From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 42: Line 42:


== Test Results ==
== Test Results ==
=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Alistair|Alistair]]
|  HP Laptop i5-7200U×4 @2.50GHz, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), M.2 SSD, with Fedora test day image 5.5.3-200.fc31.x86_64
| {{result|fail}}<ref>No WLAN. Wireless network controller not detected. Had to use Ethernet port.
Default: paxtest failed.
Performance: terminal window crashed during lmbench (MB [default 2691] Checking to see if you have 2691 MB; please wait for a moment...).</ref>
| <references/>
|-
| [[User:Elos|Elos]]
| Ryzen 7 1700, 16GB RAM, 970 EVO Plus 500GB NVMe, RX470 8GB
| {{result|pass}}<ref>/default/libhugetlbfs SKIP ./default/paxtest SKIP</ref>
| <references/>
|-
| [[User:Fedora tester|Fedora tester]]
| Desktop i5-6600 @ 3.30GHz, HD Graphics 530 (Skylake GT2) / NV124, SSD, Fedora test day image 5.5.3-200.fc31.x86_64
| {{result|pass}}<ref>Default and Performance tests passed.</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 armv7hl F31
| {{result|pass}}<ref>./default/stack-randomness SKIP   
./default/libhugetlbfs SKIP   
./default/paxtest SKIP
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| bare metal: i3-8130U, 16GB RAM, LVM/ext4
| {{result|warn}}<ref>default: WARN (sysfs-perms)
performance: PASS</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.59
| {{result|pass}}<ref>Tests passed. LGTM overal. But ABRT warning me:
WARNING: CPU: 2 PID: 390 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0 [nvidia_drm]
Crash function: nv_drm_atomic_helper_disable_all</ref>{{result|pass}}
| <references/>
|-
| [[User:boraone|boraone]]
| Operating System: Fedora 31 KDE Plasma Version: 5.17.5 KDE Frameworks Version: 5.66.0 Qt Version: 5.13.2 Kernel Version: 5.4.17-200.fc31.x86_64 OS Type: 64-bit Processors: 8 × Intel® Core™ i7-10510U CPU @ 1.80GHz Memory: 15.3 GiB of RAM
| {{result|warn}}<ref>paxtest failed</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| HP Proliant ML350 Gen8 Intel(R) Xeon(R) CPU E5-2650 0 16G 2 numa nodes
| {{result|pass}}<ref>Run stress test for scheduler and memory.</ref>
| <references/>
|-
| [[User:cserpentis|cserpentis]]
|
| {{result|pass}}<ref>Tested daily workloads with podman/docker, intellij on T480s, intel i5-8350U</ref>
| <references/>
|-
| [[User:cstratak|cstratak]]
| KVM/QEMU Fedora 31 aarch64, 32GB RAM, 8 cores, running on Ampere eMAG 8180
| {{result|pass}}<ref>./default/libhugetlbfs ./default/paxtest and ./default/stack-randomness skipped. During running the test suite I also got this message: [  162.871884] minix: module verification failed: signature and/or required key missing - tainting kernel.
The rest are PASS.
Vulnerable on spec_store_bypass and spectre_v2</ref>
| <references/>
|-
| [[User:cwei|cwei]]
| Intel xeon CPU E301505M v5 @ 2.80GHz
| {{result|fail}}<ref>./default/paxtest FAIL  ./default/insert_leap_second FAIL  ./default/libhugelbfs SKIP,    others passed.</ref>
| <references/>
|-
| [[User:danniel|danniel]]
| Intel Core I7-5500U , 8GB DDR3
| {{result|pass}}<ref>100 % passed</ref>
| <references/>
|-
| [[User:dgrigorev|dgrigorev]]
| Intel NUC Celeron CPU J3455 8Gb memory F31
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:dgrigorev|dgrigorev]]
| qemu-system-x86_64 -enable-kvm -m 6G -cpu host -smp 3 -cdrom mnt/kerneltest-5.5-x86_64.iso -boot d -drive driver=raw,file=mnt2/el-disk,index=0,media=disk -vga virtio #qemu version 4.0.0
| {{result|warn}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>{{result|pass}}<ref>performance test passed (after installing missing libtirpc-devel and adding execute permissions for ./performance/lmbench3/scripts/get{list,summary})</ref>{{result|fail}}<ref>default test suite fail with all tests PASS except paxtest FAIL and libhugetlbfs SKIP</ref>
| <references/>
|-
| [[User:didiksupriadi41|didiksupriadi41]]
| CPU: AMD A10-7400P Radeon R6 4C+6G (4) @ 2.500GHz; GPU: AMD ATI Radeon R6 Graphics + AMD Radeon R5 (Hainan);
| {{result|fail}}<ref>paxtest FAIL
sysfs-perms WARN
Performance PASS</ref>{{result|fail}}<ref>1. paxtest FAIL
2. sysfs-perms WARN
3. Performance test Passed</ref>
| <references/>
|-
| [[User:eagle8089|eagle8089]]
| HOST: Windows 10 i5-8th Gen; VM: 4GB RAM, 4 cores
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>{{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| Dell Vostro 3558 Core i3-4005U
| {{result|pass}}
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| HP Elitebook 840 G6 - Core i7-8665U
| {{result|pass}}
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| MSI MS-7984 - Core i7-6700
| {{result|pass}}
| <references/>
|-
| [[User:epereira|epereira]]
| KVM using Fedora 31 Memory 2.7 GiB, Processor Intel Core Processor (Boradwell, IBRS) x4, GNOME Version 3.34.1, OS type 64-bit, Disk 29.8
| {{result|pass}}<ref>1) Test suite called with default
./default/timer-overhead                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/cachedrop                                            FAIL   
./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/posix_timers                                        PASS   
./default/insert_leap_second                              PASS   
./default/stack-randomness                                PASS   
./default/sysfs-perms                                          PASS   
./default/mq-memory-corruption                        PASS   
./default/paxtest                                                  SKIP   
./default/selinux-dac-controls                              PASS   
Test suite complete                                              FAIL   
=============================================
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
2) Sun 16 Feb 2020 08:01:58 PM EST
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:ernst|ernst]]
| Gerät:PC192-168-2-101  Speicher:7,3 GiB  Processor:AMD® Athlon(tm) ii x2 250 processor × 2  Grafik:AMD® Rs880  GnomeVersion 3.34.3  Typ64-bit  Datenträger:700,2 GB
| {{result|pass}}
| <references/>
|-
| [[User:gabibbo97|gabibbo97]]
| CPU: AMD FX-8320 GPU: AMD Radeon R9 290
| {{result|fail}}<ref>Kernel Test Suite) FAIL: paxtest, cachedrop WARN: nvidia-module
Performance Test Suite) WARN: nvidia-module</ref>
| <references/>
|-
| [[User:gtb|gtb]]
| Thinkpad T510
| {{result|pass}}
| <references/>
|-
| [[User:gtwilliams|gtwilliams]]
| CPU: 8 x Intel Core i7-6700 CPU @ 3.40GHz, OS: FC31, KDE Plasma 5.17.5-1, Qt 5.13.2-2
| {{result|pass}}<ref>Base and performance all PASSed</ref>
| <references/>
|-
| [[User:himanshutak8|himanshutak8]]
| Lenovo Z51(core i7, 16GB RAM) Virtual Machine Running with 6GB RAM
| {{result|fail}}<ref>
/default/insert_leap_second                                    FAIL
Test suite complete                                              FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:hyperreal|hyperreal]]
| Fedora 31 Silverblue on CPU: Intel i3-4170 (4) @ 3.700GHz; GPU: Intel 4th Generation Core Processor Family (Haswell)
| {{result|pass}}<ref>PASS for both default and performance tests</ref>
| <references/>
|-
| [[User:ibims|ibims]]
| LENOVO ThinkPad T420, Intel Core i5-2520M
| {{result|pass}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/libhugetlbfs                                          SKIP   
./default/stack-randomness                                      PASS   
./default/timer-overhead                                        PASS   
./default/mq-memory-corruption                                  PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/paxtest                                                SKIP   
./default/selinux-dac-controls                                  SKIP   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:imabug|imabug]]
| Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119 bare metal running Fedora 31
| {{result|pass}}<ref>paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.</ref>
| <references/>
|-
| [[User:imabug|imabug]]
| QEMU/KVM 4GB RAM 200 GB disk on Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119.
| {{result|pass}}<ref>Default libhugetlbfs and paxtest skipped. remaining tests passed.  Performance tests passed</ref>
| <references/>
|-
| [[User:imabug|imabug]]
| Xeon W690, nVidia GTX 1660 Ti, 24GB RAM baremetal
| {{result|pass}}<ref>paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on.  Remaining tests pass.</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB, 970 EVO M.2
| {{result|pass}}<ref>Both the default (llibhugetlbfs & paxtest was skipped) and performance tests PASS, though it's worth to point out that paxtest was "skipped" when I tested the 5.5 kernel and that it would always fail back on the current stable 5.4+ kernels on F31 when running the default test. Vulnerability status: itlb_multihit:KVM: Vulnerable, l1tf:Mitigation: PTE Inversion, mds:Mitigation: Clear CPU buffers; SMT disabled, meltdown:Mitigation: PTI, spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp, spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization, spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled</ref>
| <references/>
|-
| [[User:jakfrost|jakfrost]]
| VM using Gnome Boxes default settings (QEMU, 2GB Ram, 20GB HDD) Default installation chosen using test image
| {{result|pass}}<ref>Successfully was able to identify the host machine hardware. Ran the default test suite provided in /home/liveuser/kernel-tests. For some reason, I couldn't automatically submit the results with the test script, although it reported successfully submitting them  without requesting my FAS password.</ref>
| <references/>
|-
| [[User:jbastian|jbastian]]
| HPE Apollo 70 (ThunderX2 aarch64 CPUs, 96 GiB RAM, 960 GiB SSD)
| {{result|warn}}<ref>The cachedrop test appears to have a bug; the logs show some errors:
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected</ref>{{result|pass}}
| <references/>
|-
| [[User:jbastian|jbastian]]
| HPE Apollo 70 (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:joeyengel|joeyengel]]
| Lenovo x1 carbon 4th gen; i5-6200u 8GB ram
| {{result|pass}}<ref>paxtest skipped; libhugetlbfs skipped;</ref>
| <references/>
|-
| [[User:joeyengel|joeyengel]]
| xps13 i5-8250u; fedora 31 w/ 5.5.3-200.fc31.x86_64 kernel
| {{result|pass}}<ref>Skipped tests: libhugetlbfs, paxtest, selinux-dac-controls</ref>
| <references/>
|-
| [[User:jouhou|jouhou]]
| HP Z400 Workstation w/ X5675, GTX1660, 24GB RAM
| {{result|fail}}<ref>1. Default tests: paxtest FAIL ; libhugetlbfs SKIP
2. Performance test suite: PASS</ref>
| <references/>
|-
| [[User:jouhou|jouhou]]
| Lenovo Thinkpad x1 Carbon 3rd gen
| {{result|pass}}<ref>At first run, performance tests say "fatal error: rpc/rpc.h: no such directory. Compilation terminated". After installing libntirpc and libtirpc the compilation passes but again, in the end of tests, I get following error: "/bin/sh: ../scripts/getlist: Permission denied". Although both test suites passed,  I don't know if these affect test outcomes or reliability.</ref>
| <references/>
|-
| [[User:jphilipp|jphilipp]]
|
| {{result|pass}}<ref>hp compaq elite 8100 i5 4GB</ref>
| <references/>
|-
| [[User:julroy67|julroy67]]
| Dell XPS 7390, Intel(R) Core(TM) i7-10710U CPU
| {{result|pass}}<ref>100 % passed</ref>
| <references/>
|-
| [[User:kokoseij|kokoseij]]
| CPU: Intel I5-4460, RAM: DDR3 12GB, GPU: NVIDIA GeForce GTX 960, OS: Fedora 31 Cinnamon Spin, Upgraded from kernel-stabilization copr
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS</ref>{{result|pass}}
| <references/>
|-
| [[User:lberton@redhat.com|lberton@redhat.com]]
| kerneltest-5.5-x86_64.iso @ ThinkPad T480s
| {{result|fail}}<ref>Linux localhost-live 5.5.2-200.fc31.x86_64 #1 SMP Thu Feb 6 17:23:27 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
Test suite called with default
./default/paxtest                                                FAIL   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
./default/mq-memory-corruption                                  PASS   
./default/timer-overhead                                        PASS   
./default/cachedrop                                              FAIL   
./default/stack-randomness                                      PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
Test suite complete                                              FAIL</ref>
| <references/>
|-
| [[User:lewis41|lewis41]]
| Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz - RAM 16GB
| {{result|pass}}<ref>1. Pass
2. Pass</ref>
| <references/>
|-
| [[User:macnum|macnum]]
| AMD Ryzen 9 3900X 12, ASUS Radeon RX 5600 XT OC, 32 GB hyper-x DDR4 3200Hhz (4x8)
| {{result|pass}}<ref>./default/mq-memory-corruption                                  PASS   
./default/stack-randomness                                      PASS   
./default/libhugetlbfs                                          SKIP   
./default/sysfs-perms                                            PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
./default/cachedrop                                              PASS   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
./default/paxtest                                                SKIP   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:malucious|malucious]]
| KVM guest with 2GB ram using the test image. i7-6700K.
| {{result|fail}}<ref>The performance test passed. The first test  failed. ./default/libhugetlbfs was skipped. ./default/paxtest failed.</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| Testday image VM on Toshiba ideapad Y570
| {{result|warn}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:masami|masami]]
| i7-9700K(UHD Graphics 630): fedora 31
| {{result|pass}}<ref>kernel regression test passed. Works fine for daily use. build and work fine simple kernel module.</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T480s, i5-8250U, iGPU
| {{result|pass}}<ref> Base and performance all PASSed </ref>
| <references/>
|-
| [[User:mimat|mimat]]
| w520 i7-2630qm
| {{result|pass}}<ref>Works for me. No regressions.</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Toshiba X40-D BIOS 3.80 Intel Core i7-7500U CPU @ 2.70GHz × 4
| {{result|fail}}<ref>./default/paxtest - FAIL</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Toshiba X40-E BIOS 2.30 Intel Core i5-8250U CPU @ 1.60GHz × 8
| {{result|fail}}<ref>./default/paxtest - FAIL</ref>
| <references/>
|-
| [[User:mzink@redhat.com|mzink@redhat.com]]
| ThinkPad T490s
| {{result|pass}}
| <references/>
|-
| [[User:nmousouros|nmousouros]]
| nmousouros
| {{result|pass}}<ref>./default/insert_leap_second                                    PASS   
./default/cachedrop                                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Ideapad with Core i3-6006U
| {{result|pass}}<ref>Default tests pass except paxtest, performance tests pass (after installing missing package libtirpc-devel).</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Old PC with Core i5-750, 4 GB RAM and Radeon HD 6450
| {{result|warn}}<ref>Default tests pass except paxtest. No regressions regarding hardware support noted. Performance tests aborted after 3 hours with excessive swapping.</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| AMD Phenom II X2, R5 240 (OLAND using amdgpu), F31 & 5.5.3-200.fc31.x86_64
| {{result|pass}}<ref>Default passed (libhugetlbfs and paxtest were skipped), performance passed. Vulnerabilities status looks hopeful: not affected, except for spectre.</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| IvyBridge/AMD 7670m laptop, F30 & 5.5.3-200.fc31.x86_64
| {{result|pass}}<ref>Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted.  I skipped paxtest skip in the previous entry.</ref>{{result|pass}}<ref>Default passed (libhugetlbfs skipped), performance passed. No issues spotted.</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| Skylake laptop, 5.5.3-200.fc31.x86_64
| {{result|pass}}<ref>Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted throughout the week.</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| HPE Apollo (cn99xx) - AArch64
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Lenovo HR350A (AArch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Mustang (xgene-1) AArch64
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 4B (4GB) - AArch64
| {{result|pass}}<ref>
</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Wandboard Quad (armhfp)
| {{result|fail}}<ref>./default/insert_leap_second                                    FAIL</ref>
| <references/>
|-
| [[User:quiet|quiet]]
| Memory: 3.8GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.3, OS: 64-bit, KVM, Disk: 21.5 GB
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/paxtest                                                FAIL   
./default/libhugetlbfs                                          SKIP   
./default/mq-memory-corruption                                  PASS   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/posix_timers                                          PASS   
./default/insert_leap_second                                    PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              FAIL   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:rammodulus|rammodulus]]
| Test day Image. Proxmox 5.4 VM; UEFI, 4GB, Common KVM Procs x 4, llvmpipe graphics
| {{result|pass}}<ref>Both tests passed </ref>
| <references/>
|-
| [[User:rotwild|rotwild]]
| Intel i5 460M, ATI Radeon HD 5650, 4GB RAM
| {{result|fail}}<ref>1. paxtest FAIL sysfs-perms WARN Performance test suite PASS </ref>
| <references/>
|-
| [[User:roypen|roypen]]
| Thinkpad T430, Intel i5-3320M, 8 GB RAM
| {{result|pass}}<ref>2. Performance Test suite - PASS</ref>{{result|fail}}<ref>1. ./default/libhugetbfs - SKIP ; ./default/paxtest - FAIL </ref>
| <references/>
|-
| [[User:sayaksarkar|sayaksarkar]]
| Lenovo T460s 20G [Boxes - Memory 2GiB, CPUs: 4]
| {{result|fail}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
</ref>
| <references/>
|-
| [[User:sbakker|sbakker]]
| Dell XPS 13 9360; Intel Core i7-7560U @2.40GHz x 4; Intel Iris Plus Graphics 640 (Kaby Lake GT3e), driver i915; Memory: 16GB; Disk: 512GB SSD (THNSN5512GPUK NVMe TOSHIBA)
| {{result|pass}}<ref>{{bz|1803706}} 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected </ref>{{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:shiwanibiradar|shiwanibiradar]]
| lenevo ideapad330 , fedora31 on kvm , intel i5 ,8GB RAM
| {{result|pass}}<ref>./default/paxtest:SKIP & ./default/libhugetlbfs:SKIP overall both are pass</ref>
| <references/>
|-
| [[User:simobonfo|simobonfo]]
| QEMU/KVM 4GB RAM 20 GB disk on Lenovo Ideapad 100 15-IBD with kerneltest-5.5.3.iso (Updated at 2020-02-12)
| {{result|fail}}<ref>./runtests.sh:
./default/posix_timers-->PASS   
./default/cachedrop-->FAIL   
./default/paxtest -->FAIL   
./default/stack-randomness-->PASS   
./default/mq-memory-corruption -->PASS   
./default/libhugetlbfs-->SKIP   
./default/selinux-dac-controls-->PASS   
./default/insert_leap_second -->PASS   
./default/timer-overhead -->PASS   
./default/sysfs-perms-->PASS   
./default/modsign-->PASS   
./default/memfd -->PASS
Test complete -->FAIL
./runtests.sh -t performance make the terminal crash</ref>
| <references/>
|-
| [[User:slushur|slushur]]
| Ryzen 7 1700, 32GB RAM, RX 580
| {{result|pass}}<ref>./default/paxtest SKIP
./default/libhugetlbfs SKIP</ref>
| <references/>
|-
| [[User:snip4|snip4]]
| Intel Core i7-7800X, ASUS TUF X299 MARK 2, 32GB RAM, NVIDIA RTX 2070, Test 5.5 image clean install.
| {{result|pass}}<ref>libhugetlbfs & paxtest: SKIP // Since kernel 5.4 series, can't reboot, system hangs. Only boot correctly when force power off switch, and on again.</ref>
| <references/>
|-
| [[User:stklcode|stklcode]]
| qemu (intel Skylake-X, 12-core/16GB guest specs F31 Host)
| {{result|pass}}
| <references/>
|-
| [[User:str8edgedave|str8edgedave]]
| HP Elitedesk core i7-4770 16GB RAM
| {{result|fail}}<ref>$ sudo ./runtests.sh
Test suite called with default
./secureboot/check_SB_signature                                  PASS
./default/cachedrop                                              PASS
./default/insert_leap_second                                    PASS
./default/libhugetlbfs                                          SKIP
./default/memfd                                                  PASS
./default/modsign                                                PASS
./default/mq-memory-corruption                                  PASS
./default/paxtest                                                SKIP
./default/posix_timers                                          PASS
./default/selinux-dac-controls                                  PASS
./default/stack-randomness                                      PASS
./default/sysfs-perms                                            PASS
./default/timer-overhead                                        PASS
Test suite complete                                              PASS
----
$./runtests.sh -t performance
Test suite called with performance
./secureboot/check_SB_signature                                  FAIL
Using config in CONFIG.stc0042699.stholdco.com
Tue Feb 11 10:54:11 CST 2020
Latency measurements
Tue Feb 11 10:55:35 CST 2020
Calculating file system latency
Tue Feb 11 10:55:38 CST 2020
Local networking
Tue Feb 11 10:59:19 CST 2020
Bandwidth measurements
Tue Feb 11 11:05:47 CST 2020
Calculating context switch overhead
Tue Feb 11 11:05:52 CST 2020
./performance/lmbench3                                          PASS
Test suite complete                                              FAIL
</ref>
| <references/>
|-
| [[User:suprith4989|suprith4989]]
| KVM/QEMU Dell r730, 2GB RAM
| {{result|fail}}<ref>./default/posix_timers PASS ; ./default/cachedrop PASS ; ./default/paxtest FAIL ; ./default/stack-randomness PASS ; ./default/mq-memory-corruption PASS ; ./default/libhugetlbfs SKIP ; ./default/selinux-dac-controls PASS ; ./default/insert_leap_second PASS ; ./default/timer-overhead                        PASS  ; ./default/sysfs-perms PASS ; ./default/modsign PASS ; ./default/memfd PASS ;
Test suite complete                                              FAIL
./performance/lmbench3                                      PASS
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|pass}}<ref>libhugetlbfs: SKIP
paxtest: SKIP
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:temjin747|temjin747]]
| Host: Fedora 31 KDE Spin x86_64 kernel 5.4.18-200.fc31.x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU-KVM version 4.1.1/KVM (2 vCPUs, 2 GB RAM)
| {{result|pass}}
| <references/>
|-
| [[User:tjamadeira@gmal.com|tjamadeira@gmal.com]]
| VM Fedora 31 in Intel Core i5-4210U CPU @ 1.70GHz*4; LLVM 9.0, 256 bits; gnome 3.34.3; 64-bit
| {{result|pass}}<ref>The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:vipul0|vipul0]]
| Lenovo i5-6300U CPU@2.40GHz 32GB RAM
| {{result|pass}}<ref>Run test
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance test
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:vipul0|vipul0]]
| QA
| {{result|pass}}<ref>Run test Result ::
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Perdormance Result ::
sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:vishalvvr|vishalvvr]]
| qemu/kvm 2GB  20GB, 5.5.2-200.fc31.x86_64
| {{result|fail}}<ref>1. default test suite: FAIL
./default/paxtest        FAIL
./default/libhugetlbfs  SKIP</ref>
| <references/>
|-
| [[User:wessle|wessle]]
| kerneltest-5.5-x86_64.iso on Boxes VM with defaults; CPU: AMD Ryzen Threadripper 2950X (16 cores @ 3.5GHz); GPU: nvidia GeForce RTX 2070 super
| {{result|pass}}
| <references/>
|-
| [[User:willo|willo]]
| 8GB Memory Virtualbox VM on an Intel NUC - Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz
| {{result|pass}}<ref>cachedrop, libhugetlbfs, selinux-dac-controls, insert_leap_second, modsign SKIP the rest passed for both default and performance</ref>
| <references/>
|-
| [[User:ywatanabe|ywatanabe]]
| HOST OS: fedora28 , CPU: Intel(R) Core(TM) i5-4570S CPU @ 2.90GHz , MEM: 16 GB , KERNEL: Linux fedora 4.20.8-100.fc28.x86_64 ,  KVM: qemu-kvm-2.11.2-4.fc28.x86_64 , TESTIMG_USED: kerneltest-5.5-x86_64.iso (Downloaded on Feb 12 23:05 JST)
| {{result|fail}}<ref>default test: FAILED (Failed after doing step 3 and 4 of https://fedoraproject.org/wiki/QA:Testcase_kernel_regression#Setup )
performance test: PASS</ref>
| <references/>
|-
|}
[[Category:Fedora 32 Test Days]]
[[Category:Fedora 32 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)