(9 intermediate revisions by 4 users not shown) | |||
Line 25: | Line 25: | ||
* A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!) | * A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!) | ||
* The 5.6 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID= | * The 5.6 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1495062 F31 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems. | ||
* As this is the Fedora 32 shipping kernel, you can also test with any of the [https://www.happyassassin.net/nightlies.html Fedora 32 nightlies] | * As this is the Fedora 32 shipping kernel, you can also test with any of the [https://www.happyassassin.net/nightlies.html Fedora 32 nightlies] | ||
* Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package> | * Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package> | ||
Line 53: | Line 53: | ||
|sumantrom | |sumantrom | ||
|KVM on T460s | |KVM on T460s | ||
|{{result| | |{{result|pass}}<ref> this is just an example </ref> | ||
| | |||
|- | |||
|- | |||
|udb28 | |||
|liveusb on T430s | |||
|{{result|fail}} | |||
Default test suite. | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
| | |||
|- | |||
|- | |||
|udb28 | |||
|liveusb on T430s | |||
|{{result|pass}} | |||
Performance test suite. | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
|- | |||
|- | |||
|nasirhm | |||
|KVM on X1 Carbon | |||
|{{result|fail}} Default test suite : paxtest Failed | |||
| | |||
|- | |||
|- | |||
|nasirhm | |||
|KVM on X1 Carbon | |||
|{{result|pass}} Performance test suite | |||
| | | | ||
|- | |- | ||
|} | |} | ||
=== Regression Test === | |||
{| class="wikitable" width=100% | |||
! User | |||
! Profile | |||
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression] | |||
! References | |||
|- | |||
| [[User:JoeHannes|JoeHannes]] | |||
| Asus N82JQ | |||
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 01:01:46 PM EDT | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: ./default/sysfs-perms</ref> | |||
| <references/> | |||
|- | |||
| [[User:Mac tester|Mac tester]] | |||
| Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U | |||
| {{result|fail}}<ref>Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). | |||
Performance: terminal session is killed during the test.</ref> | |||
| <references/> | |||
|- | |||
| [[User:Smyleon|Smyleon]] | |||
| Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600 | |||
| {{result|warn}}<ref>1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). | |||
2. Performance: PASS. | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled</ref> | |||
| <references/> | |||
|- | |||
| [[User:alciregi|alciregi]] | |||
| Dell XPS 13 9360, Intel i7-7500U | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:alciregi|alciregi]] | |||
| Raspberry Pi 3 aarch64 (Fedora-IoT) | |||
| {{result|pass}}<ref>5.6.3-300.fc32.aarch64 </ref> | |||
| <references/> | |||
|- | |||
| [[User:alciregi|alciregi]] | |||
| Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427 | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/mds:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:alciregi|alciregi]] | |||
| Toshiba Portege R930-1H9, Intel i5-3340M | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:amado86|amado86]] | |||
| Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) | |||
| {{result|fail}}<ref>1. ./default/timer-overhead FAIL | |||
Unacceptable long delay; asked for 2000 usec, got 6136 usec | |||
Test failure. | |||
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled | |||
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:amado86|amado86]] | |||
| Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) | |||
| {{result|fail}}<ref>Standard tests = FAIL | |||
./default/timer-overhead FAIL | |||
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) | |||
Performance tests = PASS. | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:anonymous|anonymous]] | |||
| Acer Aspire A315-42 | |||
| {{result|fail}}<ref>1. kernel-test-1586714524.log.txt | |||
./default/libhugetlbfs SKIP | |||
./default/cachedrop FAIL | |||
./default/paxtest FAIL | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:anonymous|anonymous]] | |||
| Lenovo ThinkPad W530 | |||
| {{result|fail}}<ref>Date: Mon 13 Apr 2020 11:03:24 AM EDT | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: None | |||
============================================================ | |||
Starting test ./default/sysfs-perms | |||
Starting test ./default/libhugetlbfs | |||
Starting test ./default/modsign | |||
Successfully loaded signed module | |||
insmod: ERROR: could not insert module ./minix.ko: Operation not permitted | |||
Unsigned module load failed in enforcing mode | |||
Starting test ./default/selinux-dac-controls | |||
<no matches> | |||
Starting test ./default/cachedrop | |||
100+0 records in | |||
100+0 records out | |||
104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s | |||
cat: /proc/sys/vm/drop_caches: Permission denied | |||
./drop_caches.sh: line 32: [: -ne: unary operator expected | |||
cat: /proc/sys/vm/drop_caches: Permission denied | |||
./drop_caches.sh: line 32: [: -ne: unary operator expected | |||
10+0 records in | |||
10+0 records out | |||
10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s | |||
cat: /proc/sys/vm/drop_caches: Permission denied | |||
./drop_caches.sh: line 32: [: -ne: unary operator expected | |||
TestPASS: /proc/sys/vm/drop_caches PASS | |||
Starting test ./default/mq-memory-corruption | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Starting test ./default/timer-overhead | |||
cc timer-test.o -o timer-test | |||
Starting test ./default/posix_timers | |||
Testing posix timers. False negative may happen on CPU execution | |||
based timers if other threads run on the CPU... | |||
Check itimer virtual... [OK] | |||
Check itimer prof... [OK] | |||
Check itimer real... [OK] | |||
Check timer_create() per thread... [OK] | |||
Check timer_create() per process... [OK] | |||
Starting test ./default/stack-randomness | |||
Starting test ./default/memfd | |||
memfd_test.c: In function ‘mfd_assert_get_seals’: | |||
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration] | |||
67 | r = fcntl(fd, F_GET_SEALS); | |||
| ^~~~~ | |||
memfd_test.c: In function ‘mfd_assert_open’: | |||
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration] | |||
190 | r = open(buf, flags, mode); | |||
| ^~~~ | |||
| popen | |||
memfd_test.c: In function ‘mfd_assert_write’: | |||
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration] | |||
315 | r = fallocate(fd, | |||
| ^~~~~~~~~ | |||
| alloca | |||
memfd: CREATE | |||
memfd: BASIC | |||
memfd: SEAL-WRITE | |||
memfd: SEAL-SHRINK | |||
memfd: SEAL-GROW | |||
memfd: SEAL-RESIZE | |||
memfd: SHARE-DUP | |||
memfd: SHARE-MMAP | |||
memfd: SHARE-OPEN | |||
memfd: SHARE-FORK | |||
memfd: SHARE-DUP (shared file-table) | |||
memfd: SHARE-MMAP (shared file-table) | |||
memfd: SHARE-OPEN (shared file-table) | |||
memfd: SHARE-FORK (shared file-table) | |||
memfd: DONE | |||
Starting test ./default/paxtest | |||
Executable heap (mprotect) : Vulnerable | |||
Starting test ./default/insert_leap_second | |||
Setting time to speed up testing | |||
Running for 1 iterations. Press ctrl-c to stop | |||
Setting time to Mon Apr 13 19:59:50 2020 | |||
Scheduling leap second for Mon Apr 13 20:00:00 2020 | |||
Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS | |||
Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS | |||
Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS | |||
Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS | |||
Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS | |||
Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS | |||
Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP | |||
Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP | |||
Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT | |||
Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT | |||
Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT | |||
Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT | |||
Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT | |||
Leap complete | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:anonymous|anonymous]] | |||
| Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | |||
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: ./default/sysfs-perms | |||
Date: Tue 14 Apr 2020 11:26:16 PM CEST | |||
Test set: performance | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: PASS | |||
Failed Tests: None | |||
Warned Tests: None | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:archmunky|archmunky]] | |||
| installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon | |||
| {{result|pass}}<ref>default = PASS, performance = PASS</ref> | |||
| <references/> | |||
|- | |||
| [[User:archmunky|archmunky]] | |||
| installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon | |||
| {{result|pass}}<ref>installed, no updates: default = PASS, performance = PASS; | |||
installed, updated: default = PASS , performance = PASS | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:archmunky|archmunky]] | |||
| liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon | |||
| {{result|fail}}<ref>default = fail on cachedrop, paxtest; | |||
performance = pass with getlist and getsummary permission denied errors</ref> | |||
| <references/> | |||
|- | |||
| [[User:atim|atim]] | |||
| CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64 | |||
| {{result|pass}}<ref>All tests passed and all OK.</ref> | |||
| <references/> | |||
|- | |||
| [[User:augenauf|augenauf]] | |||
| F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s | |||
| {{result|pass}}<ref>kernel: 5.6.2-301.fc32.x86_64</ref> | |||
| <references/> | |||
|- | |||
| [[User:didiksupriadi41|didiksupriadi41]] | |||
| liveusb on ASUS X550ZE | |||
| {{result|pass}}<ref>Performance test suite</ref>{{result|fail}}<ref> Default test suite : paxtest Failed</ref> | |||
| <references/> | |||
|- | |||
| [[User:drakkai|drakkai]] | |||
| Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31 | |||
| {{result|pass}}<ref>default = PASS, performance = PASS | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable</ref> | |||
| <references/> | |||
|- | |||
| [[User:dvdantunes|dvdantunes]] | |||
| kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB | |||
| {{result|fail}}<ref>Test suite: default | |||
Date: Sun 19 Apr 2020 02:44:30 AM EDT | |||
Kernel version: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: | |||
./default/cachedrop | |||
./default/paxtest | |||
Additional info: | |||
Checking for kernel signature: | |||
The signer's common name is Fedora Secure Boot Signer | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:evillagr|evillagr]] | |||
| CPU: AMD FX(tm)-8320 Eight-Core Processor | RAM: 16GB | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/mds:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:evillagr|evillagr]] | |||
| KVM (host: AMD FX(tm)-8320 Eight-Core Processor | guest:AMD Opteron 63xx class CPU) | |||
| {{result|fail}}<ref> libhugetlbfs SKIP, paxtest FAIL </ref> | |||
| <references/> | |||
|- | |||
| [[User:fubuki|fubuki]] | |||
| bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G | |||
| {{result|pass}}<ref>Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:garrmcnu|garrmcnu]] | |||
| Test image on VM (KVM) | |||
| {{result|fail}}<ref>./default/paxtest FAIL</ref> | |||
| <references/> | |||
|- | |||
| [[User:gkaukola|gkaukola]] | |||
| HP Pavilion dv6 | |||
| {{result|pass}} | |||
| <references/> | |||
|- | |||
| [[User:greenid|greenid]] | |||
| HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4 | |||
| {{result|pass}}<ref>ulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:ibims|ibims]] | |||
| Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM | |||
| {{result|pass}}<ref>Test suite called with default | |||
./default/sysfs-perms PASS | |||
./default/libhugetlbfs SKIP | |||
./default/stack-randomness PASS | |||
./default/timer-overhead PASS | |||
./default/mq-memory-corruption PASS | |||
./default/cachedrop PASS | |||
./default/memfd PASS | |||
./default/insert_leap_second PASS | |||
./default/paxtest SKIP | |||
./default/selinux-dac-controls SKIP | |||
./default/modsign PASS | |||
./default/posix_timers PASS | |||
Test suite complete PASS | |||
The following information is not submitted with your log; | |||
it is for informational purposes only. | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:jobus|jobus]] | |||
| HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | |||
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: ./default/sysfs-perms | |||
------------------------------------------------------ | |||
Date: Tue 14 Apr 2020 11:26:16 PM CEST | |||
Test set: performance | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: PASS | |||
Failed Tests: None | |||
Warned Tests: None | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:jobus|jobus]] | |||
| Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | |||
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: ./default/sysfs-perms | |||
Date: Tue 14 Apr 2020 11:26:16 PM CEST | |||
Test set: performance | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: PASS | |||
Failed Tests: None | |||
Warned Tests: None | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:joecastrop|joecastrop]] | |||
| ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image | |||
| {{result|pass}}<ref>{{bz|1562347}} Test suite called with default: All test pass except ./default/paxtest | |||
Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory | |||
38 | #include <rpc/rpc.h> | |||
https://bugzilla.redhat.com/show_bug.cgi?id=1562347 | |||
Library already installed: | |||
Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.</ref> | |||
| <references/> | |||
|- | |||
| [[User:jpesco|jpesco]] | |||
| HP Elite 8300 Intel® Core™ i5-3470 | |||
| {{result|pass}} | |||
| <references/> | |||
|- | |||
| [[User:kiko964|kiko964]] | |||
| ASUS X554L Intel Core i3-5010U | |||
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 07:06:47 AM EDT | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/cachedrop | |||
Warned Tests: None | |||
============================================================ | |||
Starting test ./default/sysfs-perms | |||
Starting test ./default/libhugetlbfs | |||
Starting test ./default/modsign | |||
Successfully loaded signed module | |||
Successfully loaded unsigned module | |||
Starting test ./default/selinux-dac-controls | |||
<no matches> | |||
Starting test ./default/cachedrop | |||
100+0 records in | |||
100+0 records out | |||
104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s | |||
cat: /proc/sys/vm/drop_caches: Permission denied | |||
./drop_caches.sh: line 32: [: -ne: unary operator expected | |||
cat: /proc/sys/vm/drop_caches: Permission denied | |||
./drop_caches.sh: line 32: [: -ne: unary operator expected | |||
TestError: Can't free dentries and inodes | |||
395696 395184 | |||
Could not run tests | |||
Starting test ./default/mq-memory-corruption | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Test PASSED | |||
Starting test ./default/timer-overhead | |||
cc timer-test.o -o timer-test | |||
Starting test ./default/posix_timers | |||
Testing posix timers. False negative may happen on CPU execution | |||
based timers if other threads run on the CPU... | |||
Check itimer virtual... [OK] | |||
Check itimer prof... [OK] | |||
Check itimer real... [OK] | |||
Check timer_create() per thread... [OK] | |||
Check timer_create() per process... [OK] | |||
Starting test ./default/stack-randomness | |||
Starting test ./default/memfd | |||
memfd_test.c: In function ‘mfd_assert_get_seals’: | |||
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration] | |||
67 | r = fcntl(fd, F_GET_SEALS); | |||
| ^~~~~ | |||
memfd_test.c: In function ‘mfd_assert_open’: | |||
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration] | |||
190 | r = open(buf, flags, mode); | |||
| ^~~~ | |||
| popen | |||
memfd_test.c: In function ‘mfd_assert_write’: | |||
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration] | |||
315 | r = fallocate(fd, | |||
| ^~~~~~~~~ | |||
| alloca | |||
memfd: CREATE | |||
memfd: BASIC | |||
memfd: SEAL-WRITE | |||
memfd: SEAL-SHRINK | |||
memfd: SEAL-GROW | |||
memfd: SEAL-RESIZE | |||
memfd: SHARE-DUP | |||
memfd: SHARE-MMAP | |||
memfd: SHARE-OPEN | |||
memfd: SHARE-FORK | |||
memfd: SHARE-DUP (shared file-table) | |||
memfd: SHARE-MMAP (shared file-table) | |||
memfd: SHARE-OPEN (shared file-table) | |||
memfd: SHARE-FORK (shared file-table) | |||
memfd: DONE | |||
Starting test ./default/paxtest | |||
Starting test ./default/insert_leap_second | |||
Setting time to speed up testing | |||
Running for 1 iterations. Press ctrl-c to stop | |||
Setting time to Tue Apr 14 19:59:50 2020 | |||
Scheduling leap second for Tue Apr 14 20:00:00 2020 | |||
Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS | |||
Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS | |||
Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS | |||
Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS | |||
Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS | |||
Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS | |||
Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP | |||
Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP | |||
Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT | |||
Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT | |||
Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT | |||
Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT | |||
Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT | |||
Leap complete | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:kle|kle]] | |||
| testkernel ISO on KVM (Host: Lenovo Thinkpad T480) | |||
| {{result|pass}}<ref>1. Performance test suite: PASSED | |||
2. Default test suite: PASSED </ref> | |||
| <references/> | |||
|- | |||
| [[User:lbrabec|lbrabec]] | |||
| F32, Lenovo T480s (i7-8650U) | |||
| {{result|fail}}<ref>./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP. | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:lfc|lfc]] | |||
| Intel® Core™ i7-6700 CPU @ 3.40GHz × 8 | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref> | |||
| <references/> | |||
|- | |||
| [[User:liwan|liwan]] | |||
| HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space | |||
| {{result|pass}}<ref>ltp/lite </ref> | |||
| <references/> | |||
|- | |||
| [[User:luya|luya]] | |||
| HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM | |||
| {{result|pass}} | |||
| <references/> | |||
|- | |||
| [[User:makelix|makelix]] | |||
| Lenovo ThinkPad T470s | |||
| {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref> | |||
| <references/> | |||
|- | |||
| [[User:makelix|makelix]] | |||
| Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz) | |||
| {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref> | |||
| <references/> | |||
|- | |||
| [[User:malucious|malucious]] | |||
| Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta | |||
| {{result|pass}}<ref>./default/libhugetlbfs and ./default/paxtest were skipped.</ref> | |||
| <references/> | |||
|- | |||
| [[User:marc84|marc84]] | |||
| USB kerneltest-5.6.3.iso on Lenovo ideapad Y570 | |||
| {{result|warn}}<ref>Running Both Basic and Performance test | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:mharpau|mharpau]] | |||
| Thinkpad T480s, i5-8250U, iGPU | |||
| {{result|pass}}<ref>everything working as expected </ref> | |||
| <references/> | |||
|- | |||
| [[User:molli123|molli123]] | |||
| E3-1240 v6, 32GB, 1060 with nouveau driver | |||
| {{result|pass}}<ref>everything working as expected</ref> | |||
| <references/> | |||
|- | |||
| [[User:mosesdenny|mosesdenny]] | |||
| | |||
| {{result|pass}}<ref>Test suite called with default | |||
./default/mq-memory-corruption PASS | |||
./default/paxtest SKIP | |||
./default/cachedrop PASS | |||
./default/timer-overhead PASS | |||
./default/modsign PASS | |||
./default/sysfs-perms PASS | |||
./default/memfd PASS | |||
./default/libhugetlbfs SKIP | |||
./default/posix_timers PASS | |||
./default/stack-randomness PASS | |||
./default/selinux-dac-controls PASS | |||
./default/insert_leap_second PASS | |||
Test suite complete PASS | |||
Thu 16 Apr 2020 04:11:15 PM EDT | |||
./performance/lmbench3 PASS | |||
Test suite complete PASS</ref> | |||
| <references/> | |||
|- | |||
| [[User:nasirhm|nasirhm]] | |||
| KVM on X1-Carbon | |||
| {{result|fail}}<ref>./default/paxtest FAIL | |||
./default/libhugetlbfs SKIP</ref> | |||
| <references/> | |||
|- | |||
| [[User:nchudnoff|nchudnoff]] | |||
| KVM (Host: AMD Phenom II X4 B93 CPU | Guest: 6 GB RAM) | |||
| {{result|pass}}<ref>All passed (libhugetlbfs SKIP, paxtest SKIP) | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/mds:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:nielsenb|nielsenb]] | |||
| HP Compaq 8510w Intel T9300 AMD RV630 | |||
| {{result|pass}}<ref>Performance test suite | |||
Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled | |||
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:norbertj|norbertj]] | |||
| Ideapad with Core i3-6006U and 8 GB memory | |||
| {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref> | |||
| <references/> | |||
|- | |||
| [[User:norbertj|norbertj]] | |||
| Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450 | |||
| {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref> | |||
| <references/> | |||
|- | |||
| [[User:novicejava1|novicejava1]] | |||
| | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion | |||
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref> | |||
| <references/> | |||
|- | |||
| [[User:pfrenard|pfrenard]] | |||
| Dell Inspiron 7000 (i7-7500U) | |||
| {{result|fail}}<ref>./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED</ref> | |||
| <references/> | |||
|- | |||
| [[User:quiet|quiet]] | |||
| Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB | |||
| {{result|fail}}<ref>Default test suite | |||
./default/paxtest FAIL | |||
Performance PASS</ref> | |||
| <references/> | |||
|- | |||
| [[User:roypen|roypen]] | |||
| Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM | |||
| {{result|pass}}<ref>Performance test suite: PASSED</ref>{{result|pass}}<ref>Default test suite: PASSED</ref> | |||
| <references/> | |||
|- | |||
| [[User:sassam|sassam]] | |||
| Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+ | |||
| {{result|pass}}<ref>Works for me. Regression tests passed on both devices.</ref> | |||
| <references/> | |||
|- | |||
| [[User:simobonfo|simobonfo]] | |||
| kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u | |||
| {{result|fail}}<ref>########## ./runtests.sh ########## | |||
All PASS exept: | |||
./default/libhugetlbfs SKIP | |||
./default/paxtest FAIL | |||
Test suite complete FAIL | |||
########## ./runtests.sh -t performance ########## | |||
Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied. | |||
/bin/sh: ../scripts/getlist: Permission denied | |||
/bin/sh: ../scripts/getsummary: Permission denied | |||
make: *** [Makefile:110: summary] Error 126 | |||
./performance/lmbench3 PASS | |||
Test suite complete PASS</ref> | |||
| <references/> | |||
|- | |||
| [[User:stathisl|stathisl]] | |||
| ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned | |||
| {{result|fail}}<ref>Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL. | |||
Date: Mon 13 Apr 2020 12:31:38 PM EDT | |||
Test set: default | |||
Kernel: 5.6.3-300.fc31.x86_64 | |||
Release: Fedora release 31 (Thirty One) | |||
Result: FAIL | |||
Failed Tests: ./default/paxtest | |||
Warned Tests: None | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:suve|suve]] | |||
| AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta | |||
| {{result|pass}}<ref>Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.</ref> | |||
| <references/> | |||
|- | |||
| [[User:tgerov|tgerov]] | |||
| ThinkPad t480s, i7-8550U, 16G | |||
| {{result|fail}}<ref>./default/libhugetlbfs SKIP | |||
./default/paxtest FAIL | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:theunrealgeek|theunrealgeek]] | |||
| Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date | |||
| {{result|pass}}<ref>Kernel: 5.6.3-300.fc32.x86_64 | |||
Both regular and performance tests pass and has uploaded results automatically as well.</ref> | |||
| <references/> | |||
|- | |||
| [[User:thuzzik|thuzzik]] | |||
| | |||
| {{result|pass}} | |||
| <references/> | |||
|- | |||
| [[User:thuzzik|thuzzik]] | |||
| Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550 | |||
| {{result|pass}}<ref>Vulnerability status: | |||
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages | |||
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable | |||
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |||
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI | |||
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | |||
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:udb28|udb28]] | |||
| Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096 | |||
| {{result|fail}}<ref>./default/paxtest FAIL | |||
Vulnerability status: | |||
spec_store_bypass: Vulnerable | |||
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |||
spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling | |||
</ref> | |||
| <references/> | |||
|- | |||
| [[User:udb28|udb28]] | |||
| Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 | |||
| {{result|pass}}<ref>Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64</ref> | |||
| <references/> | |||
|- | |||
| [[User:visitor|visitor]] | |||
| Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO | |||
| {{result|pass}}<ref>first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP</ref> | |||
| <references/> | |||
|- | |||
|} | |||
[[Category:Fedora 32 Test Days]] | [[Category:Fedora 32 Test Days]] |
Latest revision as of 12:20, 19 April 2020
Fedora Test Day | |
---|---|
Kernel 5.6 | |
Date | 2020-04-13 to 2020-04-20 |
Time | all week |
Website | QA/Test Days |
IRC | #fedora-test-day (webirc) |
Mailing list | test |
What to test?[edit]
Today's installment of Fedora Test Day will focus on Kernel 5.6.
Who's available?[edit]
The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...
- Development - jforbes (jforbes)
- Quality Assurance - Sumantro Mukherjee (sumantrom), Adam Williamson (adamw), Geoff (coremodule), Lukáš Růžička (lruzicka)
Prerequisites for Test Day[edit]
- A fully updated test day image or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
- The 5.6 kernel for an existing installation from F31 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems.
- As this is the Fedora 32 shipping kernel, you can also test with any of the Fedora 32 nightlies
- Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
- Enough free space on HDD
How to test?[edit]
Run the tests[edit]
- Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in
/home/liveuser/kernel-tests/
. - Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
- If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
- While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.
Reporting bugs[edit]
If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.
If you don't see it, please file a new bug to Bugzilla, probably against kernel
component. If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.
Test Results[edit]
Regression Test[edit]
User | Profile | Regression | References |
---|---|---|---|
sumantrom | KVM on T460s | ||
udb28 | liveusb on T430s | Default test suite. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected |
|
udb28 | liveusb on T430s | Performance test suite. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected | |
nasirhm | KVM on X1 Carbon | ||
nasirhm | KVM on X1 Carbon |
Regression Test[edit]
User | Profile | Regression | References |
---|---|---|---|
JoeHannes | Asus N82JQ | ||
Mac tester | Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U |
| |
Smyleon | Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600 |
| |
alciregi | Dell XPS 13 9360, Intel i7-7500U |
| |
alciregi | Raspberry Pi 3 aarch64 (Fedora-IoT) |
| |
alciregi | Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427 |
| |
alciregi | Toshiba Portege R930-1H9, Intel i5-3340M |
| |
amado86 | Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) |
| |
amado86 | Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) |
| |
anonymous | Acer Aspire A315-42 |
| |
anonymous | Lenovo ThinkPad W530 |
| |
anonymous | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image |
| |
archmunky | installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon |
| |
archmunky | installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon |
| |
archmunky | liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon |
| |
atim | CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64 |
| |
augenauf | F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s |
| |
didiksupriadi41 | liveusb on ASUS X550ZE | ||
drakkai | Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31 |
| |
dvdantunes | kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB |
| |
evillagr | RAM: 16GB |
| |
evillagr | guest:AMD Opteron 63xx class CPU) |
| |
fubuki | bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G |
| |
garrmcnu | Test image on VM (KVM) |
| |
gkaukola | HP Pavilion dv6 | ||
greenid | HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4 |
| |
ibims | Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM |
| |
jobus | HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image |
| |
jobus | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image |
| |
joecastrop | ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image |
| |
jpesco | HP Elite 8300 Intel® Core™ i5-3470 | ||
kiko964 | ASUS X554L Intel Core i3-5010U |
| |
kle | testkernel ISO on KVM (Host: Lenovo Thinkpad T480) |
| |
lbrabec | F32, Lenovo T480s (i7-8650U) |
| |
lfc | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland |
| |
liwan | HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space |
| |
luya | HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM | ||
makelix | Lenovo ThinkPad T470s |
| |
makelix | Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz) |
| |
malucious | Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta |
| |
marc84 | USB kerneltest-5.6.3.iso on Lenovo ideapad Y570 |
| |
mharpau | Thinkpad T480s, i5-8250U, iGPU |
| |
molli123 | E3-1240 v6, 32GB, 1060 with nouveau driver |
| |
mosesdenny |
| ||
nasirhm | KVM on X1-Carbon |
| |
nchudnoff | Guest: 6 GB RAM) |
| |
nielsenb | HP Compaq 8510w Intel T9300 AMD RV630 |
| |
norbertj | Ideapad with Core i3-6006U and 8 GB memory |
| |
norbertj | Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450 |
| |
novicejava1 |
| ||
pfrenard | Dell Inspiron 7000 (i7-7500U) |
| |
quiet | Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB |
| |
roypen | Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM | ||
sassam | Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+ |
| |
simobonfo | kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u |
| |
stathisl | ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned |
| |
suve | AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta |
| |
tgerov | ThinkPad t480s, i7-8550U, 16G |
| |
theunrealgeek | Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date |
| |
thuzzik | |||
thuzzik | Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550 |
| |
udb28 | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096 |
| |
udb28 | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 |
| |
visitor | Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO |
|