Running test: './test-kernel.py' distro: 'Ubuntu 10.10' kernel: '2.6.35-903.27 (Ubuntu 2.6.35-903.27-omap4 2.6.35.3)' arch: 'armel' uid: 1000/1000 SUDO_USER: '') Build helper tools ... (gcc 4.4.5 (Ubuntu/Linaro 4.4.4-14ubuntu5)) ok syscall(666666) returns ENOSYS (LP: #339743) ... (skipped: only i386) ok Kernel correctly calls access_ok on compat_alloc_userspace (CVE-2010-3081) ... ok Kernel correctly filters compat syscalls (CVE-2010-3301) ... ok Make sure the stack guard page does not split the stack on mlock ... FAIL inotify does not leak descriptors (LP: #485556) ... ok memmove does not leak bytes (CVE-2010-0415) ... ok Kernel memory does not leak to userspace in signalstack (CVE-2009-2847) ... ok ====================================================================== FAIL: Make sure the stack guard page does not split the stack on mlock ---------------------------------------------------------------------- Traceback (most recent call last): File "./test-kernel.py", line 103, in test_guard_page_split self.assertShellExitEquals(expected, ["./split-stack"]) File "/home/ubuntu/qrt/qrt-test-kernel/testlib.py", line 923, in assertShellExitEquals self.assertEquals(expected, rc, msg + result + report) AssertionError: Got exit code 1, expected 0 Command: './split-stack' Output: gap exists in stack VMAs (0x7ea5c000 != 0x7ea5d000)! ---------------------------------------------------------------------- Ran 8 tests in 4.710s FAILED (failures=1)