Kernel 5.4 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2019-12-09_Kernel_5.4_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Makman2 GNOME Boxes VM (QEMU, 2GB RAM, 21.5GB disk) on Dell OptiPlex 7060 w/ Fedora 30 [1] 1. ./default/cachedrop FAIL Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0405142 s, 2.6 GB/s TestError: Can't free dentries and inodes 393672 393328 Could not run tests Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
Paninaro Using the test image provided for testing on an Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2 [1] [2] 1. Performance test PASSED
2. From the logs the paxtest on default test failed for this reason: Executable heap (mprotect) : Vulnerable As suggested i previously gave the command> sudo semanage boolean -m --off selinuxuser_execheap Other issues: the live image did not come with vim and libtirpc-devel installed so i had to install those packages manually.
aernhart Dell XPS 15 9560 https://linux-hardware.org/?probe=f1acfe989d [1] 1. With 'semanage boolean -m --on selinuxuser_execheap': 'runtests.sh' results: libhugetlbfs was SKIP, paxtest was FAIL, all others PASS. './runtests.sh -t performance' was PASS. All results uploaded.
agarwalvarshit Oracle VM 4GB RAM DELL Quad Core
alciregi Dell XPS 13 9360 [1] 1. paxtest FAIL
alciregi Intel i5-7400 desktop PC [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 armv7hl F31 [1] 1. default PASS, destructive PASS,
alciregi Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427 [1] 1. paxtest FAIL
alciregi Toshiba Portege R930 Intel i5-3340M
aludwar Intel(R) Core(TM) i7-5930K CPU @ 3.50GHz - Desktop PC - 5.3.13-200.fc30.x86_64 - libvirt-daemon-kvm-5.1.0-9.fc30.x86_64 [1] 1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
aludwar Lenovo X1 Carbon 6th Gen [1] 1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest FAIL ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
atdt VM on Ryzen5 3600 [1] 1. paxtest fail
atim CPU: Quad Core AMD Athlon X4 845; Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.36 [1] [2] 1. #1781175, New 5.4.2 kernel have enormous size. Filed a bug in RHBZ.
2. All tests passed, except 'paxtest', as always.
bfrenzel Latitude 7390 2-in-1 [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/modsign PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/selinux-dac-controls PASS ./default/paxtest FAIL ./default/memfd PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
bfrenzel Librem 13 v4 4.0 [1] [2] 1. Performance: PASS
2. Test suite called with default ./default/stack-randomness PASS ./default/memfd PASS ./default/paxtest FAIL ./default/modsign PASS ./default/sysfs-perms WARN ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS Test suite complete FAIL
bfrenzel vSphere ESXi VM HW Version 13 [1] 1. Same as "vSphere ESXi VM HW Version 14"
bfrenzel vSphere ESXi VM HW Version 14 [1] 1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest FAIL ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
breier Dell XPS 13 9380 [1] 1. 1. paxtest FAIL
chuhu x86_64 kvm [1] 1. #1782736, it's a kernel panic issue on coredump.
conscript89 Lenovo w541 [1] 1. paxtest from default suite failed performance suite passed
coppertint Lenovo IdeaPad Yoga 13 (2012) - i5-3317U, 4GB [1] 1. * paxtest FAIL with selinuxuser_execheap enabled; * performance test suite encountered OOM, session killed
decathorpe AMD Ryzen 1700X / ASUS PRIME-X370-PRO / NVidia 1070 (negativo17) [1] 1. ./default/cachedrop FAILed on the first run (this happens sometimes), but it passed on a second and third run. everything else was PASS or SKIP all three times.
decathorpe DELL XPS 13 9370 [1] 1. PASS except ./default/libhugetlbfs SKIP
ejnersan HP Elitebook G4 850 [1] 1. paxtest FAILED, libhugetlbfs SKIP performance test PASS
ernst AMD® Athlon(tm) ii x2 250 processor × 2 , AMD® Rs880, Version 3.34.2, 64-bit [1] 1. Kernel: 5.4.2-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
eznoka VM on Ryzen 3900x
faramirza VirtualBox 6.0.14 running on Intel(R) Core(TM) i7-9750H [1] [2] 1. Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/posix_timers PASS ./default/paxtest FAIL ^C./default/insert_leap_second FAIL ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/sysfs-perms PASS Test suite complete FAIL
2. Test does not complete. [root@localhost kernel-tests]# ./runtests.sh Test suite called with default ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/cachedrop FAIL ./default/posix_timers PASS ./default/paxtest FAIL
filocost Asus transformer t200t [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/paxtest FAIL ./default/memfd PASS ./default/insert_leap_second PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... FAS password: Traceback (most recent call last): File "./fedora_submit.py", line 45, in <module> password=password File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login openid_insecure=self.openid_insecure) File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Test suite called with performance Using config in CONFIG.new-host mer 11 dic 2019, 09:14:50, CET Latency measurements mer 11 dic 2019, 09:17:43, CET Calculating file system latency mer 11 dic 2019, 09:17:45, CET Local networking mer 11 dic 2019, 09:21:46, CET Bandwidth measurements mer 11 dic 2019, 09:28:34, CET Calculating context switch overhead mer 11 dic 2019, 09:28:41, CET ./performance/lmbench3 PASS Test suite complete PASS
frantisekz Thinkpad T470s, Intel(R) Core(TM) i7-7600U
gkamathe Intel (Skylake, IBRS) VM [1] 1. cachedrop FAIL paxtest FAIL
goodmirek HP Elitebook 850 G4, i5-7200U w/embedded GPU [1] 1. paxtest FAILED, libhugetlbfs SKIP, performance test PASS bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4, KDE [OK], VPN IPsec [OK], VirtualBox 6.0.14 [OK], podman 1.6.2 [OK]
grenier Intel Core 2 Duo CPU E6550 Desktop
gtb Thinkpad T510
himanshutak8 Lenovo Z51 core i7, VM run with 6GB RAM [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ibims [1] 1. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ^C./default/insert_leap_second FAIL ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete FAIL #####tested as a Vbox Guest with the Test-Image mentioned in the wiki-Article. "Insert_leap_second" does not finish after more than one hour, so i pressed Ctrl-C.
idanka Fujitsu Esprimo p520 E85+ [1] 1. 1. paxtest FAIL
imabug QEMU/KVM on a Dell Precision 3620 Xeon E3-1240 [1] 1. paxtest failed. performance test passed
itrymybest80 PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB (mesa 19.2.7), 970 EVO on Fedora 31 [1] 1. 1) default regression test FAIL ./default/libhugetlbfs SKIP ./default/paxtest FAIL ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/cachedrop PASS ./default/posix_timers PASS 2) performance regression test PASS 3) vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled 4) additional info (bug?): not able to find all encrypted luks drives/partitions on my system; though they all work on all of my sata3 ports when connected separately.
ivanmironov MacBook Pro 15" mid 2015 / MacBookPro11,4 / Intel(R) Core(TM) i7-4770HQ CPU @ 2.20GHz [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ivanmironov PC / AMD FX(tm)-8350 Eight-Core Processor [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
joepadmiraal Dell XPS 15 9560 [1] 1. Done with the test day image on physical hardware. The normal test works fine but the performance test gives a compilation error. Test suite called with default ./default/cachedrop PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP Test suite complete PASS -------- bash-5.0$ sudo ./runtests.sh -t performance No .config file found. You can cp config.example .config and edit as needed for easier log submission. Test suite called with performance In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1576234233.log.txt
kcoraz Lenovo ThinkPad X390 (i5-8265U / 16G / secure boot / tpm disabled because of 1770021) [1] 1. paxtest FAILED, libhugetlbfs SKIP
knarra LENOVO Thinkpad T460s [1] 1. ./default/paxtest FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state
kronenpj
kronenpj Dell XPS 13 9370, QEmu & VirtualBox [1] 1. Can't reproduce what I was going to report.
kulish QEMU/KVM on Lenovo ThinkPad T440P Intel(R) Core(TM) i7-4810MQ CPU @ 2.80GHz [1] 1. 1. paxtest FAIL 2. performance test PASS
ledufff Thinkpad E495 AMD® Ryzen 5 3500u' [1] 1. ./default/paxtest FAIL ./default/libhugetlbfs SKIP Test suite complete FAIL
liwang@redhat.com Dell Inc. PowerEdge R330 (SKU=NotProvided;ModelName=PowerEdge R330) Intel(R) Xeon(R) CPU E3-1220 v5 @ 3.00GHz 32768 MB memory, 600 GB disk space [1] 1. LTP lite test on x86_64
luya HP Envy x360 15 Ryzen 2500U (Fedora 31) [1] 1. [1] WARN for ./runtest.sh [2] PASS for ./runtest.sh -t performance
m0stly R5 3600 / Asus Prime X470 / 5700XT [1] 1. paxtest - FAILED libhugetlbfs - SKIPPED Performance tests - PASS
marc84 Lenovo Ideapad Y570 Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
masami fedora 31. i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module. [1] 1. i7-9700K(UHD Graphics 630): Kernel regression test case passed. Works fine for daily use. build and work fine simple kernel module.
mharpau Thinkpad T480s, i5-8250U, iGPU
mikoim ThinkPad X1 Carbon 4th 20FBCTO1WW
mimat i7-2630QM [1] 1. All passed and vga switcheroo is working fine! :)
monterr AMD Rysen 1700 [1] 1. paxtest FAIL
monterr AMD rysen 1700 + ASUS ROG CROSSHAIR VI HERO [1] 1. paxtest failed. performance test passed
mzink ThinkPad T480s [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/memfd PASS ./default/paxtest PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/modsign PASS Test suite complete PASS
n0cturnal Asus X555QG [1] 1. paxtest FAIL sysfs-perms WARN libhugetlbfs SKIP
nielsenb Compaq 8510w Intel T9300 AMD RV630 BIOS
nitsharma Thinkpad T580s, i7-vpro
nitss007 Thinkpad T580s, i7-vpro
paalzzot HP probook 450 g5 i7 8th
penguinn AMD Phenom II X4 955 - M4A88T-V - Desktop PC
pifang Dell Precision R7610 E5-2620 4G [1] 1. ltp mm, syscalls testing.
pifang PowerEdge R330 E3-1240L v5 32G [1] 1. memory regression testing
pixom.ai@gmail.com Shashibhushan Singh
polczak ThinkPad E585 (Version: AMD Ryzen 7 2700U with Radeon Vega Mobile Gfx) [1] 1. Test suite called with default ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/paxtest PASS ./default/modsign PASS Test suite complete PASS
polczak ThinkPad X1 Carbon 7th [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/memfd PASS ./default/cachedrop PASS ./default/paxtest PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS
prabhakarpujeri VM [1] 1. paxtest
pwhalen Ampere eMAG (aarch64)
pwhalen Mustang (xgene-1-aarch64) [1] 1. spectre_v2:Vulnerable
pwhalen Raspberry Pi 2
pwhalen Seattle Overdrive (aarch64) [1] 1. cachedrop FAIL spec_store_bypass:Vulnerable spectre_v2:Vulnerable
pwhalen Wandboard Quad (armhfp)
quiet [1] 1. Memory: 3.8 GiB Processor: Intel Core Processor (Skylake, IBRS) × 2 Graphics: llvmpipe (LLVM 9.0, 256 bits) GNOME: Version 3.34.2 OS type: 64-bit Virtualization: KVM Disk: 21.5 GB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Default suite Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/memfd PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/paxtest FAIL ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/posix_timers PASS Test suite complete FAIL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ performance suite ./performance/lmbench3 PASS Test suite complete PASS
robinkb HP Envy x360 (AMD Ryzen 7 3700U)
rosepeach Lenovo X1 Carbon 7th Gen [1] 1. Test suite called with default ./default/libhugetlbfs SKIP ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/paxtest FAIL ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/modsign PASS ./default/memfd PASS ./default/timer-overhead PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
roypen Test kerneltest-5.4.iso libvirt 4GB RAM, 16GB disk, 2 vCPUs custom (IvyBridge-IBRS) on ThinkPad T430 [1] [2] 1. Test suite called with default (FAIL): ./default/paxtest - FAIL ./default/libhugetlbfs- SKIP everything else - PASS
2. 1. Test suite called with performance - PASSED 2. Test suite called with default (FAIL): ./default/paxtest - FAIL ./default/libhugetlbfs- SKIP everything else - PASS
rudrapratap base system -- NAME=Fedora VERSION="31 (Workstation Edition)" , installed -- kvm , base ram - 8gb, vm(ram given) - 4 gb, 2 cpu processor, [1] 1. default: fail, performance: pass, records analyzed link: https://hackmd.io/@fcEf9Yj-S-GS7Phmn6Ahzw/H190JBT6r
shiwanibiradar QEMU/KVM on lenovo ideapad 330 i5 8th gen [1] [2] [3] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
2. paxtest failed
3. paxtest fail
spathare VM Box
stklcode qemu (intel Skylake-X, F31 Host) [1] 1. 1. default: PASS (libhugetlbfs skipped) 2. performance: PASS 3. destructive: paxtest FAIL
sumantrom Fedora 31 T460s, testday iso [1] 1. pax test failed Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
szpak Hyperbook NH5/Clevo NH55RCQ with GeForce GTX 1660 Ti mobile on Fedora 30 [1] 1. #1783765, Unable to perform tests as due regression in kernel 5.3/5.4 (nouveau driver) system is pretty unstable. Upstream bug: https://gitlab.freedesktop.org/xorg/driver/xf86-video-nouveau/issues/516 (Fedora bug: https://bugzilla.redhat.com/show_bug.cgi?id=1783765)
t3rm1n4l Dell Inspiron 3180 11" [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest FAIL ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tboizard Virtual Box / Core i7 6700 Nvidia GTX 1060 6G [1] 1. I have run standard and performance tests before upgrading (kernel 5.3.15) did the upgrade to 5.4.2 and compared. My report concerns both virtual box simlation and bare metal. The tests pass, no regression performance wise and no stability issue. Date: mar. déc. 10 21:09:12 CET 2019 Test set: default Kernel: 5.4.2-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None ============================================================
twelvevolt Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz [1] 1. ./default/libhugetlbfs SKIP
wurstsemmel Dell XPS 13 9380 [1] 1. paxtest FAIL after execution of "sudo semanage boolean -m --on selinuxuser_execheap", otherwise PASS. libhugetlbfs SKIP. performance PASS, but /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 .
zlobniyshurik P9D-WS/Xeon e3-1245v3/16GB ECC/HD6950 [1] 1. ./default/paxtest - FAILED; ./default/libhugetlbfs - SKIPPED; other tests (include perfomance tests) - PASS
zlobniyshurik X470 Aorus Gaming 7/Ryzen3900X/32GB ECC [1] 1. ./default/paxtest & ./default/selinux-dax-control tests skipped due selinux off
Wiki Metadata