Closing this bug with Won't fix as Hardy is no longer supported. Please feel free to open a new bug report if you're still experiencing this on a newer release (Bionic 18.04.3 / Disco 19.04) Thanks!
** Changed in: linux (Ubuntu) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/718839 Title: QA Regression test kernel-security reports two failures on 2.6.24-28.84 Xen Status in linux package in Ubuntu: Won't Fix Bug description: Build helper tools ... (8.04) ok /proc/$pid/maps is correctly protected ... ok ASLR enabled ... (skipped: boolean on Hardy and earlier) ok ASLR of stack ... ok ASLR of libs ... ok ASLR of mmap ... ok ASLR of text ... ok ASLR of vdso ... ok ASLR of brk ... (skipped: only Intrepid and later) ok Low memory allocation respects mmap_min_addr ... ok AppArmor loaded ... ok PR_SET_SECCOMP works ... ok /dev/kmem not available ... ok SYN cookies is enabled ... (skipped: only Jaunty and later) ok init's CAPABILITY list is clean ... ok init missing READ_IMPLIES_EXEC ... (heap check) ok NX bit is working ... ok Userspace stack guard page exists (CVE-2010-2240) ... ok CONFIG_COMPAT_BRK disabled ... ok CONFIG_DEVKMEM disabled ... ok CONFIG_SECURITY enabled ... ok CONFIG_SECURITY_SELINUX enabled ... ok CONFIG_SYN_COOKIES enabled ... ok CONFIG_SECCOMP enabled ... ok CONFIG_COMPAT_VDSO disabled ... ok CONFIG_DEBUG_RODATA enabled ... FAIL CONFIG_DEBUG_SET_MODULE_RONX enabled ... (skipped: only Natty and later) ok CONFIG_SECURITY_APPARMOR enabled ... ok CONFIG_STRICT_DEVMEM enabled ... ok /dev/mem unreadable for kernel memory ... FAIL CONFIG_SECURITY_FILE_CAPABILITIES enabled ... (skipped: only Intrepid through Lucid) ok CONFIG_SECURITY_SMACK enabled ... (skipped: only Intrepid and later) ok CONFIG_DEFAULT_MMAP_MIN_ADDR ... (SECURITY_DEFAULT_MMAP_MIN_ADDR) (skipped: only Jaunty and later) ok CONFIG_CC_STACKPROTECTOR set ... ok Kernel stack guard ... (skipped: only Karmic and later) ok Sysctl to disable module loading exists ... (skipped: only Karmic and later) ok Symlinks not followable across differing uids in sticky directories ... (skipped: only Maverick and later) ok Hardlink disallowed for unreadable/unwritable sources ... (skipped: only Maverick and later) ok PTRACE allowed only on children or declared processes ... (skipped: only Maverick and later) ok Make sure rare network modules do not autoload ... (skipped: only Natty and later) ok Make sure kernel addresses in kallsyms and modules are zeroed out ... (skipped: only Natty and later) ok Make sure kernel addresses in /boot/ are not world readable ... (skipped: only Natty and later) ok ====================================================================== FAIL: CONFIG_DEBUG_RODATA enabled ---------------------------------------------------------------------- Traceback (most recent call last): File "./test-kernel-security.py", line 518, in test_72_config_debug_rodata self.assertEqual(self._test_config('DEBUG_RODATA'), expected) AssertionError: False != True ====================================================================== FAIL: /dev/mem unreadable for kernel memory ---------------------------------------------------------------------- Traceback (most recent call last): File "./test-kernel-security.py", line 585, in test_72_strict_devmem self.assertShellExitEquals(expected, ['./readmem']) File "/home/ubuntu/qrt-test-kernel/testlib.py", line 648, in assertShellExitEquals self.assertEquals(expected, rc, msg + result + report) AssertionError: Got exit code 4, expected 0 Command: './readmem' Output: 0x1000 ... readable 0x2000 ... readable 0x4000 ... readable 0x8000 ... readable 0x10000 ... readable 0x20000 ... readable 0x40000 ... readable 0x80000 ... readable 0x100000 ... readable 0x200000 ... readable 0x400000 ... readable 0x800000 ... readable 0x1000000 ... readable 0x2000000 ... readable 0x4000000 ... readable 0x8000000 ... readable 0x10000000 ... readable 0x20000000 ... readable 0x40000000 ... readable 0x80000000 ... readable 0x100000000 ... readable 0x200000000 ... readable 0x400000000 ... readable 0x800000000 ... readable 0x1000000000 ... readable 0x2000000000 ... readable 0x4000000000 ... readable 0x8000000000 ... readable 0x10000000000 ... readable 0x20000000000 ... readable 0x40000000000 ... readable 0x80000000000 ... readable 0x100000000000 ... readable 0x200000000000 ... readable 0x400000000000 ... readable 0x800000000000 ... readable 0x1000000000000 ... missing, ran off end of physical memory FAIL: scanned memory, got successful reads, and no EPERMs ---------------------------------------------------------------------- Ran 42 tests in 5.262s FAILED (failures=2) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/718839/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp