Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
JoeHannes | Asus N82JQ | [1] |
1.
Date: Tue 14 Apr 2020 01:01:46 PM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests:
./default/sysfs-perms
|
Mac tester | Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U | [1] |
1.
Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
Performance: terminal session is killed during the test.
|
Smyleon | Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600 | [1] |
1.
1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
2. Performance: PASS.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge
pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
alciregi | Dell XPS 13 9360, Intel i7-7500U | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Raspberry Pi 3 aarch64 (Fedora-IoT) | [1] |
1.
5.6.3-300.fc32.aarch64
|
alciregi | Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Toshiba Portege R930-1H9, Intel i5-3340M | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amado86 | Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) | [1] |
1.
1. ./default/timer-overhead FAIL
Unacceptable long delay; asked for 2000 usec, got 6136 usec
Test failure.
Had to disable Guest Additions Time
Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amado86 | Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) | [1] |
1.
Standard tests = FAIL
./default/timer-overhead FAIL
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this
forever)
Performance tests = PASS.
|
anonymous | Acer Aspire A315-42 | [1] |
1.
1. kernel-test-1586714524.log.txt
./default/libhugetlbfs SKIP
./default/cachedrop FAIL
./default/paxtest
FAIL
|
anonymous | Lenovo ThinkPad W530 | [1] |
1.
Date: Mon 13 Apr 2020 11:03:24 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests:
None
============================================================
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
insmod: ERROR: could not insert module ./minix.ko: Operation not permitted
Unsigned module load failed in enforcing mode
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc timer-test.o -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
67 | r = fcntl(fd, F_GET_SEALS);
| ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
190 | r = open(buf, flags, mode);
| ^~~~
| popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
315 | r = fallocate(fd,
| ^~~~~~~~~
| alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Executable heap (mprotect) : Vulnerable
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Mon Apr 13 19:59:50 2020
Scheduling leap second for Mon Apr 13 20:00:00 2020
Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS
Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP
Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP
Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT
Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT
Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT
Leap complete
|
anonymous | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | [1] |
1.
Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests:
./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
archmunky | installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon | [1] |
1.
default = PASS, performance = PASS
|
archmunky | installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon | [1] |
1.
installed, no updates: default = PASS, performance = PASS;
installed, updated: default = PASS , performance = PASS
|
archmunky | liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon | [1] |
1.
default = fail on cachedrop, paxtest;
performance = pass with getlist and getsummary permission denied errors
|
atim | CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64 | [1] |
1.
All tests passed and all OK.
|
augenauf | F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s | [1] |
1.
kernel: 5.6.2-301.fc32.x86_64
|
chuhu | x86_64 kvm guest | [1] [2] |
1.
Run process regression tests, result is good
2. Run process regression tests, result is good |
didiksupriadi41 | liveusb on ASUS X550ZE | [1] [2] |
1.
Performance test suite
2. Default test suite : paxtest Failed |
drakkai | Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31 | [1] |
1.
default = PASS, performance = PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge
pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
dvdantunes | kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB | [1] |
1.
Test suite: default
Date: Sun 19 Apr 2020 02:44:30 AM EDT
Kernel version: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests:
./default/cachedrop
./default/paxtest
Additional info:
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
evillagr | CPU: AMD FX(tm)-8320 Eight-Core Processor | RAM: 16GB | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
evillagr | KVM (host: AMD FX(tm)-8320 Eight-Core Processor | guest:AMD Opteron 63xx class CPU) | [1] |
1.
libhugetlbfs SKIP, paxtest FAIL
|
fubuki | bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G | [1] |
1.
Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
|
garrmcnu | Test image on VM (KVM) | [1] |
1.
./default/paxtest FAIL
|
gkaukola | HP Pavilion dv6 | ||
greenid | HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4 | [1] |
1.
ulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not
necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ibims | Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM | [1] |
1.
Test suite called with default
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/mq-memory-corruption PASS
./default/cachedrop PASS
./default/memfd PASS
./default/insert_leap_second PASS
./default/paxtest SKIP
./default/selinux-dac-controls SKIP
./default/modsign PASS
./default/posix_timers PASS
Test suite complete PASS
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
jobus | HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | [1] |
1.
Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests:
./default/sysfs-perms
------------------------------------------------------
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
jobus | Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image | [1] |
1.
Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests:
./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
joecastrop | ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image | [1] |
1.
#1562347,
Test suite called with default: All test pass except ./default/paxtest
Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
38 | #include
<rpc/rpc.h>
https://bugzilla.redhat.com/show_bug.cgi?id=1562347
Library already installed:
Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.
|
jpesco | HP Elite 8300 Intel® Core™ i5-3470 | ||
kiko964 | ASUS X554L Intel Core i3-5010U | [1] |
1.
Date: Tue 14 Apr 2020 07:06:47 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/cachedrop
Warned Tests:
None
============================================================
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestError: Can't free dentries and inodes
395696 395184
Could not run tests
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc timer-test.o -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
67 | r = fcntl(fd, F_GET_SEALS);
| ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
190 | r = open(buf, flags, mode);
| ^~~~
| popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
315 | r = fallocate(fd,
| ^~~~~~~~~
| alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Tue Apr 14 19:59:50 2020
Scheduling leap second for Tue Apr 14 20:00:00 2020
Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS
Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP
Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP
Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT
Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT
Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT
Leap complete
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
kle | testkernel ISO on KVM (Host: Lenovo Thinkpad T480) | [1] |
1.
1. Performance test suite: PASSED
2. Default test suite: PASSED
|
lbrabec | F32, Lenovo T480s (i7-8650U) | [1] |
1.
./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge
pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
lfc | Intel® Core™ i7-6700 CPU @ 3.40GHz × 8 | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not
necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
liwan | HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space | [1] |
1.
ltp/lite
|
luya | HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM | ||
makelix | Lenovo ThinkPad T470s | [1] |
1.
libhugetlbfs SKIP, paxtest FAIL
|
makelix | Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz) | [1] |
1.
libhugetlbfs SKIP, paxtest FAIL
|
malucious | Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta | [1] |
1.
./default/libhugetlbfs and ./default/paxtest were skipped.
|
marc84 | USB kerneltest-5.6.3.iso on Lenovo ideapad Y570 | [1] |
1.
Running Both Basic and Performance test
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge
pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
mharpau | Thinkpad T480s, i5-8250U, iGPU | [1] |
1.
everything working as expected
|
molli123 | E3-1240 v6, 32GB, 1060 with nouveau driver | [1] |
1.
everything working as expected
|
mosesdenny | [1] |
1.
Test suite called with default
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/posix_timers PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/insert_leap_second PASS
Test suite complete PASS
Thu 16 Apr 2020 04:11:15 PM EDT
./performance/lmbench3 PASS
Test suite complete PASS
|
|
nasirhm | KVM on X1-Carbon | [1] |
1.
./default/paxtest FAIL
./default/libhugetlbfs SKIP
|
nchudnoff | KVM (Host: AMD Phenom II X4 B93 CPU | Guest: 6 GB RAM) | [1] |
1.
All passed (libhugetlbfs SKIP, paxtest SKIP)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not
affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
nielsenb | HP Compaq 8510w Intel T9300 AMD RV630 | [1] |
1.
Performance test suite
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
norbertj | Ideapad with Core i3-6006U and 8 GB memory | [1] |
1.
paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
|
norbertj | Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450 | [1] |
1.
paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
|
novicejava1 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
|
pfrenard | Dell Inspiron 7000 (i7-7500U) | [1] |
1.
./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED
|
qima | x86_64 kvm guest 5.6.4-300.fc32 | [1] |
1.
/kernel/vm/hugepage/libhugetlbfs
|
quiet | Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB | [1] |
1.
Default test suite
./default/paxtest FAIL
Performance PASS
|
roypen | Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM | [1] [2] |
1.
Performance test suite: PASSED
2. Default test suite: PASSED |
sassam | Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+ | [1] |
1.
Works for me. Regression tests passed on both devices.
|
simobonfo | kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u | [1] |
1.
########## ./runtests.sh ##########
All PASS exept:
./default/libhugetlbfs SKIP
./default/paxtest
FAIL
Test suite complete FAIL
########## ./runtests.sh -t performance ##########
Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied.
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
|
stathisl | ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned | [1] |
1.
Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL.
Date: Mon 13 Apr 2020 12:31:38 PM EDT
Test set: default
Kernel:
5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: None
|
suve | AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta | [1] |
1.
Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.
|
tgerov | ThinkPad t480s, i7-8550U, 16G | [1] |
1.
./default/libhugetlbfs SKIP
./default/paxtest FAIL
|
theunrealgeek | Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date | [1] |
1.
Kernel: 5.6.3-300.fc32.x86_64
Both regular and performance tests pass and has uploaded results automatically as well.
|
thuzzik | |||
thuzzik | Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not
necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
udb28 | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram: 4096 | [1] |
1.
./default/paxtest FAIL
Vulnerability status:
spec_store_bypass: Vulnerable
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v1:Mitigration: Full AMD
retpoline, STIBP: disabled, RSB filling
|
udb28 | Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 | [1] |
1.
Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64
|
vishald | Liveusb Fedora test day image 5.6.3 on dell laptop i3 5000 series | [1] |
1.
Default: FAIL (paxtext=FAIL, libhugetlbfs =SKIP). Performance: terminal session is killed during the test
|
visitor | Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO | [1] |
1.
first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP
|