test_095_kernel_symbols_missing_proc_modules failed with 4.4 KVM

Bug #1769054 reported by Po-Hsu Lin
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
QA Regression Testing
Fix Released
Undecided
Unassigned
linux (Ubuntu)
Invalid
Undecided
Unassigned
Declined for Xenial by Steve Beattie
linux-kvm (Ubuntu)
Invalid
Undecided
Unassigned
Declined for Xenial by Steve Beattie

Bug Description

Similar to bug 1764980, but this is failing on 4.4 KVM kernel.
And despite the KALLSYMS was not enabled, the module output is not the expected zero.

  FAIL: test_095_kernel_symbols_missing_proc_modules (__main__.KernelSecurityTest)
  kernel addresses in /proc/modules are zeroed out
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1652, in test_095_kernel_symbols_missing_proc_modules
      self._check_pK_files(self._095_kernel_symbols_missing_proc_modules, expected=expected)
    File "./test-kernel-security.py", line 1526, in _check_pK_files
      test_function(expected_restricted)
    File "./test-kernel-security.py", line 1559, in _095_kernel_symbols_missing_proc_modules
      expected)
    File "./test-kernel-security.py", line 1451, in _read_twice
      self.assertEqual(0, int(address, 16), "%s: root saw %s - contents:\n%s" % (filename, address, root))
  AssertionError: /proc/modules: root saw 0xffffffffc0118000 - contents:
  fuse 73728 3 - Live 0xffffffffc0220000
  kvm_intel 143360 0 - Live 0xffffffffc01fc000
  btrfs 741376 0 - Live 0xffffffffc0146000
  xor 20480 1 btrfs, Live 0xffffffffc013d000
  lzo_compress 12288 1 btrfs, Live 0xffffffffc0139000
  raid6_pq 98304 1 btrfs, Live 0xffffffffc011e000
  pata_acpi 12288 0 - Live 0xffffffffc0118000

The KALLSYMS config was not enabled in 4.4 kvm kernel:
ubuntu@zeppo:~$ grep KALLSYMS /boot/config-4.4.0-1022-kvm
# CONFIG_KALLSYMS is not set
ubuntu@zeppo:~$

ubuntu@zeppo:~$ sudo cat /proc/modules
fuse 73728 3 - Live 0xffffffffc0220000
kvm_intel 143360 0 - Live 0xffffffffc01fc000
btrfs 741376 0 - Live 0xffffffffc0146000
xor 20480 1 btrfs, Live 0xffffffffc013d000
lzo_compress 12288 1 btrfs, Live 0xffffffffc0139000
raid6_pq 98304 1 btrfs, Live 0xffffffffc011e000
pata_acpi 12288 0 - Live 0xffffffffc0118000
ubuntu@zeppo:~$ cat /proc/version_signature
Ubuntu 4.4.0-1022.27-kvm 4.4.128

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: linux-image-4.4.0-1022-kvm 4.4.0-1022.27
ProcVersionSignature: User Name 4.4.0-1022.27-kvm 4.4.128
Uname: Linux 4.4.0-1022-kvm x86_64
ApportVersion: 2.20.1-0ubuntu2.16
Architecture: amd64
Date: Fri May 4 06:22:06 2018
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=<set>
 LANG=en_US.UTF-8
 SHELL=/bin/bash
SourcePackage: linux-kvm
UpgradeStatus: No upgrade log present (probably fresh install)

Revision history for this message
Po-Hsu Lin (cypressyew) wrote :
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 1769054

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
Steve Beattie (sbeattie) wrote :

I suspected this would be the case. I've now fixed up qrt in https://git.launchpad.net/qa-regression-testing/commit/?id=6bf3376a06c5828ad63eb350ca8e037c7a5e5a6b .

Thanks!

Changed in linux (Ubuntu):
status: Incomplete → Invalid
Changed in linux-kvm (Ubuntu):
status: New → Invalid
Changed in qa-regression-testing:
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.