly\n[ OK ] SyscallSet.AllIsValidOnlyPlusInvalidOnly (21 ms)\n[78/148] SyscallSet.AllIsValidOnlyPlusInvalidOnly (21 ms)\n[ RUN ] TestTrapRegistry.TrapIDs\n[ OK ] TestTrapRegistry.TrapIDs (0 ms)\n[79/148] TestTrapRegistry.TrapIDs (0 ms)\n[ RUN ] SandboxBPF.EnableUnsafeTrapsInSigSysHandler\n[ OK ] SandboxBPF.EnableUnsafeTrapsInSigSysHandler (19 ms)\n[80/148] SandboxBPF.EnableUnsafeTrapsInSigSysHandler (19 ms)\n[ RUN ] Syscall.ComplexSyscallSixArgs\n[ OK ] Syscall.ComplexSyscallSixArgs (0 ms)\n[81/148] Syscall.ComplexSyscallSixArgs (0 ms)\n[ RUN ] Trap.SigSysAction\n[ OK ] Trap.SigSysAction (12 ms)\n[82/148] Trap.SigSysAction (12 ms)\n[ RUN ] UnixDomainSocketTest.Fork\n[ OK ] UnixDomainSocketTest.Fork (20 ms)\n[83/148] UnixDomainSocketTest.Fork (20 ms)\n[ RUN ] UnixDomainSocketTest.Namespace\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.Namespace (9 ms)\n[84/148] UnixDomainSocketTest.Namespace (9 ms)\n[ RUN ] UnixDomainSocketTest.DoubleNamespace\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.DoubleNamespace (16 ms)\n[85/148] UnixDomainSocketTest.DoubleNamespace (16 ms)\n[ RUN ] UnixDomainSocketTest.ImpossiblePid\nPermission to use CLONE_NEWPID missing; skipping test.\n[ OK ] UnixDomainSocketTest.ImpossiblePid (17 ms)\n[86/148] UnixDomainSocketTest.ImpossiblePid (17 ms)\n[ RUN ] Credentials.DropAllCaps\n[ OK ] Credentials.DropAllCaps (9 ms)\n[87/148] Credentials.DropAllCaps (9 ms)\n[ RUN ] Credentials.MoveToNewUserNS\nUnprivileged CLONE_NEWUSER supported: false.\nThis kernel does not support unprivileged namespaces. USERNS tests will succeed without running.\n[ OK ] Credentials.MoveToNewUserNS (12 ms)\n[88/148] Credentials.MoveToNewUserNS (12 ms)\n[ RUN ] Credentials.CanCreateProcessInNewUserNS\n[ OK ] Credentials.CanCreateProcessInNewUserNS (15 ms)\n[89/148] Credentials.CanCreateProcessInNewUserNS (15 ms)\n[ RUN ] Credentials.UidIsPreserved\n[ OK ] Credentials.UidIsPreserved (13 ms)\n[90/148] Credentials.UidIsPreserved (13 ms)\n[ RUN ] Credentials.NestedUserNS\n[ OK ] Credentials.NestedUserNS (12 ms)\n[91/148] Credentials.NestedUserNS (12 ms)\n[ RUN ] Credentials.CanDetectRoot\n[ OK ] Credentials.CanDetectRoot (9 ms)\n[92/148] Credentials.CanDetectRoot (9 ms)\n[ RUN ] Credentials.DropFileSystemAccessIsSafe\n[ OK ] Credentials.DropFileSystemAccessIsSafe (14 ms)\n[93/148] Credentials.DropFileSystemAccessIsSafe (14 ms)\n[ RUN ] Credentials.CannotRegainPrivileges\n[ OK ] Credentials.CannotRegainPrivileges (11 ms)\n[94/148] Credentials.CannotRegainPrivileges (11 ms)\n[ RUN ] Credentials.SetCapabilities\n[ OK ] Credentials.SetCapabilities (11 ms)\n[95/148] Credentials.SetCapabilities (11 ms)\n[ RUN ] Credentials.SetCapabilitiesAndChroot\n[ OK ] Credentials.SetCapabilitiesAndChroot (11 ms)\n[96/148] Credentials.SetCapabilitiesAndChroot (11 ms)\n[ RUN ] Credentials.SetCapabilitiesMatchesLibCap2\n[ OK ] Credentials.SetCapabilitiesMatchesLibCap2 (10 ms)\n[97/148] Credentials.SetCapabilitiesMatchesLibCap2 (10 ms)\n[ RUN ] Credentials.DropFileSystemAccessPreservesTLS\n[ OK ] Credentials.DropFileSystemAccessPreservesTLS (13 ms)\n[98/148] Credentials.DropFileSystemAccessPreservesTLS (13 ms)\n[ RUN ] NamespaceUtils.KernelSupportsUnprivilegedNamespace\n[ OK ] NamespaceUtils.KernelSupportsUnprivilegedNamespace (15 ms)\n[99/148] NamespaceUtils.KernelSupportsUnprivilegedNamespace (15 ms)\n[ RUN ] NamespaceUtils.WriteToIdMapFile\n[ OK ] NamespaceUtils.WriteToIdMapFile (10 ms)\n[100/148] NamespaceUtils.WriteToIdMapFile (10 ms)\n[ RUN ] CodeGen.HashSanity\n[ OK ] CodeGen.HashSanity (37 ms)\n[101/148] CodeGen.HashSanity (37 ms)\n[ RUN ] ProgramTest.OneInstruction\n[ OK ] ProgramTest.OneInstruction (1 ms)\n[102/148] ProgramTest.OneInstruction (1 ms)\n[ RUN ] ProgramTest.SimpleBranch\n[ OK ] ProgramTest.SimpleBranch (0 ms)\n[103/148] ProgramTest.SimpleBranch (0 ms)\n[ RUN ] ProgramTest.AtypicalBranch\n[ OK ] ProgramTest.AtypicalBranch (0 ms)\n[104/148] ProgramTest.AtypicalBranch (0 ms)\n[ RUN ] ProgramTest.Complex\n[ OK ] ProgramTest.Complex (0 ms)\n[105/148] ProgramTest.Complex (0 ms)\n[ RUN ] ProgramTest.ConfusingTails\n[ OK ] ProgramTest.ConfusingTails (1 ms)\n[106/148] ProgramTest.ConfusingTails (1 ms)\n[ RUN ] ProgramTest.ConfusingTailsBasic\n[ OK ] ProgramTest.ConfusingTailsBasic (0 ms)\n[107/148] ProgramTest.ConfusingTailsBasic (0 ms)\n[ RUN ] ProgramTest.ConfusingTailsMergeable\n[ OK ] ProgramTest.ConfusingTailsMergeable (0 ms)\n[108/148] ProgramTest.ConfusingTailsMergeable (0 ms)\n[ RUN ] ProgramTest.InstructionFolding\n[ OK ] ProgramTest.InstructionFolding (1 ms)\n[109/148] ProgramTest.InstructionFolding (1 ms)\n[ RUN ] ProgramTest.FarBranches\n[ OK ] ProgramTest.FarBranches (177 ms)\n[110/148] ProgramTest.FarBranches (177 ms)\n[ RUN ] NamespaceSandboxTest.BasicUsage\n[ OK ] NamespaceSandboxTest.BasicUsage (0 ms)\n[111/148] NamespaceSandboxTest.BasicUsage (0 ms)\n[ RUN ] NamespaceSandboxTest.BasicUsageWithOptions\n[ OK ] NamespaceSandboxTest.BasicUsageWithOptions (0 ms)\n[112/148] NamespaceSandboxTest.BasicUsageWithOptions (0 ms)\n[ RUN ] NamespaceSandboxTest.ChrootAndDropCapabilities\n[ OK ] NamespaceSandboxTest.ChrootAndDropCapabilities (0 ms)\n[113/148] NamespaceSandboxTest.ChrootAndDropCapabilities (0 ms)\n[ RUN ] NamespaceSandboxTest.NestedNamespaceSandbox\n[ OK ] NamespaceSandboxTest.NestedNamespaceSandbox (0 ms)\n[114/148] NamespaceSandboxTest.NestedNamespaceSandbox (0 ms)\n[ RUN ] ForkInNewPidNamespace.CheckDoesNotReturnZero\n[ OK ] ForkInNewPidNamespace.CheckDoesNotReturnZero (8 ms)\n[115/148] ForkInNewPidNamespace.CheckDoesNotReturnZero (8 ms)\n[ RUN ] ForkInNewPidNamespace.BasicUsage\n[ OK ] ForkInNewPidNamespace.BasicUsage (8 ms)\n[116/148] ForkInNewPidNamespace.BasicUsage (8 ms)\n[ RUN ] ForkInNewPidNamespace.ExitWithSignal\n[ OK ] ForkInNewPidNamespace.ExitWithSignal (9 ms)\n[117/148] ForkInNewPidNamespace.ExitWithSignal (9 ms)\n[ RUN ] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers\n[ OK ] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers (11 ms)\n[118/148] InstallTerminationSignalHandler.DoesNotOverrideExistingHandlers (11 ms)\n[ RUN ] BrokerProcess.OpenComplexFlagsWithClientCheck\n[ OK ] BrokerProcess.OpenComplexFlagsWithClientCheck (17 ms)\n[119/148] BrokerProcess.OpenComplexFlagsWithClientCheck (17 ms)\n[ RUN ] BrokerProcess.OpenComplexFlagsNoClientCheck\n[ OK ] BrokerProcess.OpenComplexFlagsNoClientCheck (40 ms)\n[120/148] BrokerProcess.OpenComplexFlagsNoClientCheck (40 ms)\n[ RUN ] BrokerProcess.BrokerDiesOnClosedChannel\n[ OK ] BrokerProcess.BrokerDiesOnClosedChannel (21 ms)\n[121/148] BrokerProcess.BrokerDiesOnClosedChannel (21 ms)\n[ RUN ] BrokerProcess.CreateFile\n[ OK ] BrokerProcess.CreateFile (16 ms)\n[122/148] BrokerProcess.CreateFile (16 ms)\n[ RUN ] BrokerProcess.StatFileClient\n[ OK ] BrokerProcess.StatFileClient (149 ms)\n[123/148] BrokerProcess.StatFileClient (149 ms)\n[ RUN ] BrokerProcess.StatFileHost\n[ OK ] BrokerProcess.StatFileHost (134 ms)\n[124/148] BrokerProcess.StatFileHost (134 ms)\n[ RUN ] BrokerProcess.RenameFileClient\n[ OK ] BrokerProcess.RenameFileClient (56 ms)\n[125/148] BrokerProcess.RenameFileClient (56 ms)\n[ RUN ] BrokerProcess.RenameFileHost\n[ OK ] BrokerProcess.RenameFileHost (58 ms)\n[126/148] BrokerProcess.RenameFileHost (58 ms)\n[ RUN ] BrokerProcess.ReadlinkFileClient\n[ OK ] BrokerProcess.ReadlinkFileClient (59 ms)\n[127/148] BrokerProcess.ReadlinkFileClient (59 ms)\n[ RUN ] BrokerProcess.ReadlinkFileHost\n[ OK ] BrokerProcess.ReadlinkFileHost (60 ms)\n[128/148] BrokerProcess.ReadlinkFileHost (60 ms)\n[ RUN ] BrokerProcess.MkdirClient\n[ OK ] BrokerProcess.MkdirClient (133 ms)\n[129/148] BrokerProcess.MkdirClient (133 ms)\n[ RUN ] BrokerProcess.MkdirHost\n[ OK ] BrokerProcess.MkdirHost (138 ms)\n[130/148] BrokerProcess.MkdirHost (138 ms)\n[ RUN ] BrokerProcess.RmdirClient\n[ OK ] BrokerProcess.RmdirClient (104 ms)\n[131/148] BrokerProcess.RmdirClient (104 ms)\n[ RUN ] BrokerProcess.RmdirHost\n[ OK ] BrokerProcess.RmdirHost (91 ms)\n[132/148] BrokerProcess.RmdirHost (91 ms)\n[ RUN ] BrokerProcess.UnlinkClient\n[ OK ] BrokerProcess.UnlinkClient (90 ms)\n[133/148] BrokerProcess.UnlinkClient (90 ms)\n[ RUN ] BrokerProcess.UnlinkHost\n[ OK ] BrokerProcess.UnlinkHost (98 ms)\n[134/148] BrokerProcess.UnlinkHost (98 ms)\n[ RUN ] BrokerProcess.IsSyscallAllowed\n[ OK ] BrokerProcess.IsSyscallAllowed (1 ms)\n[135/148] BrokerProcess.IsSyscallAllowed (1 ms)\n[ RUN ] BrokerSimpleMessage.AddData\n[ OK ] BrokerSimpleMessage.AddData (0 ms)\n[136/148] BrokerSimpleMessage.AddData (0 ms)\n[ RUN ] BrokerSimpleMessage.SendAndRecvMsg\n[ OK ] BrokerSimpleMessage.SendAndRecvMsg (8 ms)\n[137/148] BrokerSimpleMessage.SendAndRecvMsg (8 ms)\n[ RUN ] BrokerSimpleMessage.SendRecvMsgSynchronous\n[ OK ] BrokerSimpleMessage.SendRecvMsgSynchronous (2 ms)\n[138/148] BrokerSimpleMessage.SendRecvMsgSynchronous (2 ms)\n[ RUN ] SandboxBPF.Tsync\n[ OK ] SandboxBPF.Tsync (29 ms)\n[139/148] SandboxBPF.Tsync (29 ms)\n[ RUN ] SandboxBPF.StartMultiThreadedAsSingleThreaded\n[ OK ] SandboxBPF.StartMultiThreadedAsSingleThreaded (2112 ms)\n[140/148] SandboxBPF.StartMultiThreadedAsSingleThreaded (2112 ms)\n[ RUN ] SandboxBPF.CreateDestroy\n[ OK ] SandboxBPF.CreateDestroy (0 ms)\n[141/148] SandboxBPF.CreateDestroy (0 ms)\n[ RUN ] SandboxBPF.ProcTaskFdDescriptorGetsClosed\n[ OK ] SandboxBPF.ProcTaskFdDescriptorGetsClosed (1 ms)\n[142/148] SandboxBPF.ProcTaskFdDescriptorGetsClosed (1 ms)\n[ RUN ] BPFTest.BPFTesterCompatibilityDelegateLeakTest\n[ OK ] BPFTest.BPFTesterCompatibilityDelegateLeakTest (0 ms)\n[143/148] BPFTest.BPFTesterCompatibilityDelegateLeakTest (0 ms)\n[ RUN ] Syscall.InvalidCallReturnsENOSYS\n[ OK ] Syscall.InvalidCallReturnsENOSYS (0 ms)\n[144/148] Syscall.InvalidCallReturnsENOSYS (0 ms)\n[ RUN ] Syscall.WellKnownEntryPoint\n[ OK ] Syscall.WellKnownEntryPoint (0 ms)\n[145/148] Syscall.WellKnownEntryPoint (0 ms)\n[ RUN ] Syscall.TrivialSyscallNoArgs\n[ OK ] Syscall.TrivialSyscallNoArgs (1 ms)\n[146/148] Syscall.TrivialSyscallNoArgs (1 ms)\n[ RUN ] Syscall.TrivialSyscallOneArg\n[ OK ] Syscall.TrivialSyscallOneArg (0 ms)\n[147/148] Syscall.TrivialSyscallOneArg (0 ms)\n[ RUN ] Syscall.TrivialFailingSyscall\n[ OK ] Syscall.TrivialFailingSyscall (0 ms)\n[148/148] Syscall.TrivialFailingSyscall (0 ms)\nSUCCESS: all tests passed.\nTests took 2 seconds.\n", "outputs_ref": { "isolated": "a3633e0cb74b299f907511802cfb8d58aeea9def", "isolatedserver": "https://isolateserver.appspot.com", "namespace": "default-gzip" }, "run_id": "43ab44ccfe82e711", "server_versions": [ "4201-b04f7f8" ], "started_ts": "2019-03-18T20:17:02.893842", "state": "COMPLETED", "tags": [ "build_is_experimental:false", "buildername:Linux TSan Tests", "buildnumber:35729", "cpu:x86-64", "data:0a7a89120e8f843912feb553d0215825c9fadd06", "gpu:none", "master:chromium.memory", "name:sandbox_linux_unittests", "os:Ubuntu-14.04", "pool:Chrome", "priority:25", "project:chromium", "purpose:CI", "purpose:luci", "purpose:post-commit", "service_account:none", "slavename:swarm323-c4", "spec_name:chromium.ci:Linux TSan Tests", "stepname:sandbox_linux_unittests", "swarming.pool.template:none", "swarming.pool.version:301b8e63a30efe760c5077d38a79f758c770c9ac", "user:None" ], "task_id": "43af59869e5d2f10" } ] }