** Description changed:

- The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security
- regression test due to kernel config options. The following tests are
- failing:
+ [SRU Justification]
  
- KernelSecurityConfigTest.test_010_kaslr_config                                
                                                                                
                                             
- KernelSecurityConfigTest.test_100_config_security_tomoyo                      
                                                                                
                                             
- KernelSecurityConfigTest.test_230_config_security_ipsec                       
                                                                                
                                             
- KernelSecurityConfigTest.test_240_SLAB_freelist_randomization                 
                                                                                
                                             
- KernelSecurityConfigTest.test_290_config_hardened_usercopy                    
                                                                                
                                             
- KernelSecurityConfigTest.test_300_config_kernel_fortify                       
                                                                                
                                             
- KernelSecurityConfigTest.test_310_config_security_perf_events_restrict        
                                                                                
                                             
- KernelSecurityConfigTest.test_320_config_arm_pan                              
                                                                                
                                             
- KernelSecurityConfigTest.test_330_config_debug_wx                             
                                                                                
                                             
- KernelSecurityConfigTest.test_360_config_security_yama                        
                                                                                
                                             
- KernelSecurityConfigTest.test_380_config_sched_stack_end_check                
                                                                                
                                             
- KernelSecurityConfigTest.test_410_config_lock_down_kernel                     
                                                                                
                                             
- KernelSecurityConfigTest.test_420_config_page_poisoning                       
                                                                                
                                             
- KernelSecurityConfigTest.test_421_config_page_poisoning_no_sanity             
                                                                                
                                             
- KernelSecurityConfigTest.test_421_config_page_poisoning_zero                  
                                                                                
                                             
- KernelSecurityConfigTest.test_430_config_module_sign                          
                                                                                
                                             
- KernelSecurityConfigTest.test_440_config_module_sign_all
+ [Impact]
+ 
+ The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression 
test due to kernel config options. The kernel configs were changed to 
+ match the Xilinx provided kernel configs which resulted in these configs 
being disabled.
+ 
+ [Fix]
+ 
+ Enable the following configs:
+ PAGE_POISONING_ZERO                                                           
                                                                                
                                             
+ PAGE_POISONING_NO_SANITY                                                      
                                                                                
                                             
+ PAGE_POISONING                                                                
                                                                                
                                             
+ SECURITY_LOCKDOWN_LSM                                                         
                                                                                
                                             
+ SCHED_STACK_END_CHECK                                                         
                                                                                
                                             
+ SECURITY_YAMA                                                                 
                                                                                
                                             
+ DEBUG_WX                                                                      
                                                                                
                                             
+ CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
+ CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
+ FORTIFY_SOURCE                                                                
                                                                                
                                             
+ HARDENED_USERCOPY                                                             
                                                                                
                                             
+ SLAB_FREELIST_RANDOM                                                          
                                                                                
                                             
+ IP_ADVANCED_ROUTER                                                            
                                                                                
                                             
+ SECURITY_TOMOYO                                                               
                                                                                
                                             
+ RANDOMIZE_BASE      
+ 
+ [Testcase]
+ 
+ ubuntu_qrt_kernel caught this isuse and will continue to test whether
+ these configs are enabled.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-xilinx-zynqmp in Ubuntu.
https://bugs.launchpad.net/bugs/1995465

Title:
  linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security.

Status in linux-xilinx-zynqmp package in Ubuntu:
  New

Bug description:
  [SRU Justification]

  [Impact]

  The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression 
test due to kernel config options. The kernel configs were changed to 
  match the Xilinx provided kernel configs which resulted in these configs 
being disabled.

  [Fix]

  Enable the following configs:
  PAGE_POISONING_ZERO                                                           
                                                                                
                                             
  PAGE_POISONING_NO_SANITY                                                      
                                                                                
                                             
  PAGE_POISONING                                                                
                                                                                
                                             
  SECURITY_LOCKDOWN_LSM                                                         
                                                                                
                                             
  SCHED_STACK_END_CHECK                                                         
                                                                                
                                             
  SECURITY_YAMA                                                                 
                                                                                
                                             
  DEBUG_WX                                                                      
                                                                                
                                             
  CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
  CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
  FORTIFY_SOURCE                                                                
                                                                                
                                             
  HARDENED_USERCOPY                                                             
                                                                                
                                             
  SLAB_FREELIST_RANDOM                                                          
                                                                                
                                             
  IP_ADVANCED_ROUTER                                                            
                                                                                
                                             
  SECURITY_TOMOYO                                                               
                                                                                
                                             
  RANDOMIZE_BASE      

  [Testcase]

  ubuntu_qrt_kernel caught this isuse and will continue to test whether
  these configs are enabled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/+bug/1995465/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to