Latest revision |
Your text |
Line 41: |
Line 41: |
| == Test Results == | | == Test Results == |
|
| |
|
| === Regression Test ===
| |
| {|
| |
| ! User
| |
| ! Profile
| |
| ! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
| |
| ! References
| |
| |-
| |
| | [[User:JeremyM|JeremyM]]
| |
| | Sony Vaio Intel i5
| |
| | {{result|pass}}<ref>Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:MidnightRAT|MidnightRAT]]
| |
| | Fedora 30 stock
| |
| | {{result|pass}}<ref>Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel
| |
| uname -a
| |
| Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
| |
| What can i do ti check my system?
| |
| Thanks.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Baremetal i5-7400 8GB RAM
| |
| | {{result|pass}}<ref>Test suite called with performance
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
| |
| | {{result|pass}}<ref>Checking for kernel signature:
| |
| The signer's common name is Fedora Secure Boot Signer
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | RPi3 armv7hl
| |
| | {{result|pass}}<ref>Test suite called with destructive
| |
| </ref>{{result|pass}}<ref>Test suite called with default</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | Scaleway START1-XS x86_64 cloud instance
| |
| | {{result|pass}}<ref>Test suite called with default
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | aarch64 on KVM
| |
| | {{result|pass}}<ref>Test suite called with default
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | vmware 4GB ram 2vcpu
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:archmunky|archmunky]]
| |
| | Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
| |
| | {{result|warn}}<ref>Standard: https://apps.fedoraproject.org/kerneltest/logs/34940
| |
| sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS
| |
|
| |
| Performance: https://apps.fedoraproject.org/kerneltest/logs/34942
| |
| All PASS
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:archmunky|archmunky]]
| |
| | Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
| |
| | {{result|pass}}<ref>runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:atim|atim]]
| |
| | CPU: Quad Core AMD Athlon X4 845 | GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
| |
| | {{result|pass}}<ref>Test suite called with default - PASS (except paxtest as always)
| |
|
| |
| Test suite called with performance - PASS
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:benjamind|benjamind]]
| |
| | VMware Workstation on Fedora 30 host (i7-6500U)
| |
| | {{result|pass}}<ref>cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:calinoiualex|calinoiualex]]
| |
| | Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
| |
| | {{result|pass}}<ref>1. Pass
| |
| 2. Pass
| |
|
| |
| Ran with performance argument
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:chuhu|chuhu]]
| |
| | NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
| |
| | {{result|pass}}<ref>Ran trinity testings and scheduler testings suits. </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:danniel|danniel]]
| |
| | KVM
| |
| | {{result|pass}}<ref>works </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:dinostar|dinostar]]
| |
| | Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
| |
| | {{result|pass}}<ref>The following test was skipped, everything else was a pass.
| |
|
| |
| ./default/libhugetlbfs SKIP</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:eboswell|eboswell]]
| |
| | Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
| |
| | {{result|pass}}<ref>Test suite called with performance. Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
| |
| </ref>{{result|pass}}<ref>Test suite called with default. Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:glb|glb]]
| |
| | Bare metal, Core i7-920, 12GB RAM
| |
| | {{result|pass}}<ref>All default test suite passed.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:goodmirek|goodmirek]]
| |
| | bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
| |
| | {{result|pass}}<ref>KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:heffer|heffer]]
| |
| | ThinkPad X1 Carbon 5th
| |
| | {{result|fail}}<ref>WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577
| |
| Works fine with kernel-5.1.18-300.fc30.x86_64</ref>{{result|fail}}<ref>{{bz|1724357}} Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:idanka|idanka]]
| |
| | Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050
| |
| | {{result|warn}}<ref>./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass
| |
| thirdparty/nvidia-module error
| |
| performance: fatal error: rpc/rpc.h: No such file or directory</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jlanda|jlanda]]
| |
| | bare metal ryzen 5 1600x
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:kiyer|kiyer]]
| |
| | Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:kparal|kparal]]
| |
| | Thinkpad T480s, Fedora 30
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:lewis41|lewis41]]
| |
| | i5-6500 CPU @ 3.20GHz
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:lewis41|lewis41]]
| |
| | i5-6500 CPU @ 3.20GHz - 8GB RAM
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:lnie|lnie]]
| |
| | ProLiant SL4545 G7
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:luya|luya]]
| |
| | HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
| |
| | {{result|pass}}<ref>Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:masami|masami]]
| |
| | Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
| |
| | {{result|pass}}<ref>Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:masami|masami]]
| |
| | Raspberry Pi 3B+ aarch64
| |
| | {{result|pass}}<ref>kernel regression tests passed. </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:mharpau|mharpau]]
| |
| | Fedora 30 T480s i5-8250U iGPU
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:mimat|mimat]]
| |
| | fedora 30@i7-2630QM
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:mizhang|mizhang]]
| |
| | Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:mizhang|mizhang]]
| |
| | Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
| |
| | {{result|pass}}<ref>LTP from upstream
| |
| sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass
| |
| fs pass, fsx pass, math pass, hugeltb pass, mm failed with case ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:monot0m|monot0m]]
| |
| | Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nah Fam|nah Fam]]
| |
| | vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
| |
| | {{result|warn}}<ref>Test 1
| |
| ./default/cachedrop FAIL
| |
| Test suite complete FAIL
| |
|
| |
| Test 2
| |
| ./performance/lmbench3 PASS
| |
| Test suite complete PASS </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nightromantic|nightromantic]]
| |
| | Bare metal, desktop, F30@Intel i3-8100
| |
| | {{result|warn}}<ref>./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS".
| |
| ./runtests.sh -t performance -- "PASS"</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:numasan|numasan]]
| |
| | HP EliteBook 820 G4
| |
| | {{result|pass}}<ref>Test set: default</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ozeszty|ozeszty]]
| |
| | F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
| |
| | {{result|pass}}<ref>./default/libhugetlbfs skipped as usual, default and performance passed.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ozeszty|ozeszty]]
| |
| | F30 KDE, Skylake laptop on kernel 4.2.2 from koji
| |
| | {{result|pass}}<ref>./default/libhugetlbfs skipped, default and performance passed. </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pmeyer|pmeyer]]
| |
| | AMD® Athlon(tm) ii x2 250 processor × 2
| |
| | {{result|pass}}<ref>file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
| |
| file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
| |
| file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
| |
| file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Banana Pi (armhfp)
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Mustang (xgene-1)
| |
| | {{result|pass}}<ref>make not installed on first run. Second attempt passed - https://apps.fedoraproject.org/kerneltest/logs/34914</ref>{{result|fail}}<ref>https://apps.fedoraproject.org/kerneltest/kernel/5.2.2-200.fc30.aarch64</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Pine 64 Plus (aarch64 sbc)
| |
| | {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34917</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Raspberry Pi 3B+ (armhfp)
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Trimslice (armhfp)
| |
| | {{result|warn}}<ref>Test suite complete - WARN
| |
| https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pwhalen|pwhalen]]
| |
| | Wandboard Quad (armhfp)
| |
| | {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ralex|ralex]]
| |
| | Ryyzen 2600x | 16 GB Ram | Nvidia GTX 1080
| |
| | {{result|pass}}<ref>Default passed (https://apps.fedoraproject.org/kerneltest/logs/35167)
| |
| Performance passed (https://apps.fedoraproject.org/kerneltest/logs/35168)</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:rammodulus|rammodulus]]
| |
| | Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
| |
| | {{result|fail}}<ref>Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully.
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:rudrapratap|rudrapratap]]
| |
| | qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
| |
| | {{result|pass}}<ref>Test suite called with default
| |
| ./default/posix_timers PASS
| |
| ./default/sysfs-perms PASS
| |
| ./default/selinux-dac-controls PASS
| |
| ./default/paxtest PASS
| |
| ./default/memfd PASS
| |
| ./default/stack-randomness PASS
| |
| ./default/cachedrop PASS
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/modsign PASS
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/insert_leap_second PASS
| |
| ./default/timer-overhead PASS
| |
|
| |
| Test suite complete PASS </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:salimma|salimma]]
| |
| | Bare metal: Thinkpad T480s
| |
| | {{result|pass}}<ref>Default and performance profiles pass</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:sumantrom|sumantrom]]
| |
| | T470s
| |
| | {{result|pass}}<ref>Called with default</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:tmlgcq|tmlgcq]]
| |
| | QEMU with KVM Virtual
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:tmsp|tmsp]]
| |
| | Ryzen 1800X; 16 GB RAM; F30
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:user|user]]
| |
| | default
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:vascom|vascom]]
| |
| | Bare metal, Core i7-4470, 32GB RAM
| |
| | {{result|pass}}<ref>All good.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:weswilliams|weswilliams]]
| |
| | VMware Workstation 15.1.0 on Fedora 30 host
| |
| | {{result|pass}}<ref>All default test suite passed.</ref>
| |
| | <references/>
| |
|
| |
| |-
| |
| |}
| |
|
| |
|
| |
|
| |
|
| | | |
| [[Category:Fedora 31 Test Days]] | | [[Category:Fedora 31 Test Days]] |