From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 100: Line 100:
|-
|-
|}
|}
=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:JoeHannes|JoeHannes]]
| Asus N82JQ
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 01:01:46 PM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms</ref>
| <references/>
|-
| [[User:Mac tester|Mac tester]]
| Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U
| {{result|fail}}<ref>Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
Performance: terminal session is killed during the test.</ref>
| <references/>
|-
| [[User:Smyleon|Smyleon]]
| Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600
| {{result|warn}}<ref>1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
2. Performance: PASS.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Dell XPS 13 9360, Intel i7-7500U
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 aarch64 (Fedora-IoT)
| {{result|pass}}<ref>5.6.3-300.fc32.aarch64 </ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930-1H9, Intel i5-3340M
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:amado86|amado86]]
| Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
| {{result|fail}}<ref>1. ./default/timer-overhead                                        FAIL
    Unacceptable long delay; asked for 2000 usec, got 6136 usec
    Test failure.
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:amado86|amado86]]
| Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
| {{result|fail}}<ref>Standard tests = FAIL
./default/timer-overhead FAIL
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
Performance tests = PASS.
</ref>
| <references/>
|-
| [[User:anonymous|anonymous]]
| Acer Aspire A315-42
| {{result|fail}}<ref>1. kernel-test-1586714524.log.txt
./default/libhugetlbfs                                          SKIP
./default/cachedrop                                              FAIL
./default/paxtest                                                FAIL
</ref>
| <references/>
|-
| [[User:anonymous|anonymous]]
| Lenovo ThinkPad W530
| {{result|fail}}<ref>Date: Mon 13 Apr 2020 11:03:24 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: None
============================================================
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
insmod: ERROR: could not insert module ./minix.ko: Operation not permitted
Unsigned module load failed in enforcing mode
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc  timer-test.o  -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
  67 |  r = fcntl(fd, F_GET_SEALS);
      |      ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
  190 |  r = open(buf, flags, mode);
      |      ^~~~
      |      popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
  315 |  r = fallocate(fd,
      |      ^~~~~~~~~
      |      alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Executable heap (mprotect)              : Vulnerable
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Mon Apr 13 19:59:50 2020
Scheduling leap second for Mon Apr 13 20:00:00 2020
Mon Apr 13 19:59:57 2020 +    97 us (0) TIME_INS
Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 +    429 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 +    748 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 +  1037 us (1) TIME_OOP
Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP
Mon Apr 13 20:00:00 2020 +  1312 us (1) TIME_WAIT
Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 +  1810 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT
Mon Apr 13 20:00:02 2020 +  2124 us (1) TIME_WAIT
Leap complete
</ref>
| <references/>
|-
| [[User:anonymous|anonymous]]
| Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
| {{result|pass}}<ref>default = PASS, performance = PASS</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
| {{result|pass}}<ref>installed, no updates: default = PASS, performance = PASS;
installed, updated: default = PASS , performance = PASS
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| liveimage on bare metal:  CPU: i5-6600k,  RAM: 32GB,  GPU: RX 580,  MB: MSI Gaming Pro Carbon
| {{result|fail}}<ref>default = fail on cachedrop, paxtest;
performance = pass with getlist and getsummary permission denied errors</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64
| {{result|pass}}<ref>All tests passed and all OK.</ref>
| <references/>
|-
| [[User:augenauf|augenauf]]
| F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s
| {{result|pass}}<ref>kernel: 5.6.2-301.fc32.x86_64</ref>
| <references/>
|-
| [[User:didiksupriadi41|didiksupriadi41]]
| liveusb on ASUS X550ZE
| {{result|pass}}<ref>Performance test suite</ref>{{result|fail}}<ref> Default test suite : paxtest Failed</ref>
| <references/>
|-
| [[User:drakkai|drakkai]]
| Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31
| {{result|pass}}<ref>default = PASS, performance = PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable</ref>
| <references/>
|-
| [[User:dvdantunes|dvdantunes]]
| kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB
| {{result|fail}}<ref>Test suite: default
Date: Sun 19 Apr 2020 02:44:30 AM EDT
Kernel version: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests:
./default/cachedrop
./default/paxtest
Additional info:
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:evillagr|evillagr]]
| CPU: AMD FX(tm)-8320 Eight-Core Processor | RAM: 16GB
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:evillagr|evillagr]]
| KVM (host: AMD FX(tm)-8320 Eight-Core Processor | guest:AMD Opteron 63xx class CPU)
| {{result|fail}}<ref> libhugetlbfs SKIP, paxtest FAIL </ref>
| <references/>
|-
| [[User:fubuki|fubuki]]
| bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G
| {{result|pass}}<ref>Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
</ref>
| <references/>
|-
| [[User:garrmcnu|garrmcnu]]
| Test image on VM (KVM)
| {{result|fail}}<ref>./default/paxtest FAIL</ref>
| <references/>
|-
| [[User:gkaukola|gkaukola]]
| HP Pavilion dv6
| {{result|pass}}
| <references/>
|-
| [[User:greenid|greenid]]
| HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4
| {{result|pass}}<ref>ulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:ibims|ibims]]
| Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM
| {{result|pass}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/libhugetlbfs                                          SKIP   
./default/stack-randomness                                      PASS   
./default/timer-overhead                                        PASS   
./default/mq-memory-corruption                                  PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/insert_leap_second                                    PASS   
./default/paxtest                                                SKIP   
./default/selinux-dac-controls                                  SKIP   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
Test suite complete                                              PASS   
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:jobus|jobus]]
| HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
------------------------------------------------------
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
</ref>
| <references/>
|-
| [[User:jobus|jobus]]
| Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
</ref>
| <references/>
|-
| [[User:joecastrop|joecastrop]]
| ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image
| {{result|pass}}<ref>{{bz|1562347}} Test suite called with default: All test pass except ./default/paxtest
Performance test fail:  bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
  38 | #include <rpc/rpc.h>
https://bugzilla.redhat.com/show_bug.cgi?id=1562347
Library already installed:
Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.</ref>
| <references/>
|-
| [[User:jpesco|jpesco]]
| HP Elite 8300 Intel® Core™ i5-3470
| {{result|pass}}
| <references/>
|-
| [[User:kiko964|kiko964]]
| ASUS X554L Intel Core i3-5010U
| {{result|fail}}<ref>Date: Tue 14 Apr 2020 07:06:47 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/cachedrop
Warned Tests: None
============================================================
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestError: Can't free dentries and inodes
395696 395184
Could not run tests
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc  timer-test.o  -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
  67 |  r = fcntl(fd, F_GET_SEALS);
      |      ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
  190 |  r = open(buf, flags, mode);
      |      ^~~~
      |      popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
  315 |  r = fallocate(fd,
      |      ^~~~~~~~~
      |      alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Tue Apr 14 19:59:50 2020
Scheduling leap second for Tue Apr 14 20:00:00 2020
Tue Apr 14 19:59:57 2020 +    184 us (37) TIME_INS
Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 +    493 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 +    827 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 +  1231 us (38) TIME_OOP
Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP
Tue Apr 14 20:00:00 2020 +  1662 us (38) TIME_WAIT
Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 +  2251 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT
Tue Apr 14 20:00:02 2020 +  2745 us (38) TIME_WAIT
Leap complete
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:kle|kle]]
| testkernel ISO on KVM (Host: Lenovo Thinkpad T480)
| {{result|pass}}<ref>1. Performance test suite: PASSED
2. Default test suite: PASSED </ref>
| <references/>
|-
| [[User:lbrabec|lbrabec]]
| F32, Lenovo T480s (i7-8650U)
| {{result|fail}}<ref>./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
</ref>
| <references/>
|-
| [[User:lfc|lfc]]
| Intel® Core™ i7-6700 CPU @ 3.40GHz × 8 | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| <references/>
|-
| [[User:liwan|liwan]]
| HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space
| {{result|pass}}<ref>ltp/lite </ref>
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:makelix|makelix]]
| Lenovo ThinkPad T470s
| {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref>
| <references/>
|-
| [[User:makelix|makelix]]
| Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520  @ 2.40GHz)
| {{result|fail}}<ref>libhugetlbfs SKIP, paxtest FAIL</ref>
| <references/>
|-
| [[User:malucious|malucious]]
| Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta
| {{result|pass}}<ref>./default/libhugetlbfs and ./default/paxtest  were skipped.</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| USB kerneltest-5.6.3.iso on Lenovo ideapad Y570
| {{result|warn}}<ref>Running Both Basic and Performance test
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T480s, i5-8250U, iGPU
| {{result|pass}}<ref>everything working as expected </ref>
| <references/>
|-
| [[User:molli123|molli123]]
| E3-1240 v6, 32GB, 1060 with nouveau driver
| {{result|pass}}<ref>everything working as expected</ref>
| <references/>
|-
| [[User:mosesdenny|mosesdenny]]
|
| {{result|pass}}<ref>Test suite called with default
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/insert_leap_second                                    PASS   
Test suite complete                                              PASS
Thu 16 Apr 2020 04:11:15 PM EDT
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:nasirhm|nasirhm]]
| KVM on X1-Carbon
| {{result|fail}}<ref>./default/paxtest                                                FAIL
./default/libhugetlbfs                                        SKIP</ref>
| <references/>
|-
| [[User:nchudnoff|nchudnoff]]
| KVM (Host: AMD Phenom II X4 B93 CPU | Guest: 6 GB RAM)
| {{result|pass}}<ref>All passed (libhugetlbfs SKIP, paxtest SKIP)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| HP Compaq 8510w Intel T9300 AMD RV630
| {{result|pass}}<ref>Performance test suite
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Ideapad with Core i3-6006U and 8 GB memory
| {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450
| {{result|fail}}<ref>paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.</ref>
| <references/>
|-
| [[User:novicejava1|novicejava1]]
|
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:pfrenard|pfrenard]]
| Dell Inspiron 7000 (i7-7500U)
| {{result|fail}}<ref>./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED</ref>
| <references/>
|-
| [[User:quiet|quiet]]
| Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB
| {{result|fail}}<ref>Default test suite
./default/paxtest FAIL
Performance PASS</ref>
| <references/>
|-
| [[User:roypen|roypen]]
| Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM
| {{result|pass}}<ref>Performance test suite: PASSED</ref>{{result|pass}}<ref>Default test suite: PASSED</ref>
| <references/>
|-
| [[User:sassam|sassam]]
| Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+
| {{result|pass}}<ref>Works for me. Regression tests passed on both devices.</ref>
| <references/>
|-
| [[User:simobonfo|simobonfo]]
| kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u
| {{result|fail}}<ref>########## ./runtests.sh ##########
All PASS exept:
./default/libhugetlbfs                                            SKIP   
./default/paxtest                                                  FAIL   
Test suite complete                                              FAIL
########## ./runtests.sh -t performance ##########
Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied.
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:stathisl|stathisl]]
| ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned
| {{result|fail}}<ref>Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL.
Date: Mon 13 Apr 2020 12:31:38 PM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: None
</ref>
| <references/>
|-
| [[User:suve|suve]]
| AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta
| {{result|pass}}<ref>Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.</ref>
| <references/>
|-
| [[User:tgerov|tgerov]]
| ThinkPad t480s, i7-8550U, 16G
| {{result|fail}}<ref>./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                FAIL   
</ref>
| <references/>
|-
| [[User:theunrealgeek|theunrealgeek]]
| Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date
| {{result|pass}}<ref>Kernel: 5.6.3-300.fc32.x86_64
Both regular and performance tests pass and has uploaded results automatically as well.</ref>
| <references/>
|-
| [[User:thuzzik|thuzzik]]
|
| {{result|pass}}
| <references/>
|-
| [[User:thuzzik|thuzzik]]
| Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:udb28|udb28]]
| Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096
| {{result|fail}}<ref>./default/paxtest FAIL
Vulnerability status:
spec_store_bypass: Vulnerable
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:udb28|udb28]]
| Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2
| {{result|pass}}<ref>Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64</ref>
| <references/>
|-
| [[User:visitor|visitor]]
| Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO
| {{result|pass}}<ref>first test: ./default/libhugetlbfs  SKIP, ./default/paxtest  SKIP</ref>
| <references/>
|-
|}


[[Category:Fedora 32 Test Days]]
[[Category:Fedora 32 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)