[Bug 1802069] Re: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel
** Changed in: ubuntu-kernel-tests Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802069] Re: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel
** Changed in: linux-lts-xenial (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802069] Re: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel
I've now adjusted the test take the backported commit into account for 4.4 kernels and going forward for 4.19+ kernels in https://git.launchpad.net/qa-regression- testing/commit/?id=0a556d8677d0acd429becc4f49b5a9c59ff27135 . Thanks!. ** Changed in: qa-regression-testing Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802069] Re: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel
Yep, thanks, I'll take a look at fixing that today. ** Changed in: qa-regression-testing Status: New => Triaged ** Changed in: qa-regression-testing Assignee: (unassigned) => Steve Beattie (sbeattie) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1802069] Re: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel
So the issue lies within the _read_twice() in test-kernel-security.py script. The first attempt to cat /proc/self/stack will return 0, as it's reading the file as root. The second attempt will failed with "permission denied" as we're not allowing regular user to access that file anymore. But the code in _read_twice() is still expecting it to return a zeroed-out content, like: $ cat /proc/self/stack [<>] save_stack_trace_tsk+0x22/0x40 [<>] proc_pid_stack+0xac/0x100 [<>] proc_single_show+0x55/0x90 [<>] seq_read+0xf2/0x3d0 [<>] __vfs_read+0x1b/0x40 [<>] vfs_read+0x86/0x130 [<>] SyS_read+0x55/0xc0 [<>] entry_SYSCALL_64_fastpath+0x22/0xc1 [<>] 0x Thus for 4.4 kernel, we can expect two different behaviour, one is the zeroed-out kernel address, another is the permission denied error. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs