So the issue lies within the _read_twice() in test-kernel-security.py script.
The first attempt to cat /proc/self/stack will return 0, as it's reading the file as root. The second attempt will failed with "permission denied" as we're not allowing regular user to access that file anymore. But the code in _read_twice() is still expecting it to return a zeroed-out content, like: $ cat /proc/self/stack [<0000000000000000>] save_stack_trace_tsk+0x22/0x40 [<0000000000000000>] proc_pid_stack+0xac/0x100 [<0000000000000000>] proc_single_show+0x55/0x90 [<0000000000000000>] seq_read+0xf2/0x3d0 [<0000000000000000>] __vfs_read+0x1b/0x40 [<0000000000000000>] vfs_read+0x86/0x130 [<0000000000000000>] SyS_read+0x55/0xc0 [<0000000000000000>] entry_SYSCALL_64_fastpath+0x22/0xc1 [<0000000000000000>] 0xffffffffffffffff Thus for 4.4 kernel, we can expect two different behaviour, one is the zeroed-out kernel address, another is the permission denied error. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1802069 Title: test_095_kernel_symbols_missing_proc_self_stack failed with Xenial kernel To manage notifications about this bug go to: https://bugs.launchpad.net/qa-regression-testing/+bug/1802069/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs