From Fedora Project Wiki

Fedora Test Day
Echo-testing-48px.png
Kernel 5.2

Date 2019-07-22 to 2019-07-29
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.2.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 29 or 30 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.2 kernel for an existing installation from F30 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F29 and F30 systems.
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
JeremyM Sony Vaio Intel i5
Pass pass
[1]
  1. Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "
MidnightRAT Fedora 30 stock
Pass pass
[1]
  1. Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks.
alciregi Baremetal i5-7400 8GB RAM
Pass pass
[1]
  1. Test suite called with performance Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
Pass pass
[1]
  1. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
alciregi RPi3 armv7hl
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with destructive
  2. Test suite called with default
alciregi Scaleway START1-XS x86_64 cloud instance
Pass pass
[1]
  1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi aarch64 on KVM
Pass pass
[1]
  1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
alciregi vmware 4GB ram 2vcpu
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
archmunky Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
Warning warn
[1]
  1. Standard: https://apps.fedoraproject.org/kerneltest/logs/34940 sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS Performance: https://apps.fedoraproject.org/kerneltest/logs/34942 All PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
archmunky Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
Pass pass
[1]
  1. runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS
atim GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
Pass pass
[1]
  1. Test suite called with default - PASS (except paxtest as always) Test suite called with performance - PASS
benjamind VMware Workstation on Fedora 30 host (i7-6500U)
Pass pass
[1]
  1. cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately
calinoiualex Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
Pass pass
[1]
  1. 1. Pass 2. Pass Ran with performance argument Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
chuhu NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
Pass pass
[1]
  1. Ran trinity testings and scheduler testings suits.
danniel KVM
Pass pass
[1]
  1. works
dinostar Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
Pass pass
[1]
  1. The following test was skipped, everything else was a pass. ./default/libhugetlbfs SKIP
eboswell Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with performance. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
  2. Test suite called with default. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
glb Bare metal, Core i7-920, 12GB RAM
Pass pass
[1]
  1. All default test suite passed.
goodmirek bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
Pass pass
[1]
  1. KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.
heffer ThinkPad X1 Carbon 5th
Fail fail
[1]
Fail fail
[2]
  1. WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577 Works fine with kernel-5.1.18-300.fc30.x86_64
  2. RHBZ #1724357 Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357
idanka Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050
Warning warn
[1]
  1. ./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass thirdparty/nvidia-module error performance: fatal error: rpc/rpc.h: No such file or directory
jlanda bare metal ryzen 5 1600x
Pass pass
kiyer Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
Pass pass
kparal Thinkpad T480s, Fedora 30
Pass pass
lewis41 i5-6500 CPU @ 3.20GHz
Pass pass
lewis41 i5-6500 CPU @ 3.20GHz - 8GB RAM
Pass pass
lnie ProLiant SL4545 G7
Pass pass
luya HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
Pass pass
[1]
  1. Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.
masami Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
Pass pass
[1]
  1. Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.
masami Raspberry Pi 3B+ aarch64
Pass pass
[1]
  1. kernel regression tests passed.
mharpau Fedora 30 T480s i5-8250U iGPU
Pass pass
mimat fedora 30@i7-2630QM
Pass pass
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
Pass pass
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
Pass pass
[1]
  1. LTP from upstream sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass fs pass, fsx pass, math pass, hugeltb pass, mm failed with case ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass
monot0m Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
monot0m Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
nah Fam vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
Warning warn
[1]
  1. Test 1 ./default/cachedrop FAIL Test suite complete FAIL Test 2 ./performance/lmbench3 PASS Test suite complete PASS
nightromantic Bare metal, desktop, F30@Intel i3-8100
Warning warn
[1]
  1. ./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS". ./runtests.sh -t performance -- "PASS"
numasan HP EliteBook 820 G4
Pass pass
[1]
  1. Test set: default
ozeszty F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
Pass pass
[1]
  1. ./default/libhugetlbfs skipped as usual, default and performance passed.
ozeszty F30 KDE, Skylake laptop on kernel 4.2.2 from koji
Pass pass
[1]
  1. ./default/libhugetlbfs skipped, default and performance passed.
pmeyer AMD® Athlon(tm) ii x2 250 processor × 2
Pass pass
[1]
  1. file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
pwhalen Banana Pi (armhfp)
Pass pass
pwhalen Mustang (xgene-1)
Pass pass
[1]
Fail fail
[2]
pwhalen Pine 64 Plus (aarch64 sbc)
Pass pass
[1]
pwhalen Raspberry Pi 3B+ (armhfp)
Pass pass
pwhalen Trimslice (armhfp)
Warning warn
[1]
pwhalen Wandboard Quad (armhfp)
Pass pass
[1]
ralex 16 GB Ram | Nvidia GTX 1080
Pass pass
[1]
rammodulus Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
Fail fail
[1]
  1. Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
rudrapratap qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/selinux-dac-controls PASS ./default/paxtest PASS ./default/memfd PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/modsign PASS ./default/libhugetlbfs SKIP ./default/insert_leap_second PASS ./default/timer-overhead PASS Test suite complete PASS
salimma Bare metal: Thinkpad T480s
Pass pass
[1]
  1. Default and performance profiles pass
sumantrom T470s
Pass pass
[1]
  1. Called with default
tmlgcq QEMU with KVM Virtual
Pass pass
tmsp Ryzen 1800X; 16 GB RAM; F30
Pass pass
user default
Pass pass
vascom Bare metal, Core i7-4470, 32GB RAM
Pass pass
[1]
  1. All good.
weswilliams VMware Workstation 15.1.0 on Fedora 30 host
Pass pass
[1]
  1. All default test suite passed.