On Thu, Jul 5, 2018 at 12:07 AM, pmkellly@xxxxxxxxxxxx <pmkellly@xxxxxxxxxxxx> wrote: > On 07/04/2018 10:18 AM, Alessio Ciregia wrote: >> >> Just for information. >> kernel-tests on F29 requires python3-fedora (and not python-fedora). >> >> In addition, running such tool on F29 (kernel >> 4.18.0-0.rc2.git4.1.fc29.x86_64) I get this vulnerability status: >> >> /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI >> /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable >> /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user >> pointer sanitization >> /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full >> generic retpoline >> >> Is this ok? >> >> Thanks, >> A. >> _______________________________________________ >> test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx >> To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx >> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html >> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines >> List Archives: >> https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/66L46ILNRBVPHGWP247Y3DVED7MFQHOE/ >> > > I also found the need to load python3-fedora in order to run kernel tests. I > also got messages about vulnerabilities, but I can't find any documents > explaining them. > > You may want to try running kernel tests with performance. I could not get > them to run (runtests.sh -t performance). I attached the errors I got when I > tried to run the kernel tests with performance. > > Have a Great Day! > > Pat (tablepc) > > _______________________________________________ > test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx > To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx > Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/CPR262EMFRT5XDKR25W6W5YDG7EVJTJ2/ > You can find vulnerability status in a kernel document[1]. Also, spec_store_bypass is described at redhat customer portal[2]. [1]: https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-devices-system-cpu [2]: https://access.redhat.com/security/vulnerabilities/ssbd cheers, -- /** * Masami Ichikawa * personal: masami256@xxxxxxxxx * fedora project: masami@xxxxxxxxxxxxxxxxx */ _______________________________________________ test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/test@xxxxxxxxxxxxxxxxxxxxxxx/message/4TU7RCHLDQT5CJUKVDMQ42IXO6BJYFVZ/