Starting lpci, version 0.2.8 Logging execution to '/home/buildd/.local/state/lpci/log/lpci-20240503-002622.667844.log' Launching environment for bionic/amd64 Starting instance Running ['apt', 'update'] :: :: WARNING: apt does not have a stable CLI interface. Use with caution in scripts. :: :: Hit:1 http://archive.ubuntu.com/ubuntu bionic InRelease :: Hit:2 http://archive.ubuntu.com/ubuntu bionic-updates InRelease :: Hit:3 http://archive.ubuntu.com/ubuntu bionic-backports InRelease :: Hit:4 http://security.ubuntu.com/ubuntu bionic-security InRelease :: Reading package lists... :: Building dependency tree... :: Reading state information... :: All packages are up to date. Installing system packages Running ['apt', 'install', '-y', 'sudo'] :: :: WARNING: apt does not have a stable CLI interface. Use with caution in scripts. :: :: Reading package lists... :: Building dependency tree... :: Reading state information... :: sudo is already the newest version (1.8.21p2-3ubuntu1.6). :: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Running command for the job... Running ['bash', '--noprofile', '--norc', '-ec', 'DEBIAN_FRONTEND=noninteractive apt upgrade --assume-yes\n'] :: :: WARNING: apt does not have a stable CLI interface. Use with caution in scripts. :: :: Reading package lists... :: Building dependency tree... :: Reading state information... :: Calculating upgrade... :: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Running command for the job... Running ['bash', '--noprofile', '--norc', '-ec', './lpcraft-runner glibc-security\n'] :: Copying: test-glibc-security.py :: Copying: testlib.py :: Copying: install-packages :: Copying: packages-helper :: Copying: glibc-security :: :: Test files: /tmp/qrt-test-glibc-security.tar.gz :: :: To run, copy the tarball somewhere, then do: :: $ tar -zxf qrt-test-glibc-security.tar.gz :: $ cd ./qrt-test-glibc-security :: $ sudo ./install-packages test-glibc-security.py :: $ ./test-glibc-security.py -v :: Reading package lists... :: Building dependency tree... :: Reading state information... :: The following additional packages will be installed: :: python3-ptyprocess :: Suggested packages: :: python-pexpect-doc :: The following NEW packages will be installed: :: python3-pexpect python3-ptyprocess :: 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. :: Need to get 55.1 kB of archives. :: After this operation, 244 kB of additional disk space will be used. :: Get:1 http://archive.ubuntu.com/ubuntu bionic/main amd64 python3-ptyprocess all 0.5.2-1 [12.7 kB] :: Get:2 http://archive.ubuntu.com/ubuntu bionic/main amd64 python3-pexpect all 4.2.1-1 [42.4 kB] :: Fetched 55.1 kB in 0s (2207 kB/s) :: Selecting previously unselected package python3-ptyprocess. :: (Reading database ... 18459 files and directories currently installed.) :: Preparing to unpack .../python3-ptyprocess_0.5.2-1_all.deb ... :: Unpacking python3-ptyprocess (0.5.2-1) ... :: Selecting previously unselected package python3-pexpect. :: Preparing to unpack .../python3-pexpect_4.2.1-1_all.deb ... :: Unpacking python3-pexpect (4.2.1-1) ... :: Setting up python3-ptyprocess (0.5.2-1) ... :: Setting up python3-pexpect (4.2.1-1) ... :: Requiring 'lsb-release' ... :: Requiring 'build-essential' ... :: Requiring 'python3-pexpect' ... :: test_00_make (__main__.GlibcSecurityTest) :: Build helper tools ... Running test: './test-glibc-security.py' distro: 'Ubuntu 18.04' kernel: '5.4.0-177.197 (Ubuntu 5.4.0-177.197-generic 5.4.268)' arch: 'amd64' init: 'systemd' uid: 0/0 SUDO_USER: 'ubuntu') :: (gcc 7.5.0 (Ubuntu 7.5.0-3ubuntu1~18.04)) ok :: test_11_heap_protector (__main__.GlibcSecurityTest) :: glibc heap protection ... ok :: test_11_sprintf_unmangled (__main__.GlibcSecurityTest) :: sprintf not pre-truncated with -D_FORTIFY_SOURCE=2 ... ok :: test_12_glibc_pointer_obfuscation (__main__.GlibcSecurityTest) :: glibc pointer obfuscation ... ok :: test_13_select_overflow (__main__.GlibcSecurityTest) :: select macros detect overflow with -D_FORTIFY_SOURCE=2 ... ok :: test_41_passwd_hashes (__main__.GlibcSecurityTest) :: Password hashes ... (sha512) ok :: test_42_passwd_hash_alg_pam (__main__.GlibcSecurityTest) :: test the default hash algorithm configured in pam ... (sha512) ok :: test_70_env_okay_non_setuid (__main__.GlibcSecurityTest) :: Ensure environment vars passed through to non-setuid progs ... ok :: test_71_env_filtered_setuid (__main__.GlibcSecurityTest) :: Ensure environment vars filtered for setuid progs ... ok :: test_72_envs_okay_for_setuis (__main__.GlibcSecurityTest) :: Ensure we didn't break misc env vars for setuid progs ... ok :: test_80_stack_guard_exists (__main__.GlibcSecurityTest) :: Stack guard exists ... ok :: test_81_stack_guard_leads_zero (__main__.GlibcSecurityTest) :: Stack guard leads with zero byte ... ok :: test_82_stack_guard_randomized (__main__.GlibcSecurityTest) :: Stack guard is randomized ... ok :: test_90_abort_msg (__main__.GlibcSecurityTest) :: Retains assert()/*_chk() message ... (/lib/x86_64-linux-gnu/libc.so.6) ok :: :: ---------------------------------------------------------------------- :: Ran 14 tests in 1.694s :: :: OK