From Fedora Project Wiki

(Created page with "{{Infobox_group | name = Fedora Test Day | image = link=QA/Test Days | caption = Kernel 5.3 | date = 2019-09-30 to 2019-10-07 | time = all w...")
 
 
(3 intermediate revisions by one other user not shown)
Line 24: Line 24:
== Prerequisites for Test Day ==  
== Prerequisites for Test Day ==  


* A fully updated [https://xyz.iso test day image] or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* A fully updated [https://jforbes.fedorapeople.org/kerneltest-5.3.iso test day image] or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* The 5.3 kernel for an existing installation from [ F30 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
* The 5.3 kernel for an existing installation from [https://koji.fedoraproject.org/koji/taskinfo?taskID=37989138 F30 koji] or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
* Enough free space on HDD
* Enough free space on HDD


Line 41: Line 41:
== Test Results ==
== Test Results ==


=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:GoodMirek|GoodMirek]]
| Dell XPS M1330, CPU intel Core2 Duo T8100, GPU Geforce 8400M GS
| {{result|pass}}<ref>FC31, 5.3.2-300.fc31.x86_64</ref>
| <references/>
|-
| [[User:GoodMirek|GoodMirek]]
| HP Elitebook 850 G4, i5-7200U w/embedded GPU
| {{result|warn}}<ref>{{bz|1759289}} All good, just this kernel takes double time to boot to LUKS password prompt, see the bug https://bugzilla.redhat.com/show_bug.cgi?id=1759289</ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Fedora 30 WS with Koji 5.3.2-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, NV124 [NVIDIA GeForce GTX 970], 16GB RAM, 250GB SSD
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted. </ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Test Day Image 5.3.1-300.fc30.x86_64 on HP 250 G5 notebook, i5-7200U CPU @ 2.50GHz × 4, Intel HD Graphics 620 (Kaby Lake GT2), 4GB RAM, 128GB SSD.
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted. </ref>
| <references/>
|-
| [[User:HackerOne|HackerOne]]
| Test Day Image 5.3.1-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, Intel® HD Graphics 530 (Skylake GT2), 16GB RAM, 250GB SSD
| {{result|pass}}<ref>Default and Performance tests passed. Log files submitted.</ref>
| <references/>
|-
| [[User:Paninaro|Paninaro]]
| Official Test Day Live image on a Notebook HP 650 Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2  RAM 3.7 GiB Graphics Intel® Ivybridge Mobile uname -a : Linux localhost-live 5.3.1-300.fc30.x86_64 #1 SMP Fri Sep 27 14:38:54 UTC 2019
| {{result|pass}}<ref>No problems spotted in this kernel, so i consider both the tests PASSED. The default test warn, is not a big issue as the directory /sys/kernel/debug is 700 so it really doesn't matter the file permission in that folder. For the performance test, installing libtirpc-devel and giving the executable permissions to getlist and getsummary files, solve the issue and the performance test is PASSED with no errors: https://apps.fedoraproject.org/kerneltest/logs/35994</ref>{{result|warn}}<ref>I could mark the test passed but i prefer to give some info instead:
Kernel regression default test result in WARN. Looking at the log https://apps.fedoraproject.org/kerneltest/logs/35991 the reason is: Found world-writable files in sysfs.
/sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
About performance test, there is an issue with the live image, it does not come with package libtirpc-devel installed, so the compilation terminate with fatal error, the problem is that the performance test exit with result PASS and report a passed test. This is a bug, imho, as it consider passed a test that was not executed. Btw after installing libtirpc-devel the compilation goes on and it runs some tests like Latency measurements, Calculating file system latency, Local networking, Bandwidth measurements, Calculating context switch overhead and than it stops again with error /bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
And again the test result in a PASS
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS 
So is a call for fixing some bugs in the kernel-test suite.
</ref>
| <references/>
|-
| [[User:agarwalvarshit|agarwalvarshit]]
| Oracle VM  4Gb Ram i3 processor
| {{result|fail}}<ref>est suite called with default
./default/libhugetlbfs                                          SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        FAIL   
^C./default/insert_leap_second                              FAIL   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                FAIL   
./default/stack-randomness                                      PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:albertopatino1|albertopatino1]]
| Lenovo P52, Intel(R) Xeon(R) E-2176M  CPU @ 2.70GHz, 4K Display, 128Gb RAM, Disk /dev/nvme1n1 KXG5AZNV1T02 TOSHIBA, e1000e: enp0s31f6 NIC Link is Up 1000 Mbps Full Duplex
| {{result|pass}}<ref>{{bz|1752961}} Fedora Test Day Image. Results from sudo ./runtests.sh
Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    PASS   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              PASS
ASIDE: FedoraTestDay Image works fine in this machine with profile described above. However same computer has Fedora 30 upgraded to F31. Same kernel (but f31) is causing kernel panic. Computer is not booting. </ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| KVM, RAM 2GB, BIOS
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 aarch64 F31
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 armv7hl F31
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930 i5 4GB RAM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| KVM, 2 Core, 4GB RAM, UEFI
| {{result|pass}}<ref>Both Passed but performance log would not upload
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845; Kernel: 5.3.1-300.fc31.x86_64; Graphics:  Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 435.21
| {{result|pass}}<ref>Test suite PASS</ref>
| <references/>
|-
| [[User:bradfordcp|bradfordcp]]
| Official Test Day Live Image on Dell Precision 5530. Intel Core i7-8850H (Six Core 2.60GHz, 4.30GHz Turbo, 9MB 45 W). 32 GB DDR4-2666MHz SDRAM Non-ECC. Nvidia Quadro P1000 w/4GB GDDD R5. Intel Wifi Link 9260 2x2 802.1 1AC+BT 5.0 vPro Wireless
| {{result|pass}}<ref>Clean PASS with a SKIP on libhugetlbfs.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:bradfordcp|bradfordcp]]
| Official Test Day Live Image on Dell XPS 9570. 8th Generation Intel Core i9-8 950HK Processor (12MB Cache, u p to 4.8 GHz, 6 cores). 32GB 2x16GB DDR4-2666MHz. NVIDIA GeForce GTX 1050Ti with 4GB GDDR5. Killer 1535 2x2 802.11ac Wi-Fi Wireless + Bluetooth 4.2
| {{result|pass}}<ref>Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                SKIP   
./default/cachedrop                                              SKIP   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    SKIP   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  SKIP   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |  static psize;
      |        ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
  94 |  return;
      |  ^~~~~~
lib_sched.c:46:1: note: declared here
  46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
      | ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
  207 |  retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
      |            ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
  231 |  retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
      |          ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  149 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  76 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  157 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  153 |    if (parallel <= 0) lmbench_usage(argc, argv, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  53 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
  167 |  static count = 0;
      |        ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  41 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  136 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  116 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  78 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  58 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  492 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  60 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  55 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/ccYbciYF.o: in function `setup_names':
lat_fs.c:(.text+0x836): warning: the use of `tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  182 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  42 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  46 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  45 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  84 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  203 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  393 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  69 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  413 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  70 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  123 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  66 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  39 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  204 |  lmbench_usage(ac, av, usage);
      |  ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  40 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
22219MB OK
22219MB OK
22219MB OK
mhz: should take approximately 15 seconds
Using config in CONFIG.localhost.localdomain
Tue 01 Oct 2019 02:39:04 AM EDT
Latency measurements
Tue 01 Oct 2019 02:39:44 AM EDT
Calculating file system latency
Tue 01 Oct 2019 02:40:05 AM EDT
Local networking
Tue 01 Oct 2019 02:43:52 AM EDT
Bandwidth measurements
Tue 01 Oct 2019 02:56:19 AM EDT
Calculating context switch overhead
Tue 01 Oct 2019 02:56:56 AM EDT
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Traceback (most recent call last):
  File "./fedora_submit.py", line 45, in <module>
    password=password
  File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
    openid_insecure=self.openid_insecure)
  File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:carlhuby|carlhuby]]
| Toshiba Sattelite P50t - Intel i7-4720HQ
| {{result|pass}}<ref>Passed Test Suite</ref>
| <references/>
|-
| [[User:chrismurphy|chrismurphy]]
| HP Spectre, intel i7-6500U, Skylake GT2 [HD Graphics 520]
| {{result|fail}}<ref>{{bz|1781288}} {{bz|1780800}} 1781288: kernel/trace/trace.c:8106 create_trace_option_files, taints kernel
1780800: GPU hang</ref>
| <references/>
|-
| [[User:dan1mal|dan1mal]]
| VMware Workstation 15 player VM - 2gb memory, 1 processor, 20gb hd
| {{result|pass}}<ref>Test 1:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
Test 2:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:filip|filip]]
| AUSU t200t notebook transformer
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>{{result|pass}}
| <references/>
|-
| [[User:garrmcnu|garrmcnu]]
| Test image on VM (KVM)
| {{result|pass}}<ref>Default and performance tests passed</ref>
| <references/>
|-
| [[User:himank98|himank98]]
| Oracle VM 4gb RAM i7 processor
| {{result|fail}}<ref>/default/insert_leap_second                                    FAIL   
./default/stack-randomness                                      PASS   
./default/mq-memory-corruption                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                PASS   
./default/selinux-dac-controls                                  PASS   
./default/cachedrop                                              PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:himanshutak8|himanshutak8]]
| Lenovo z51 with i7 processor(with 16gb RAM) test in Orcale VirtualBox VM(Machine running on i7 processor and 4GB RAM )
| {{result|fail}}<ref>Test suite called with Performance Failed. Script Stuck at Bandwidth Measurements for a long(wait to execute further about 2hrs)  after that it failed.</ref>{{result|fail}}<ref>Test Suite called with default failed on ./default/insert_leap_second while overall Test Suit Complete status is FAILED
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:hitesh0078|hitesh0078]]
| Test in Oracle Virtual Box VM Machine running on i5 processor and 4GB RAM
| {{result|fail}}<ref>Test suite called with default
./default/stack-randomness                                      PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/paxtest                                                PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
 
^C./default/insert_leap_second                                    FAIL   
./default/posix_timers                                          PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
Test suite complete                                              FAIL   
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:holishing|holishing]]
| OS: Fedora 31 (Thirty One) x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:joepadmiraal|joepadmiraal]]
| XPS 15 9560, Intel i7-7700HQ, NVIDIA GeForce GTX 1050 Mobile, 16GB
| {{result|pass}}<ref>1. PASSED
2. Error while compiling:
bash-5.0$ sudo ./runtests.sh -t performance
Test suite called with performance
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
  38 | #include <rpc/rpc.h>
      |          ^~~~~~~~~~~
compilation terminated.
</ref>
| <references/>
|-
| [[User:kostera|kostera]]
| Dell Inspiron 5570 i3-8130U; 12GB RAM; Kingston A400 M.2 SATA III SSD; Fedora 31 BETA Workstation/GNOME kernel 5.3.1-300.fc31.x86_64
| {{result|fail}}<ref>[inspiron@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/modsign                                                PASS   
./default/paxtest                                                FAIL   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/timer-overhead                                        FAIL   
./default/sysfs-perms                                            PASS   
./default/posix_timers                                          PASS   
./default/mq-memory-corruption                                  PASS   
./default/insert_leap_second                                    PASS   
./default/cachedrop                                              FAIL   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
./runtest.sh: line 8: make: command not found
./runtest.sh: line 9: make: command not found
./runtest.sh: line 13: make: command not found
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Traceback (most recent call last):
  File "./fedora_submit.py", line 45, in <module>
    password=password
  File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
    openid_insecure=self.openid_insecure)
  File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Missing argument: auth_module
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ uname -a
Linux localhost.localdomain 5.3.1-300.fc31.x86_64 #1 SMP Tue Sep 24 21:00:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
</ref>
| <references/>
|-
| [[User:lewis41|lewis41]]
| CPU: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 8GB Samsung SSD 850
| {{result|pass}}<ref>Passed default/performance test suite</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz
| {{result|pass}}<ref>Performance suite has passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>{{result|fail}}<ref>The `paxtest` was skipped, so was `selinux-dac-controls`. The `cachedrop` failed. The overall result of the default test suite was fail.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 15 Ryzen 2500U (Fedora 31)
| {{result|pass}}<ref>./default/sysfs-perms  WARN   
</ref>
| <references/>
|-
| [[User:malucious|malucious]]
| gnome-boxes guest using the test image. Host: Asus Z170A i7-6700K
| {{result|pass}}<ref>./runtests.sh -t performance PASSED.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>{{result|fail}}<ref>./runtest.sh Failed.  ./default/cachedrop Failed.  ./default/libhugetlbfs Skipped.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| Test Day Image on VirtualBox
| {{result|warn}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:masami|masami]]
| fedora 30, 5.3.2-300.fc30.x86_64. i7-9700K(UHD Graphics 630)
| {{result|fail}}<ref>{{bz|1758831}} Sorry, I made mistake to set bug number. I reported #1758831 .  GDM login screen doesn't show up on kernel 5.3.2</ref>{{result|fail}}<ref>{{bz|1752961}} GDM login screen doesn't show.</ref>
| <references/>
|-
| [[User:maxishere|maxishere]]
| Fedora Server 30 Image on DigitalOcean with Kernel 5.3.2-300 from Koji
| {{result|pass}}<ref>Everything passed but the performance test had some warnings about implicit-function-declaration on the function lmbench_usage(ac, av, usage)</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Fedora 30 T480s i5-8250U 24GB RAM iGPU
| {{result|pass}}<ref>Both default and performance: PASSED</ref>
| <references/>
|-
| [[User:mimat|mimat]]
| Testday iso. lenovo w520 with optimus.
| {{result|pass}}<ref>Both default and performance: PASSED. But I had problem with optimus gfx, discrete gfx was always powered on. Had similar problem before when testing on my daily f30 installation.
</ref>
| <references/>
|-
| [[User:mimat|mimat]]
| w520. f30 fully updated. 5.3.2
| {{result|pass}}<ref>{{bz|1757891}} Everything besides properly working optimus graphics is working. </ref>
| <references/>
|-
| [[User:mzink|mzink]]
|
| {{result|pass}}<ref>{{bz|1752961}} Lenovo t480s - kernel 5.3 works fine, but only with TPM disabled. Kernel panic with TPM enabled (BZ 1752961)</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| Compaq 8510w Intel T9300 AMD RV630 BIOS
| {{result|pass}}
| <references/>
|-
| [[User:nightromantic|nightromantic]]
| Fedora 30 fully updated; kernel 5.3.1-300.fc31.x86_64 (Koji); Desktop system, CPU: Intel Core i3-8100, m/b ASUS PRIME B360-PLUS (Intel B360 Chipset)
| {{result|warn}}<ref>SKIP on libhugetlbfs, WARN on sysfs-perms, all others PASS</ref>
| <references/>
|-
| [[User:quiet|quiet]]
|
| {{result|pass}}<ref>1.test) ./default/libhugetlbfs was skipped, everything else from the test suit passed
2.test) all passed</ref>
| <references/>
|-
| [[User:quiet|quiet]]
| test day image iso on VM, 4 GiB RAM, 2x Intel Core Skylake (IBRS) 2904 MHz
| {{result|pass}}<ref>1.test) ./default/libhugetlbfs was skipped, otherwise everthing else from the test suite passed
2.test) everything passed</ref>
| <references/>
|-
| [[User:rammodulus|rammodulus]]
| Test day iso on Virtualbox 6.0.12 VM, 4vCPU, 4GB ram
| {{result|fail}}<ref>1. Ran default test suite only, failed on insert_leap_second test
2. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:rodamorris|rodamorris]]
| i7-6850k X99 32GB AMD GPU Desktop/Dell XPS 9360
| {{result|pass}}<ref>All tests run passed; log files submitted.</ref>
| <references/>
|-
| [[User:subhamrai03|subhamrai03]]
| test on VM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:subhamrai03|subhamrai03]]
| test on VM with performance
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Test day iso on KVM
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Test day iso on KVM called with performance
| {{result|pass}}<ref>The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:szydell|szydell]]
| Kerneltest Image -> dell 3510, 16GB RAM, i7-6820HQ CPU @ 2.70GHz
| {{result|pass}}
| <references/>
|-
| [[User:szydell|szydell]]
| Virtualbox 6.0.6 -> Fedora KDE 30 -> System76 Oryx Pro (oryp4), i7-8750H, 32GB ram
| {{result|fail}}<ref>insert_leap_second FAILED</ref>
| <references/>
|-
| [[User:tablepc|tablepc]]
| Test on bare metal install (Lenovo M83 with an i5-4570 CPU) on fully updated F31 beta 0928 drop running tests on Kernel 5.3.1
| {{result|pass}}<ref>Ran both the Default and Performance tests. All tests passed and results were submitted.</ref>
| <references/>
|-
| [[User:tcza|tcza]]
|
| {{result|pass}}
| <references/>
|-
| [[User:tcza|tcza]]
| Manufacturer: Dell Inc. Product Name: 0YVXR8
| {{result|pass}}
| <references/>
|-
| [[User:temjin747|temjin747]]
| Host: Fedora 30 x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU version 3.1.1/KVM (2 vCPUs, 4 GB RAM)
| {{result|pass}}<ref>skipped libhugetlbfs in first test script</ref>
| <references/>
|-
| [[User:xfor|xfor]]
| ASUS B450M-A,  AMD R5 2400G, RAM DDR4-3000 2x8G, F30 update
| {{result|pass}}
| <references/>
|-
| [[User:zsun|zsun]]
| BeagleBone Black armv7hl 5.3.2-300.fc30.armv7hl
| {{result|fail}}<ref> paxtest and timer-overhead of the kernel-tests testsuit failed. </ref>
| <references/>
|-
| [[User:zsun|zsun]]
| Raspberry Pi 3 kernel-5.3.2-300.fc30.aarch64
| {{result|pass}}<ref>ftrace tracers can be enabled and no panic happens</ref>{{result|fail}}<ref>paxtest and timer-overhead of the kernel-tests testsuit failed.</ref>
| <references/>
|-
|}


   
   
[[Category:Fedora 31 Test Days]]
[[Category:Fedora 31 Test Days]]

Latest revision as of 22:21, 25 February 2020

Fedora Test Day
Echo-testing-48px.png
Kernel 5.3

Date 2019-09-30 to 2019-10-07
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.3.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.3 kernel for an existing installation from F30 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
GoodMirek Dell XPS M1330, CPU intel Core2 Duo T8100, GPU Geforce 8400M GS
Pass pass
[1]
  1. FC31, 5.3.2-300.fc31.x86_64
GoodMirek HP Elitebook 850 G4, i5-7200U w/embedded GPU
Warning warn
[1]
  1. RHBZ #1759289 All good, just this kernel takes double time to boot to LUKS password prompt, see the bug https://bugzilla.redhat.com/show_bug.cgi?id=1759289
HackerOne Fedora 30 WS with Koji 5.3.2-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, NV124 [NVIDIA GeForce GTX 970], 16GB RAM, 250GB SSD
Pass pass
[1]
  1. Default and Performance tests passed. Log files submitted.
HackerOne Test Day Image 5.3.1-300.fc30.x86_64 on HP 250 G5 notebook, i5-7200U CPU @ 2.50GHz × 4, Intel HD Graphics 620 (Kaby Lake GT2), 4GB RAM, 128GB SSD.
Pass pass
[1]
  1. Default and Performance tests passed. Log files submitted.
HackerOne Test Day Image 5.3.1-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, Intel® HD Graphics 530 (Skylake GT2), 16GB RAM, 250GB SSD
Pass pass
[1]
  1. Default and Performance tests passed. Log files submitted.
Paninaro Official Test Day Live image on a Notebook HP 650 Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2 RAM 3.7 GiB Graphics Intel® Ivybridge Mobile uname -a : Linux localhost-live 5.3.1-300.fc30.x86_64 #1 SMP Fri Sep 27 14:38:54 UTC 2019
Pass pass
[1]
Warning warn
[2]
  1. No problems spotted in this kernel, so i consider both the tests PASSED. The default test warn, is not a big issue as the directory /sys/kernel/debug is 700 so it really doesn't matter the file permission in that folder. For the performance test, installing libtirpc-devel and giving the executable permissions to getlist and getsummary files, solve the issue and the performance test is PASSED with no errors: https://apps.fedoraproject.org/kerneltest/logs/35994
  2. I could mark the test passed but i prefer to give some info instead: Kernel regression default test result in WARN. Looking at the log https://apps.fedoraproject.org/kerneltest/logs/35991 the reason is: Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx About performance test, there is an issue with the live image, it does not come with package libtirpc-devel installed, so the compilation terminate with fatal error, the problem is that the performance test exit with result PASS and report a passed test. This is a bug, imho, as it consider passed a test that was not executed. Btw after installing libtirpc-devel the compilation goes on and it runs some tests like Latency measurements, Calculating file system latency, Local networking, Bandwidth measurements, Calculating context switch overhead and than it stops again with error /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 And again the test result in a PASS ./performance/lmbench3 PASS Test suite complete PASS So is a call for fixing some bugs in the kernel-test suite.
agarwalvarshit Oracle VM 4Gb Ram i3 processor
Fail fail
[1]
  1. est suite called with default ./default/libhugetlbfs SKIP ./default/cachedrop PASS ./default/timer-overhead FAIL ^C./default/insert_leap_second FAIL ./default/sysfs-perms PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS ./default/memfd PASS ./default/paxtest FAIL ./default/stack-randomness PASS ./default/posix_timers PASS Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
albertopatino1 Lenovo P52, Intel(R) Xeon(R) E-2176M CPU @ 2.70GHz, 4K Display, 128Gb RAM, Disk /dev/nvme1n1 KXG5AZNV1T02 TOSHIBA, e1000e: enp0s31f6 NIC Link is Up 1000 Mbps Full Duplex
Pass pass
[1]
  1. RHBZ #1752961 Fedora Test Day Image. Results from sudo ./runtests.sh Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/cachedrop PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS Test suite complete PASS ASIDE: FedoraTestDay Image works fine in this machine with profile described above. However same computer has Fedora 30 upgraded to F31. Same kernel (but f31) is causing kernel panic. Computer is not booting.
alciregi KVM, RAM 2GB, BIOS
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi Raspberry Pi 3 aarch64 F31
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
alciregi Raspberry Pi 3 armv7hl F31
Pass pass
alciregi Toshiba Portege R930 i5 4GB RAM
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
archmunky KVM, 2 Core, 4GB RAM, UEFI
Pass pass
[1]
  1. Both Passed but performance log would not upload Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
atim CPU: Quad Core AMD Athlon X4 845; Kernel: 5.3.1-300.fc31.x86_64; Graphics: Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 435.21
Pass pass
[1]
  1. Test suite PASS
bradfordcp Official Test Day Live Image on Dell Precision 5530. Intel Core i7-8850H (Six Core 2.60GHz, 4.30GHz Turbo, 9MB 45 W). 32 GB DDR4-2666MHz SDRAM Non-ECC. Nvidia Quadro P1000 w/4GB GDDD R5. Intel Wifi Link 9260 2x2 802.1 1AC+BT 5.0 vPro Wireless
Pass pass
[1]
  1. Clean PASS with a SKIP on libhugetlbfs. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
bradfordcp Official Test Day Live Image on Dell XPS 9570. 8th Generation Intel Core i9-8 950HK Processor (12MB Cache, u p to 4.8 GHz, 6 cores). 32GB 2x16GB DDR4-2666MHz. NVIDIA GeForce GTX 1050Ti with 4GB GDDR5. Killer 1535 2x2 802.11ac Wi-Fi Wireless + Bluetooth 4.2
Pass pass
[1]
  1. Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/modsign SKIP ./default/cachedrop SKIP ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/insert_leap_second SKIP ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls SKIP Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/ccYbciYF.o: in function setup_names': lat_fs.c:(.text+0x836): warning: the use of tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ 22219MB OK 22219MB OK 22219MB OK mhz: should take approximately 15 seconds Using config in CONFIG.localhost.localdomain Tue 01 Oct 2019 02:39:04 AM EDT Latency measurements Tue 01 Oct 2019 02:39:44 AM EDT Calculating file system latency Tue 01 Oct 2019 02:40:05 AM EDT Local networking Tue 01 Oct 2019 02:43:52 AM EDT Bandwidth measurements Tue 01 Oct 2019 02:56:19 AM EDT Calculating context switch overhead Tue 01 Oct 2019 02:56:56 AM EDT /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
carlhuby Toshiba Sattelite P50t - Intel i7-4720HQ
Pass pass
[1]
  1. Passed Test Suite
chrismurphy HP Spectre, intel i7-6500U, Skylake GT2 [HD Graphics 520]
Fail fail
[1]
  1. RHBZ #1781288 RHBZ #1780800 1781288: kernel/trace/trace.c:8106 create_trace_option_files, taints kernel 1780800: GPU hang
dan1mal VMware Workstation 15 player VM - 2gb memory, 1 processor, 20gb hd
Pass pass
[1]
  1. Test 1: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling Test 2: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
filip AUSU t200t notebook transformer
Pass pass
[1]
Pass pass
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
garrmcnu Test image on VM (KVM)
Pass pass
[1]
  1. Default and performance tests passed
himank98 Oracle VM 4gb RAM i7 processor
Fail fail
[1]
  1. /default/insert_leap_second FAIL ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/timer-overhead PASS Test suite complete FAIL The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
himanshutak8 Lenovo z51 with i7 processor(with 16gb RAM) test in Orcale VirtualBox VM(Machine running on i7 processor and 4GB RAM )
Fail fail
[1]
Fail fail
[2]
  1. Test suite called with Performance Failed. Script Stuck at Bandwidth Measurements for a long(wait to execute further about 2hrs) after that it failed.
  2. Test Suite called with default failed on ./default/insert_leap_second while overall Test Suit Complete status is FAILED Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
hitesh0078 Test in Oracle Virtual Box VM Machine running on i5 processor and 4GB RAM
Fail fail
[1]
  1. Test suite called with default ./default/stack-randomness PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ^C./default/insert_leap_second FAIL ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS Test suite complete FAIL The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
holishing OS: Fedora 31 (Thirty One) x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
joepadmiraal XPS 15 9560, Intel i7-7700HQ, NVIDIA GeForce GTX 1050 Mobile, 16GB
Pass pass
[1]
  1. 1. PASSED 2. Error while compiling: bash-5.0$ sudo ./runtests.sh -t performance Test suite called with performance In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated.
kostera Dell Inspiron 5570 i3-8130U; 12GB RAM; Kingston A400 M.2 SATA III SSD; Fedora 31 BETA Workstation/GNOME kernel 5.3.1-300.fc31.x86_64
Fail fail
[1]
  1. [inspiron@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/modsign PASS ./default/paxtest FAIL ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/timer-overhead FAIL ./default/sysfs-perms PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/cachedrop FAIL ./default/stack-randomness PASS ./default/selinux-dac-controls PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling [inspiron@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance ./runtest.sh: line 8: make: command not found ./runtest.sh: line 9: make: command not found ./runtest.sh: line 13: make: command not found ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Missing argument: auth_module The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling [inspiron@localhost kernel-tests]$ uname -a Linux localhost.localdomain 5.3.1-300.fc31.x86_64 #1 SMP Tue Sep 24 21:00:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
lewis41 CPU: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 8GB Samsung SSD 850
Pass pass
[1]
  1. Passed default/performance test suite
lruzicka Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz
Pass pass
[1]
Fail fail
[2]
  1. Performance suite has passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
  2. The paxtest was skipped, so was selinux-dac-controls. The cachedrop failed. The overall result of the default test suite was fail. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
luya HP Envy x360 15 Ryzen 2500U (Fedora 31)
Pass pass
[1]
  1. ./default/sysfs-perms WARN
malucious gnome-boxes guest using the test image. Host: Asus Z170A i7-6700K
Pass pass
[1]
Fail fail
[2]
  1. ./runtests.sh -t performance PASSED. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
  2. ./runtest.sh Failed. ./default/cachedrop Failed. ./default/libhugetlbfs Skipped. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
marc84 Test Day Image on VirtualBox
Warning warn
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
masami fedora 30, 5.3.2-300.fc30.x86_64. i7-9700K(UHD Graphics 630)
Fail fail
[1]
Fail fail
[2]
  1. RHBZ #1758831 Sorry, I made mistake to set bug number. I reported #1758831 . GDM login screen doesn't show up on kernel 5.3.2
  2. RHBZ #1752961 GDM login screen doesn't show.
maxishere Fedora Server 30 Image on DigitalOcean with Kernel 5.3.2-300 from Koji
Pass pass
[1]
  1. Everything passed but the performance test had some warnings about implicit-function-declaration on the function lmbench_usage(ac, av, usage)
mharpau Fedora 30 T480s i5-8250U 24GB RAM iGPU
Pass pass
[1]
  1. Both default and performance: PASSED
mimat Testday iso. lenovo w520 with optimus.
Pass pass
[1]
  1. Both default and performance: PASSED. But I had problem with optimus gfx, discrete gfx was always powered on. Had similar problem before when testing on my daily f30 installation.
mimat w520. f30 fully updated. 5.3.2
Pass pass
[1]
  1. RHBZ #1757891 Everything besides properly working optimus graphics is working.
mzink
Pass pass
[1]
  1. RHBZ #1752961 Lenovo t480s - kernel 5.3 works fine, but only with TPM disabled. Kernel panic with TPM enabled (BZ 1752961)
nielsenb Compaq 8510w Intel T9300 AMD RV630 BIOS
Pass pass
nightromantic Fedora 30 fully updated; kernel 5.3.1-300.fc31.x86_64 (Koji); Desktop system, CPU: Intel Core i3-8100, m/b ASUS PRIME B360-PLUS (Intel B360 Chipset)
Warning warn
[1]
  1. SKIP on libhugetlbfs, WARN on sysfs-perms, all others PASS
quiet
Pass pass
[1]
  1. 1.test) ./default/libhugetlbfs was skipped, everything else from the test suit passed 2.test) all passed
quiet test day image iso on VM, 4 GiB RAM, 2x Intel Core Skylake (IBRS) 2904 MHz
Pass pass
[1]
  1. 1.test) ./default/libhugetlbfs was skipped, otherwise everthing else from the test suite passed 2.test) everything passed
rammodulus Test day iso on Virtualbox 6.0.12 VM, 4vCPU, 4GB ram
Fail fail
[1]
  1. 1. Ran default test suite only, failed on insert_leap_second test 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
rodamorris i7-6850k X99 32GB AMD GPU Desktop/Dell XPS 9360
Pass pass
[1]
  1. All tests run passed; log files submitted.
subhamrai03 test on VM
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
subhamrai03 test on VM with performance
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
sumantrom Test day iso on KVM
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
sumantrom Test day iso on KVM called with performance
Pass pass
[1]
  1. The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
szydell Kerneltest Image -> dell 3510, 16GB RAM, i7-6820HQ CPU @ 2.70GHz
Pass pass
szydell Virtualbox 6.0.6 -> Fedora KDE 30 -> System76 Oryx Pro (oryp4), i7-8750H, 32GB ram
Fail fail
[1]
  1. insert_leap_second FAILED
tablepc Test on bare metal install (Lenovo M83 with an i5-4570 CPU) on fully updated F31 beta 0928 drop running tests on Kernel 5.3.1
Pass pass
[1]
  1. Ran both the Default and Performance tests. All tests passed and results were submitted.
tcza
Pass pass
tcza Manufacturer: Dell Inc. Product Name: 0YVXR8
Pass pass
temjin747 Host: Fedora 30 x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU version 3.1.1/KVM (2 vCPUs, 4 GB RAM)
Pass pass
[1]
  1. skipped libhugetlbfs in first test script
xfor ASUS B450M-A, AMD R5 2400G, RAM DDR4-3000 2x8G, F30 update
Pass pass
zsun BeagleBone Black armv7hl 5.3.2-300.fc30.armv7hl
Fail fail
[1]
  1. paxtest and timer-overhead of the kernel-tests testsuit failed.
zsun Raspberry Pi 3 kernel-5.3.2-300.fc30.aarch64
Pass pass
[1]
Fail fail
[2]
  1. ftrace tracers can be enabled and no panic happens
  2. paxtest and timer-overhead of the kernel-tests testsuit failed.