Kernel 5.3 Test Day

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2019-09-30_Kernel_5.3_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
GoodMirek Dell XPS M1330, CPU intel Core2 Duo T8100, GPU Geforce 8400M GS [1] 1. FC31, 5.3.2-300.fc31.x86_64
GoodMirek HP Elitebook 850 G4, i5-7200U w/embedded GPU [1] 1. #1759289, All good, just this kernel takes double time to boot to LUKS password prompt, see the bug https://bugzilla.redhat.com/show_bug.cgi?id=1759289
HackerOne Fedora 30 WS with Koji 5.3.2-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, NV124 [NVIDIA GeForce GTX 970], 16GB RAM, 250GB SSD [1] 1. Default and Performance tests passed. Log files submitted.
HackerOne Test Day Image 5.3.1-300.fc30.x86_64 on HP 250 G5 notebook, i5-7200U CPU @ 2.50GHz × 4, Intel HD Graphics 620 (Kaby Lake GT2), 4GB RAM, 128GB SSD. [1] 1. Default and Performance tests passed. Log files submitted.
HackerOne Test Day Image 5.3.1-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, Intel® HD Graphics 530 (Skylake GT2), 16GB RAM, 250GB SSD [1] 1. Default and Performance tests passed. Log files submitted.
Paninaro Official Test Day Live image on a Notebook HP 650 Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2 RAM 3.7 GiB Graphics Intel® Ivybridge Mobile uname -a : L inux localhost-live 5.3.1-300.fc30.x86_64 #1 SMP Fri Sep 27 14:38:54 UTC 2019 [1] [2] 1. No problems spotted in this kernel, so i consider both the tests PASSED. The default test warn, is not a big issue as the directory /sys/kernel/debug is 700 so it really doesn't matter the file permission in that folder. For the performance test, installing libtirpc-devel and giving the executable permissions to getlist and getsummary files, solve the issue and the performance test is PASSED with no errors: https://apps.fedoraproject.org/kerneltest/logs/35994
2. I could mark the test passed but i prefer to give some info instead: Kernel regression default test result in WARN. Looking at the log https://apps.fedoraproject.org/kerneltest/logs/35991 the reason is: Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx About performance test, there is an issue with the live image, it does not come with package libtirpc-devel installed, so the compilation terminate with fatal error, the problem is that the performance test exit with result PASS and report a passed test. This is a bug, imho, as it consider passed a test that was not executed. Btw after installing libtirpc-devel the compilation goes on and it runs some tests like Latency measurements, Calculating file system latency, Local networking, Bandwidth measurements, Calculating context switch overhead and than it stops again with error /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 And again the test result in a PASS ./performance/lmbench3 PASS Test suite complete PASS So is a call for fixing some bugs in the kernel-test suite.
agarwalvarshit Oracle VM 4Gb Ram i3 processor [1] 1. est suite called with default ./default/libhugetlbfs SKIP ./default/cachedrop PASS ./default/timer-overhead FAIL ^C./default/insert_leap_second FAIL ./default/sysfs-perms PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS ./default/memfd PASS ./default/paxtest FAIL ./default/stack-randomness PASS ./default/posix_timers PASS Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
albertopatino1 Lenovo P52, Intel(R) Xeon(R) E-2176M CPU @ 2.70GHz, 4K Display, 128Gb RAM, Disk /dev/nvme1n1 KXG5AZNV1T02 TOSHIBA, e1000e: enp0s31f6 NIC Link is Up 1 000 Mbps Full Duplex [1] 1. #1752961, Fedora Test Day Image. Results from sudo ./runtests.sh Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/cachedrop PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS Test suite complete PASS ASIDE: FedoraTestDay Image works fine in this machine with profile described above. However same computer has Fedora 30 upgraded to F31. Same kernel (but f31) is causing kernel panic. Computer is not booting.
alciregi KVM, RAM 2GB, BIOS [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi Raspberry Pi 3 aarch64 F31 [1] 1. /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
alciregi Raspberry Pi 3 armv7hl F31
alciregi Toshiba Portege R930 i5 4GB RAM [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
archmunky KVM, 2 Core, 4GB RAM, UEFI [1] 1. Both Passed but performance log would not upload Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
atim CPU: Quad Core AMD Athlon X4 845; Kernel: 5.3.1-300.fc31.x86_64; Graphics: Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 435.21 [1] 1. Test suite PASS
bradfordcp Official Test Day Live Image on Dell Precision 5530. Intel Core i7-8850H (Six Core 2.60GHz, 4.30GHz Turbo, 9MB 45 W). 32 GB DDR4-2666MHz SDRAM Non-ECC . Nvidia Quadro P1000 w/4GB GDDD R5. Intel Wifi Link 9260 2x2 802.1 1AC+BT 5.0 vPro Wireless [1] 1. Clean PASS with a SKIP on libhugetlbfs. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
bradfordcp Official Test Day Live Image on Dell XPS 9570. 8th Generation Intel Core i9-8 950HK Processor (12MB Cache, u p to 4.8 GHz, 6 cores). 32GB 2x16GB DDR4- 2666MHz. NVIDIA GeForce GTX 1050Ti with 4GB GDDR5. Killer 1535 2x2 802.11ac Wi-Fi Wireless + Bluetooth 4.2 [1] 1. Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/modsign SKIP ./default/cachedrop SKIP ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/insert_leap_second SKIP ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls SKIP Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/ccYbciYF.o: in function `setup_names': lat_fs.c:(.text+0x836): warning: the use of `tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ 22219MB OK 22219MB OK 22219MB OK mhz: should take approximately 15 seconds Using config in CONFIG.localhost.localdomain Tue 01 Oct 2019 02:39:04 AM EDT Latency measurements Tue 01 Oct 2019 02:39:44 AM EDT Calculating file system latency Tue 01 Oct 2019 02:40:05 AM EDT Local networking Tue 01 Oct 2019 02:43:52 AM EDT Bandwidth measurements Tue 01 Oct 2019 02:56:19 AM EDT Calculating context switch overhead Tue 01 Oct 2019 02:56:56 AM EDT /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
carlhuby Toshiba Sattelite P50t - Intel i7-4720HQ [1] 1. Passed Test Suite
chrismurphy HP Spectre, intel i7-6500U, Skylake GT2 [HD Graphics 520] [1] 1. #1781288, #1780800, 1781288: kernel/trace/trace.c:8106 create_trace_option_files, taints kernel 1780800: GPU hang
dan1mal VMware Workstation 15 player VM - 2gb memory, 1 processor, 20gb hd [1] 1. Test 1: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling Test 2: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
filip AUSU t200t notebook transformer [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
garrmcnu Test image on VM (KVM) [1] 1. Default and performance tests passed
himank98 Oracle VM 4gb RAM i7 processor [1] 1. /default/insert_leap_second FAIL ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/timer-overhead PASS Test suite complete FAIL The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
himanshutak8 Lenovo z51 with i7 processor(with 16gb RAM) test in Orcale VirtualBox VM(Machine running on i7 processor and 4GB RAM ) [1] [2] 1. Test suite called with Performance Failed. Script Stuck at Bandwidth Measurements for a long(wait to execute further about 2hrs) after that it failed.
2. Test Suite called with default failed on ./default/insert_leap_second while overall Test Suit Complete status is FAILED Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
hitesh0078 Test in Oracle Virtual Box VM Machine running on i5 processor and 4GB RAM [1] 1. Test suite called with default ./default/stack-randomness PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ^C./default/insert_leap_second FAIL ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS Test suite complete FAIL The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
holishing OS: Fedora 31 (Thirty One) x86_64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
joepadmiraal XPS 15 9560, Intel i7-7700HQ, NVIDIA GeForce GTX 1050 Mobile, 16GB [1] 1. 1. PASSED 2. Error while compiling: bash-5.0$ sudo ./runtests.sh -t performance Test suite called with performance In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated.
kostera Dell Inspiron 5570 i3-8130U; 12GB RAM; Kingston A400 M.2 SATA III SSD; Fedora 31 BETA Workstation/GNOME kernel 5.3.1-300.fc31.x86_64 [1] 1. [inspiron@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/modsign PASS ./default/paxtest FAIL ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/timer-overhead FAIL ./default/sysfs-perms PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/cachedrop FAIL ./default/stack-randomness PASS ./default/selinux-dac-controls PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling [inspiron@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance ./runtest.sh: line 8: make: command not found ./runtest.sh: line 9: make: command not found ./runtest.sh: line 13: make: command not found ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Missing argument: auth_module The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling [inspiron@localhost kernel-tests]$ uname -a Linux localhost.localdomain 5.3.1-300.fc31.x86_64 #1 SMP Tue Sep 24 21:00:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
lewis41 CPU: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 8GB Samsung SSD 850 [1] 1. Passed default/performance test suite
lruzicka Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz [1] [2] 1. Performance suite has passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
2. The `paxtest` was skipped, so was `selinux-dac-controls`. The `cachedrop` failed. The overall result of the default test suite was fail. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
luya HP Envy x360 15 Ryzen 2500U (Fedora 31) [1] 1. ./default/sysfs-perms WARN
malucious gnome-boxes guest using the test image. Host: Asus Z170A i7-6700K [1] [2] 1. ./runtests.sh -t performance PASSED. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
2. ./runtest.sh Failed. ./default/cachedrop Failed. ./default/libhugetlbfs Skipped. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
marc84 Test Day Image on VirtualBox [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
masami fedora 30, 5.3.2-300.fc30.x86_64. i7-9700K(UHD Graphics 630) [1] [2] 1. #1758831, Sorry, I made mistake to set bug number. I reported #1758831 . GDM login screen doesn't show up on kernel 5.3.2
2. #1752961, GDM login screen doesn't show.
maxishere Fedora Server 30 Image on DigitalOcean with Kernel 5.3.2-300 from Koji [1] 1. Everything passed but the performance test had some warnings about implicit-function-declaration on the function lmbench_usage(ac, av, usage)
mharpau Fedora 30 T480s i5-8250U 24GB RAM iGPU [1] 1. Both default and performance: PASSED
mimat Testday iso. lenovo w520 with optimus. [1] 1. Both default and performance: PASSED. But I had problem with optimus gfx, discrete gfx was always powered on. Had similar problem before when testing on my daily f30 installation.
mimat w520. f30 fully updated. 5.3.2 [1] 1. #1757891, Everything besides properly working optimus graphics is working.
mzink [1] 1. #1752961, Lenovo t480s - kernel 5.3 works fine, but only with TPM disabled. Kernel panic with TPM enabled (BZ 1752961)
nielsenb Compaq 8510w Intel T9300 AMD RV630 BIOS
nightromantic Fedora 30 fully updated; kernel 5.3.1-300.fc31.x86_64 (Koji); Desktop system, CPU: Intel Core i3-8100, m/b ASUS PRIME B360-PLUS (Intel B360 Chipset) [1] 1. SKIP on libhugetlbfs, WARN on sysfs-perms, all others PASS
quiet [1] 1. 1.test) ./default/libhugetlbfs was skipped, everything else from the test suit passed 2.test) all passed
quiet test day image iso on VM, 4 GiB RAM, 2x Intel Core Skylake (IBRS) 2904 MHz [1] 1. 1.test) ./default/libhugetlbfs was skipped, otherwise everthing else from the test suite passed 2.test) everything passed
rammodulus Test day iso on Virtualbox 6.0.12 VM, 4vCPU, 4GB ram [1] 1. 1. Ran default test suite only, failed on insert_leap_second test 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
rodamorris i7-6850k X99 32GB AMD GPU Desktop/Dell XPS 9360 [1] 1. All tests run passed; log files submitted.
subhamrai03 test on VM [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
subhamrai03 test on VM with performance [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
sumantrom Test day iso on KVM [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
sumantrom Test day iso on KVM called with performance [1] 1. The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
szydell Kerneltest Image -> dell 3510, 16GB RAM, i7-6820HQ CPU @ 2.70GHz
szydell Virtualbox 6.0.6 -> Fedora KDE 30 -> System76 Oryx Pro (oryp4), i7-8750H, 32GB ram [1] 1. insert_leap_second FAILED
tablepc Test on bare metal install (Lenovo M83 with an i5-4570 CPU) on fully updated F31 beta 0928 drop running tests on Kernel 5.3.1 [1] 1. Ran both the Default and Performance tests. All tests passed and results were submitted.
tcza
tcza Manufacturer: Dell Inc. Product Name: 0YVXR8
temjin747 Host: Fedora 30 x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU version 3.1.1/KVM (2 vCPUs, 4 GB RAM) [1] 1. skipped libhugetlbfs in first test script
xfor ASUS B450M-A, AMD R5 2400G, RAM DDR4-3000 2x8G, F30 update
zsun BeagleBone Black armv7hl 5.3.2-300.fc30.armv7hl [1] 1. paxtest and timer-overhead of the kernel-tests testsuit failed.
zsun Raspberry Pi 3 kernel-5.3.2-300.fc30.aarch64 [1] [2] 1. ftrace tracers can be enabled and no panic happens
2. paxtest and timer-overhead of the kernel-tests testsuit failed.
Wiki Metadata