From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 41: Line 41:
== Test Results ==
== Test Results ==


=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Makman2|Makman2]]
| GNOME Boxes VM (QEMU, 2GB RAM, 21.5GB disk) on Dell OptiPlex 7060 w/ Fedora 30
| {{result|fail}}<ref>./default/cachedrop                                              FAIL   
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0405142 s, 2.6 GB/s
TestError: Can't free dentries and inodes
393672 393328
Could not run tests
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| <references/>
|-
| [[User:Paninaro|Paninaro]]
| Using the test image provided for testing on an Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2
| {{result|pass}}<ref>Performance test PASSED</ref>{{result|fail}}<ref>From the logs the paxtest on default test failed for this reason:
Executable heap (mprotect)              : Vulnerable
As suggested i previously gave the command> sudo semanage boolean -m --off selinuxuser_execheap
Other issues: the live image did not come with vim and libtirpc-devel installed so i had to install those packages manually.</ref>
| <references/>
|-
| [[User:aernhart|aernhart]]
| Dell XPS 15 9560 https://linux-hardware.org/?probe=f1acfe989d
| {{result|warn}}<ref>With 'semanage boolean -m --on selinuxuser_execheap': 'runtests.sh' results: libhugetlbfs was SKIP, paxtest was FAIL, all others PASS. './runtests.sh -t performance' was PASS. All results uploaded.</ref>
| <references/>
|-
| [[User:agarwalvarshit|agarwalvarshit]]
| Oracle VM 4GB RAM DELL Quad Core
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Dell XPS 13 9360
| {{result|fail}}<ref>paxtest FAIL</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Intel i5-7400 desktop PC
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 armv7hl F31
| {{result|pass}}<ref>default PASS, destructive PASS, </ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
| {{result|fail}}<ref>paxtest FAIL</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930 Intel i5-3340M
| {{result|pass}}
| <references/>
|-
| [[User:aludwar|aludwar]]
| Intel(R) Core(TM) i7-5930K CPU @ 3.50GHz - Desktop PC - 5.3.13-200.fc30.x86_64 - libvirt-daemon-kvm-5.1.0-9.fc30.x86_64
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              PASS   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:aludwar|aludwar]]
| Lenovo X1 Carbon 6th Gen
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                FAIL   
./default/mq-memory-corruption                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              FAIL   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
</ref>
| <references/>
|-
| [[User:atdt|atdt]]
| VM on Ryzen5 3600
| {{result|warn}}<ref>paxtest fail</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845;  Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.36
| {{result|fail}}<ref>{{bz|1781175}} New 5.4.2 kernel have enormous size. Filed a bug in RHBZ.</ref>{{result|pass}}<ref>All tests passed, except 'paxtest', as always.</ref>
| <references/>
|-
| [[User:bfrenzel|bfrenzel]]
| Latitude 7390 2-in-1
| {{result|fail}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
./default/posix_timers                                          PASS   
./default/timer-overhead                                        PASS   
./default/selinux-dac-controls                                  PASS   
./default/paxtest                                                FAIL   
./default/memfd                                                  PASS   
./default/stack-randomness                                      PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              FAIL    </ref>
| <references/>
|-
| [[User:bfrenzel|bfrenzel]]
| Librem 13 v4 4.0
| {{result|pass}}<ref>Performance: PASS</ref>{{result|fail}}<ref>Test suite called with default
./default/stack-randomness                                      PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                FAIL   
./default/modsign                                                PASS   
./default/sysfs-perms                                            WARN   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    PASS   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              FAIL </ref>
| <references/>
|-
| [[User:bfrenzel|bfrenzel]]
| vSphere ESXi VM HW Version 13
| {{result|fail}}<ref>Same as "vSphere ESXi VM HW Version 14"</ref>
| <references/>
|-
| [[User:bfrenzel|bfrenzel]]
| vSphere ESXi VM HW Version 14
| {{result|fail}}<ref>bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                FAIL   
./default/mq-memory-corruption                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              FAIL  </ref>
| <references/>
|-
| [[User:breier|breier]]
| Dell XPS 13 9380
| {{result|fail}}<ref>1. paxtest FAIL</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| x86_64 kvm
| {{result|fail}}<ref>{{bz|1782736}} it's a kernel panic issue on coredump.</ref>
| <references/>
|-
| [[User:conscript89|conscript89]]
| Lenovo w541
| {{result|fail}}<ref>paxtest from default suite failed
performance suite passed</ref>
| <references/>
|-
| [[User:coppertint|coppertint]]
| Lenovo IdeaPad Yoga 13 (2012) - i5-3317U, 4GB
| {{result|warn}}<ref>* paxtest FAIL with selinuxuser_execheap enabled; * performance test suite encountered OOM, session killed</ref>
| <references/>
|-
| [[User:decathorpe|decathorpe]]
| AMD Ryzen 1700X / ASUS PRIME-X370-PRO / NVidia 1070 (negativo17)
| {{result|warn}}<ref>./default/cachedrop FAILed on the first run (this happens sometimes), but it passed on a second and third run. everything else was PASS or SKIP all three times.</ref>
| <references/>
|-
| [[User:decathorpe|decathorpe]]
| DELL XPS 13 9370
| {{result|pass}}<ref>PASS except ./default/libhugetlbfs SKIP</ref>
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| HP Elitebook G4 850
| {{result|fail}}<ref>paxtest FAILED, libhugetlbfs SKIP
performance test PASS </ref>
| <references/>
|-
| [[User:ernst|ernst]]
| AMD® Athlon(tm) ii x2 250 processor × 2 , AMD® Rs880, Version 3.34.2, 64-bit
| {{result|pass}}<ref>
Kernel: 5.4.2-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
</ref>
| <references/>
|-
| [[User:eznoka|eznoka]]
| VM on Ryzen 3900x
| {{result|pass}}
| <references/>
|-
| [[User:faramirza|faramirza]]
| VirtualBox 6.0.14 running on Intel(R) Core(TM) i7-9750H
| {{result|fail}}<ref>Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/paxtest                                                FAIL   
^C./default/insert_leap_second                                    FAIL   
./default/selinux-dac-controls                                  PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
Test suite complete                                              FAIL </ref>{{result|fail}}<ref>Test does not complete.
[root@localhost kernel-tests]# ./runtests.sh
Test suite called with default
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/cachedrop                                              FAIL   
./default/posix_timers                                          PASS   
./default/paxtest                                                FAIL   
</ref>
| <references/>
|-
| [[User:filocost|filocost]]
| Asus transformer t200t
| {{result|warn}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/cachedrop                                              PASS   
./default/paxtest                                                FAIL   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Traceback (most recent call last):
  File "./fedora_submit.py", line 45, in <module>
    password=password
  File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
    openid_insecure=self.openid_insecure)
  File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Test suite called with performance
Using config in CONFIG.new-host
mer 11 dic 2019, 09:14:50, CET
Latency measurements
mer 11 dic 2019, 09:17:43, CET
Calculating file system latency
mer 11 dic 2019, 09:17:45, CET
Local networking
mer 11 dic 2019, 09:21:46, CET
Bandwidth measurements
mer 11 dic 2019, 09:28:34, CET
Calculating context switch overhead
mer 11 dic 2019, 09:28:41, CET
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:frantisekz|frantisekz]]
| Thinkpad T470s, Intel(R) Core(TM) i7-7600U
| {{result|pass}}
| <references/>
|-
| [[User:gkamathe|gkamathe]]
| Intel (Skylake, IBRS) VM
| {{result|fail}}<ref>cachedrop FAIL
paxtest      FAIL</ref>
| <references/>
|-
| [[User:goodmirek|goodmirek]]
| HP Elitebook 850 G4, i5-7200U w/embedded GPU
| {{result|fail}}<ref>paxtest FAILED, libhugetlbfs SKIP, performance test PASS
bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4, KDE [OK], VPN IPsec [OK], VirtualBox 6.0.14 [OK], podman 1.6.2 [OK]</ref>
| <references/>
|-
| [[User:grenier|grenier]]
| Intel Core 2 Duo CPU E6550 Desktop
| {{result|pass}}
| <references/>
|-
| [[User:gtb|gtb]]
| Thinkpad T510
| {{result|pass}}
| <references/>
|-
| [[User:himanshutak8|himanshutak8]]
| Lenovo Z51 core i7, VM run with 6GB RAM
| {{result|fail}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:ibims|ibims]]
|
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
^C./default/insert_leap_second                                    FAIL   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              FAIL
#####tested as a Vbox Guest with the Test-Image mentioned in the wiki-Article. "Insert_leap_second" does not finish after more than one hour, so i pressed Ctrl-C.</ref>
| <references/>
|-
| [[User:idanka|idanka]]
| Fujitsu Esprimo p520 E85+
| {{result|fail}}<ref>1. paxtest FAIL</ref>
| <references/>
|-
| [[User:imabug|imabug]]
| QEMU/KVM on a Dell Precision 3620 Xeon E3-1240
| {{result|fail}}<ref>paxtest failed.  performance test passed</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB (mesa 19.2.7), 970 EVO on Fedora 31
| {{result|fail}}<ref>1) default regression test FAIL ./default/libhugetlbfs SKIP ./default/paxtest FAIL ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/cachedrop PASS ./default/posix_timers PASS
2) performance regression test PASS
3) vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
4) additional info (bug?): not able to find all encrypted luks drives/partitions on my system; though they all work on all of my sata3 ports when connected separately.</ref>
| <references/>
|-
| [[User:ivanmironov|ivanmironov]]
| MacBook Pro 15" mid 2015 / MacBookPro11,4 / Intel(R) Core(TM) i7-4770HQ CPU @ 2.20GHz
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                FAIL   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:ivanmironov|ivanmironov]]
| PC / AMD FX(tm)-8350 Eight-Core Processor
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                FAIL   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:joepadmiraal|joepadmiraal]]
| Dell XPS 15 9560
| {{result|pass}}<ref>Done with the test day image on physical hardware.
The normal test works fine but the performance test gives a compilation error.
Test suite called with default
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              PASS
--------
bash-5.0$ sudo ./runtests.sh -t performance
No .config file found. You can cp config.example .config and edit as needed for easier log submission.
Test suite called with performance
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
  38 | #include <rpc/rpc.h>
      |          ^~~~~~~~~~~
compilation terminated.
gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
make[1]: *** [Makefile:114: lmbench] Error 2
make: *** [Makefile:20: build] Error 2
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
  38 | #include <rpc/rpc.h>
      |          ^~~~~~~~~~~
compilation terminated.
gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
make[1]: *** [Makefile:114: lmbench] Error 2
make: *** [Makefile:23: results] Error 2
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1576234233.log.txt
</ref>
| <references/>
|-
| [[User:kcoraz|kcoraz]]
| Lenovo ThinkPad X390 (i5-8265U / 16G / secure boot / tpm disabled because of 1770021)
| {{result|warn}}<ref>paxtest FAILED, libhugetlbfs SKIP</ref>
| <references/>
|-
| [[User:knarra|knarra]]
| LENOVO Thinkpad T460s
| {{result|fail}}<ref>./default/paxtest                                                FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state </ref>
| <references/>
|-
| [[User:kronenpj|kronenpj]]
|
| {{result|fail}}
| <references/>
|-
| [[User:kronenpj|kronenpj]]
| Dell XPS 13 9370, QEmu & VirtualBox
| {{result|warn}}<ref>Can't reproduce what I was going to report.</ref>
| <references/>
|-
| [[User:kulish|kulish]]
| QEMU/KVM on Lenovo ThinkPad T440P Intel(R) Core(TM) i7-4810MQ CPU @ 2.80GHz
| {{result|fail}}<ref>1. paxtest    FAIL
2. performance test    PASS</ref>
| <references/>
|-
| [[User:ledufff|ledufff]]
| Thinkpad E495 AMD® Ryzen 5 3500u'
| {{result|fail}}<ref>./default/paxtest                                                FAIL
./default/libhugetlbfs                                          SKIP
Test suite complete                                              FAIL</ref>
| <references/>
|-
| [[User:liwang@redhat.com|liwang@redhat.com]]
| Dell Inc. PowerEdge R330 (SKU=NotProvided;ModelName=PowerEdge R330) Intel(R) Xeon(R) CPU E3-1220 v5 @ 3.00GHz 32768 MB memory, 600 GB disk space
| {{result|pass}}<ref>LTP lite test on x86_64</ref>
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 15 Ryzen 2500U (Fedora 31)
| {{result|warn}}<ref>[1] WARN for  ./runtest.sh
[2] PASS for ./runtest.sh -t performance</ref>
| <references/>
|-
| [[User:m0stly|m0stly]]
| R5 3600 / Asus Prime X470 / 5700XT
| {{result|fail}}<ref>paxtest - FAILED
libhugetlbfs - SKIPPED
Performance tests - PASS </ref>
| <references/>
|-
| [[User:marc84|marc84]]
| Lenovo Ideapad Y570 Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz
| {{result|warn}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:masami|masami]]
| fedora 31. i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module.
| {{result|pass}}<ref>i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module.
</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T480s, i5-8250U, iGPU
| {{result|pass}}
| <references/>
|-
| [[User:mikoim|mikoim]]
| ThinkPad X1 Carbon 4th 20FBCTO1WW
| {{result|pass}}
| <references/>
|-
| [[User:mimat|mimat]]
| i7-2630QM
| {{result|pass}}<ref>All passed and vga switcheroo is working fine! :)</ref>
| <references/>
|-
| [[User:monterr|monterr]]
| AMD Rysen 1700
| {{result|fail}}<ref>paxtest FAIL </ref>
| <references/>
|-
| [[User:monterr|monterr]]
| AMD rysen 1700 + ASUS ROG CROSSHAIR VI HERO
| {{result|fail}}<ref>paxtest failed. performance test passed</ref>
| <references/>
|-
| [[User:mzink|mzink]]
| ThinkPad T480s
| {{result|pass}}<ref>Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/insert_leap_second                                    PASS   
./default/cachedrop                                              PASS   
./default/libhugetlbfs                                          SKIP   
./default/stack-randomness                                      PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/mq-memory-corruption                                  PASS   
./default/timer-overhead                                        PASS   
./default/modsign                                                PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:n0cturnal|n0cturnal]]
| Asus X555QG
| {{result|fail}}<ref>paxtest FAIL
sysfs-perms WARN
libhugetlbfs SKIP</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| Compaq 8510w Intel T9300 AMD RV630 BIOS
| {{result|pass}}
| <references/>
|-
| [[User:nitsharma|nitsharma]]
| Thinkpad T580s, i7-vpro
| {{result|pass}}
| <references/>
|-
| [[User:nitss007|nitss007]]
| Thinkpad T580s, i7-vpro
| {{result|pass}}
| <references/>
|-
| [[User:paalzzot|paalzzot]]
| HP probook 450 g5 i7 8th
| {{result|pass}}
| <references/>
|-
| [[User:penguinn|penguinn]]
| AMD Phenom II X4 955 - M4A88T-V - Desktop PC
| {{result|pass}}
| <references/>
|-
| [[User:pifang|pifang]]
| Dell Precision R7610 E5-2620 4G
| {{result|pass}}<ref>ltp mm, syscalls testing.</ref>
| <references/>
|-
| [[User:pifang|pifang]]
| PowerEdge R330 E3-1240L v5 32G
| {{result|pass}}<ref>memory regression testing</ref>
| <references/>
|-
| [[User:pixom.ai@gmail.com|pixom.ai@gmail.com]]
| Shashibhushan Singh
| {{result|pass}}
| <references/>
|-
| [[User:polczak|polczak]]
| ThinkPad E585 (Version: AMD Ryzen 7 2700U with Radeon Vega Mobile Gfx)
| {{result|pass}}<ref>Test suite called with default
./default/posix_timers                                          PASS   
./default/libhugetlbfs                                          SKIP   
./default/selinux-dac-controls                                  PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
./default/timer-overhead                                        PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                PASS   
./default/modsign                                                PASS   
Test suite complete                                              PASS    </ref>
| <references/>
|-
| [[User:polczak|polczak]]
| ThinkPad X1 Carbon 7th
| {{result|pass}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/mq-memory-corruption                                  PASS   
./default/insert_leap_second                                    PASS   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/cachedrop                                              PASS   
./default/paxtest                                                PASS   
./default/timer-overhead                                        PASS   
./default/stack-randomness                                      PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:prabhakarpujeri|prabhakarpujeri]]
| VM
| {{result|fail}}<ref>paxtest</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Ampere eMAG (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Mustang (xgene-1-aarch64)
| {{result|pass}}<ref>spectre_v2:Vulnerable</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 2
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Seattle Overdrive (aarch64)
| {{result|fail}}<ref>cachedrop FAIL
spec_store_bypass:Vulnerable
spectre_v2:Vulnerable
</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Wandboard Quad (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:quiet|quiet]]
|
| {{result|pass}}<ref>Memory: 3.8 GiB
Processor: Intel Core Processor (Skylake, IBRS) × 2
Graphics: llvmpipe (LLVM 9.0, 256 bits)
GNOME: Version 3.34.2
OS type: 64-bit
Virtualization: KVM
Disk: 21.5 GB
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Default suite
Test suite called with default
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/cachedrop                                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
./default/paxtest                                                FAIL   
./default/stack-randomness                                      PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/timer-overhead                                        PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              FAIL   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
performance suite
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:robinkb|robinkb]]
| HP Envy x360 (AMD Ryzen 7 3700U)
| {{result|pass}}
| <references/>
|-
| [[User:rosepeach|rosepeach]]
| Lenovo X1 Carbon 7th Gen
| {{result|fail}}<ref>Test suite called with default
./default/libhugetlbfs                                          SKIP   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/mq-memory-corruption                                  PASS   
./default/posix_timers                                          PASS   
./default/paxtest                                                FAIL   
./default/cachedrop                                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/insert_leap_second                                    PASS   
./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:roypen|roypen]]
| Test kerneltest-5.4.iso libvirt 4GB RAM, 16GB disk, 2 vCPUs custom (IvyBridge-IBRS) on ThinkPad T430
| {{result|fail}}<ref>Test suite called with default (FAIL): ./default/paxtest - FAIL ./default/libhugetlbfs- SKIP everything else - PASS </ref>{{result|fail}}{{result|pass}}<ref>1. Test suite called with performance - PASSED
2. Test suite called with default (FAIL):
./default/paxtest  - FAIL
./default/libhugetlbfs- SKIP
everything else - PASS</ref>
| <references/>
|-
| [[User:rudrapratap|rudrapratap]]
| base system -- NAME=Fedora VERSION="31 (Workstation Edition)" , installed -- kvm , base ram - 8gb, vm(ram given) - 4 gb, 2 cpu processor,
| {{result|fail}}<ref>default: fail, performance: pass, records analyzed link: https://hackmd.io/@fcEf9Yj-S-GS7Phmn6Ahzw/H190JBT6r</ref>
| <references/>
|-
| [[User:shiwanibiradar|shiwanibiradar]]
| QEMU/KVM on lenovo ideapad 330 i5 8th gen
| {{result|fail}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>{{result|fail}}<ref>paxtest failed</ref>{{result|pass}}<ref>paxtest fail</ref>
| <references/>
|-
| [[User:spathare|spathare]]
| VM Box
| {{result|pass}}
| <references/>
|-
| [[User:stklcode|stklcode]]
| qemu (intel Skylake-X, F31 Host)
| {{result|warn}}<ref>1. default: PASS (libhugetlbfs skipped)
2. performance: PASS
3. destructive: paxtest FAIL</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Fedora 31 T460s, testday iso
| {{result|fail}}<ref>pax test failed
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| <references/>
|-
| [[User:szpak|szpak]]
| Hyperbook NH5/Clevo NH55RCQ with GeForce GTX 1660 Ti mobile on Fedora 30
| {{result|fail}}<ref>{{bz|1783765}} Unable to perform tests as due regression in kernel 5.3/5.4 (nouveau driver) system is pretty unstable. Upstream bug: https://gitlab.freedesktop.org/xorg/driver/xf86-video-nouveau/issues/516 (Fedora bug: https://bugzilla.redhat.com/show_bug.cgi?id=1783765)</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                FAIL   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:tboizard|tboizard]]
| Virtual Box / Core i7 6700 Nvidia GTX 1060 6G
| {{result|pass}}<ref>I have run standard and performance tests before upgrading (kernel 5.3.15) did the upgrade to 5.4.2 and compared.
My report concerns both virtual box simlation and bare metal.
The tests pass, no regression performance wise and no stability issue.
Date: mar. déc. 10 21:09:12 CET 2019
Test set: default
Kernel: 5.4.2-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
============================================================</ref>
| <references/>
|-
| [[User:twelvevolt|twelvevolt]]
| Intel(R) Core(TM)2 Duo CPU    E8400  @ 3.00GHz
| {{result|pass}}<ref>./default/libhugetlbfs                                          SKIP</ref>
| <references/>
|-
| [[User:wurstsemmel|wurstsemmel]]
| Dell XPS 13 9380
| {{result|fail}}<ref>paxtest FAIL after execution of "sudo semanage boolean -m --on selinuxuser_execheap", otherwise PASS. libhugetlbfs SKIP. performance PASS, but /bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
.</ref>
| <references/>
|-
| [[User:zlobniyshurik|zlobniyshurik]]
| P9D-WS/Xeon e3-1245v3/16GB ECC/HD6950
| {{result|fail}}<ref>./default/paxtest - FAILED; ./default/libhugetlbfs - SKIPPED; other tests (include perfomance tests) - PASS</ref>
| <references/>
|-
| [[User:zlobniyshurik|zlobniyshurik]]
| X470 Aorus Gaming 7/Ryzen3900X/32GB ECC
| {{result|pass}}<ref>./default/paxtest & ./default/selinux-dax-control tests skipped due selinux off</ref>
| <references/>
|-
|}


   
   
[[Category:Fedora 32 Test Days]]
[[Category:Fedora 32 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)