环境: [root@localhost ~]# cat /etc/os-release NAME="Anolis OS" VERSION="23" ID="anolis" VERSION_ID="23" PLATFORM_ID="platform:an23" PRETTY_NAME="Anolis OS 23" ANSI_COLOR="0;31" HOME_URL="https://openanolis.cn/" BUG_REPORT_URL="https://bugzilla.openanolis.cn/" 执行过程: 测试用例执行失败tests/system_base/util-linux/tc_util_dmesg_warn_func_001.py,新增告警字段,执行dmesg -l warn -T | grep -Ev "^$|#" [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: IBPB-extending microcode not applied! [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. [Tue May 7 22:56:40 2024] amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled [Tue May 7 22:56:43 2024 device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [Tue May 7 22:56:53 2024] kauditd_printk_skb: 68 callbacks suppressed
请帮忙分析一下这些是否符合预期
(In reply to gitpush from comment #0) > 环境: > [root@localhost ~]# cat /etc/os-release > NAME="Anolis OS" > VERSION="23" > ID="anolis" > VERSION_ID="23" > PLATFORM_ID="platform:an23" > PRETTY_NAME="Anolis OS 23" > ANSI_COLOR="0;31" > HOME_URL="https://openanolis.cn/" > BUG_REPORT_URL="https://bugzilla.openanolis.cn/" > > 执行过程: > 测试用例执行失败tests/system_base/util-linux/tc_util_dmesg_warn_func_001. > py,新增告警字段,执行dmesg -l warn -T | grep -Ev "^$|#" > > [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: IBPB-extending > microcode not applied! > [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: WARNING: See > https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for > mitigation options. > [Tue May 7 22:56:40 2024] amd_pstate: the _CPC object is not present in > SBIOS or ACPI disabled AMD相关的问题请@ > [Tue May 7 22:56:43 2024 device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is > disabled. Duplicate IMA measurements will not be recorded in the IMA log. > [Tue May 7 22:56:53 2024] kauditd_printk_skb: 68 callbacks suppressed
(In reply to zhangjing from comment #2) > (In reply to gitpush from comment #0) > > 环境: > > [root@localhost ~]# cat /etc/os-release > > NAME="Anolis OS" > > VERSION="23" > > ID="anolis" > > VERSION_ID="23" > > PLATFORM_ID="platform:an23" > > PRETTY_NAME="Anolis OS 23" > > ANSI_COLOR="0;31" > > HOME_URL="https://openanolis.cn/" > > BUG_REPORT_URL="https://bugzilla.openanolis.cn/" > > > > 执行过程: > > 测试用例执行失败tests/system_base/util-linux/tc_util_dmesg_warn_func_001. > > py,新增告警字段,执行dmesg -l warn -T | grep -Ev "^$|#" > > > > [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: IBPB-extending > > microcode not applied! > > [Tue May 7 22:56:39 2024] Speculative Return Stack Overflow: WARNING: See > > https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for > > mitigation options. > > [Tue May 7 22:56:40 2024] amd_pstate: the _CPC object is not present in > > SBIOS or ACPI disabled > AMD相关的问题请 @贯君 看看 > > > [Tue May 7 22:56:43 2024 device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is > > disabled. Duplicate IMA measurements will not be recorded in the IMA log. 安全相关的麻烦 @熙羽 看看 > > [Tue May 7 22:56:53 2024] kauditd_printk_skb: 68 callbacks suppressed 网络相关的麻烦 @不达 看看
srso和amd pstate warning均为提示需要微码或bios支持。 1. srso mitigation方式有两种a. 纯软件 mitigation safeRET ,b. microcode。此处warning提示microcode不可用将采用纯软件mitigation; 2. amd pstate /cppc 需要bios透穿PCP,此处应该是测试机器bios不支持该功能
CONFIG_IMA_DISABLE_HTABLE 没有开启是符合预期的
已确定预期中事件,该问题关闭