** Description changed: - The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security - regression test due to kernel config options. The following tests are - failing: + [SRU Justification] - KernelSecurityConfigTest.test_010_kaslr_config - KernelSecurityConfigTest.test_100_config_security_tomoyo - KernelSecurityConfigTest.test_230_config_security_ipsec - KernelSecurityConfigTest.test_240_SLAB_freelist_randomization - KernelSecurityConfigTest.test_290_config_hardened_usercopy - KernelSecurityConfigTest.test_300_config_kernel_fortify - KernelSecurityConfigTest.test_310_config_security_perf_events_restrict - KernelSecurityConfigTest.test_320_config_arm_pan - KernelSecurityConfigTest.test_330_config_debug_wx - KernelSecurityConfigTest.test_360_config_security_yama - KernelSecurityConfigTest.test_380_config_sched_stack_end_check - KernelSecurityConfigTest.test_410_config_lock_down_kernel - KernelSecurityConfigTest.test_420_config_page_poisoning - KernelSecurityConfigTest.test_421_config_page_poisoning_no_sanity - KernelSecurityConfigTest.test_421_config_page_poisoning_zero - KernelSecurityConfigTest.test_430_config_module_sign - KernelSecurityConfigTest.test_440_config_module_sign_all + [Impact] + + The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression test due to kernel config options. The kernel configs were changed to + match the Xilinx provided kernel configs which resulted in these configs being disabled. + + [Fix] + + Enable the following configs: + PAGE_POISONING_ZERO + PAGE_POISONING_NO_SANITY + PAGE_POISONING + SECURITY_LOCKDOWN_LSM + SCHED_STACK_END_CHECK + SECURITY_YAMA + DEBUG_WX + CONFIG_SECURITY_PERF_EVENTS_RESTRICT + CONFIG_SECURITY_PERF_EVENTS_RESTRICT + FORTIFY_SOURCE + HARDENED_USERCOPY + SLAB_FREELIST_RANDOM + IP_ADVANCED_ROUTER + SECURITY_TOMOYO + RANDOMIZE_BASE + + [Testcase] + + ubuntu_qrt_kernel caught this isuse and will continue to test whether + these configs are enabled.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-xilinx-zynqmp in Ubuntu. https://bugs.launchpad.net/bugs/1995465 Title: linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security. Status in linux-xilinx-zynqmp package in Ubuntu: New Bug description: [SRU Justification] [Impact] The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression test due to kernel config options. The kernel configs were changed to match the Xilinx provided kernel configs which resulted in these configs being disabled. [Fix] Enable the following configs: PAGE_POISONING_ZERO PAGE_POISONING_NO_SANITY PAGE_POISONING SECURITY_LOCKDOWN_LSM SCHED_STACK_END_CHECK SECURITY_YAMA DEBUG_WX CONFIG_SECURITY_PERF_EVENTS_RESTRICT CONFIG_SECURITY_PERF_EVENTS_RESTRICT FORTIFY_SOURCE HARDENED_USERCOPY SLAB_FREELIST_RANDOM IP_ADVANCED_ROUTER SECURITY_TOMOYO RANDOMIZE_BASE [Testcase] ubuntu_qrt_kernel caught this isuse and will continue to test whether these configs are enabled. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/+bug/1995465/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp