Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
GoodMirek | Dell XPS M1330, CPU intel Core2 Duo T8100, GPU Geforce 8400M GS | [1] |
1.
FC31, 5.3.2-300.fc31.x86_64
|
GoodMirek | HP Elitebook 850 G4, i5-7200U w/embedded GPU | [1] |
1.
#1759289,
All good, just this kernel takes double time to boot to LUKS password prompt, see the bug https://bugzilla.redhat.com/show_bug.cgi?id=1759289
|
HackerOne | Fedora 30 WS with Koji 5.3.2-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, NV124 [NVIDIA GeForce GTX 970], 16GB RAM, 250GB SSD | [1] |
1.
Default and Performance tests passed. Log files submitted.
|
HackerOne | Test Day Image 5.3.1-300.fc30.x86_64 on HP 250 G5 notebook, i5-7200U CPU @ 2.50GHz × 4, Intel HD Graphics 620 (Kaby Lake GT2), 4GB RAM, 128GB SSD. | [1] |
1.
Default and Performance tests passed. Log files submitted.
|
HackerOne | Test Day Image 5.3.1-300.fc30.x86_64 on a custom desktop i5-6600 CPU @ 3.30GHz × 4, Intel® HD Graphics 530 (Skylake GT2), 16GB RAM, 250GB SSD | [1] |
1.
Default and Performance tests passed. Log files submitted.
|
Paninaro | Official Test Day Live image on a Notebook HP 650 Intel® Celeron(R) CPU 1000M @ 1.80GHz × 2 RAM 3.7 GiB Graphics Intel® Ivybridge Mobile uname -a : L inux localhost-live 5.3.1-300.fc30.x86_64 #1 SMP Fri Sep 27 14:38:54 UTC 2019 | [1] [2] |
1.
No problems spotted in this kernel, so i consider both the tests PASSED. The default test warn, is not a big issue as the directory /sys/kernel/debug is 700 so it really doesn't matter the file
permission in that folder. For the performance test, installing libtirpc-devel and giving the executable permissions to getlist and getsummary files, solve the issue and the performance test is PASSED with no errors: https://apps.fedoraproject.org/kerneltest/logs/35994
2. I could mark the test passed but i prefer to give some info instead: Kernel regression default test result in WARN. Looking at the log https://apps.fedoraproject.org/kerneltest/logs/35991 the reason is: Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx About performance test, there is an issue with the live image, it does not come with package libtirpc-devel installed, so the compilation terminate with fatal error, the problem is that the performance test exit with result PASS and report a passed test. This is a bug, imho, as it consider passed a test that was not executed. Btw after installing libtirpc-devel the compilation goes on and it runs some tests like Latency measurements, Calculating file system latency, Local networking, Bandwidth measurements, Calculating context switch overhead and than it stops again with error /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 And again the test result in a PASS ./performance/lmbench3 PASS Test suite complete PASS So is a call for fixing some bugs in the kernel-test suite. |
agarwalvarshit | Oracle VM 4Gb Ram i3 processor | [1] |
1.
est suite called with default
./default/libhugetlbfs SKIP
./default/cachedrop PASS
./default/timer-overhead FAIL
^C./default/insert_leap_second FAIL
./default/sysfs-perms PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/selinux-dac-controls PASS
./default/memfd PASS
./default/paxtest FAIL
./default/stack-randomness PASS
./default/posix_timers PASS
Test suite complete FAIL
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
albertopatino1 | Lenovo P52, Intel(R) Xeon(R) E-2176M CPU @ 2.70GHz, 4K Display, 128Gb RAM, Disk /dev/nvme1n1 KXG5AZNV1T02 TOSHIBA, e1000e: enp0s31f6 NIC Link is Up 1 000 Mbps Full Duplex | [1] |
1.
#1752961,
Fedora Test Day Image. Results from sudo ./runtests.sh
Test suite called with default
./default/timer-overhead PASS
./default/stack-randomness
PASS
./default/sysfs-perms PASS
./default/modsign PASS
./default/cachedrop PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/posix_timers PASS
./default/insert_leap_second PASS
./default/paxtest PASS
./default/mq-memory-corruption PASS
./default/selinux-dac-controls PASS
Test suite complete PASS
ASIDE: FedoraTestDay Image works fine in this machine with profile described above. However same computer has Fedora 30 upgraded to F31. Same kernel (but f31) is causing kernel panic. Computer is not booting.
|
alciregi | KVM, RAM 2GB, BIOS | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
alciregi | Raspberry Pi 3 aarch64 F31 | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not
affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
|
alciregi | Raspberry Pi 3 armv7hl F31 | ||
alciregi | Toshiba Portege R930 i5 4GB RAM | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
archmunky | KVM, 2 Core, 4GB RAM, UEFI | [1] |
1.
Both Passed but performance log would not upload
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
atim | CPU: Quad Core AMD Athlon X4 845; Kernel: 5.3.1-300.fc31.x86_64; Graphics: Device-1: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 435.21 | [1] |
1.
Test suite PASS
|
bradfordcp | Official Test Day Live Image on Dell Precision 5530. Intel Core i7-8850H (Six Core 2.60GHz, 4.30GHz Turbo, 9MB 45 W). 32 GB DDR4-2666MHz SDRAM Non-ECC . Nvidia Quadro P1000 w/4GB GDDD R5. Intel Wifi Link 9260 2x2 802.1 1AC+BT 5.0 vPro Wireless | [1] |
1.
Clean PASS with a SKIP on libhugetlbfs.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
bradfordcp | Official Test Day Live Image on Dell XPS 9570. 8th Generation Intel Core i9-8 950HK Processor (12MB Cache, u p to 4.8 GHz, 6 cores). 32GB 2x16GB DDR4- 2666MHz. NVIDIA GeForce GTX 1050Ti with 4GB GDDR5. Killer 1535 2x2 802.11ac Wi-Fi Wireless + Bluetooth 4.2 | [1] |
1.
Test suite called with default
./default/timer-overhead PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/modsign SKIP
./default/cachedrop SKIP
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/posix_timers PASS
./default/insert_leap_second SKIP
./default/paxtest PASS
./default/mq-memory-corruption PASS
./default/selinux-dac-controls SKIP
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 | static psize;
| ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
94 | return;
| ^~~~~~
lib_sched.c:46:1: note: declared here
46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
| ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
| ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
| ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
149 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
76 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
157 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
153 | if (parallel <= 0) lmbench_usage(argc, argv, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
53 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
167 | static count = 0;
| ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
41 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
136 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
116 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
78 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
58 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
492 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
60 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
55 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/ccYbciYF.o: in function `setup_names':
lat_fs.c:(.text+0x836): warning: the use of `tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
182 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
42 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
46 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
45 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
84 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
203 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
393 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
69 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
413 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
70 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
123 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
66 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
39 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
204 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
40 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
22219MB OK
22219MB OK
22219MB OK
mhz: should take approximately 15 seconds
Using config in CONFIG.localhost.localdomain
Tue 01 Oct 2019 02:39:04 AM EDT
Latency measurements
Tue 01 Oct 2019 02:39:44 AM EDT
Calculating file system latency
Tue 01 Oct 2019 02:40:05 AM EDT
Local networking
Tue 01 Oct 2019 02:43:52 AM EDT
Bandwidth measurements
Tue 01 Oct 2019 02:56:19 AM EDT
Calculating context switch overhead
Tue 01 Oct 2019 02:56:56 AM EDT
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
Traceback (most recent call last):
File "./fedora_submit.py", line 45, in <module>
password=password
File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
openid_insecure=self.openid_insecure)
File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
carlhuby | Toshiba Sattelite P50t - Intel i7-4720HQ | [1] |
1.
Passed Test Suite
|
chrismurphy | HP Spectre, intel i7-6500U, Skylake GT2 [HD Graphics 520] | [1] |
1.
#1781288,
#1780800,
1781288: kernel/trace/trace.c:8106 create_trace_option_files, taints kernel
1780800: GPU hang
|
dan1mal | VMware Workstation 15 player VM - 2gb memory, 1 processor, 20gb hd | [1] |
1.
Test 1:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no
microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
Test 2:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
filip | AUSU t200t notebook transformer | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT
disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
garrmcnu | Test image on VM (KVM) | [1] |
1.
Default and performance tests passed
|
himank98 | Oracle VM 4gb RAM i7 processor | [1] |
1.
/default/insert_leap_second FAIL
./default/stack-randomness PASS
./default/mq-memory-corruption
PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
./default/paxtest PASS
./default/selinux-dac-controls PASS
./default/cachedrop PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/timer-overhead PASS
Test suite complete FAIL
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
himanshutak8 | Lenovo z51 with i7 processor(with 16gb RAM) test in Orcale VirtualBox VM(Machine running on i7 processor and 4GB RAM ) | [1] [2] |
1.
Test suite called with Performance Failed. Script Stuck at Bandwidth Measurements for a long(wait to execute further about 2hrs) after that it failed.
2. Test Suite called with default failed on ./default/insert_leap_second while overall Test Suit Complete status is FAILED Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling |
hitesh0078 | Test in Oracle Virtual Box VM Machine running on i5 processor and 4GB RAM | [1] |
1.
Test suite called with default
./default/stack-randomness PASS
./default/modsign PASS
./default/timer-overhead PASS
./default/paxtest PASS
./default/selinux-dac-controls PASS
./default/sysfs-perms PASS
^C./default/insert_leap_second FAIL
./default/posix_timers PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/cachedrop PASS
./default/mq-memory-corruption PASS
Test suite complete FAIL
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
holishing | OS: Fedora 31 (Thirty One) x86_64 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
joepadmiraal | XPS 15 9560, Intel i7-7700HQ, NVIDIA GeForce GTX 1050 Mobile, 16GB | [1] |
1.
1. PASSED
2. Error while compiling:
bash-5.0$ sudo ./runtests.sh -t performance
Test suite called with performance
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No
such file or directory
38 | #include <rpc/rpc.h>
| ^~~~~~~~~~~
compilation terminated.
|
kostera | Dell Inspiron 5570 i3-8130U; 12GB RAM; Kingston A400 M.2 SATA III SSD; Fedora 31 BETA Workstation/GNOME kernel 5.3.1-300.fc31.x86_64 | [1] |
1.
[inspiron@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/modsign PASS
./default/paxtest
FAIL
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/timer-overhead FAIL
./default/sysfs-perms PASS
./default/posix_timers PASS
./default/mq-memory-corruption PASS
./default/insert_leap_second PASS
./default/cachedrop FAIL
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
Test suite complete FAIL
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
./runtest.sh: line 8: make: command not found
./runtest.sh: line 9: make: command not found
./runtest.sh: line 13: make: command not found
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Traceback (most recent call last):
File "./fedora_submit.py", line 45, in <module>
password=password
File "/usr/lib/python3.7/site-packages/fedora/client/openidbaseclient.py", line 293, in login
openid_insecure=self.openid_insecure)
File "/usr/lib/python3.7/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
raise AuthError(output['message'])
fedora.client.AuthError: Missing argument: auth_module
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
[inspiron@localhost kernel-tests]$ uname -a
Linux localhost.localdomain 5.3.1-300.fc31.x86_64 #1 SMP Tue Sep 24 21:00:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
|
lewis41 | CPU: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 8GB Samsung SSD 850 | [1] |
1.
Passed default/performance test suite
|
lruzicka | Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz | [1] [2] |
1.
Performance suite has passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
2. The `paxtest` was skipped, so was `selinux-dac-controls`. The `cachedrop` failed. The overall result of the default test suite was fail. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling |
luya | HP Envy x360 15 Ryzen 2500U (Fedora 31) | [1] |
1.
./default/sysfs-perms WARN
|
malucious | gnome-boxes guest using the test image. Host: Asus Z170A i7-6700K | [1] [2] |
1.
./runtests.sh -t performance PASSED.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
2. ./runtest.sh Failed. ./default/cachedrop Failed. ./default/libhugetlbfs Skipped. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling |
marc84 | Test Day Image on VirtualBox | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state
unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
masami | fedora 30, 5.3.2-300.fc30.x86_64. i7-9700K(UHD Graphics 630) | [1] [2] |
1.
#1758831,
Sorry, I made mistake to set bug number. I reported #1758831 . GDM login screen doesn't show up on kernel 5.3.2
2. #1752961, GDM login screen doesn't show. |
maxishere | Fedora Server 30 Image on DigitalOcean with Kernel 5.3.2-300 from Koji | [1] |
1.
Everything passed but the performance test had some warnings about implicit-function-declaration on the function lmbench_usage(ac, av, usage)
|
mharpau | Fedora 30 T480s i5-8250U 24GB RAM iGPU | [1] |
1.
Both default and performance: PASSED
|
mimat | Testday iso. lenovo w520 with optimus. | [1] |
1.
Both default and performance: PASSED. But I had problem with optimus gfx, discrete gfx was always powered on. Had similar problem before when testing on my daily f30 installation.
|
mimat | w520. f30 fully updated. 5.3.2 | [1] |
1.
#1757891,
Everything besides properly working optimus graphics is working.
|
mzink | [1] |
1.
#1752961,
Lenovo t480s - kernel 5.3 works fine, but only with TPM disabled. Kernel panic with TPM enabled (BZ 1752961)
|
|
nielsenb | Compaq 8510w Intel T9300 AMD RV630 BIOS | ||
nightromantic | Fedora 30 fully updated; kernel 5.3.1-300.fc31.x86_64 (Koji); Desktop system, CPU: Intel Core i3-8100, m/b ASUS PRIME B360-PLUS (Intel B360 Chipset) | [1] |
1.
SKIP on libhugetlbfs, WARN on sysfs-perms, all others PASS
|
quiet | [1] |
1.
1.test) ./default/libhugetlbfs was skipped, everything else from the test suit passed
2.test) all passed
|
|
quiet | test day image iso on VM, 4 GiB RAM, 2x Intel Core Skylake (IBRS) 2904 MHz | [1] |
1.
1.test) ./default/libhugetlbfs was skipped, otherwise everthing else from the test suite passed
2.test) everything passed
|
rammodulus | Test day iso on Virtualbox 6.0.12 VM, 4vCPU, 4GB ram | [1] |
1.
1. Ran default test suite only, failed on insert_leap_second test
2. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
rodamorris | i7-6850k X99 32GB AMD GPU Desktop/Dell XPS 9360 | [1] |
1.
All tests run passed; log files submitted.
|
subhamrai03 | test on VM | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT
Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
subhamrai03 | test on VM with performance | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT
Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
sumantrom | Test day iso on KVM | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear
CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
sumantrom | Test day iso on KVM called with performance | [1] |
1.
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
szydell | Kerneltest Image -> dell 3510, 16GB RAM, i7-6820HQ CPU @ 2.70GHz | ||
szydell | Virtualbox 6.0.6 -> Fedora KDE 30 -> System76 Oryx Pro (oryp4), i7-8750H, 32GB ram | [1] |
1.
insert_leap_second FAILED
|
tablepc | Test on bare metal install (Lenovo M83 with an i5-4570 CPU) on fully updated F31 beta 0928 drop running tests on Kernel 5.3.1 | [1] |
1.
Ran both the Default and Performance tests. All tests passed and results were submitted.
|
tcza | |||
tcza | Manufacturer: Dell Inc. Product Name: 0YVXR8 | ||
temjin747 | Host: Fedora 30 x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU version 3.1.1/KVM (2 vCPUs, 4 GB RAM) | [1] |
1.
skipped libhugetlbfs in first test script
|
xfor | ASUS B450M-A, AMD R5 2400G, RAM DDR4-3000 2x8G, F30 update | ||
zsun | BeagleBone Black armv7hl 5.3.2-300.fc30.armv7hl | [1] |
1.
paxtest and timer-overhead of the kernel-tests testsuit failed.
|
zsun | Raspberry Pi 3 kernel-5.3.2-300.fc30.aarch64 | [1] [2] |
1.
ftrace tracers can be enabled and no panic happens
2. paxtest and timer-overhead of the kernel-tests testsuit failed. |