From Fedora Project Wiki

Fedora Test Day
Kernel 5.6

Date 2020-04-13 to 2020-04-20
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.6.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.6 kernel for an existing installation from F31 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems.
  • As this is the Fedora 32 shipping kernel, you can also test with any of the Fedora 32 nightlies
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
sumantrom KVM on T460s
Pass pass
[1]
udb28 liveusb on T430s
Fail fail

Default test suite. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

udb28 liveusb on T430s
Pass pass

Performance test suite. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

nasirhm KVM on X1 Carbon
Fail fail
Default test suite : paxtest Failed
nasirhm KVM on X1 Carbon
Pass pass
Performance test suite

Regression Test[edit]

User Profile Regression References
JoeHannes Asus N82JQ
Fail fail
[2]
  1. this is just an example
  2. Date: Tue 14 Apr 2020 01:01:46 PM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms
Mac tester Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U
Fail fail
[1]
  1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). Performance: terminal session is killed during the test.
Smyleon Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600
Warning warn
[1]
  1. 1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). 2. Performance: PASS. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
alciregi Dell XPS 13 9360, Intel i7-7500U
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 aarch64 (Fedora-IoT)
Pass pass
[1]
  1. 5.6.3-300.fc32.aarch64
alciregi Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-1H9, Intel i5-3340M
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amado86 Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
Fail fail
[1]
  1. 1. ./default/timer-overhead FAIL Unacceptable long delay; asked for 2000 usec, got 6136 usec Test failure. Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amado86 Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
Fail fail
[1]
  1. Standard tests = FAIL ./default/timer-overhead FAIL Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) Performance tests = PASS.
anonymous Acer Aspire A315-42
Fail fail
[1]
  1. 1. kernel-test-1586714524.log.txt ./default/libhugetlbfs SKIP ./default/cachedrop FAIL ./default/paxtest FAIL
anonymous Lenovo ThinkPad W530
Fail fail
[1]
  1. Date: Mon 13 Apr 2020 11:03:24 AM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: None
    ================================================[edit]

    Starting test ./default/sysfs-perms Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module insmod: ERROR: could not insert module ./minix.ko: Operation not permitted Unsigned module load failed in enforcing mode Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/timer-overhead cc timer-test.o -o timer-test Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/stack-randomness Starting test ./default/memfd memfd_test.c: In function ‘mfd_assert_get_seals’: memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]

      67 |  r = fcntl(fd, F_GET_SEALS);
         |      ^~~~~
    

    memfd_test.c: In function ‘mfd_assert_open’: memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]

     190 |  r = open(buf, flags, mode);
         |      ^~~~
         |      popen
    

    memfd_test.c: In function ‘mfd_assert_write’: memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]

     315 |  r = fallocate(fd,
         |      ^~~~~~~~~
         |      alloca
    

    memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/paxtest Executable heap (mprotect)  : Vulnerable Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop

    Setting time to Mon Apr 13 19:59:50 2020 Scheduling leap second for Mon Apr 13 20:00:00 2020 Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT Leap complete

anonymous Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
Fail fail
[1]
  1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
archmunky installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
Pass pass
[1]
  1. default = PASS, performance = PASS
archmunky installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
Pass pass
[1]
  1. installed, no updates: default = PASS, performance = PASS; installed, updated: default = PASS , performance = PASS
archmunky liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon
Fail fail
[1]
  1. default = fail on cachedrop, paxtest; performance = pass with getlist and getsummary permission denied errors
atim CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64
Pass pass
[1]
  1. All tests passed and all OK.
augenauf F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s
Pass pass
[1]
  1. kernel: 5.6.2-301.fc32.x86_64
didiksupriadi41 liveusb on ASUS X550ZE
Pass pass
[1]
Fail fail
[2]
  1. Performance test suite
  2. Default test suite : paxtest Failed
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31
Pass pass
[1]
  1. default = PASS, performance = PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
dvdantunes kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB
Fail fail
[1]
  1. Test suite: default Date: Sun 19 Apr 2020 02:44:30 AM EDT Kernel version: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/cachedrop ./default/paxtest Additional info: Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
evillagr RAM: 16GB
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
evillagr guest:AMD Opteron 63xx class CPU)
Fail fail
[1]
  1. libhugetlbfs SKIP, paxtest FAIL
fubuki bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G
Pass pass
[1]
  1. Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
garrmcnu Test image on VM (KVM)
Fail fail
[1]
  1. ./default/paxtest FAIL
gkaukola HP Pavilion dv6
Pass pass
greenid HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4
Pass pass
[1]
  1. ulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ibims Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM
Pass pass
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/paxtest SKIP ./default/selinux-dac-controls SKIP ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
jobus HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
Fail fail
[1]
  1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms

    Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None

jobus Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
Fail fail
[1]
  1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
joecastrop ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image
Pass pass
[1]
  1. RHBZ #1562347 Test suite called with default: All test pass except ./default/paxtest Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> https://bugzilla.redhat.com/show_bug.cgi?id=1562347 Library already installed: Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.
jpesco HP Elite 8300 Intel® Core™ i5-3470
Pass pass
kiko964 ASUS X554L Intel Core i3-5010U
Fail fail
[1]
  1. Date: Tue 14 Apr 2020 07:06:47 AM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/cachedrop Warned Tests: None
    ================================================[edit]

    Starting test ./default/sysfs-perms Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestError: Can't free dentries and inodes 395696 395184 Could not run tests Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/timer-overhead cc timer-test.o -o timer-test Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/stack-randomness Starting test ./default/memfd memfd_test.c: In function ‘mfd_assert_get_seals’: memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]

      67 |  r = fcntl(fd, F_GET_SEALS);
         |      ^~~~~
    

    memfd_test.c: In function ‘mfd_assert_open’: memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]

     190 |  r = open(buf, flags, mode);
         |      ^~~~
         |      popen
    

    memfd_test.c: In function ‘mfd_assert_write’: memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]

     315 |  r = fallocate(fd,
         |      ^~~~~~~~~
         |      alloca
    

    memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/paxtest Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop

    Setting time to Tue Apr 14 19:59:50 2020 Scheduling leap second for Tue Apr 14 20:00:00 2020 Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT Leap complete


    Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

kle testkernel ISO on KVM (Host: Lenovo Thinkpad T480)
Pass pass
[1]
  1. 1. Performance test suite: PASSED 2. Default test suite: PASSED
lbrabec F32, Lenovo T480s (i7-8650U)
Fail fail
[1]
  1. ./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
lfc RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
liwan HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space
Pass pass
[1]
  1. ltp/lite
luya HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM
Pass pass
makelix Lenovo ThinkPad T470s
Fail fail
[1]
  1. libhugetlbfs SKIP, paxtest FAIL
makelix Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz)
Fail fail
[1]
  1. libhugetlbfs SKIP, paxtest FAIL
malucious Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta
Pass pass
[1]
  1. ./default/libhugetlbfs and ./default/paxtest were skipped.
marc84 USB kerneltest-5.6.3.iso on Lenovo ideapad Y570
Warning warn
[1]
  1. Running Both Basic and Performance test Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
mharpau Thinkpad T480s, i5-8250U, iGPU
Pass pass
[1]
  1. everything working as expected
molli123 E3-1240 v6, 32GB, 1060 with nouveau driver
Pass pass
[1]
  1. everything working as expected
mosesdenny
Pass pass
[1]
  1. Test suite called with default ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS Test suite complete PASS Thu 16 Apr 2020 04:11:15 PM EDT ./performance/lmbench3 PASS Test suite complete PASS
nasirhm KVM on X1-Carbon
Fail fail
[1]
  1. ./default/paxtest FAIL ./default/libhugetlbfs SKIP
nchudnoff Guest: 6 GB RAM)
Pass pass
[1]
  1. All passed (libhugetlbfs SKIP, paxtest SKIP) Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
nielsenb HP Compaq 8510w Intel T9300 AMD RV630
Pass pass
[1]
  1. Performance test suite Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
norbertj Ideapad with Core i3-6006U and 8 GB memory
Fail fail
[1]
  1. paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
norbertj Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450
Fail fail
[1]
  1. paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
novicejava1
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
pfrenard Dell Inspiron 7000 (i7-7500U)
Fail fail
[1]
  1. ./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED
quiet Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB
Fail fail
[1]
  1. Default test suite ./default/paxtest FAIL Performance PASS
roypen Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM
Pass pass
[1]
Pass pass
[2]
  1. Performance test suite: PASSED
  2. Default test suite: PASSED
sassam Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+
Pass pass
[1]
  1. Works for me. Regression tests passed on both devices.
simobonfo kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u
Fail fail
[1]
  1. ########## ./runtests.sh ########## All PASS exept: ./default/libhugetlbfs SKIP ./default/paxtest FAIL Test suite complete FAIL
                      1. ./runtests.sh -t performance ##########
    Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied. /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
stathisl ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned
Fail fail
[1]
  1. Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL. Date: Mon 13 Apr 2020 12:31:38 PM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: None
suve AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta
Pass pass
[1]
  1. Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.
tgerov ThinkPad t480s, i7-8550U, 16G
Fail fail
[1]
  1. ./default/libhugetlbfs SKIP ./default/paxtest FAIL
theunrealgeek Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date
Pass pass
[1]
  1. Kernel: 5.6.3-300.fc32.x86_64 Both regular and performance tests pass and has uploaded results automatically as well.
thuzzik
Pass pass
thuzzik Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
udb28 Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096
Fail fail
[1]
  1. ./default/paxtest FAIL Vulnerability status: spec_store_bypass: Vulnerable spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling
udb28 Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2
Pass pass
[1]
  1. Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64
visitor Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO
Pass pass
[1]
  1. first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP