From Fedora Project Wiki

Fedora Test Day
Echo-testing-48px.png
Kernel 5.5

Date 2020-02-10 to 2020-02-17
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's installment of Fedora Test Day will focus on Kernel 5.5.

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 30 or 31 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.5 kernel for an existing installation from F31 koji or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F30 systems.
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
Alistair HP Laptop i5-7200U×4 @2.50GHz, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), M.2 SSD, with Fedora test day image 5.5.3-200.fc31.x86_64
Fail fail
[1]
  1. No WLAN. Wireless network controller not detected. Had to use Ethernet port. Default: paxtest failed. Performance: terminal window crashed during lmbench (MB [default 2691] Checking to see if you have 2691 MB; please wait for a moment...).
Elos Ryzen 7 1700, 16GB RAM, 970 EVO Plus 500GB NVMe, RX470 8GB
Pass pass
[1]
  1. /default/libhugetlbfs SKIP ./default/paxtest SKIP
Fedora tester Desktop i5-6600 @ 3.30GHz, HD Graphics 530 (Skylake GT2) / NV124, SSD, Fedora test day image 5.5.3-200.fc31.x86_64
Pass pass
[1]
  1. Default and Performance tests passed.
alciregi Raspberry Pi 3 armv7hl F31
Pass pass
[1]
  1. ./default/stack-randomness SKIP ./default/libhugetlbfs SKIP ./default/paxtest SKIP
archmunky bare metal: i3-8130U, 16GB RAM, LVM/ext4
Warning warn
[1]
  1. default: WARN (sysfs-perms) performance: PASS
atim CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.59
Pass pass
[1]
Pass pass
  1. Tests passed. LGTM overal. But ABRT warning me: WARNING: CPU: 2 PID: 390 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0 [nvidia_drm] Crash function: nv_drm_atomic_helper_disable_all
boraone Operating System: Fedora 31 KDE Plasma Version: 5.17.5 KDE Frameworks Version: 5.66.0 Qt Version: 5.13.2 Kernel Version: 5.4.17-200.fc31.x86_64 OS Type: 64-bit Processors: 8 × Intel® Core™ i7-10510U CPU @ 1.80GHz Memory: 15.3 GiB of RAM
Warning warn
[1]
  1. paxtest failed
chuhu HP Proliant ML350 Gen8 Intel(R) Xeon(R) CPU E5-2650 0 16G 2 numa nodes
Pass pass
[1]
  1. Run stress test for scheduler and memory.
cserpentis
Pass pass
[1]
  1. Tested daily workloads with podman/docker, intellij on T480s, intel i5-8350U
cstratak KVM/QEMU Fedora 31 aarch64, 32GB RAM, 8 cores, running on Ampere eMAG 8180
Pass pass
[1]
  1. ./default/libhugetlbfs ./default/paxtest and ./default/stack-randomness skipped. During running the test suite I also got this message: [ 162.871884] minix: module verification failed: signature and/or required key missing - tainting kernel. The rest are PASS. Vulnerable on spec_store_bypass and spectre_v2
cwei Intel xeon CPU E301505M v5 @ 2.80GHz
Fail fail
[1]
  1. ./default/paxtest FAIL ./default/insert_leap_second FAIL ./default/libhugelbfs SKIP, others passed.
danniel Intel Core I7-5500U , 8GB DDR3
Pass pass
[1]
  1. 100 % passed
dgrigorev Intel NUC Celeron CPU J3455 8Gb memory F31
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
dgrigorev qemu-system-x86_64 -enable-kvm -m 6G -cpu host -smp 3 -cdrom mnt/kerneltest-5.5-x86_64.iso -boot d -drive driver=raw,file=mnt2/el-disk,index=0,media=disk -vga virtio #qemu version 4.0.0
Warning warn
[1]
Pass pass
[2]
Fail fail
[3]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. performance test passed (after installing missing libtirpc-devel and adding execute permissions for ./performance/lmbench3/scripts/get{list,summary})
  3. default test suite fail with all tests PASS except paxtest FAIL and libhugetlbfs SKIP
didiksupriadi41 CPU: AMD A10-7400P Radeon R6 4C+6G (4) @ 2.500GHz; GPU: AMD ATI Radeon R6 Graphics + AMD Radeon R5 (Hainan);
Fail fail
[1]
Fail fail
[2]
  1. paxtest FAIL sysfs-perms WARN Performance PASS
  2. 1. paxtest FAIL 2. sysfs-perms WARN 3. Performance test Passed
eagle8089 HOST: Windows 10 i5-8th Gen; VM: 4GB RAM, 4 cores
Pass pass
[1]
Pass pass
[2]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ejnersan Dell Vostro 3558 Core i3-4005U
Pass pass
ejnersan HP Elitebook 840 G6 - Core i7-8665U
Pass pass
ejnersan MSI MS-7984 - Core i7-6700
Pass pass
epereira KVM using Fedora 31 Memory 2.7 GiB, Processor Intel Core Processor (Boradwell, IBRS) x4, GNOME Version 3.34.1, OS type 64-bit, Disk 29.8
Pass pass
[1]
  1. 1) Test suite called with default ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/cachedrop FAIL ./default/modsign PASS ./default/memfd PASS ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/selinux-dac-controls PASS Test suite complete FAIL
    =================================[edit]

    Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling

    2) Sun 16 Feb 2020 08:01:58 PM EST ./performance/lmbench3 PASS

    Test suite complete PASS

    Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling

ernst Gerät:PC192-168-2-101 Speicher:7,3 GiB Processor:AMD® Athlon(tm) ii x2 250 processor × 2 Grafik:AMD® Rs880 GnomeVersion 3.34.3 Typ64-bit Datenträger:700,2 GB
Pass pass
gabibbo97 CPU: AMD FX-8320 GPU: AMD Radeon R9 290
Fail fail
[1]
  1. Kernel Test Suite) FAIL: paxtest, cachedrop WARN: nvidia-module Performance Test Suite) WARN: nvidia-module
gtb Thinkpad T510
Pass pass
gtwilliams CPU: 8 x Intel Core i7-6700 CPU @ 3.40GHz, OS: FC31, KDE Plasma 5.17.5-1, Qt 5.13.2-2
Pass pass
[1]
  1. Base and performance all PASSed
himanshutak8 Lenovo Z51(core i7, 16GB RAM) Virtual Machine Running with 6GB RAM
Fail fail
[1]
  1. /default/insert_leap_second FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hyperreal Fedora 31 Silverblue on CPU: Intel i3-4170 (4) @ 3.700GHz; GPU: Intel 4th Generation Core Processor Family (Haswell)
Pass pass
[1]
  1. PASS for both default and performance tests
ibims LENOVO ThinkPad T420, Intel Core i5-2520M
Pass pass
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/paxtest SKIP ./default/selinux-dac-controls SKIP ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS
imabug Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119 bare metal running Fedora 31
Pass pass
[1]
  1. paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
imabug QEMU/KVM 4GB RAM 200 GB disk on Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119.
Pass pass
[1]
  1. Default libhugetlbfs and paxtest skipped. remaining tests passed. Performance tests passed
imabug Xeon W690, nVidia GTX 1660 Ti, 24GB RAM baremetal
Pass pass
[1]
  1. paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
itrymybest80 PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB, 970 EVO M.2
Pass pass
[1]
  1. Both the default (llibhugetlbfs & paxtest was skipped) and performance tests PASS, though it's worth to point out that paxtest was "skipped" when I tested the 5.5 kernel and that it would always fail back on the current stable 5.4+ kernels on F31 when running the default test. Vulnerability status: itlb_multihit:KVM: Vulnerable, l1tf:Mitigation: PTE Inversion, mds:Mitigation: Clear CPU buffers; SMT disabled, meltdown:Mitigation: PTI, spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp, spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization, spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
jakfrost VM using Gnome Boxes default settings (QEMU, 2GB Ram, 20GB HDD) Default installation chosen using test image
Pass pass
[1]
  1. Successfully was able to identify the host machine hardware. Ran the default test suite provided in /home/liveuser/kernel-tests. For some reason, I couldn't automatically submit the results with the test script, although it reported successfully submitting them without requesting my FAS password.
jbastian HPE Apollo 70 (ThunderX2 aarch64 CPUs, 96 GiB RAM, 960 GiB SSD)
Warning warn
[1]
Pass pass
  1. The cachedrop test appears to have a bug; the logs show some errors: cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected
jbastian HPE Apollo 70 (aarch64)
Pass pass
joeyengel Lenovo x1 carbon 4th gen; i5-6200u 8GB ram
Pass pass
[1]
  1. paxtest skipped; libhugetlbfs skipped;
joeyengel xps13 i5-8250u; fedora 31 w/ 5.5.3-200.fc31.x86_64 kernel
Pass pass
[1]
  1. Skipped tests: libhugetlbfs, paxtest, selinux-dac-controls
jouhou HP Z400 Workstation w/ X5675, GTX1660, 24GB RAM
Fail fail
[1]
  1. 1. Default tests: paxtest FAIL ; libhugetlbfs SKIP 2. Performance test suite: PASS
jouhou Lenovo Thinkpad x1 Carbon 3rd gen
Pass pass
[1]
  1. At first run, performance tests say "fatal error: rpc/rpc.h: no such directory. Compilation terminated". After installing libntirpc and libtirpc the compilation passes but again, in the end of tests, I get following error: "/bin/sh: ../scripts/getlist: Permission denied". Although both test suites passed, I don't know if these affect test outcomes or reliability.
jphilipp
Pass pass
[1]
  1. hp compaq elite 8100 i5 4GB
julroy67 Dell XPS 7390, Intel(R) Core(TM) i7-10710U CPU
Pass pass
[1]
  1. 100 % passed
kokoseij CPU: Intel I5-4460, RAM: DDR3 12GB, GPU: NVIDIA GeForce GTX 960, OS: Fedora 31 Cinnamon Spin, Upgraded from kernel-stabilization copr
Pass pass
[1]
Pass pass
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
lberton@redhat.com kerneltest-5.5-x86_64.iso @ ThinkPad T480s
Fail fail
[1]
  1. Linux localhost-live 5.5.2-200.fc31.x86_64 #1 SMP Thu Feb 6 17:23:27 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux Test suite called with default ./default/paxtest FAIL ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/cachedrop FAIL ./default/stack-randomness PASS ./default/memfd PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
lewis41 Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz - RAM 16GB
Pass pass
[1]
  1. 1. Pass 2. Pass
macnum AMD Ryzen 9 3900X 12, ASUS Radeon RX 5600 XT OC, 32 GB hyper-x DDR4 3200Hhz (4x8)
Pass pass
[1]
  1. ./default/mq-memory-corruption PASS ./default/stack-randomness PASS ./default/libhugetlbfs SKIP ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/modsign PASS ./default/posix_timers PASS ./default/paxtest SKIP ./default/memfd PASS ./default/timer-overhead PASS Test suite complete PASS
malucious KVM guest with 2GB ram using the test image. i7-6700K.
Fail fail
[1]
  1. The performance test passed. The first test failed. ./default/libhugetlbfs was skipped. ./default/paxtest failed.
marc84 Testday image VM on Toshiba ideapad Y570
Warning warn
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
masami i7-9700K(UHD Graphics 630): fedora 31
Pass pass
[1]
  1. kernel regression test passed. Works fine for daily use. build and work fine simple kernel module.
mharpau Thinkpad T480s, i5-8250U, iGPU
Pass pass
[1]
  1. Base and performance all PASSed
mimat w520 i7-2630qm
Pass pass
[1]
  1. Works for me. No regressions.
monot0m Toshiba X40-D BIOS 3.80 Intel Core i7-7500U CPU @ 2.70GHz × 4
Fail fail
[1]
  1. ./default/paxtest - FAIL
monot0m Toshiba X40-E BIOS 2.30 Intel Core i5-8250U CPU @ 1.60GHz × 8
Fail fail
[1]
  1. ./default/paxtest - FAIL
mzink@redhat.com ThinkPad T490s
Pass pass
nmousouros nmousouros
Pass pass
[1]
  1. ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/paxtest PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS
norbertj Ideapad with Core i3-6006U
Pass pass
[1]
  1. Default tests pass except paxtest, performance tests pass (after installing missing package libtirpc-devel).
norbertj Old PC with Core i5-750, 4 GB RAM and Radeon HD 6450
Warning warn
[1]
  1. Default tests pass except paxtest. No regressions regarding hardware support noted. Performance tests aborted after 3 hours with excessive swapping.
ozeszty AMD Phenom II X2, R5 240 (OLAND using amdgpu), F31 & 5.5.3-200.fc31.x86_64
Pass pass
[1]
  1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. Vulnerabilities status looks hopeful: not affected, except for spectre.
ozeszty IvyBridge/AMD 7670m laptop, F30 & 5.5.3-200.fc31.x86_64
Pass pass
[1]
Pass pass
[2]
  1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted. I skipped paxtest skip in the previous entry.
  2. Default passed (libhugetlbfs skipped), performance passed. No issues spotted.
ozeszty Skylake laptop, 5.5.3-200.fc31.x86_64
Pass pass
[1]
  1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted throughout the week.
pwhalen HPE Apollo (cn99xx) - AArch64
Pass pass
pwhalen Lenovo HR350A (AArch64)
Pass pass
pwhalen Mustang (xgene-1) AArch64
Pass pass
pwhalen Raspberry Pi 4B (4GB) - AArch64
Pass pass
Cite error: Invalid <ref> tag; refs with no name must have content
pwhalen Wandboard Quad (armhfp)
Fail fail
[1]
  1. ./default/insert_leap_second FAIL
quiet Memory: 3.8GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.3, OS: 64-bit, KVM, Disk: 21.5 GB
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/modsign PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/paxtest FAIL ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS Test suite complete FAIL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ./performance/lmbench3 PASS Test suite complete PASS
rammodulus Test day Image. Proxmox 5.4 VM; UEFI, 4GB, Common KVM Procs x 4, llvmpipe graphics
Pass pass
[1]
  1. Both tests passed
rotwild Intel i5 460M, ATI Radeon HD 5650, 4GB RAM
Fail fail
[1]
  1. 1. paxtest FAIL sysfs-perms WARN Performance test suite PASS
roypen Thinkpad T430, Intel i5-3320M, 8 GB RAM
Pass pass
[1]
Fail fail
[2]
  1. 2. Performance Test suite - PASS
  2. 1. ./default/libhugetbfs - SKIP ; ./default/paxtest - FAIL
sayaksarkar Lenovo T460s 20G [Boxes - Memory 2GiB, CPUs: 4]
Fail fail
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
sbakker Dell XPS 13 9360; Intel Core i7-7560U @2.40GHz x 4; Intel Iris Plus Graphics 640 (Kaby Lake GT3e), driver i915; Memory: 16GB; Disk: 512GB SSD (THNSN5512GPUK NVMe TOSHIBA)
Pass pass
[1]
Pass pass
[2]
  1. RHBZ #1803706 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
shiwanibiradar lenevo ideapad330 , fedora31 on kvm , intel i5 ,8GB RAM
Pass pass
[1]
  1. ./default/paxtest:SKIP & ./default/libhugetlbfs:SKIP overall both are pass
simobonfo QEMU/KVM 4GB RAM 20 GB disk on Lenovo Ideapad 100 15-IBD with kerneltest-5.5.3.iso (Updated at 2020-02-12)
Fail fail
[1]
  1. ./runtests.sh: ./default/posix_timers-->PASS ./default/cachedrop-->FAIL ./default/paxtest -->FAIL ./default/stack-randomness-->PASS ./default/mq-memory-corruption -->PASS ./default/libhugetlbfs-->SKIP ./default/selinux-dac-controls-->PASS ./default/insert_leap_second -->PASS ./default/timer-overhead -->PASS ./default/sysfs-perms-->PASS ./default/modsign-->PASS ./default/memfd -->PASS Test complete -->FAIL ./runtests.sh -t performance make the terminal crash
slushur Ryzen 7 1700, 32GB RAM, RX 580
Pass pass
[1]
  1. ./default/paxtest SKIP ./default/libhugetlbfs SKIP
snip4 Intel Core i7-7800X, ASUS TUF X299 MARK 2, 32GB RAM, NVIDIA RTX 2070, Test 5.5 image clean install.
Pass pass
[1]
  1. libhugetlbfs & paxtest: SKIP // Since kernel 5.4 series, can't reboot, system hangs. Only boot correctly when force power off switch, and on again.
stklcode qemu (intel Skylake-X, 12-core/16GB guest specs F31 Host)
Pass pass
str8edgedave HP Elitedesk core i7-4770 16GB RAM
Fail fail
[1]
  1. $ sudo ./runtests.sh Test suite called with default ./secureboot/check_SB_signature PASS ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS


    $./runtests.sh -t performance Test suite called with performance ./secureboot/check_SB_signature FAIL Using config in CONFIG.stc0042699.stholdco.com Tue Feb 11 10:54:11 CST 2020 Latency measurements Tue Feb 11 10:55:35 CST 2020 Calculating file system latency Tue Feb 11 10:55:38 CST 2020 Local networking Tue Feb 11 10:59:19 CST 2020 Bandwidth measurements Tue Feb 11 11:05:47 CST 2020 Calculating context switch overhead Tue Feb 11 11:05:52 CST 2020 ./performance/lmbench3 PASS

    Test suite complete FAIL

suprith4989 KVM/QEMU Dell r730, 2GB RAM
Fail fail
[1]
  1. ./default/posix_timers PASS ; ./default/cachedrop PASS ; ./default/paxtest FAIL ; ./default/stack-randomness PASS ; ./default/mq-memory-corruption PASS ; ./default/libhugetlbfs SKIP ; ./default/selinux-dac-controls PASS ; ./default/insert_leap_second PASS ; ./default/timer-overhead PASS  ; ./default/sysfs-perms PASS ; ./default/modsign PASS ; ./default/memfd PASS ; Test suite complete FAIL ./performance/lmbench3 PASS Test suite complete PASS
t3rm1n4l Dell Inspiron 3180 11"
Pass pass
[1]
  1. libhugetlbfs: SKIP paxtest: SKIP Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
temjin747 Host: Fedora 31 KDE Spin x86_64 kernel 5.4.18-200.fc31.x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU-KVM version 4.1.1/KVM (2 vCPUs, 2 GB RAM)
Pass pass
tjamadeira@gmal.com VM Fedora 31 in Intel Core i5-4210U CPU @ 1.70GHz*4; LLVM 9.0, 256 bits; gnome 3.34.3; 64-bit
Pass pass
[1]
  1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vipul0 Lenovo i5-6300U CPU@2.40GHz 32GB RAM
Pass pass
[1]
  1. Run test /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance test /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vipul0 QA
Pass pass
[1]
  1. Run test Result :: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Perdormance Result :: sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vishalvvr qemu/kvm 2GB 20GB, 5.5.2-200.fc31.x86_64
Fail fail
[1]
  1. 1. default test suite: FAIL ./default/paxtest FAIL ./default/libhugetlbfs SKIP
wessle kerneltest-5.5-x86_64.iso on Boxes VM with defaults; CPU: AMD Ryzen Threadripper 2950X (16 cores @ 3.5GHz); GPU: nvidia GeForce RTX 2070 super
Pass pass
willo 8GB Memory Virtualbox VM on an Intel NUC - Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz
Pass pass
[1]
  1. cachedrop, libhugetlbfs, selinux-dac-controls, insert_leap_second, modsign SKIP the rest passed for both default and performance
ywatanabe HOST OS: fedora28 , CPU: Intel(R) Core(TM) i5-4570S CPU @ 2.90GHz , MEM: 16 GB , KERNEL: Linux fedora 4.20.8-100.fc28.x86_64 , KVM: qemu-kvm-2.11.2-4.fc28.x86_64 , TESTIMG_USED: kerneltest-5.5-x86_64.iso (Downloaded on Feb 12 23:05 JST)
Fail fail
[1]
  1. default test: FAILED (Failed after doing step 3 and 4 of https://fedoraproject.org/wiki/QA:Testcase_kernel_regression#Setup ) performance test: PASS