From Fedora Project Wiki

Fedora Test Day
Kernel 5.4

Date 2019-12-09 to 2019-12-16
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.4.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated iso test day image or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.4 kernel for an existing installation from F31 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
Makman2 GNOME Boxes VM (QEMU, 2GB RAM, 21.5GB disk) on Dell OptiPlex 7060 w/ Fedora 30
Fail fail
[1]
  1. ./default/cachedrop FAIL Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0405142 s, 2.6 GB/s TestError: Can't free dentries and inodes 393672 393328 Could not run tests Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
Paninaro Using the test image provided for testing on an Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2
Pass pass
[1]
Fail fail
[2]
  1. Performance test PASSED
  2. From the logs the paxtest on default test failed for this reason: Executable heap (mprotect)  : Vulnerable As suggested i previously gave the command> sudo semanage boolean -m --off selinuxuser_execheap Other issues: the live image did not come with vim and libtirpc-devel installed so i had to install those packages manually.
aernhart Dell XPS 15 9560 https://linux-hardware.org/?probe=f1acfe989d
Warning warn
[1]
  1. With 'semanage boolean -m --on selinuxuser_execheap': 'runtests.sh' results: libhugetlbfs was SKIP, paxtest was FAIL, all others PASS. './runtests.sh -t performance' was PASS. All results uploaded.
agarwalvarshit Oracle VM 4GB RAM DELL Quad Core
Pass pass
alciregi Dell XPS 13 9360
Fail fail
[1]
  1. paxtest FAIL
alciregi Intel i5-7400 desktop PC
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 armv7hl F31
Pass pass
[1]
  1. default PASS, destructive PASS,
alciregi Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
Fail fail
[1]
  1. paxtest FAIL
alciregi Toshiba Portege R930 Intel i5-3340M
Pass pass
aludwar Intel(R) Core(TM) i7-5930K CPU @ 3.50GHz - Desktop PC - 5.3.13-200.fc30.x86_64 - libvirt-daemon-kvm-5.1.0-9.fc30.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
aludwar Lenovo X1 Carbon 6th Gen
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest FAIL ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
atdt VM on Ryzen5 3600
Warning warn
[1]
  1. paxtest fail
atim CPU: Quad Core AMD Athlon X4 845; Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.36
Fail fail
[1]
Pass pass
[2]
  1. RHBZ #1781175 New 5.4.2 kernel have enormous size. Filed a bug in RHBZ.
  2. All tests passed, except 'paxtest', as always.
bfrenzel Latitude 7390 2-in-1
Fail fail
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/modsign PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/selinux-dac-controls PASS ./default/paxtest FAIL ./default/memfd PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
bfrenzel Librem 13 v4 4.0
Pass pass
[1]
Fail fail
[2]
  1. Performance: PASS
  2. Test suite called with default ./default/stack-randomness PASS ./default/memfd PASS ./default/paxtest FAIL ./default/modsign PASS ./default/sysfs-perms WARN ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS Test suite complete FAIL
bfrenzel vSphere ESXi VM HW Version 13
Fail fail
[1]
  1. Same as "vSphere ESXi VM HW Version 14"
bfrenzel vSphere ESXi VM HW Version 14
Fail fail
[1]
  1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest FAIL ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
breier Dell XPS 13 9380
Fail fail
[1]
  1. 1. paxtest FAIL
chuhu x86_64 kvm
Fail fail
[1]
  1. RHBZ #1782736 it's a kernel panic issue on coredump.
conscript89 Lenovo w541
Fail fail
[1]
  1. paxtest from default suite failed performance suite passed
coppertint Lenovo IdeaPad Yoga 13 (2012) - i5-3317U, 4GB
Warning warn
[1]
  1. * paxtest FAIL with selinuxuser_execheap enabled; * performance test suite encountered OOM, session killed
decathorpe AMD Ryzen 1700X / ASUS PRIME-X370-PRO / NVidia 1070 (negativo17)
Warning warn
[1]
  1. ./default/cachedrop FAILed on the first run (this happens sometimes), but it passed on a second and third run. everything else was PASS or SKIP all three times.
decathorpe DELL XPS 13 9370
Pass pass
[1]
  1. PASS except ./default/libhugetlbfs SKIP
ejnersan HP Elitebook G4 850
Fail fail
[1]
  1. paxtest FAILED, libhugetlbfs SKIP performance test PASS
ernst AMD® Athlon(tm) ii x2 250 processor × 2 , AMD® Rs880, Version 3.34.2, 64-bit
Pass pass
[1]
  1. Kernel: 5.4.2-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
eznoka VM on Ryzen 3900x
Pass pass
faramirza VirtualBox 6.0.14 running on Intel(R) Core(TM) i7-9750H
Fail fail
[1]
Fail fail
[2]
  1. Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/posix_timers PASS ./default/paxtest FAIL ^C./default/insert_leap_second FAIL ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/sysfs-perms PASS Test suite complete FAIL
  2. Test does not complete. [root@localhost kernel-tests]# ./runtests.sh Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/cachedrop FAIL ./default/posix_timers PASS ./default/paxtest FAIL
filocost Asus transformer t200t
Warning warn
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/paxtest FAIL ./default/memfd PASS ./default/insert_leap_second PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... FAS password: Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Test suite called with performance Using config in CONFIG.new-host mer 11 dic 2019, 09:14:50, CET Latency measurements mer 11 dic 2019, 09:17:43, CET Calculating file system latency mer 11 dic 2019, 09:17:45, CET Local networking mer 11 dic 2019, 09:21:46, CET Bandwidth measurements mer 11 dic 2019, 09:28:34, CET Calculating context switch overhead mer 11 dic 2019, 09:28:41, CET ./performance/lmbench3 PASS Test suite complete PASS
frantisekz Thinkpad T470s, Intel(R) Core(TM) i7-7600U
Pass pass
gkamathe Intel (Skylake, IBRS) VM
Fail fail
[1]
  1. cachedrop FAIL paxtest FAIL
goodmirek HP Elitebook 850 G4, i5-7200U w/embedded GPU
Fail fail
[1]
  1. paxtest FAILED, libhugetlbfs SKIP, performance test PASS bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4, KDE [OK], VPN IPsec [OK], VirtualBox 6.0.14 [OK], podman 1.6.2 [OK]
grenier Intel Core 2 Duo CPU E6550 Desktop
Pass pass
gtb Thinkpad T510
Pass pass
himanshutak8 Lenovo Z51 core i7, VM run with 6GB RAM
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ibims
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ^C./default/insert_leap_second FAIL ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
            1. tested as a Vbox Guest with the Test-Image mentioned in the wiki-Article. "Insert_leap_second" does not finish after more than one hour, so i pressed Ctrl-C.
idanka Fujitsu Esprimo p520 E85+
Fail fail
[1]
  1. 1. paxtest FAIL
imabug QEMU/KVM on a Dell Precision 3620 Xeon E3-1240
Fail fail
[1]
  1. paxtest failed. performance test passed
itrymybest80 PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB (mesa 19.2.7), 970 EVO on Fedora 31
Fail fail
[1]
  1. 1) default regression test FAIL ./default/libhugetlbfs SKIP ./default/paxtest FAIL ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/cachedrop PASS ./default/posix_timers PASS 2) performance regression test PASS 3) vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled 4) additional info (bug?): not able to find all encrypted luks drives/partitions on my system; though they all work on all of my sata3 ports when connected separately.
ivanmironov MacBook Pro 15" mid 2015 / MacBookPro11,4 / Intel(R) Core(TM) i7-4770HQ CPU @ 2.20GHz
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ivanmironov PC / AMD FX(tm)-8350 Eight-Core Processor
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
joepadmiraal Dell XPS 15 9560
Pass pass
[1]
  1. Done with the test day image on physical hardware. The normal test works fine but the performance test gives a compilation error. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete PASS

    bash-5.0$ sudo ./runtests.sh -t performance No .config file found. You can cp config.example .config and edit as needed for easier log submission. Test suite called with performance In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory

      38 | #include <rpc/rpc.h>
         |          ^~~~~~~~~~~
    

    compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory

      38 | #include <rpc/rpc.h>
         |          ^~~~~~~~~~~
    

    compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS

    Test suite complete PASS

    Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1576234233.log.txt

kcoraz Lenovo ThinkPad X390 (i5-8265U / 16G / secure boot / tpm disabled because of 1770021)
Warning warn
[1]
  1. paxtest FAILED, libhugetlbfs SKIP
knarra LENOVO Thinkpad T460s
Fail fail
[1]
  1. ./default/paxtest FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state
kronenpj
Fail fail
kronenpj Dell XPS 13 9370, QEmu & VirtualBox
Warning warn
[1]
  1. Can't reproduce what I was going to report.
kulish QEMU/KVM on Lenovo ThinkPad T440P Intel(R) Core(TM) i7-4810MQ CPU @ 2.80GHz
Fail fail
[1]
  1. 1. paxtest FAIL 2. performance test PASS
ledufff Thinkpad E495 AMD® Ryzen 5 3500u'
Fail fail
[1]
  1. ./default/paxtest FAIL ./default/libhugetlbfs SKIP Test suite complete FAIL
liwang@redhat.com Dell Inc. PowerEdge R330 (SKU=NotProvided;ModelName=PowerEdge R330) Intel(R) Xeon(R) CPU E3-1220 v5 @ 3.00GHz 32768 MB memory, 600 GB disk space
Pass pass
[1]
  1. LTP lite test on x86_64
luya HP Envy x360 15 Ryzen 2500U (Fedora 31)
Warning warn
[1]
  1. [1] WARN for ./runtest.sh [2] PASS for ./runtest.sh -t performance
m0stly R5 3600 / Asus Prime X470 / 5700XT
Fail fail
[1]
  1. paxtest - FAILED libhugetlbfs - SKIPPED Performance tests - PASS
marc84 Lenovo Ideapad Y570 Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz
Warning warn
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
masami fedora 31. i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module.
Pass pass
[1]
  1. i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module.
mharpau Thinkpad T480s, i5-8250U, iGPU
Pass pass
mikoim ThinkPad X1 Carbon 4th 20FBCTO1WW
Pass pass
mimat i7-2630QM
Pass pass
[1]
  1. All passed and vga switcheroo is working fine! :)
monterr AMD Rysen 1700
Fail fail
[1]
  1. paxtest FAIL
monterr AMD rysen 1700 + ASUS ROG CROSSHAIR VI HERO
Fail fail
[1]
  1. paxtest failed. performance test passed
mzink ThinkPad T480s
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/memfd PASS ./default/paxtest PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/modsign PASS Test suite complete PASS
n0cturnal Asus X555QG
Fail fail
[1]
  1. paxtest FAIL sysfs-perms WARN libhugetlbfs SKIP
nielsenb Compaq 8510w Intel T9300 AMD RV630 BIOS
Pass pass
nitsharma Thinkpad T580s, i7-vpro
Pass pass
nitss007 Thinkpad T580s, i7-vpro
Pass pass
paalzzot HP probook 450 g5 i7 8th
Pass pass
penguinn AMD Phenom II X4 955 - M4A88T-V - Desktop PC
Pass pass
pifang Dell Precision R7610 E5-2620 4G
Pass pass
[1]
  1. ltp mm, syscalls testing.
pifang PowerEdge R330 E3-1240L v5 32G
Pass pass
[1]
  1. memory regression testing
pixom.ai@gmail.com Shashibhushan Singh
Pass pass
polczak ThinkPad E585 (Version: AMD Ryzen 7 2700U with Radeon Vega Mobile Gfx)
Pass pass
[1]
  1. Test suite called with default ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/modsign PASS Test suite complete PASS
polczak ThinkPad X1 Carbon 7th
Pass pass
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/memfd PASS ./default/cachedrop PASS ./default/paxtest PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS
prabhakarpujeri VM
Fail fail
[1]
  1. paxtest
pwhalen Ampere eMAG (aarch64)
Pass pass
pwhalen Mustang (xgene-1-aarch64)
Pass pass
[1]
  1. spectre_v2:Vulnerable
pwhalen Raspberry Pi 2
Pass pass
pwhalen Seattle Overdrive (aarch64)
Fail fail
[1]
  1. cachedrop FAIL spec_store_bypass:Vulnerable spectre_v2:Vulnerable
pwhalen Wandboard Quad (armhfp)
Pass pass
quiet
Pass pass
[1]
  1. Memory: 3.8 GiB Processor: Intel Core Processor (Skylake, IBRS) × 2 Graphics: llvmpipe (LLVM 9.0, 256 bits) GNOME: Version 3.34.2 OS type: 64-bit Virtualization: KVM Disk: 21.5 GB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Default suite Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/memfd PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/paxtest FAIL ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/posix_timers PASS Test suite complete FAIL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ performance suite ./performance/lmbench3 PASS Test suite complete PASS
robinkb HP Envy x360 (AMD Ryzen 7 3700U)
Pass pass
rosepeach Lenovo X1 Carbon 7th Gen
Fail fail
[1]
  1. Test suite called with default ./default/libhugetlbfs SKIP ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/paxtest FAIL ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/modsign PASS ./default/memfd PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
roypen Test kerneltest-5.4.iso libvirt 4GB RAM, 16GB disk, 2 vCPUs custom (IvyBridge-IBRS) on ThinkPad T430
Fail fail
[1]
Fail fail
Pass pass
[2]
  1. Test suite called with default (FAIL): ./default/paxtest - FAIL ./default/libhugetlbfs- SKIP everything else - PASS
  2. 1. Test suite called with performance - PASSED 2. Test suite called with default (FAIL): ./default/paxtest - FAIL ./default/libhugetlbfs- SKIP everything else - PASS
rudrapratap base system -- NAME=Fedora VERSION="31 (Workstation Edition)" , installed -- kvm , base ram - 8gb, vm(ram given) - 4 gb, 2 cpu processor,
Fail fail
[1]
  1. default: fail, performance: pass, records analyzed link: https://hackmd.io/@fcEf9Yj-S-GS7Phmn6Ahzw/H190JBT6r
shiwanibiradar QEMU/KVM on lenovo ideapad 330 i5 8th gen
Fail fail
[1]
Fail fail
[2]
Pass pass
[3]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
  2. paxtest failed
  3. paxtest fail
spathare VM Box
Pass pass
stklcode qemu (intel Skylake-X, F31 Host)
Warning warn
[1]
  1. 1. default: PASS (libhugetlbfs skipped) 2. performance: PASS 3. destructive: paxtest FAIL
sumantrom Fedora 31 T460s, testday iso
Fail fail
[1]
  1. pax test failed Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
szpak Hyperbook NH5/Clevo NH55RCQ with GeForce GTX 1660 Ti mobile on Fedora 30
Fail fail
[1]
  1. RHBZ #1783765 Unable to perform tests as due regression in kernel 5.3/5.4 (nouveau driver) system is pretty unstable. Upstream bug: https://gitlab.freedesktop.org/xorg/driver/xf86-video-nouveau/issues/516 (Fedora bug: https://bugzilla.redhat.com/show_bug.cgi?id=1783765)
t3rm1n4l Dell Inspiron 3180 11"
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tboizard Virtual Box / Core i7 6700 Nvidia GTX 1060 6G
Pass pass
[1]
  1. I have run standard and performance tests before upgrading (kernel 5.3.15) did the upgrade to 5.4.2 and compared. My report concerns both virtual box simlation and bare metal. The tests pass, no regression performance wise and no stability issue. Date: mar. déc. 10 21:09:12 CET 2019 Test set: default Kernel: 5.4.2-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None ============================================================
twelvevolt Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz
Pass pass
[1]
  1. ./default/libhugetlbfs SKIP
wurstsemmel Dell XPS 13 9380
Fail fail
[1]
  1. paxtest FAIL after execution of "sudo semanage boolean -m --on selinuxuser_execheap", otherwise PASS. libhugetlbfs SKIP. performance PASS, but /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 .
zlobniyshurik P9D-WS/Xeon e3-1245v3/16GB ECC/HD6950
Fail fail
[1]
  1. ./default/paxtest - FAILED; ./default/libhugetlbfs - SKIPPED; other tests (include perfomance tests) - PASS
zlobniyshurik X470 Aorus Gaming 7/Ryzen3900X/32GB ECC
Pass pass
[1]
  1. ./default/paxtest & ./default/selinux-dax-control tests skipped due selinux off