Kernel 5.5 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2020-02-10_Kernel_5.5_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Alistair HP Laptop i5-7200U×4 @2.50GHz, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), M.2 SSD, with Fedora test day image 5.5.3-200.fc31.x86_64 [1] 1. No WLAN. Wireless network controller not detected. Had to use Ethernet port. Default: paxtest failed. Performance: terminal window crashed during lmbench (MB [default 2691] Checking to see if you have 2691 MB; please wait for a moment...).
Elos Ryzen 7 1700, 16GB RAM, 970 EVO Plus 500GB NVMe, RX470 8GB [1] 1. /default/libhugetlbfs SKIP ./default/paxtest SKIP
Fedora tester Desktop i5-6600 @ 3.30GHz, HD Graphics 530 (Skylake GT2) / NV124, SSD, Fedora test day image 5.5.3-200.fc31.x86_64 [1] 1. Default and Performance tests passed.
alciregi Raspberry Pi 3 armv7hl F31 [1] 1. ./default/stack-randomness SKIP ./default/libhugetlbfs SKIP ./default/paxtest SKIP
archmunky bare metal: i3-8130U, 16GB RAM, LVM/ext4 [1] 1. default: WARN (sysfs-perms) performance: PASS
atim CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.59 [1] 1. Tests passed. LGTM overal. But ABRT warning me: WARNING: CPU: 2 PID: 390 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0 [nvidia_drm] Crash function: nv_drm_atomic_helper_disable_all
boraone Operating System: Fedora 31 KDE Plasma Version: 5.17.5 KDE Frameworks Version: 5.66.0 Qt Version: 5.13.2 Kernel Version: 5.4.17-200.fc31.x86_64 OS Typ e: 64-bit Processors: 8 × Intel® Core™ i7-10510U CPU @ 1.80GHz Memory: 15.3 GiB of RAM [1] 1. paxtest failed
chuhu HP Proliant ML350 Gen8 Intel(R) Xeon(R) CPU E5-2650 0 16G 2 numa nodes [1] 1. Run stress test for scheduler and memory.
cserpentis [1] 1. Tested daily workloads with podman/docker, intellij on T480s, intel i5-8350U
cstratak KVM/QEMU Fedora 31 aarch64, 32GB RAM, 8 cores, running on Ampere eMAG 8180 [1] 1. ./default/libhugetlbfs ./default/paxtest and ./default/stack-randomness skipped. During running the test suite I also got this message: [ 162.871884] minix: module verification failed: signature and/or required key missing - tainting kernel. The rest are PASS. Vulnerable on spec_store_bypass and spectre_v2
cwei Intel xeon CPU E301505M v5 @ 2.80GHz [1] 1. ./default/paxtest FAIL ./default/insert_leap_second FAIL ./default/libhugelbfs SKIP, others passed.
danniel Intel Core I7-5500U , 8GB DDR3 [1] 1. 100 % passed
dgrigorev Intel NUC Celeron CPU J3455 8Gb memory F31 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
dgrigorev qemu-system-x86_64 -enable-kvm -m 6G -cpu host -smp 3 -cdrom mnt/kerneltest-5.5-x86_64.iso -boot d -drive driver=raw,file=mnt2/el-disk,index=0,media=d isk -vga virtio #qemu version 4.0.0 [1] [2] [3] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. performance test passed (after installing missing libtirpc-devel and adding execute permissions for ./performance/lmbench3/scripts/get{list,summary})
3. default test suite fail with all tests PASS except paxtest FAIL and libhugetlbfs SKIP
didiksupriadi41 CPU: AMD A10-7400P Radeon R6 4C+6G (4) @ 2.500GHz; GPU: AMD ATI Radeon R6 Graphics + AMD Radeon R5 (Hainan); [1] [2] 1. paxtest FAIL sysfs-perms WARN Performance PASS
2. 1. paxtest FAIL 2. sysfs-perms WARN 3. Performance test Passed
eagle8089 HOST: Windows 10 i5-8th Gen; VM: 4GB RAM, 4 cores [1] [2] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ejnersan Dell Vostro 3558 Core i3-4005U
ejnersan HP Elitebook 840 G6 - Core i7-8665U
ejnersan MSI MS-7984 - Core i7-6700
epereira KVM using Fedora 31 Memory 2.7 GiB, Processor Intel Core Processor (Boradwell, IBRS) x4, GNOME Version 3.34.1, OS type 64-bit, Disk 29.8 [1] 1. 1) Test suite called with default ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/cachedrop FAIL ./default/modsign PASS ./default/memfd PASS ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/selinux-dac-controls PASS Test suite complete FAIL ============================================= Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling 2) Sun 16 Feb 2020 08:01:58 PM EST ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
ernst Gerät:PC192-168-2-101 Speicher:7,3 GiB Processor:AMD® Athlon(tm) ii x2 250 processor × 2 Grafik:AMD® Rs880 GnomeVersion 3.34.3 Typ64-bit Daten träger:700,2 GB
frantisekz T470s Baremetal
gabibbo97 CPU: AMD FX-8320 GPU: AMD Radeon R9 290 [1] 1. Kernel Test Suite) FAIL: paxtest, cachedrop WARN: nvidia-module Performance Test Suite) WARN: nvidia-module
gtb Thinkpad T510
gtwilliams CPU: 8 x Intel Core i7-6700 CPU @ 3.40GHz, OS: FC31, KDE Plasma 5.17.5-1, Qt 5.13.2-2 [1] 1. Base and performance all PASSed
himanshutak8 Lenovo Z51(core i7, 16GB RAM) Virtual Machine Running with 6GB RAM [1] 1. /default/insert_leap_second FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hyperreal Fedora 31 Silverblue on CPU: Intel i3-4170 (4) @ 3.700GHz; GPU: Intel 4th Generation Core Processor Family (Haswell) [1] 1. PASS for both default and performance tests
ibims LENOVO ThinkPad T420, Intel Core i5-2520M [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/paxtest SKIP ./default/selinux-dac-controls SKIP ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS
imabug Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119 bare metal running Fedora 31 [1] 1. paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
imabug QEMU/KVM 4GB RAM 200 GB disk on Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119. [1] 1. Default libhugetlbfs and paxtest skipped. remaining tests passed. Performance tests passed
imabug Xeon W690, nVidia GTX 1660 Ti, 24GB RAM baremetal [1] 1. paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
itrymybest80 PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB, 970 EVO M.2 [1] 1. Both the default (llibhugetlbfs & paxtest was skipped) and performance tests PASS, though it's worth to point out that paxtest was "skipped" when I tested the 5.5 kernel and that it would always fail back on the current stable 5.4+ kernels on F31 when running the default test. Vulnerability status: itlb_multihit:KVM: Vulnerable, l1tf:Mitigation: PTE Inversion, mds:Mitigation: Clear CPU buffers; SMT disabled, meltdown:Mitigation: PTI, spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp, spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization, spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
jakfrost VM using Gnome Boxes default settings (QEMU, 2GB Ram, 20GB HDD) Default installation chosen using test image [1] 1. Successfully was able to identify the host machine hardware. Ran the default test suite provided in /home/liveuser/kernel-tests. For some reason, I couldn't automatically submit the results with the test script, although it reported successfully submitting them without requesting my FAS password.
jbastian HPE Apollo 70 (ThunderX2 aarch64 CPUs, 96 GiB RAM, 960 GiB SSD) [1] 1. The cachedrop test appears to have a bug; the logs show some errors: cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected
jbastian HPE Apollo 70 (aarch64)
joeyengel Lenovo x1 carbon 4th gen; i5-6200u 8GB ram [1] 1. paxtest skipped; libhugetlbfs skipped;
joeyengel xps13 i5-8250u; fedora 31 w/ 5.5.3-200.fc31.x86_64 kernel [1] 1. Skipped tests: libhugetlbfs, paxtest, selinux-dac-controls
jouhou HP Z400 Workstation w/ X5675, GTX1660, 24GB RAM [1] 1. 1. Default tests: paxtest FAIL ; libhugetlbfs SKIP 2. Performance test suite: PASS
jouhou Lenovo Thinkpad x1 Carbon 3rd gen [1] 1. At first run, performance tests say "fatal error: rpc/rpc.h: no such directory. Compilation terminated". After installing libntirpc and libtirpc the compilation passes but again, in the end of tests, I get following error: "/bin/sh: ../scripts/getlist: Permission denied". Although both test suites passed, I don't know if these affect test outcomes or reliability.
jphilipp [1] 1. hp compaq elite 8100 i5 4GB
julroy67 Dell XPS 7390, Intel(R) Core(TM) i7-10710U CPU [1] 1. 100 % passed
kokoseij CPU: Intel I5-4460, RAM: DDR3 12GB, GPU: NVIDIA GeForce GTX 960, OS: Fedora 31 Cinnamon Spin, Upgraded from kernel-stabilization copr [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
lberton@redhat.com kerneltest-5.5-x86_64.iso @ ThinkPad T480s [1] 1. Linux localhost-live 5.5.2-200.fc31.x86_64 #1 SMP Thu Feb 6 17:23:27 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux Test suite called with default ./default/paxtest FAIL ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/timer-overhead PASS ./default/cachedrop FAIL ./default/stack-randomness PASS ./default/memfd PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
lewis41 Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz - RAM 16GB [1] 1. 1. Pass 2. Pass
macnum AMD Ryzen 9 3900X 12, ASUS Radeon RX 5600 XT OC, 32 GB hyper-x DDR4 3200Hhz (4x8) [1] 1. ./default/mq-memory-corruption PASS ./default/stack-randomness PASS ./default/libhugetlbfs SKIP ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/modsign PASS ./default/posix_timers PASS ./default/paxtest SKIP ./default/memfd PASS ./default/timer-overhead PASS Test suite complete PASS
malucious KVM guest with 2GB ram using the test image. i7-6700K. [1] 1. The performance test passed. The first test failed. ./default/libhugetlbfs was skipped. ./default/paxtest failed.
marc84 Testday image VM on Toshiba ideapad Y570 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
masami i7-9700K(UHD Graphics 630): fedora 31 [1] 1. kernel regression test passed. Works fine for daily use. build and work fine simple kernel module.
mharpau Thinkpad T480s, i5-8250U, iGPU [1] 1. Base and performance all PASSed
mimat w520 i7-2630qm [1] 1. Works for me. No regressions.
monot0m Toshiba X40-D BIOS 3.80 Intel Core i7-7500U CPU @ 2.70GHz × 4 [1] 1. ./default/paxtest - FAIL
monot0m Toshiba X40-E BIOS 2.30 Intel Core i5-8250U CPU @ 1.60GHz × 8 [1] 1. ./default/paxtest - FAIL
mzink@redhat.com ThinkPad T490s
nmousouros nmousouros [1] 1. ./default/insert_leap_second PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/paxtest PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS
norbertj Ideapad with Core i3-6006U [1] 1. Default tests pass except paxtest, performance tests pass (after installing missing package libtirpc-devel).
norbertj Old PC with Core i5-750, 4 GB RAM and Radeon HD 6450 [1] 1. Default tests pass except paxtest. No regressions regarding hardware support noted. Performance tests aborted after 3 hours with excessive swapping.
ozeszty AMD Phenom II X2, R5 240 (OLAND using amdgpu), F31 & 5.5.3-200.fc31.x86_64 [1] 1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. Vulnerabilities status looks hopeful: not affected, except for spectre.
ozeszty IvyBridge/AMD 7670m laptop, F30 & 5.5.3-200.fc31.x86_64 [1] [2] 1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted. I skipped paxtest skip in the previous entry.
2. Default passed (libhugetlbfs skipped), performance passed. No issues spotted.
ozeszty Skylake laptop, 5.5.3-200.fc31.x86_64 [1] 1. Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted throughout the week.
pwhalen HPE Apollo (cn99xx) - AArch64
pwhalen Lenovo HR350A (AArch64)
pwhalen Mustang (xgene-1) AArch64
pwhalen Raspberry Pi 4B (4GB) - AArch64 [1] 1.
pwhalen Wandboard Quad (armhfp) [1] 1. ./default/insert_leap_second FAIL
quiet Memory: 3.8GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.3, OS: 64-bit, KVM, Disk: 21.5 GB [1] 1. Test suite called with default ./default/cachedrop PASS ./default/modsign PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/paxtest FAIL ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/insert_leap_second PASS ./default/selinux-dac-controls PASS Test suite complete FAIL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ./performance/lmbench3 PASS Test suite complete PASS
rammodulus Test day Image. Proxmox 5.4 VM; UEFI, 4GB, Common KVM Procs x 4, llvmpipe graphics [1] 1. Both tests passed
rotwild Intel i5 460M, ATI Radeon HD 5650, 4GB RAM [1] 1. 1. paxtest FAIL sysfs-perms WARN Performance test suite PASS
roypen Thinkpad T430, Intel i5-3320M, 8 GB RAM [1] [2] 1. 2. Performance Test suite - PASS
2. 1. ./default/libhugetbfs - SKIP ; ./default/paxtest - FAIL
sayaksarkar Lenovo T460s 20G [Boxes - Memory 2GiB, CPUs: 4] [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
sbakker Dell XPS 13 9360; Intel Core i7-7560U @2.40GHz x 4; Intel Iris Plus Graphics 640 (Kaby Lake GT3e), driver i915; Memory: 16GB; Disk: 512GB SSD (THNSN55 12GPUK NVMe TOSHIBA) [1] [2] 1. #1803706, 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
shiwanibiradar lenevo ideapad330 , fedora31 on kvm , intel i5 ,8GB RAM [1] 1. ./default/paxtest:SKIP & ./default/libhugetlbfs:SKIP overall both are pass
simobonfo QEMU/KVM 4GB RAM 20 GB disk on Lenovo Ideapad 100 15-IBD with kerneltest-5.5.3.iso (Updated at 2020-02-12) [1] 1. ./runtests.sh: ./default/posix_timers-->PASS ./default/cachedrop-->FAIL ./default/paxtest -->FAIL ./default/stack-randomness-->PASS ./default/mq-memory-corruption -->PASS ./default/libhugetlbfs-->SKIP ./default/selinux-dac-controls-->PASS ./default/insert_leap_second -->PASS ./default/timer-overhead -->PASS ./default/sysfs-perms-->PASS ./default/modsign-->PASS ./default/memfd -->PASS Test complete -->FAIL ./runtests.sh -t performance make the terminal crash
slushur Ryzen 7 1700, 32GB RAM, RX 580 [1] 1. ./default/paxtest SKIP ./default/libhugetlbfs SKIP
snip4 Intel Core i7-7800X, ASUS TUF X299 MARK 2, 32GB RAM, NVIDIA RTX 2070, Test 5.5 image clean install. [1] 1. libhugetlbfs & paxtest: SKIP // Since kernel 5.4 series, can't reboot, system hangs. Only boot correctly when force power off switch, and on again.
stklcode qemu (intel Skylake-X, 12-core/16GB guest specs F31 Host)
str8edgedave HP Elitedesk core i7-4770 16GB RAM [1] 1. $ sudo ./runtests.sh Test suite called with default ./secureboot/check_SB_signature PASS ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS ---- $./runtests.sh -t performance Test suite called with performance ./secureboot/check_SB_signature FAIL Using config in CONFIG.stc0042699.stholdco.com Tue Feb 11 10:54:11 CST 2020 Latency measurements Tue Feb 11 10:55:35 CST 2020 Calculating file system latency Tue Feb 11 10:55:38 CST 2020 Local networking Tue Feb 11 10:59:19 CST 2020 Bandwidth measurements Tue Feb 11 11:05:47 CST 2020 Calculating context switch overhead Tue Feb 11 11:05:52 CST 2020 ./performance/lmbench3 PASS Test suite complete FAIL
suprith4989 KVM/QEMU Dell r730, 2GB RAM [1] 1. ./default/posix_timers PASS ; ./default/cachedrop PASS ; ./default/paxtest FAIL ; ./default/stack-randomness PASS ; ./default/mq-memory-corruption PASS ; ./default/libhugetlbfs SKIP ; ./default/selinux-dac-controls PASS ; ./default/insert_leap_second PASS ; ./default/timer-overhead PASS ; ./default/sysfs-perms PASS ; ./default/modsign PASS ; ./default/memfd PASS ; Test suite complete FAIL ./performance/lmbench3 PASS Test suite complete PASS
t3rm1n4l Dell Inspiron 3180 11" [1] 1. libhugetlbfs: SKIP paxtest: SKIP Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
temjin747 Host: Fedora 31 KDE Spin x86_64 kernel 5.4.18-200.fc31.x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU-KVM version 4 .1.1/KVM (2 vCPUs, 2 GB RAM)
tjamadeira@gmal.com VM Fedora 31 in Intel Core i5-4210U CPU @ 1.70GHz*4; LLVM 9.0, 256 bits; gnome 3.34.3; 64-bit [1] 1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vipul0 Lenovo i5-6300U CPU@2.40GHz 32GB RAM [1] 1. Run test /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance test /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vipul0 QA [1] 1. Run test Result :: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Perdormance Result :: sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vishalvvr qemu/kvm 2GB 20GB, 5.5.2-200.fc31.x86_64 [1] 1. 1. default test suite: FAIL ./default/paxtest FAIL ./default/libhugetlbfs SKIP
wessle kerneltest-5.5-x86_64.iso on Boxes VM with defaults; CPU: AMD Ryzen Threadripper 2950X (16 cores @ 3.5GHz); GPU: nvidia GeForce RTX 2070 super
willo 8GB Memory Virtualbox VM on an Intel NUC - Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz [1] 1. cachedrop, libhugetlbfs, selinux-dac-controls, insert_leap_second, modsign SKIP the rest passed for both default and performance
ywatanabe HOST OS: fedora28 , CPU: Intel(R) Core(TM) i5-4570S CPU @ 2.90GHz , MEM: 16 GB , KERNEL: Linux fedora 4.20.8-100.fc28.x86_64 , KVM: qemu-kvm-2.11.2-4 .fc28.x86_64 , TESTIMG_USED: kerneltest-5.5-x86_64.iso (Downloaded on Feb 12 23:05 JST) [1] 1. default test: FAILED (Failed after doing step 3 and 4 of https://fedoraproject.org/wiki/QA:Testcase_kernel_regression#Setup ) performance test: PASS
Wiki Metadata