root@test-b1:~# uname -a
Linux test-b1 4.15.0-150-generic #155-Ubuntu SMP Sat Jul 3 13:37:31 UTC 2021 
x86_64 x86_64 x86_64 GNU/Linux

root@test-b1:~# grep -e ' ref_module' -e ' find_symbol' -e ' 
each_symbol_section$' -e ' __module_address' -e ' __module_text_address' 
/proc/kallsyms
ffffffff9d127720 t find_symbol_in_section
ffffffff9d128530 T each_symbol_section
ffffffff9d128590 T find_symbol
ffffffff9d128740 T ref_module
ffffffff9d129120 T __module_address
ffffffff9d129200 T __module_text_address

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1932065

Title:
  Upstream v5.9 introduced 'module' patches that removed exported
  symbols

Status in linux package in Ubuntu:
  New
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Fix Committed

Bug description:
  SRU Justification:

  [Impact]

  * The following patches removed an exported symbol that will cause
  potential disruption and breakage for customers

   modules: inherit TAINT_PROPRIETARY_MODULE
   modules: return licensing information from find_symbol
   modules: rename the licence field in struct symsearch to license
   modules: unexport __module_address
   modules: unexport __module_text_address
   modules: mark each_symbol_section static
   modules: mark find_symbol static
   modules: mark ref_module static

  [Fix]

  * Temporarily revert as SAUCE patches to allow customers time to make
  necessary changes to support eventual patch changes.

  [Test Plan]

  * Check symbols on running kernel
   sudo grep -e ' ref_module' -e ' find_symbol' -e ' each_symbol_section$' -e ' 
__module_address' -e ' __module_text_address' /proc/kallsyms

  * Check symbols on all installed kernels
   sudo grep -e ' ref_module' -e ' find_symbol' -e ' each_symbol_section$' -e ' 
__module_address' -e ' __module_text_address' /boot/System.map-*

  [Where problems could occur]

  * The new functionality provided by patches will be removed, since we
  aren't removing existing functionality the risk should be low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1932065/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to