Kernel 5.2 Test Day

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2019-06-22_Kernel_5.2_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
JeremyM Sony Vaio Intel i5 [1] 1. Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "
MidnightRAT Fedora 30 stock [1] 1. Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks.
alciregi Baremetal i5-7400 8GB RAM [1] 1. Test suite called with performance Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU [1] 1. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
alciregi RPi3 armv7hl [1] [2] 1. Test suite called with destructive
2. Test suite called with default
alciregi Scaleway START1-XS x86_64 cloud instance [1] 1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
alciregi aarch64 on KVM [1] 1. Test suite called with default Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
alciregi vmware 4GB ram 2vcpu [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
archmunky Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM [1] 1. Standard: https://apps.fedoraproject.org/kerneltest/logs/34940 sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS Performance: https://apps.fedoraproject.org/kerneltest/logs/34942 All PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
archmunky Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM [1] 1. runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS
atim CPU: Quad Core AMD Athlon X4 845 | GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30 [1] 1. Test suite called with default - PASS (except paxtest as always) Test suite called with performance - PASS
benjamind VMware Workstation on Fedora 30 host (i7-6500U) [1] 1. cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately
calinoiualex Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz [1] 1. 1. Pass 2. Pass Ran with performance argument Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
chuhu NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes); [1] 1. Ran trinity testings and scheduler testings suits.
danniel KVM [1] 1. works
dinostar Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop [1] 1. The following test was skipped, everything else was a pass. ./default/libhugetlbfs SKIP
eboswell Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory [1] [2] 1. Test suite called with performance. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
2. Test suite called with default. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
floonse [1] [2] [3] [4] 1. <a href=http://cialiswwshop.com/>buy cialis online with prescription</a>
2. <a href=http://vsviagrav.com/>viagra prescription online</a>
3. <a href=http://vscialisv.com>cialis prescription online
4. <a href=http://vskamagrav.com/>buy kamagra uk with mastercard
glb Bare metal, Core i7-920, 12GB RAM [1] 1. All default test suite passed.
goodmirek bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4 [1] 1. KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.
heffer ThinkPad X1 Carbon 5th [1] [2] 1. WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577 Works fine with kernel-5.1.18-300.fc30.x86_64
2. #1724357, Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357
idanka Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050 [1] 1. ./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass thirdparty/nvidia-module error performance: fatal error: rpc/rpc.h: No such file or directory
jlanda bare metal ryzen 5 1600x
kiyer Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
kparal Thinkpad T480s, Fedora 30
lewis41 i5-6500 CPU @ 3.20GHz
lewis41 i5-6500 CPU @ 3.20GHz - 8GB RAM
lnie ProLiant SL4545 G7
luya HP Envy x360 15-cp0xxx (Ryzen 2500U APU) [1] 1. Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.
masami Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630 [1] 1. Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.
masami Raspberry Pi 3B+ aarch64 [1] 1. kernel regression tests passed.
mharpau Fedora 30 T480s i5-8250U iGPU
mimat fedora 30@i7-2630QM
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
mizhang Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64 [1] 1. LTP from upstream sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass fs pass, fsx pass, math pass, hugeltb pass, mm failed with case ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass
monot0m Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-3317U CPU @ 1.70GHz × 4 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i5-7200U CPU @ 2.50GHz × 4 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
monot0m Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
monot0m Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
nah Fam vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu [1] 1. Test 1 ./default/cachedrop FAIL Test suite complete FAIL Test 2 ./performance/lmbench3 PASS Test suite complete PASS
nightromantic Bare metal, desktop, F30@Intel i3-8100 [1] 1. ./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS". ./runtests.sh -t performance -- "PASS"
numasan HP EliteBook 820 G4 [1] 1. Test set: default
ozeszty F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr [1] 1. ./default/libhugetlbfs skipped as usual, default and performance passed.
ozeszty F30 KDE, Skylake laptop on kernel 4.2.2 from koji [1] 1. ./default/libhugetlbfs skipped, default and performance passed.
pmeyer AMD® Athlon(tm) ii x2 250 processor × 2 [1] 1. file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564 132196.log.txt file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
pwhalen Banana Pi (armhfp)
pwhalen Mustang (xgene-1) [1] [2] 1. make not installed on first run. Second attempt passed - https://apps.fedoraproject.org/kerneltest/logs/34914
2. https://apps.fedoraproject.org/kerneltest/kernel/5.2.2-200.fc30.aarch64
pwhalen Pine 64 Plus (aarch64 sbc) [1] 1. https://apps.fedoraproject.org/kerneltest/logs/34917
pwhalen Raspberry Pi 3B+ (armhfp)
pwhalen Trimslice (armhfp) [1] 1. Test suite complete - WARN https://apps.fedoraproject.org/kerneltest/logs/34921
pwhalen Wandboard Quad (armhfp) [1] 1. https://apps.fedoraproject.org/kerneltest/logs/34921
ralex Ryyzen 2600x | 16 GB Ram | Nvidia GTX 1080 [1] 1. Default passed (https://apps.fedoraproject.org/kerneltest/logs/35167) Performance passed (https://apps.fedoraproject.org/kerneltest/logs/35168)
rammodulus Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration. [1] 1. Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
rudrapratap qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64 [1] 1. Test suite called with default ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/selinux-dac-controls PASS ./default/paxtest PASS ./default/memfd PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/mq-memory-corruption PASS ./default/modsign PASS ./default/libhugetlbfs SKIP ./default/insert_leap_second PASS ./default/timer-overhead PASS Test suite complete PASS
salimma Bare metal: Thinkpad T480s [1] 1. Default and performance profiles pass
sumantrom T470s [1] 1. Called with default
tmlgcq QEMU with KVM Virtual
tmsp Ryzen 1800X; 16 GB RAM; F30
user default
vascom Bare metal, Core i7-4470, 32GB RAM [1] 1. All good.
weswilliams VMware Workstation 15.1.0 on Fedora 30 host [1] 1. All default test suite passed.
Wiki Metadata