Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
Alistair | HP Laptop i5-7200U×4 @2.50GHz, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), M.2 SSD, with Fedora test day image 5.5.3-200.fc31.x86_64 | [1] |
1.
No WLAN. Wireless network controller not detected. Had to use Ethernet port.
Default: paxtest failed.
Performance: terminal window crashed during lmbench (MB [default 2691] Checking to see if you
have 2691 MB; please wait for a moment...).
|
Elos | Ryzen 7 1700, 16GB RAM, 970 EVO Plus 500GB NVMe, RX470 8GB | [1] |
1.
/default/libhugetlbfs SKIP ./default/paxtest SKIP
|
Fedora tester | Desktop i5-6600 @ 3.30GHz, HD Graphics 530 (Skylake GT2) / NV124, SSD, Fedora test day image 5.5.3-200.fc31.x86_64 | [1] |
1.
Default and Performance tests passed.
|
alciregi | Raspberry Pi 3 armv7hl F31 | [1] |
1.
./default/stack-randomness SKIP
./default/libhugetlbfs SKIP
./default/paxtest SKIP
|
archmunky | bare metal: i3-8130U, 16GB RAM, LVM/ext4 | [1] |
1.
default: WARN (sysfs-perms)
performance: PASS
|
atim | CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.59 | [1] |
1.
Tests passed. LGTM overal. But ABRT warning me:
WARNING: CPU: 2 PID: 390 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0 [nvidia_drm]
Crash function: nv_drm_atomic_helper_disable_all
|
boraone | Operating System: Fedora 31 KDE Plasma Version: 5.17.5 KDE Frameworks Version: 5.66.0 Qt Version: 5.13.2 Kernel Version: 5.4.17-200.fc31.x86_64 OS Typ e: 64-bit Processors: 8 × Intel® Core™ i7-10510U CPU @ 1.80GHz Memory: 15.3 GiB of RAM | [1] |
1.
paxtest failed
|
chuhu | HP Proliant ML350 Gen8 Intel(R) Xeon(R) CPU E5-2650 0 16G 2 numa nodes | [1] |
1.
Run stress test for scheduler and memory.
|
cserpentis | [1] |
1.
Tested daily workloads with podman/docker, intellij on T480s, intel i5-8350U
|
|
cstratak | KVM/QEMU Fedora 31 aarch64, 32GB RAM, 8 cores, running on Ampere eMAG 8180 | [1] |
1.
./default/libhugetlbfs ./default/paxtest and ./default/stack-randomness skipped. During running the test suite I also got this message: [ 162.871884] minix: module verification failed: signature
and/or required key missing - tainting kernel.
The rest are PASS.
Vulnerable on spec_store_bypass and spectre_v2
|
cwei | Intel xeon CPU E301505M v5 @ 2.80GHz | [1] |
1.
./default/paxtest FAIL ./default/insert_leap_second FAIL ./default/libhugelbfs SKIP, others passed.
|
danniel | Intel Core I7-5500U , 8GB DDR3 | [1] |
1.
100 % passed
|
dgrigorev | Intel NUC Celeron CPU J3455 8Gb memory F31 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
dgrigorev | qemu-system-x86_64 -enable-kvm -m 6G -cpu host -smp 3 -cdrom mnt/kerneltest-5.5-x86_64.iso -boot d -drive driver=raw,file=mnt2/el-disk,index=0,media=d isk -vga virtio #qemu version 4.0.0 | [1] [2] [3] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. performance test passed (after installing missing libtirpc-devel and adding execute permissions for ./performance/lmbench3/scripts/get{list,summary}) 3. default test suite fail with all tests PASS except paxtest FAIL and libhugetlbfs SKIP |
didiksupriadi41 | CPU: AMD A10-7400P Radeon R6 4C+6G (4) @ 2.500GHz; GPU: AMD ATI Radeon R6 Graphics + AMD Radeon R5 (Hainan); | [1] [2] |
1.
paxtest FAIL
sysfs-perms WARN
Performance PASS
2. 1. paxtest FAIL 2. sysfs-perms WARN 3. Performance test Passed |
eagle8089 | HOST: Windows 10 i5-8th Gen; VM: 4GB RAM, 4 cores | [1] [2] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected |
ejnersan | Dell Vostro 3558 Core i3-4005U | ||
ejnersan | HP Elitebook 840 G6 - Core i7-8665U | ||
ejnersan | MSI MS-7984 - Core i7-6700 | ||
epereira | KVM using Fedora 31 Memory 2.7 GiB, Processor Intel Core Processor (Boradwell, IBRS) x4, GNOME Version 3.34.1, OS type 64-bit, Disk 29.8 | [1] |
1.
1) Test suite called with default
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/cachedrop FAIL
./default/modsign PASS
./default/memfd PASS
./default/posix_timers PASS
./default/insert_leap_second PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/selinux-dac-controls PASS
Test suite complete FAIL
=============================================
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
2) Sun 16 Feb 2020 08:01:58 PM EST
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
ernst | Gerät:PC192-168-2-101 Speicher:7,3 GiB Processor:AMD® Athlon(tm) ii x2 250 processor × 2 Grafik:AMD® Rs880 GnomeVersion 3.34.3 Typ64-bit Daten träger:700,2 GB | ||
frantisekz | T470s Baremetal | ||
gabibbo97 | CPU: AMD FX-8320 GPU: AMD Radeon R9 290 | [1] |
1.
Kernel Test Suite) FAIL: paxtest, cachedrop WARN: nvidia-module
Performance Test Suite) WARN: nvidia-module
|
gtb | Thinkpad T510 | ||
gtwilliams | CPU: 8 x Intel Core i7-6700 CPU @ 3.40GHz, OS: FC31, KDE Plasma 5.17.5-1, Qt 5.13.2-2 | [1] |
1.
Base and performance all PASSed
|
himanshutak8 | Lenovo Z51(core i7, 16GB RAM) Virtual Machine Running with 6GB RAM | [1] |
1.
/default/insert_leap_second FAIL
Test suite complete FAIL
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
hyperreal | Fedora 31 Silverblue on CPU: Intel i3-4170 (4) @ 3.700GHz; GPU: Intel 4th Generation Core Processor Family (Haswell) | [1] |
1.
PASS for both default and performance tests
|
ibims | LENOVO ThinkPad T420, Intel Core i5-2520M | [1] |
1.
Test suite called with default
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/mq-memory-corruption PASS
./default/cachedrop PASS
./default/memfd PASS
./default/insert_leap_second PASS
./default/paxtest SKIP
./default/selinux-dac-controls SKIP
./default/modsign PASS
./default/posix_timers PASS
Test suite complete PASS
|
imabug | Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119 bare metal running Fedora 31 | [1] |
1.
paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
|
imabug | QEMU/KVM 4GB RAM 200 GB disk on Dell Precision 3620 Intel Xeon E3-1240 nVidia GF119. | [1] |
1.
Default libhugetlbfs and paxtest skipped. remaining tests passed. Performance tests passed
|
imabug | Xeon W690, nVidia GTX 1660 Ti, 24GB RAM baremetal | [1] |
1.
paxtest passes when selinuxuser_execheap is off, fails when selinuxuser_execheap is set on. Remaining tests pass.
|
itrymybest80 | PRIME Z270-A, i5-7600K, 16GB DDR4, RX 580 8GB, 970 EVO M.2 | [1] |
1.
Both the default (llibhugetlbfs & paxtest was skipped) and performance tests PASS, though it's worth to point out that paxtest was "skipped" when I tested the 5.5 kernel and that it would always fail
back on the current stable 5.4+ kernels on F31 when running the default test. Vulnerability status: itlb_multihit:KVM: Vulnerable, l1tf:Mitigation: PTE Inversion, mds:Mitigation: Clear CPU buffers; SMT disabled, meltdown:Mitigation: PTI, spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp, spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization, spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
jakfrost | VM using Gnome Boxes default settings (QEMU, 2GB Ram, 20GB HDD) Default installation chosen using test image | [1] |
1.
Successfully was able to identify the host machine hardware. Ran the default test suite provided in /home/liveuser/kernel-tests. For some reason, I couldn't automatically submit the results with the
test script, although it reported successfully submitting them without requesting my FAS password.
|
jbastian | HPE Apollo 70 (ThunderX2 aarch64 CPUs, 96 GiB RAM, 960 GiB SSD) | [1] |
1.
The cachedrop test appears to have a bug; the logs show some errors:
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat:
/proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
|
jbastian | HPE Apollo 70 (aarch64) | ||
joeyengel | Lenovo x1 carbon 4th gen; i5-6200u 8GB ram | [1] |
1.
paxtest skipped; libhugetlbfs skipped;
|
joeyengel | xps13 i5-8250u; fedora 31 w/ 5.5.3-200.fc31.x86_64 kernel | [1] |
1.
Skipped tests: libhugetlbfs, paxtest, selinux-dac-controls
|
jouhou | HP Z400 Workstation w/ X5675, GTX1660, 24GB RAM | [1] |
1.
1. Default tests: paxtest FAIL ; libhugetlbfs SKIP
2. Performance test suite: PASS
|
jouhou | Lenovo Thinkpad x1 Carbon 3rd gen | [1] |
1.
At first run, performance tests say "fatal error: rpc/rpc.h: no such directory. Compilation terminated". After installing libntirpc and libtirpc the compilation passes but again, in the end of tests,
I get following error: "/bin/sh: ../scripts/getlist: Permission denied". Although both test suites passed, I don't know if these affect test outcomes or reliability.
|
jphilipp | [1] |
1.
hp compaq elite 8100 i5 4GB
|
|
julroy67 | Dell XPS 7390, Intel(R) Core(TM) i7-10710U CPU | [1] |
1.
100 % passed
|
kokoseij | CPU: Intel I5-4460, RAM: DDR3 12GB, GPU: NVIDIA GeForce GTX 960, OS: Fedora 31 Cinnamon Spin, Upgraded from kernel-stabilization copr | [1] |
1.
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
|
lberton@redhat.com | kerneltest-5.5-x86_64.iso @ ThinkPad T480s | [1] |
1.
Linux localhost-live 5.5.2-200.fc31.x86_64 #1 SMP Thu Feb 6 17:23:27 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
Test suite called with default
./default/paxtest
FAIL
./default/insert_leap_second PASS
./default/selinux-dac-controls PASS
./default/sysfs-perms PASS
./default/modsign PASS
./default/posix_timers PASS
./default/mq-memory-corruption PASS
./default/timer-overhead PASS
./default/cachedrop FAIL
./default/stack-randomness PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
Test suite complete FAIL
|
lewis41 | Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz - RAM 16GB | [1] |
1.
1. Pass
2. Pass
|
macnum | AMD Ryzen 9 3900X 12, ASUS Radeon RX 5600 XT OC, 32 GB hyper-x DDR4 3200Hhz (4x8) | [1] |
1.
./default/mq-memory-corruption PASS
./default/stack-randomness PASS
./default/libhugetlbfs
SKIP
./default/sysfs-perms PASS
./default/insert_leap_second PASS
./default/selinux-dac-controls PASS
./default/cachedrop PASS
./default/modsign PASS
./default/posix_timers PASS
./default/paxtest SKIP
./default/memfd PASS
./default/timer-overhead PASS
Test suite complete PASS
|
malucious | KVM guest with 2GB ram using the test image. i7-6700K. | [1] |
1.
The performance test passed. The first test failed. ./default/libhugetlbfs was skipped. ./default/paxtest failed.
|
marc84 | Testday image VM on Toshiba ideapad Y570 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
masami | i7-9700K(UHD Graphics 630): fedora 31 | [1] |
1.
kernel regression test passed. Works fine for daily use. build and work fine simple kernel module.
|
mharpau | Thinkpad T480s, i5-8250U, iGPU | [1] |
1.
Base and performance all PASSed
|
mimat | w520 i7-2630qm | [1] |
1.
Works for me. No regressions.
|
monot0m | Toshiba X40-D BIOS 3.80 Intel Core i7-7500U CPU @ 2.70GHz × 4 | [1] |
1.
./default/paxtest - FAIL
|
monot0m | Toshiba X40-E BIOS 2.30 Intel Core i5-8250U CPU @ 1.60GHz × 8 | [1] |
1.
./default/paxtest - FAIL
|
mzink@redhat.com | ThinkPad T490s | ||
nmousouros | nmousouros | [1] |
1.
./default/insert_leap_second PASS
./default/cachedrop PASS
./default/selinux-dac-controls
PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/mq-memory-corruption PASS
./default/paxtest PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
./default/modsign PASS
./default/posix_timers PASS
Test suite complete PASS
|
norbertj | Ideapad with Core i3-6006U | [1] |
1.
Default tests pass except paxtest, performance tests pass (after installing missing package libtirpc-devel).
|
norbertj | Old PC with Core i5-750, 4 GB RAM and Radeon HD 6450 | [1] |
1.
Default tests pass except paxtest. No regressions regarding hardware support noted. Performance tests aborted after 3 hours with excessive swapping.
|
ozeszty | AMD Phenom II X2, R5 240 (OLAND using amdgpu), F31 & 5.5.3-200.fc31.x86_64 | [1] |
1.
Default passed (libhugetlbfs and paxtest were skipped), performance passed. Vulnerabilities status looks hopeful: not affected, except for spectre.
|
ozeszty | IvyBridge/AMD 7670m laptop, F30 & 5.5.3-200.fc31.x86_64 | [1] [2] |
1.
Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted. I skipped paxtest skip in the previous entry.
2. Default passed (libhugetlbfs skipped), performance passed. No issues spotted. |
ozeszty | Skylake laptop, 5.5.3-200.fc31.x86_64 | [1] |
1.
Default passed (libhugetlbfs and paxtest were skipped), performance passed. No issues spotted throughout the week.
|
pwhalen | HPE Apollo (cn99xx) - AArch64 | ||
pwhalen | Lenovo HR350A (AArch64) | ||
pwhalen | Mustang (xgene-1) AArch64 | ||
pwhalen | Raspberry Pi 4B (4GB) - AArch64 | [1] |
1.
|
pwhalen | Wandboard Quad (armhfp) | [1] |
1.
./default/insert_leap_second FAIL
|
quiet | Memory: 3.8GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.3, OS: 64-bit, KVM, Disk: 21.5 GB | [1] |
1.
Test suite called with default
./default/cachedrop PASS
./default/modsign PASS
./default/memfd
PASS
./default/timer-overhead PASS
./default/paxtest FAIL
./default/libhugetlbfs SKIP
./default/mq-memory-corruption PASS
./default/sysfs-perms PASS
./default/stack-randomness PASS
./default/posix_timers PASS
./default/insert_leap_second PASS
./default/selinux-dac-controls PASS
Test suite complete FAIL
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
./performance/lmbench3 PASS
Test suite complete PASS
|
rammodulus | Test day Image. Proxmox 5.4 VM; UEFI, 4GB, Common KVM Procs x 4, llvmpipe graphics | [1] |
1.
Both tests passed
|
rotwild | Intel i5 460M, ATI Radeon HD 5650, 4GB RAM | [1] |
1.
1. paxtest FAIL sysfs-perms WARN Performance test suite PASS
|
roypen | Thinkpad T430, Intel i5-3320M, 8 GB RAM | [1] [2] |
1.
2. Performance Test suite - PASS
2. 1. ./default/libhugetbfs - SKIP ; ./default/paxtest - FAIL |
sayaksarkar | Lenovo T460s 20G [Boxes - Memory 2GiB, CPUs: 4] | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
sbakker | Dell XPS 13 9360; Intel Core i7-7560U @2.40GHz x 4; Intel Iris Plus Graphics 640 (Kaby Lake GT3e), driver i915; Memory: 16GB; Disk: 512GB SSD (THNSN55 12GPUK NVMe TOSHIBA) | [1] [2] |
1.
#1803706,
1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected |
shiwanibiradar | lenevo ideapad330 , fedora31 on kvm , intel i5 ,8GB RAM | [1] |
1.
./default/paxtest:SKIP & ./default/libhugetlbfs:SKIP overall both are pass
|
simobonfo | QEMU/KVM 4GB RAM 20 GB disk on Lenovo Ideapad 100 15-IBD with kerneltest-5.5.3.iso (Updated at 2020-02-12) | [1] |
1.
./runtests.sh:
./default/posix_timers-->PASS
./default/cachedrop-->FAIL
./default/paxtest -->FAIL
./default/stack-randomness-->PASS
./default/mq-memory-corruption -->PASS
./default/libhugetlbfs-->SKIP
./default/selinux-dac-controls-->PASS
./default/insert_leap_second -->PASS
./default/timer-overhead -->PASS
./default/sysfs-perms-->PASS
./default/modsign-->PASS
./default/memfd -->PASS
Test complete -->FAIL
./runtests.sh -t performance make the terminal crash
|
slushur | Ryzen 7 1700, 32GB RAM, RX 580 | [1] |
1.
./default/paxtest SKIP
./default/libhugetlbfs SKIP
|
snip4 | Intel Core i7-7800X, ASUS TUF X299 MARK 2, 32GB RAM, NVIDIA RTX 2070, Test 5.5 image clean install. | [1] |
1.
libhugetlbfs & paxtest: SKIP // Since kernel 5.4 series, can't reboot, system hangs. Only boot correctly when force power off switch, and on again.
|
stklcode | qemu (intel Skylake-X, 12-core/16GB guest specs F31 Host) | ||
str8edgedave | HP Elitedesk core i7-4770 16GB RAM | [1] |
1.
$ sudo ./runtests.sh
Test suite called with default
./secureboot/check_SB_signature PASS
./default/cachedrop
PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
----
$./runtests.sh -t performance
Test suite called with performance
./secureboot/check_SB_signature FAIL
Using config in CONFIG.stc0042699.stholdco.com
Tue Feb 11 10:54:11 CST 2020
Latency measurements
Tue Feb 11 10:55:35 CST 2020
Calculating file system latency
Tue Feb 11 10:55:38 CST 2020
Local networking
Tue Feb 11 10:59:19 CST 2020
Bandwidth measurements
Tue Feb 11 11:05:47 CST 2020
Calculating context switch overhead
Tue Feb 11 11:05:52 CST 2020
./performance/lmbench3 PASS
Test suite complete FAIL
|
suprith4989 | KVM/QEMU Dell r730, 2GB RAM | [1] |
1.
./default/posix_timers PASS ; ./default/cachedrop PASS ; ./default/paxtest FAIL ; ./default/stack-randomness PASS ; ./default/mq-memory-corruption PASS ; ./default/libhugetlbfs SKIP ;
./default/selinux-dac-controls PASS ; ./default/insert_leap_second PASS ; ./default/timer-overhead PASS ; ./default/sysfs-perms PASS ; ./default/modsign PASS ; ./default/memfd PASS ;
Test suite complete FAIL
./performance/lmbench3 PASS
Test suite complete PASS
|
t3rm1n4l | Dell Inspiron 3180 11" | [1] |
1.
libhugetlbfs: SKIP
paxtest: SKIP
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not
affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
temjin747 | Host: Fedora 31 KDE Spin x86_64 kernel 5.4.18-200.fc31.x86_64 running on HP Envy x360, AMD Ryzen 5 2500U APU. VM: Test Day Image on QEMU-KVM version 4 .1.1/KVM (2 vCPUs, 2 GB RAM) | ||
tjamadeira@gmal.com | VM Fedora 31 in Intel Core i5-4210U CPU @ 1.70GHz*4; LLVM 9.0, 256 bits; gnome 3.34.3; 64-bit | [1] |
1.
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split
huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vipul0 | Lenovo i5-6300U CPU@2.40GHz 32GB RAM | [1] |
1.
Run test
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance test
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vipul0 | QA | [1] |
1.
Run test Result ::
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Perdormance Result ::
sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vishalvvr | qemu/kvm 2GB 20GB, 5.5.2-200.fc31.x86_64 | [1] |
1.
1. default test suite: FAIL
./default/paxtest FAIL
./default/libhugetlbfs SKIP
|
wessle | kerneltest-5.5-x86_64.iso on Boxes VM with defaults; CPU: AMD Ryzen Threadripper 2950X (16 cores @ 3.5GHz); GPU: nvidia GeForce RTX 2070 super | ||
willo | 8GB Memory Virtualbox VM on an Intel NUC - Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz | [1] |
1.
cachedrop, libhugetlbfs, selinux-dac-controls, insert_leap_second, modsign SKIP the rest passed for both default and performance
|
ywatanabe | HOST OS: fedora28 , CPU: Intel(R) Core(TM) i5-4570S CPU @ 2.90GHz , MEM: 16 GB , KERNEL: Linux fedora 4.20.8-100.fc28.x86_64 , KVM: qemu-kvm-2.11.2-4 .fc28.x86_64 , TESTIMG_USED: kerneltest-5.5-x86_64.iso (Downloaded on Feb 12 23:05 JST) | [1] |
1.
default test: FAILED (Failed after doing step 3 and 4 of https://fedoraproject.org/wiki/QA:Testcase_kernel_regression#Setup )
performance test: PASS
|