Re: kernel-tests on F29

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jul 5, 2018 at 12:07 AM, pmkellly@xxxxxxxxxxxx
<pmkellly@xxxxxxxxxxxx> wrote:
> On 07/04/2018 10:18 AM, Alessio Ciregia wrote:
>>
>> Just for information.
>> kernel-tests on F29 requires python3-fedora (and not python-fedora).
>>
>> In addition, running such tool on F29 (kernel
>> 4.18.0-0.rc2.git4.1.fc29.x86_64) I get this vulnerability status:
>>
>> /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
>> /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
>> /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
>> pointer sanitization
>> /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full
>> generic retpoline
>>
>> Is this ok?
>>
>> Thanks,
>> A.
>> _______________________________________________
>> test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx
>> To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx
>> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/66L46ILNRBVPHGWP247Y3DVED7MFQHOE/
>>
>
> I also found the need to load python3-fedora in order to run kernel tests. I
> also got messages about vulnerabilities, but I can't find any documents
> explaining them.
>
> You may want to try running kernel tests with performance. I could not get
> them to run (runtests.sh -t performance). I attached the errors I got when I
> tried to run the kernel tests with performance.
>
>         Have a Great Day!
>
>         Pat (tablepc)
>
> _______________________________________________
> test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx
> To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/CPR262EMFRT5XDKR25W6W5YDG7EVJTJ2/
>


You can find vulnerability status in  a kernel document[1].
Also, spec_store_bypass is described at redhat customer portal[2].

[1]: https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-devices-system-cpu
[2]: https://access.redhat.com/security/vulnerabilities/ssbd

cheers,

-- 
/**
* Masami Ichikawa
* personal: masami256@xxxxxxxxx
* fedora project: masami@xxxxxxxxxxxxxxxxx
*/
_______________________________________________
test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/4TU7RCHLDQT5CJUKVDMQ42IXO6BJYFVZ/




[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux