From Fedora Project Wiki

(Revise "run the tests" a bit, including direct link to the regression test since that's usually the only one for kernel test days)
No edit summary
 
(One intermediate revision by one other user not shown)
Line 31: Line 31:
=== Run the tests ===
=== Run the tests ===
# Follow the instructions in [[QA:Testcase_kernel_regression|this test case]]. For users running the test day image, the tests are pre-installed in {{filename|/home/liveuser/kernel-tests/}}.
# Follow the instructions in [[QA:Testcase_kernel_regression|this test case]]. For users running the test day image, the tests are pre-installed in {{filename|/home/liveuser/kernel-tests/}}.
# Visit the [http://testdays.fedorainfracloud.org/events/67 result page] and enter your result in the 'Regression' column by clicking 'Enter Result'.
# Visit the [http://testdays.fedorainfracloud.org/events/67 result page] and enter your result in the 'Regression' column by clicking ''Enter result''.
# If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the ''Enter result'' button for the test.
# If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the ''Enter result'' button for the test.


Line 41: Line 41:
== Test Results ==
== Test Results ==


=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:JeremyM|JeremyM]]
| Sony Vaio Intel i5
| {{result|pass}}<ref>Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "</ref>
| <references/>
|-
| [[User:MidnightRAT|MidnightRAT]]
| Fedora 30 stock
| {{result|pass}}<ref>Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel
uname -a
Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
What can i do ti check my system?
Thanks.</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Baremetal i5-7400 8GB RAM
| {{result|pass}}<ref>Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
| {{result|pass}}<ref>Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| RPi3 armv7hl
| {{result|pass}}<ref>Test suite called with destructive
</ref>{{result|pass}}<ref>Test suite called with default</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Scaleway START1-XS x86_64 cloud instance
| {{result|pass}}<ref>Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| aarch64 on KVM
| {{result|pass}}<ref>Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| vmware 4GB ram 2vcpu
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
| {{result|warn}}<ref>Standard: https://apps.fedoraproject.org/kerneltest/logs/34940
sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS
Performance: https://apps.fedoraproject.org/kerneltest/logs/34942
All PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
| {{result|pass}}<ref>runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845 | GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
| {{result|pass}}<ref>Test suite called with default - PASS (except paxtest as always)
Test suite called with performance - PASS
</ref>
| <references/>
|-
| [[User:benjamind|benjamind]]
| VMware Workstation on Fedora 30 host (i7-6500U)
| {{result|pass}}<ref>cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately</ref>
| <references/>
|-
| [[User:calinoiualex|calinoiualex]]
| Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
| {{result|pass}}<ref>1. Pass
2. Pass
Ran with performance argument
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
| {{result|pass}}<ref>Ran trinity testings and scheduler testings suits. </ref>
| <references/>
|-
| [[User:danniel|danniel]]
| KVM
| {{result|pass}}<ref>works </ref>
| <references/>
|-
| [[User:dinostar|dinostar]]
| Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
| {{result|pass}}<ref>The following test was skipped, everything else was a pass.
./default/libhugetlbfs                                          SKIP</ref>
| <references/>
|-
| [[User:eboswell|eboswell]]
| Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
| {{result|pass}}<ref>Test suite called with performance. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
</ref>{{result|pass}}<ref>Test suite called with default. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:glb|glb]]
| Bare metal, Core i7-920, 12GB RAM
| {{result|pass}}<ref>All default test suite passed.</ref>
| <references/>
|-
| [[User:goodmirek|goodmirek]]
| bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
| {{result|pass}}<ref>KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.</ref>
| <references/>
|-
| [[User:heffer|heffer]]
| ThinkPad X1 Carbon 5th
| {{result|fail}}<ref>WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577
Works fine with kernel-5.1.18-300.fc30.x86_64</ref>{{result|fail}}<ref>{{bz|1724357}} Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357</ref>
| <references/>
|-
| [[User:idanka|idanka]]
| Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 /  GeForce GTX 1050
| {{result|warn}}<ref>./default/libhugetlbfs SKIP ./default/paxtest FAIL  all other pass
thirdparty/nvidia-module  error
performance: fatal error: rpc/rpc.h: No such file or directory</ref>
| <references/>
|-
| [[User:jlanda|jlanda]]
| bare metal ryzen 5 1600x
| {{result|pass}}
| <references/>
|-
| [[User:kiyer|kiyer]]
| Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
| {{result|pass}}
| <references/>
|-
| [[User:kparal|kparal]]
| Thinkpad T480s, Fedora 30
| {{result|pass}}
| <references/>
|-
| [[User:lewis41|lewis41]]
| i5-6500 CPU @ 3.20GHz
| {{result|pass}}
| <references/>
|-
| [[User:lewis41|lewis41]]
| i5-6500 CPU @ 3.20GHz - 8GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:lnie|lnie]]
| ProLiant SL4545 G7
| {{result|pass}}
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
| {{result|pass}}<ref>Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.</ref>
| <references/>
|-
| [[User:masami|masami]]
| Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
| {{result|pass}}<ref>Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days,  didn't get any kernel oops/warnings.</ref>
| <references/>
|-
| [[User:masami|masami]]
| Raspberry Pi 3B+ aarch64
| {{result|pass}}<ref>kernel regression tests passed. </ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Fedora 30 T480s i5-8250U iGPU
| {{result|pass}}
| <references/>
|-
| [[User:mimat|mimat]]
| fedora 30@i7-2630QM
| {{result|pass}}
| <references/>
|-
| [[User:mizhang|mizhang]]
| Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
| {{result|pass}}
| <references/>
|-
| [[User:mizhang|mizhang]]
| Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
| {{result|pass}}<ref>LTP from upstream
sched pass, syscalls failed with case move_pages12,  can pass, cve pass, commands pass, containers pass, dio pass
fs pass, fsx pass, math pass, hugeltb pass, mm  failed with case ksm06_1 and ksm06_2 , numa  failed with case move_pages12  , nptl pass, pty pass,timers pass, ipc pass, tracing pass</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:nah Fam|nah Fam]]
| vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
| {{result|warn}}<ref>Test 1
./default/cachedrop                                              FAIL     
Test suite complete                                              FAIL 
Test 2
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:nightromantic|nightromantic]]
| Bare metal, desktop, F30@Intel i3-8100
| {{result|warn}}<ref>./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS".
./runtests.sh -t performance -- "PASS"</ref>
| <references/>
|-
| [[User:numasan|numasan]]
| HP EliteBook 820 G4
| {{result|pass}}<ref>Test set: default</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
| {{result|pass}}<ref>./default/libhugetlbfs skipped as usual, default and performance passed.</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F30 KDE, Skylake laptop on kernel 4.2.2 from koji
| {{result|pass}}<ref>./default/libhugetlbfs skipped, default and performance passed. </ref>
| <references/>
|-
| [[User:pmeyer|pmeyer]]
| AMD® Athlon(tm) ii x2 250 processor × 2
| {{result|pass}}<ref>file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Banana Pi (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Mustang (xgene-1)
| {{result|pass}}<ref>make not installed on first run. Second attempt passed - https://apps.fedoraproject.org/kerneltest/logs/34914</ref>{{result|fail}}<ref>https://apps.fedoraproject.org/kerneltest/kernel/5.2.2-200.fc30.aarch64</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Pine 64 Plus (aarch64 sbc)
| {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34917</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 3B+ (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Trimslice (armhfp)
| {{result|warn}}<ref>Test suite complete - WARN
https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Wandboard Quad (armhfp)
| {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| <references/>
|-
| [[User:ralex|ralex]]
| Ryyzen 2600x | 16 GB Ram | Nvidia GTX 1080
| {{result|pass}}<ref>Default passed (https://apps.fedoraproject.org/kerneltest/logs/35167)
Performance passed (https://apps.fedoraproject.org/kerneltest/logs/35168)</ref>
| <references/>
|-
| [[User:rammodulus|rammodulus]]
| Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
| {{result|fail}}<ref>Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:rudrapratap|rudrapratap]]
| qemu-kvm-3.0.1-3.fc29.x86_64 , base -  fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
| {{result|pass}}<ref>Test suite called with default
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/selinux-dac-controls                                  PASS   
./default/paxtest                                                PASS   
./default/memfd                                                  PASS   
./default/stack-randomness                                      PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
./default/modsign                                                PASS   
./default/libhugetlbfs                                          SKIP   
./default/insert_leap_second                                    PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS  </ref>
| <references/>
|-
| [[User:salimma|salimma]]
| Bare metal: Thinkpad T480s
| {{result|pass}}<ref>Default and performance profiles pass</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| T470s
| {{result|pass}}<ref>Called with default</ref>
| <references/>
|-
| [[User:tmlgcq|tmlgcq]]
| QEMU with KVM Virtual
| {{result|pass}}
| <references/>
|-
| [[User:tmsp|tmsp]]
| Ryzen 1800X; 16 GB RAM; F30
| {{result|pass}}
| <references/>
|-
| [[User:user|user]]
| default
| {{result|pass}}
| <references/>
|-
| [[User:vascom|vascom]]
| Bare metal, Core i7-4470, 32GB RAM
| {{result|pass}}<ref>All good.</ref>
| <references/>
|-
| [[User:weswilliams|weswilliams]]
| VMware Workstation 15.1.0 on Fedora 30 host
| {{result|pass}}<ref>All default test suite passed.</ref>
| <references/>
|-
|}


   
   
[[Category:Fedora 31 Test Days]]
[[Category:Fedora 31 Test Days]]

Latest revision as of 06:50, 21 September 2019

Fedora Test Day
Echo-testing-48px.png
Kernel 5.2

Date 2019-07-22 to 2019-07-29
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.2.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.2 kernel for an existing installation from F30 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
JeremyM Sony Vaio Intel i5
Pass pass
[1]
  1. Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "
MidnightRAT Fedora 30 stock
Pass pass
[1]
  1. Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks.
alciregi Baremetal i5-7400 8GB RAM
Pass pass
[1]
  1. Test suite called with performance Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
Pass pass
[1]
  1. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
alciregi RPi3 armv7hl
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with destructive
  2. Test suite called with default
alciregi Scaleway START1-XS x86_64 cloud instance
Pass pass
[1]
  1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi aarch64 on KVM
Pass pass
[1]
  1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
alciregi vmware 4GB ram 2vcpu
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
archmunky Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
Warning warn
[1]
  1. Standard: https://apps.fedoraproject.org/kerneltest/logs/34940 sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS Performance: https://apps.fedoraproject.org/kerneltest/logs/34942 All PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
archmunky Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
Pass pass
[1]
  1. runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS
atim GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
Pass pass
[1]
  1. Test suite called with default - PASS (except paxtest as always) Test suite called with performance - PASS
benjamind VMware Workstation on Fedora 30 host (i7-6500U)
Pass pass
[1]
  1. cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately
calinoiualex Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
Pass pass
[1]
  1. 1. Pass 2. Pass Ran with performance argument Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
chuhu NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
Pass pass
[1]
  1. Ran trinity testings and scheduler testings suits.
danniel KVM
Pass pass
[1]
  1. works
dinostar Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
Pass pass
[1]
  1. The following test was skipped, everything else was a pass. ./default/libhugetlbfs SKIP
eboswell Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with performance. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
  2. Test suite called with default. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
glb Bare metal, Core i7-920, 12GB RAM
Pass pass
[1]
  1. All default test suite passed.
goodmirek bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
Pass pass
[1]
  1. KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.
heffer ThinkPad X1 Carbon 5th
Fail fail
[1]
Fail fail
[2]
  1. WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577 Works fine with kernel-5.1.18-300.fc30.x86_64
  2. RHBZ #1724357 Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357
idanka Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050
Warning warn
[1]
  1. ./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass thirdparty/nvidia-module error performance: fatal error: rpc/rpc.h: No such file or directory
jlanda bare metal ryzen 5 1600x
Pass pass
kiyer Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
Pass pass
kparal Thinkpad T480s, Fedora 30
Pass pass
lewis41 i5-6500 CPU @ 3.20GHz
Pass pass
lewis41 i5-6500 CPU @ 3.20GHz - 8GB RAM
Pass pass
lnie ProLiant SL4545 G7
Pass pass
luya HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
Pass pass
[1]
  1. Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.
masami Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
Pass pass
[1]
  1. Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.
masami Raspberry Pi 3B+ aarch64
Pass pass
[1]
  1. kernel regression tests passed.
mharpau Fedora 30 T480s i5-8250U iGPU
Pass pass
mimat fedora 30@i7-2630QM
Pass pass
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
Pass pass
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
Pass pass
[1]
  1. LTP from upstream sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass fs pass, fsx pass, math pass, hugeltb pass, mm failed with case ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass
monot0m Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
monot0m Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
nah Fam vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
Warning warn
[1]
  1. Test 1 ./default/cachedrop FAIL Test suite complete FAIL Test 2 ./performance/lmbench3 PASS Test suite complete PASS
nightromantic Bare metal, desktop, F30@Intel i3-8100
Warning warn
[1]
  1. ./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS". ./runtests.sh -t performance -- "PASS"
numasan HP EliteBook 820 G4
Pass pass
[1]
  1. Test set: default
ozeszty F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
Pass pass
[1]
  1. ./default/libhugetlbfs skipped as usual, default and performance passed.
ozeszty F30 KDE, Skylake laptop on kernel 4.2.2 from koji
Pass pass
[1]
  1. ./default/libhugetlbfs skipped, default and performance passed.
pmeyer AMD® Athlon(tm) ii x2 250 processor × 2
Pass pass
[1]
  1. file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
pwhalen Banana Pi (armhfp)
Pass pass
pwhalen Mustang (xgene-1)
Pass pass
[1]
Fail fail
[2]
pwhalen Pine 64 Plus (aarch64 sbc)
Pass pass
[1]
pwhalen Raspberry Pi 3B+ (armhfp)
Pass pass
pwhalen Trimslice (armhfp)
Warning warn
[1]
pwhalen Wandboard Quad (armhfp)
Pass pass
[1]
ralex 16 GB Ram | Nvidia GTX 1080
Pass pass
[1]
rammodulus Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
Fail fail
[1]
  1. Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
rudrapratap qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/selinux-dac-controls PASS ./default/paxtest PASS ./default/memfd PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/modsign PASS ./default/libhugetlbfs SKIP ./default/insert_leap_second PASS ./default/timer-overhead PASS Test suite complete PASS
salimma Bare metal: Thinkpad T480s
Pass pass
[1]
  1. Default and performance profiles pass
sumantrom T470s
Pass pass
[1]
  1. Called with default
tmlgcq QEMU with KVM Virtual
Pass pass
tmsp Ryzen 1800X; 16 GB RAM; F30
Pass pass
user default
Pass pass
vascom Bare metal, Core i7-4470, 32GB RAM
Pass pass
[1]
  1. All good.
weswilliams VMware Workstation 15.1.0 on Fedora 30 host
Pass pass
[1]
  1. All default test suite passed.