Latest revision |
Your text |
Line 25: |
Line 25: |
|
| |
|
| * A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!) | | * A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!) |
| * The 5.6 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1495062 F31 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems. | | * The 5.6 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1491815 F31 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems. |
| * As this is the Fedora 32 shipping kernel, you can also test with any of the [https://www.happyassassin.net/nightlies.html Fedora 32 nightlies] | | * As this is the Fedora 32 shipping kernel, you can also test with any of the [https://www.happyassassin.net/nightlies.html Fedora 32 nightlies] |
| * Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package> | | * Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package> |
Line 90: |
Line 90: |
| |nasirhm | | |nasirhm |
| |KVM on X1 Carbon | | |KVM on X1 Carbon |
| |{{result|fail}} Default test suite : paxtest Failed | | |{{result|fail}}<ref> paxtest Failed </ref> |
| | | | | |
| |-
| |
| |-
| |
| |nasirhm
| |
| |KVM on X1 Carbon
| |
| |{{result|pass}} Performance test suite
| |
| |
| |
| |-
| |
| |}
| |
|
| |
| === Regression Test ===
| |
| {| class="wikitable" width=100%
| |
| ! User
| |
| ! Profile
| |
| ! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
| |
| ! References
| |
| |-
| |
| | [[User:JoeHannes|JoeHannes]]
| |
| | Asus N82JQ
| |
| | {{result|fail}}<ref>Date: Tue 14 Apr 2020 01:01:46 PM EDT
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: ./default/sysfs-perms</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:Mac tester|Mac tester]]
| |
| | Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U
| |
| | {{result|fail}}<ref>Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
| |
| Performance: terminal session is killed during the test.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:Smyleon|Smyleon]]
| |
| | Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600
| |
| | {{result|warn}}<ref>1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
| |
|
| |
| 2. Performance: PASS.
| |
|
| |
| Vulnerability status:
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Dell XPS 13 9360, Intel i7-7500U
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Raspberry Pi 3 aarch64 (Fedora-IoT)
| |
| | {{result|pass}}<ref>5.6.3-300.fc32.aarch64 </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Toshiba Portege R930-1H9, Intel i5-3340M
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:amado86|amado86]]
| |
| | Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
| |
| | {{result|fail}}<ref>1. ./default/timer-overhead FAIL
| |
| Unacceptable long delay; asked for 2000 usec, got 6136 usec
| |
| Test failure.
| |
|
| |
| Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:amado86|amado86]]
| |
| | Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
| |
| | {{result|fail}}<ref>Standard tests = FAIL
| |
| ./default/timer-overhead FAIL
| |
|
| |
| Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
| |
|
| |
|
| |
| Performance tests = PASS.
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:anonymous|anonymous]]
| |
| | Acer Aspire A315-42
| |
| | {{result|fail}}<ref>1. kernel-test-1586714524.log.txt
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/cachedrop FAIL
| |
| ./default/paxtest FAIL
| |
|
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:anonymous|anonymous]]
| |
| | Lenovo ThinkPad W530
| |
| | {{result|fail}}<ref>Date: Mon 13 Apr 2020 11:03:24 AM EDT
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: None
| |
| ============================================================
| |
| Starting test ./default/sysfs-perms
| |
| Starting test ./default/libhugetlbfs
| |
| Starting test ./default/modsign
| |
| Successfully loaded signed module
| |
| insmod: ERROR: could not insert module ./minix.ko: Operation not permitted
| |
| Unsigned module load failed in enforcing mode
| |
| Starting test ./default/selinux-dac-controls
| |
| <no matches>
| |
| Starting test ./default/cachedrop
| |
| 100+0 records in
| |
| 100+0 records out
| |
| 104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s
| |
| cat: /proc/sys/vm/drop_caches: Permission denied
| |
| ./drop_caches.sh: line 32: [: -ne: unary operator expected
| |
| cat: /proc/sys/vm/drop_caches: Permission denied
| |
| ./drop_caches.sh: line 32: [: -ne: unary operator expected
| |
| 10+0 records in
| |
| 10+0 records out
| |
| 10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s
| |
| cat: /proc/sys/vm/drop_caches: Permission denied
| |
| ./drop_caches.sh: line 32: [: -ne: unary operator expected
| |
| TestPASS: /proc/sys/vm/drop_caches PASS
| |
| Starting test ./default/mq-memory-corruption
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Starting test ./default/timer-overhead
| |
| cc timer-test.o -o timer-test
| |
| Starting test ./default/posix_timers
| |
| Testing posix timers. False negative may happen on CPU execution
| |
| based timers if other threads run on the CPU...
| |
| Check itimer virtual... [OK]
| |
| Check itimer prof... [OK]
| |
| Check itimer real... [OK]
| |
| Check timer_create() per thread... [OK]
| |
| Check timer_create() per process... [OK]
| |
| Starting test ./default/stack-randomness
| |
| Starting test ./default/memfd
| |
| memfd_test.c: In function ‘mfd_assert_get_seals’:
| |
| memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
| |
| 67 | r = fcntl(fd, F_GET_SEALS);
| |
| | ^~~~~
| |
| memfd_test.c: In function ‘mfd_assert_open’:
| |
| memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
| |
| 190 | r = open(buf, flags, mode);
| |
| | ^~~~
| |
| | popen
| |
| memfd_test.c: In function ‘mfd_assert_write’:
| |
| memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
| |
| 315 | r = fallocate(fd,
| |
| | ^~~~~~~~~
| |
| | alloca
| |
| memfd: CREATE
| |
| memfd: BASIC
| |
| memfd: SEAL-WRITE
| |
| memfd: SEAL-SHRINK
| |
| memfd: SEAL-GROW
| |
| memfd: SEAL-RESIZE
| |
| memfd: SHARE-DUP
| |
| memfd: SHARE-MMAP
| |
| memfd: SHARE-OPEN
| |
| memfd: SHARE-FORK
| |
| memfd: SHARE-DUP (shared file-table)
| |
| memfd: SHARE-MMAP (shared file-table)
| |
| memfd: SHARE-OPEN (shared file-table)
| |
| memfd: SHARE-FORK (shared file-table)
| |
| memfd: DONE
| |
| Starting test ./default/paxtest
| |
| Executable heap (mprotect) : Vulnerable
| |
| Starting test ./default/insert_leap_second
| |
| Setting time to speed up testing
| |
| Running for 1 iterations. Press ctrl-c to stop
| |
|
| |
| Setting time to Mon Apr 13 19:59:50 2020
| |
| Scheduling leap second for Mon Apr 13 20:00:00 2020
| |
| Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS
| |
| Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS
| |
| Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS
| |
| Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS
| |
| Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS
| |
| Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS
| |
| Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP
| |
| Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP
| |
| Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT
| |
| Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT
| |
| Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT
| |
| Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT
| |
| Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT
| |
| Leap complete
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:anonymous|anonymous]]
| |
| | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| |
| | {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: ./default/sysfs-perms
| |
|
| |
|
| |
| Date: Tue 14 Apr 2020 11:26:16 PM CEST
| |
| Test set: performance
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: PASS
| |
| Failed Tests: None
| |
| Warned Tests: None
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:archmunky|archmunky]]
| |
| | installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
| |
| | {{result|pass}}<ref>default = PASS, performance = PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:archmunky|archmunky]]
| |
| | installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
| |
| | {{result|pass}}<ref>installed, no updates: default = PASS, performance = PASS;
| |
| installed, updated: default = PASS , performance = PASS
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:archmunky|archmunky]]
| |
| | liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon
| |
| | {{result|fail}}<ref>default = fail on cachedrop, paxtest;
| |
| performance = pass with getlist and getsummary permission denied errors</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:atim|atim]]
| |
| | CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64
| |
| | {{result|pass}}<ref>All tests passed and all OK.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:augenauf|augenauf]]
| |
| | F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s
| |
| | {{result|pass}}<ref>kernel: 5.6.2-301.fc32.x86_64</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:didiksupriadi41|didiksupriadi41]]
| |
| | liveusb on ASUS X550ZE
| |
| | {{result|pass}}<ref>Performance test suite</ref>{{result|fail}}<ref> Default test suite : paxtest Failed</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:drakkai|drakkai]]
| |
| | Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31
| |
| | {{result|pass}}<ref>default = PASS, performance = PASS
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:dvdantunes|dvdantunes]]
| |
| | kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB
| |
| | {{result|fail}}<ref>Test suite: default
| |
| Date: Sun 19 Apr 2020 02:44:30 AM EDT
| |
| Kernel version: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
|
| |
| Failed Tests:
| |
| ./default/cachedrop
| |
| ./default/paxtest
| |
|
| |
| Additional info:
| |
| Checking for kernel signature:
| |
| The signer's common name is Fedora Secure Boot Signer
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:evillagr|evillagr]]
| |
| | CPU: AMD FX(tm)-8320 Eight-Core Processor | RAM: 16GB
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:evillagr|evillagr]]
| |
| | KVM (host: AMD FX(tm)-8320 Eight-Core Processor | guest:AMD Opteron 63xx class CPU)
| |
| | {{result|fail}}<ref> libhugetlbfs SKIP, paxtest FAIL </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:fubuki|fubuki]]
| |
| | bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G
| |
| | {{result|pass}}<ref>Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:garrmcnu|garrmcnu]]
| |
| | Test image on VM (KVM)
| |
| | {{result|fail}}<ref>./default/paxtest FAIL</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:gkaukola|gkaukola]]
| |
| | HP Pavilion dv6
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:greenid|greenid]]
| |
| | HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4
| |
| | {{result|pass}}<ref>ulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ibims|ibims]]
| |
| | Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM
| |
| | {{result|pass}}<ref>Test suite called with default
| |
| ./default/sysfs-perms PASS
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/stack-randomness PASS
| |
| ./default/timer-overhead PASS
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/cachedrop PASS
| |
| ./default/memfd PASS
| |
| ./default/insert_leap_second PASS
| |
| ./default/paxtest SKIP
| |
| ./default/selinux-dac-controls SKIP
| |
| ./default/modsign PASS
| |
| ./default/posix_timers PASS
| |
|
| |
| Test suite complete PASS
| |
|
| |
| The following information is not submitted with your log;
| |
| it is for informational purposes only.
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jobus|jobus]]
| |
| | HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| |
| | {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: ./default/sysfs-perms
| |
| ------------------------------------------------------
| |
| Date: Tue 14 Apr 2020 11:26:16 PM CEST
| |
| Test set: performance
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: PASS
| |
| Failed Tests: None
| |
| Warned Tests: None
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jobus|jobus]]
| |
| | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| |
| | {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: ./default/sysfs-perms
| |
|
| |
| Date: Tue 14 Apr 2020 11:26:16 PM CEST
| |
| Test set: performance
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: PASS
| |
| Failed Tests: None
| |
| Warned Tests: None
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:joecastrop|joecastrop]]
| |
| | ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image
| |
| | {{result|pass}}<ref>{{bz|1562347}} Test suite called with default: All test pass except ./default/paxtest
| |
| Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
| |
| 38 | #include <rpc/rpc.h>
| |
| https://bugzilla.redhat.com/show_bug.cgi?id=1562347
| |
|
| |
| Library already installed:
| |
| Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jpesco|jpesco]]
| |
| | HP Elite 8300 Intel® Core™ i5-3470
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:kiko964|kiko964]]
| |
| | ASUS X554L Intel Core i3-5010U
| |
| | {{result|fail}}<ref>Date: Tue 14 Apr 2020 07:06:47 AM EDT
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/cachedrop
| |
| Warned Tests: None
| |
| ============================================================
| |
| Starting test ./default/sysfs-perms
| |
| Starting test ./default/libhugetlbfs
| |
| Starting test ./default/modsign
| |
| Successfully loaded signed module
| |
| Successfully loaded unsigned module
| |
| Starting test ./default/selinux-dac-controls
| |
| <no matches>
| |
| Starting test ./default/cachedrop
| |
| 100+0 records in
| |
| 100+0 records out
| |
| 104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s
| |
| cat: /proc/sys/vm/drop_caches: Permission denied
| |
| ./drop_caches.sh: line 32: [: -ne: unary operator expected
| |
| cat: /proc/sys/vm/drop_caches: Permission denied
| |
| ./drop_caches.sh: line 32: [: -ne: unary operator expected
| |
| TestError: Can't free dentries and inodes
| |
| 395696 395184
| |
| Could not run tests
| |
| Starting test ./default/mq-memory-corruption
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Test PASSED
| |
| Starting test ./default/timer-overhead
| |
| cc timer-test.o -o timer-test
| |
| Starting test ./default/posix_timers
| |
| Testing posix timers. False negative may happen on CPU execution
| |
| based timers if other threads run on the CPU...
| |
| Check itimer virtual... [OK]
| |
| Check itimer prof... [OK]
| |
| Check itimer real... [OK]
| |
| Check timer_create() per thread... [OK]
| |
| Check timer_create() per process... [OK]
| |
| Starting test ./default/stack-randomness
| |
| Starting test ./default/memfd
| |
| memfd_test.c: In function ‘mfd_assert_get_seals’:
| |
| memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
| |
| 67 | r = fcntl(fd, F_GET_SEALS);
| |
| | ^~~~~
| |
| memfd_test.c: In function ‘mfd_assert_open’:
| |
| memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
| |
| 190 | r = open(buf, flags, mode);
| |
| | ^~~~
| |
| | popen
| |
| memfd_test.c: In function ‘mfd_assert_write’:
| |
| memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
| |
| 315 | r = fallocate(fd,
| |
| | ^~~~~~~~~
| |
| | alloca
| |
| memfd: CREATE
| |
| memfd: BASIC
| |
| memfd: SEAL-WRITE
| |
| memfd: SEAL-SHRINK
| |
| memfd: SEAL-GROW
| |
| memfd: SEAL-RESIZE
| |
| memfd: SHARE-DUP
| |
| memfd: SHARE-MMAP
| |
| memfd: SHARE-OPEN
| |
| memfd: SHARE-FORK
| |
| memfd: SHARE-DUP (shared file-table)
| |
| memfd: SHARE-MMAP (shared file-table)
| |
| memfd: SHARE-OPEN (shared file-table)
| |
| memfd: SHARE-FORK (shared file-table)
| |
| memfd: DONE
| |
| Starting test ./default/paxtest
| |
| Starting test ./default/insert_leap_second
| |
| Setting time to speed up testing
| |
| Running for 1 iterations. Press ctrl-c to stop
| |
|
| |
| Setting time to Tue Apr 14 19:59:50 2020
| |
| Scheduling leap second for Tue Apr 14 20:00:00 2020
| |
| Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS
| |
| Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS
| |
| Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS
| |
| Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS
| |
| Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS
| |
| Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS
| |
| Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP
| |
| Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP
| |
| Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT
| |
| Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT
| |
| Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT
| |
| Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT
| |
| Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT
| |
| Leap complete
| |
|
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:kle|kle]]
| |
| | testkernel ISO on KVM (Host: Lenovo Thinkpad T480)
| |
| | {{result|pass}}<ref>1. Performance test suite: PASSED
| |
| 2. Default test suite: PASSED </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lbrabec|lbrabec]]
| |
| | F32, Lenovo T480s (i7-8650U)
| |
| | {{result|fail}}<ref>./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP.
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lfc|lfc]]
| |
| | Intel® Core™ i7-6700 CPU @ 3.40GHz × 8 | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:liwan|liwan]]
| |
| | HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space
| |
| | {{result|pass}}<ref>ltp/lite </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:luya|luya]]
| |
| | HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:makelix|makelix]]
| |
| | Lenovo ThinkPad T470s
| |
| | {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:makelix|makelix]]
| |
| | Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz)
| |
| | {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:malucious|malucious]]
| |
| | Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta
| |
| | {{result|pass}}<ref>./default/libhugetlbfs and ./default/paxtest were skipped.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:marc84|marc84]]
| |
| | USB kerneltest-5.6.3.iso on Lenovo ideapad Y570
| |
| | {{result|warn}}<ref>Running Both Basic and Performance test
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
|
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:mharpau|mharpau]]
| |
| | Thinkpad T480s, i5-8250U, iGPU
| |
| | {{result|pass}}<ref>everything working as expected </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:molli123|molli123]]
| |
| | E3-1240 v6, 32GB, 1060 with nouveau driver
| |
| | {{result|pass}}<ref>everything working as expected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:mosesdenny|mosesdenny]]
| |
| |
| |
| | {{result|pass}}<ref>Test suite called with default
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/paxtest SKIP
| |
| ./default/cachedrop PASS
| |
| ./default/timer-overhead PASS
| |
| ./default/modsign PASS
| |
| ./default/sysfs-perms PASS
| |
| ./default/memfd PASS
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/posix_timers PASS
| |
| ./default/stack-randomness PASS
| |
| ./default/selinux-dac-controls PASS
| |
| ./default/insert_leap_second PASS
| |
|
| |
| Test suite complete PASS
| |
| Thu 16 Apr 2020 04:11:15 PM EDT
| |
| ./performance/lmbench3 PASS
| |
|
| |
| Test suite complete PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nasirhm|nasirhm]]
| |
| | KVM on X1-Carbon
| |
| | {{result|fail}}<ref>./default/paxtest FAIL
| |
| ./default/libhugetlbfs SKIP</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nchudnoff|nchudnoff]]
| |
| | KVM (Host: AMD Phenom II X4 B93 CPU | Guest: 6 GB RAM)
| |
| | {{result|pass}}<ref>All passed (libhugetlbfs SKIP, paxtest SKIP)
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nielsenb|nielsenb]]
| |
| | HP Compaq 8510w Intel T9300 AMD RV630
| |
| | {{result|pass}}<ref>Performance test suite
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:norbertj|norbertj]]
| |
| | Ideapad with Core i3-6006U and 8 GB memory
| |
| | {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:norbertj|norbertj]]
| |
| | Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450
| |
| | {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:novicejava1|novicejava1]]
| |
| |
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pfrenard|pfrenard]]
| |
| | Dell Inspiron 7000 (i7-7500U)
| |
| | {{result|fail}}<ref>./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:quiet|quiet]]
| |
| | Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB
| |
| | {{result|fail}}<ref>Default test suite
| |
|
| |
| ./default/paxtest FAIL
| |
|
| |
| Performance PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:roypen|roypen]]
| |
| | Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM
| |
| | {{result|pass}}<ref>Performance test suite: PASSED</ref>{{result|pass}}<ref>Default test suite: PASSED</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:sassam|sassam]]
| |
| | Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+
| |
| | {{result|pass}}<ref>Works for me. Regression tests passed on both devices.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:simobonfo|simobonfo]]
| |
| | kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u
| |
| | {{result|fail}}<ref>########## ./runtests.sh ##########
| |
| All PASS exept:
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/paxtest FAIL
| |
| Test suite complete FAIL
| |
| ########## ./runtests.sh -t performance ##########
| |
| Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied.
| |
| /bin/sh: ../scripts/getlist: Permission denied
| |
| /bin/sh: ../scripts/getsummary: Permission denied
| |
| make: *** [Makefile:110: summary] Error 126
| |
| ./performance/lmbench3 PASS
| |
| Test suite complete PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:stathisl|stathisl]]
| |
| | ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned
| |
| | {{result|fail}}<ref>Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL.
| |
| Date: Mon 13 Apr 2020 12:31:38 PM EDT
| |
| Test set: default
| |
| Kernel: 5.6.3-300.fc31.x86_64
| |
| Release: Fedora release 31 (Thirty One)
| |
| Result: FAIL
| |
| Failed Tests: ./default/paxtest
| |
| Warned Tests: None
| |
|
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:suve|suve]]
| |
| | AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta
| |
| | {{result|pass}}<ref>Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:tgerov|tgerov]]
| |
| | ThinkPad t480s, i7-8550U, 16G
| |
| | {{result|fail}}<ref>./default/libhugetlbfs SKIP
| |
| ./default/paxtest FAIL
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:theunrealgeek|theunrealgeek]]
| |
| | Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date
| |
| | {{result|pass}}<ref>Kernel: 5.6.3-300.fc32.x86_64
| |
| Both regular and performance tests pass and has uploaded results automatically as well.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:thuzzik|thuzzik]]
| |
| |
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:thuzzik|thuzzik]]
| |
| | Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:udb28|udb28]]
| |
| | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096
| |
| | {{result|fail}}<ref>./default/paxtest FAIL
| |
| Vulnerability status:
| |
| spec_store_bypass: Vulnerable
| |
| spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:udb28|udb28]]
| |
| | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2
| |
| | {{result|pass}}<ref>Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:visitor|visitor]]
| |
| | Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO
| |
| | {{result|pass}}<ref>first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP</ref>
| |
| | <references/>
| |
|
| |
| |- | | |- |
| |} | | |} |
|
| |
|
| |
|
| |
|
| |
|
| [[Category:Fedora 32 Test Days]] | | [[Category:Fedora 32 Test Days]] |