So the issue lies within the _read_twice() in test-kernel-security.py
script.

The first attempt to cat /proc/self/stack will return 0, as it's reading the 
file as root.
The second attempt will failed with "permission denied" as we're not allowing 
regular user to access that file anymore.

But the code in _read_twice() is still expecting it to return a zeroed-out 
content, like:
$ cat /proc/self/stack 
[<0000000000000000>] save_stack_trace_tsk+0x22/0x40
[<0000000000000000>] proc_pid_stack+0xac/0x100
[<0000000000000000>] proc_single_show+0x55/0x90
[<0000000000000000>] seq_read+0xf2/0x3d0
[<0000000000000000>] __vfs_read+0x1b/0x40
[<0000000000000000>] vfs_read+0x86/0x130
[<0000000000000000>] SyS_read+0x55/0xc0
[<0000000000000000>] entry_SYSCALL_64_fastpath+0x22/0xc1
[<0000000000000000>] 0xffffffffffffffff


Thus for 4.4 kernel, we can expect two different behaviour, one is the 
zeroed-out kernel address, another is the permission denied error.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1802069

Title:
  test_095_kernel_symbols_missing_proc_self_stack failed with Xenial
  kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to