Enable the following configs:
PAGE_POISONING_ZERO
PAGE_POISONING_NO_SANITY
PAGE_POISONING
SECURITY_LOCKDOWN_LSM
SCHED_STACK_END_CHECK
SECURITY_YAMA
DEBUG_WX
CONFIG_SECURITY_PERF_EVENTS_RESTRICT
CONFIG_SECURITY_PERF_EVENTS_RESTRICT
FORTIFY_SOURCE
HARDENED_USERCOPY
SLAB_FREELIST_RANDOM
IP_ADVANCED_ROUTER
SECURITY_TOMOYO

** Description changed:

  [SRU Justification]
  
  [Impact]
  
- The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression 
test due to kernel config options. The kernel configs were changed to 
+ The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression 
test due to kernel config options. The kernel configs were changed to
  match the Xilinx provided kernel configs which resulted in these configs 
being disabled.
  
  [Fix]
  
- Enable the following configs:
- PAGE_POISONING_ZERO                                                           
                                                                                
                                             
- PAGE_POISONING_NO_SANITY                                                      
                                                                                
                                             
- PAGE_POISONING                                                                
                                                                                
                                             
- SECURITY_LOCKDOWN_LSM                                                         
                                                                                
                                             
- SCHED_STACK_END_CHECK                                                         
                                                                                
                                             
- SECURITY_YAMA                                                                 
                                                                                
                                             
- DEBUG_WX                                                                      
                                                                                
                                             
- CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
- CONFIG_SECURITY_PERF_EVENTS_RESTRICT                                          
                                                                                
                                             
- FORTIFY_SOURCE                                                                
                                                                                
                                             
- HARDENED_USERCOPY                                                             
                                                                                
                                             
- SLAB_FREELIST_RANDOM                                                          
                                                                                
                                             
- IP_ADVANCED_ROUTER                                                            
                                                                                
                                             
- SECURITY_TOMOYO                                                               
                                                                                
                                             
- RANDOMIZE_BASE      
+ Enable all configs checked in ubuntu_qrt_kernel_security.
+ 
  
  [Testcase]
  
  ubuntu_qrt_kernel caught this isuse and will continue to test whether
  these configs are enabled.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-xilinx-zynqmp in Ubuntu.
https://bugs.launchpad.net/bugs/1995465

Title:
  linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security.

Status in linux-xilinx-zynqmp package in Ubuntu:
  New

Bug description:
  [SRU Justification]

  [Impact]

  The linux-xilinx-zynqmp/focal fails ubuntu_qrt_kernel_security regression 
test due to kernel config options. The kernel configs were changed to
  match the Xilinx provided kernel configs which resulted in these configs 
being disabled.

  [Fix]

  Enable all configs checked in ubuntu_qrt_kernel_security.

  
  [Testcase]

  ubuntu_qrt_kernel caught this isuse and will continue to test whether
  these configs are enabled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/+bug/1995465/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to