From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 24: Line 24:
== Prerequisites for Test Day ==  
== Prerequisites for Test Day ==  


* A fully updated [https://jforbes.fedorapeople.org/kerneltest-5.3.iso test day image] or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* A fully updated [https://xyz.iso test day image] or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* The 5.3 kernel for an existing installation from [https://koji.fedoraproject.org/koji/taskinfo?taskID=37989138 F30 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
* The 5.3 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1391730 F30 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
* Enough free space on HDD
* Enough free space on HDD


Line 41: Line 41:
== Test Results ==
== Test Results ==


=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:GoodMirek|GoodMirek]]
| Dell XPS M1330, CPU intel Core2 Duo T8100, GPU Geforce 8400M GS
| {{result|pass}}<ref>FC31, 5.3.2-300.fc31.x86_64</ref>
| <references/>
|-
| [[User:GoodMirek|GoodMirek]]
| HP Elitebook 850 G4, i5-7200U w/embedded GPU
| {{result|warn}}<ref>{{bz|1759289}} All good, just this kernel takes double time to boot to LUKS password prompt, see the bug https://bugzilla.redhat.com/show_bug.cgi?id=1759289</ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Fedora 30 WS with Koji 5.3.2-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, NV124 [NVIDIA GeForce GTX 970], 16GB RAM, 250GB SSD
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted. </ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Test Day Image 5.3.1-300.fc30.x86_64 on HP 250 G5 notebook, i5-7200U CPU @ 2.50GHz × 4, Intel HD Graphics 620 (Kaby Lake GT2), 4GB RAM, 128GB SSD.
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted. </ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Test Day Image 5.3.1-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, Intel® HD Graphics 530 (Skylake GT2), 16GB RAM, 250GB SSD
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted.</ref>
| <references/>
|-
| [[User:Paninaro|Paninaro]]
| Official Test Day Live image on a Notebook HP 650 Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2  RAM 3.7 GiB Graphics Intel® Ivybridge Mobile uname -a : Linux localhost-live 5.3.1-300.fc30.x86_64 #1 SMP Fri Sep 27 14:38:54 UTC 2019
| {{result|pass}}<ref>No problems spotted in this kernel, so i consider both the tests PASSED. The default test warn, is not a big issue as the directory /sys/kernel/debug is 700 so it really doesn't matter the file permission in that folder. For the performance test, installing libtirpc-devel and giving the executable permissions to getlist and getsummary files, solve the issue and the performance test is PASSED with no errors: https://apps.fedoraproject.org/kerneltest/logs/35994</ref>{{result|warn}}<ref>I could mark the test passed but i prefer to give some info instead:
Kernel regression default test result in WARN. Looking at the log https://apps.fedoraproject.org/kerneltest/logs/35991 the reason is: Found world-writable files in sysfs.
/sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
About performance test, there is an issue with the live image, it does not come with package libtirpc-devel installed, so the compilation terminate with fatal error, the problem is that the performance test exit with result PASS and report a passed test. This is a bug, imho, as it consider passed a test that was not executed. Btw after installing libtirpc-devel the compilation goes on and it runs some tests like Latency measurements, Calculating file system latency, Local networking, Bandwidth measurements, Calculating context switch overhead and than it stops again with error /bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
And again the test result in a PASS
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS 
So is a call for fixing some bugs in the kernel-test suite.
</ref>
| <references/>
|-
| [[User:agarwalvarshit|agarwalvarshit]]
| Oracle VM  4Gb Ram i3 processor
| {{result|fail}}<ref>est suite called with default
./default/libhugetlbfs                                          SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        FAIL   
^C./default/insert_leap_second                              FAIL   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                FAIL   
./default/stack-randomness                                      PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:albertopatino1|albertopatino1]]
| Lenovo P52, Intel(R) Xeon(R) E-2176M  CPU @ 2.70GHz, 4K Display, 128Gb RAM, Disk /dev/nvme1n1 KXG5AZNV1T02 TOSHIBA, e1000e: enp0s31f6 NIC Link is Up 1000 Mbps Full Duplex
| {{result|pass}}<ref>{{bz|1752961}} Fedora Test Day Image. Results from sudo ./runtests.sh
Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    PASS   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              PASS
ASIDE: FedoraTestDay Image works fine in this machine with profile described above. However same computer has Fedora 30 upgraded to F31. Same kernel (but f31) is causing kernel panic. Computer is not booting. </ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| KVM, RAM 2GB, BIOS
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 aarch64 F31
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 armv7hl F31
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930 i5 4GB RAM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| KVM, 2 Core, 4GB RAM, UEFI
| {{result|pass}}<ref>Both Passed but performance log would not upload
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845; Kernel: 5.3.1-300.fc31.x86_64; Graphics:  Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 435.21
| {{result|pass}}<ref>Test suite PASS</ref>
| <references/>
|-
| [[User:bradfordcp|bradfordcp]]
| Official Test Day Live Image on Dell Precision 5530. Intel Core i7-8850H (Six Core 2.60GHz, 4.30GHz Turbo, 9MB 45 W). 32 GB DDR4-2666MHz SDRAM Non-ECC. Nvidia Quadro P1000 w/4GB GDDD R5. Intel Wifi Link 9260 2x2 802.1 1AC+BT 5.0 vPro Wireless
| {{result|pass}}<ref>Clean PASS with a SKIP on libhugetlbfs.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:bradfordcp|bradfordcp]]
| Official Test Day Live Image on Dell XPS 9570. 8th Generation Intel Core i9-8 950HK Processor (12MB Cache, u p to 4.8 GHz, 6 cores). 32GB 2x16GB DDR4-2666MHz. NVIDIA GeForce GTX 1050Ti with 4GB GDDR5. Killer 1535 2x2 802.11ac Wi-Fi Wireless + Bluetooth 4.2
| {{result|pass}}<ref>Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                SKIP   
./default/cachedrop                                              SKIP   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    SKIP   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  SKIP   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |  static psize;
      |        ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
  94 |  return;
      |  ^~~~~~
lib_sched.c:46:1: note: declared here
  46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
      | ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
  207 |  retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
      |            ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
  231 |  retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
      |          ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  149 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  76 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  157 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  153 |    if (parallel <= 0) lmbench_usage(argc, argv, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  53 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
  167 |  static count = 0;
      |        ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  41 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  136 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  116 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  78 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  58 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  492 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  60 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  55 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/ccYbciYF.o: in function `setup_names':
lat_fs.c:(.text+0x836): warning: the use of `tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  182 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  42 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  46 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  45 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  84 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  203 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  393 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  69 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  413 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  70 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  123 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  66 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  39 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  204 |  lmbench_usage(ac, av, usage);
      |  ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  40 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
22219MB OK
22219MB OK
22219MB OK
mhz: should take approximately 15 seconds
Using config in CONFIG.localhost.localdomain
Tue 01 Oct 2019 02:39:04 AM EDT
Latency measurements
Tue 01 Oct 2019 02:39:44 AM EDT
Calculating file system latency
Tue 01 Oct 2019 02:40:05 AM EDT
Local networking
Tue 01 Oct 2019 02:43:52 AM EDT
Bandwidth measurements
Tue 01 Oct 2019 02:56:19 AM EDT
Calculating context switch overhead
Tue 01 Oct 2019 02:56:56 AM EDT
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Traceback (most recent call last):
  File "./fedora_submit.py", line 45, in <module>
    password=password
  File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
    openid_insecure=self.openid_insecure)
  File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:carlhuby|carlhuby]]
| Toshiba Sattelite P50t - Intel i7-4720HQ
| {{result|pass}}<ref>Passed Test Suite</ref>
| <references/>
|-
| [[User:chrismurphy|chrismurphy]]
| HP Spectre, intel i7-6500U, Skylake GT2 [HD Graphics 520]
| {{result|fail}}<ref>{{bz|1781288}} {{bz|1780800}} 1781288: kernel/trace/trace.c:8106 create_trace_option_files, taints kernel
1780800: GPU hang</ref>
| <references/>
|-
| [[User:dan1mal|dan1mal]]
| VMware Workstation 15 player VM - 2gb memory, 1 processor, 20gb hd
| {{result|pass}}<ref>Test 1:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
Test 2:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:filip|filip]]
| AUSU t200t notebook transformer
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>{{result|pass}}
| <references/>
|-
| [[User:garrmcnu|garrmcnu]]
| Test image on VM (KVM)
| {{result|pass}}<ref>Default and performance tests passed</ref>
| <references/>
|-
| [[User:himank98|himank98]]
| Oracle VM 4gb RAM i7 processor
| {{result|fail}}<ref>/default/insert_leap_second                                    FAIL   
./default/stack-randomness                                      PASS   
./default/mq-memory-corruption                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                PASS   
./default/selinux-dac-controls                                  PASS   
./default/cachedrop                                              PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:himanshutak8|himanshutak8]]
| Lenovo z51 with i7 processor(with 16gb RAM) test in Orcale VirtualBox VM(Machine running on i7 processor and 4GB RAM )
| {{result|fail}}<ref>Test suite called with Performance Failed. Script Stuck at Bandwidth Measurements for a long(wait to execute further about 2hrs)  after that it failed.</ref>{{result|fail}}<ref>Test Suite called with default failed on ./default/insert_leap_second while overall Test Suit Complete status is FAILED
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:hitesh0078|hitesh0078]]
| Test in Oracle Virtual Box VM Machine running on i5 processor and 4GB RAM
| {{result|fail}}<ref>Test suite called with default
./default/stack-randomness                                      PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/paxtest                                                PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
 
^C./default/insert_leap_second                                    FAIL   
./default/posix_timers                                          PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
Test suite complete                                              FAIL   
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:holishing|holishing]]
| OS: Fedora 31 (Thirty One) x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:joepadmiraal|joepadmiraal]]
| XPS 15 9560, Intel i7-7700HQ, NVIDIA GeForce GTX 1050 Mobile, 16GB
| {{result|pass}}<ref>1. PASSED
2. Error while compiling:
bash-5.0$ sudo ./runtests.sh -t performance
Test suite called with performance
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
  38 | #include <rpc/rpc.h>
      |          ^~~~~~~~~~~
compilation terminated.
</ref>
| <references/>
|-
| [[User:kostera|kostera]]
| Dell Inspiron 5570 i3-8130U; 12GB RAM; Kingston A400 M.2 SATA III SSD; Fedora 31 BETA Workstation/GNOME kernel 5.3.1-300.fc31.x86_64
| {{result|fail}}<ref>[inspiron@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/modsign                                                PASS   
./default/paxtest                                                FAIL   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/timer-overhead                                        FAIL   
./default/sysfs-perms                                            PASS   
./default/posix_timers                                          PASS   
./default/mq-memory-corruption                                  PASS   
./default/insert_leap_second                                    PASS   
./default/cachedrop                                              FAIL   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
./runtest.sh: line 8: make: command not found
./runtest.sh: line 9: make: command not found
./runtest.sh: line 13: make: command not found
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Traceback (most recent call last):
  File "./fedora_submit.py", line 45, in <module>
    password=password
  File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
    openid_insecure=self.openid_insecure)
  File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Missing argument: auth_module
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ uname -a
Linux localhost.localdomain 5.3.1-300.fc31.x86_64 #1 SMP Tue Sep 24 21:00:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
</ref>
| <references/>
|-
| [[User:lewis41|lewis41]]
| CPU: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 8GB Samsung SSD 850
| {{result|pass}}<ref>Passed default/performance test suite</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz
| {{result|pass}}<ref>Performance suite has passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>{{result|fail}}<ref>The `paxtest` was skipped, so was `selinux-dac-controls`. The `cachedrop` failed. The overall result of the default test suite was fail.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 15 Ryzen 2500U (Fedora 31)
| {{result|pass}}<ref>./default/sysfs-perms  WARN   
</ref>
| <references/>
|-
| [[User:malucious|malucious]]
| gnome-boxes guest using the test image. Host: Asus Z170A i7-6700K
| {{result|pass}}<ref>./runtests.sh -t performance PASSED.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>{{result|fail}}<ref>./runtest.sh Failed.  ./default/cachedrop Failed.  ./default/libhugetlbfs Skipped.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| Test Day Image on VirtualBox
| {{result|warn}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:masami|masami]]
| fedora 30, 5.3.2-300.fc30.x86_64. i7-9700K(UHD Graphics 630)
| {{result|fail}}<ref>{{bz|1758831}} Sorry, I made mistake to set bug number. I reported #1758831 .  GDM login screen doesn't show up on kernel 5.3.2</ref>{{result|fail}}<ref>{{bz|1752961}} GDM login screen doesn't show.</ref>
| <references/>
|-
| [[User:maxishere|maxishere]]
| Fedora Server 30 Image on DigitalOcean with Kernel 5.3.2-300 from Koji
| {{result|pass}}<ref>Everything passed but the performance test had some warnings about implicit-function-declaration on the function lmbench_usage(ac, av, usage)</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Fedora 30 T480s i5-8250U 24GB RAM iGPU
| {{result|pass}}<ref>Both default and performance: PASSED</ref>
| <references/>
|-
| [[User:mimat|mimat]]
| Testday iso. lenovo w520 with optimus.
| {{result|pass}}<ref>Both default and performance: PASSED. But I had problem with optimus gfx, discrete gfx was always powered on. Had similar problem before when testing on my daily f30 installation.
</ref>
| <references/>
|-
| [[User:mimat|mimat]]
| w520. f30 fully updated. 5.3.2
| {{result|pass}}<ref>{{bz|1757891}} Everything besides properly working optimus graphics is working. </ref>
| <references/>
|-
| [[User:mzink|mzink]]
|
| {{result|pass}}<ref>{{bz|1752961}} Lenovo t480s - kernel 5.3 works fine, but only with TPM disabled. Kernel panic with TPM enabled (BZ 1752961)</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| Compaq 8510w Intel T9300 AMD RV630 BIOS
| {{result|pass}}
| <references/>
|-
| [[User:nightromantic|nightromantic]]
| Fedora 30 fully updated; kernel 5.3.1-300.fc31.x86_64 (Koji); Desktop system, CPU: Intel Core i3-8100, m/b ASUS PRIME B360-PLUS (Intel B360 Chipset)
| {{result|warn}}<ref>SKIP on libhugetlbfs, WARN on sysfs-perms, all others PASS</ref>
| <references/>
|-
| [[User:quiet|quiet]]
|
| {{result|pass}}<ref>1.test) ./default/libhugetlbfs was skipped, everything else from the test suit passed
2.test) all passed</ref>
| <references/>
|-
| [[User:quiet|quiet]]
| test day image iso on VM, 4 GiB RAM, 2x Intel Core Skylake (IBRS) 2904 MHz
| {{result|pass}}<ref>1.test) ./default/libhugetlbfs was skipped, otherwise everthing else from the test suite passed
2.test) everything passed</ref>
| <references/>
|-
| [[User:rammodulus|rammodulus]]
| Test day iso on Virtualbox 6.0.12 VM, 4vCPU, 4GB ram
| {{result|fail}}<ref>1. Ran default test suite only, failed on insert_leap_second test
2. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:rodamorris|rodamorris]]
| i7-6850k X99 32GB AMD GPU Desktop/Dell XPS 9360
| {{result|pass}}<ref>All tests run passed; log files submitted.</ref>
| <references/>
|-
| [[User:subhamrai03|subhamrai03]]
| test on VM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:subhamrai03|subhamrai03]]
| test on VM with performance
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Test day iso on KVM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Test day iso on KVM called with performance
| {{result|pass}}<ref>The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:szydell|szydell]]
| Kerneltest Image -> dell 3510, 16GB RAM, i7-6820HQ CPU @ 2.70GHz
| {{result|pass}}
| <references/>
|-
| [[User:szydell|szydell]]
| Virtualbox 6.0.6 -> Fedora KDE 30 -> System76 Oryx Pro (oryp4), i7-8750H, 32GB ram
| {{result|fail}}<ref>insert_leap_second FAILED</ref>
| <references/>
|-
| [[User:tablepc|tablepc]]
| Test on bare metal install (Lenovo M83 with an i5-4570 CPU) on fully updated F31 beta 0928 drop running tests on Kernel 5.3.1
| {{result|pass}}<ref>Ran both the Default and Performance tests. All tests passed and results were submitted.</ref>
| <references/>
|-
| [[User:tcza|tcza]]
|
| {{result|pass}}
| <references/>
|-
| [[User:tcza|tcza]]
| Manufacturer: Dell Inc. Product Name: 0YVXR8
| {{result|pass}}
| <references/>
|-
| [[User:temjin747|temjin747]]
| Host: Fedora 30 x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU version 3.1.1/KVM (2 vCPUs, 4 GB RAM)
| {{result|pass}}<ref>skipped libhugetlbfs in first test script</ref>
| <references/>
|-
| [[User:xfor|xfor]]
| ASUS B450M-A,  AMD R5 2400G, RAM DDR4-3000 2x8G, F30 update
| {{result|pass}}
| <references/>
|-
| [[User:zsun|zsun]]
| BeagleBone Black armv7hl 5.3.2-300.fc30.armv7hl
| {{result|fail}}<ref> paxtest and timer-overhead of the kernel-tests testsuit failed. </ref>
| <references/>
|-
| [[User:zsun|zsun]]
| Raspberry Pi 3 kernel-5.3.2-300.fc30.aarch64
| {{result|pass}}<ref>ftrace tracers can be enabled and no panic happens</ref>{{result|fail}}<ref>paxtest and timer-overhead of the kernel-tests testsuit failed.</ref>
| <references/>
|-
|}


   
   
[[Category:Fedora 31 Test Days]]
[[Category:Fedora 31 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)