User
|
Profile
|
Regression
|
References
|
JoeHannes
|
Asus N82JQ
|
fail [2]
|
- ↑ this is just an example
- ↑ Date: Tue 14 Apr 2020 01:01:46 PM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
|
Mac tester
|
Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U
|
fail [1]
|
- ↑ Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
Performance: terminal session is killed during the test.
|
Smyleon
|
Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600
|
warn [1]
|
- ↑ 1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP).
2. Performance: PASS.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
alciregi
|
Dell XPS 13 9360, Intel i7-7500U
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Raspberry Pi 3 aarch64 (Fedora-IoT)
|
pass [1]
|
|
alciregi
|
Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Toshiba Portege R930-1H9, Intel i5-3340M
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amado86
|
Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
|
fail [1]
|
- ↑ 1. ./default/timer-overhead FAIL
Unacceptable long delay; asked for 2000 usec, got 6136 usec
Test failure.
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amado86
|
Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10)
|
fail [1]
|
- ↑ Standard tests = FAIL
./default/timer-overhead FAIL
Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever)
Performance tests = PASS.
|
anonymous
|
Acer Aspire A315-42
|
fail [1]
|
- ↑ 1. kernel-test-1586714524.log.txt
./default/libhugetlbfs SKIP
./default/cachedrop FAIL
./default/paxtest FAIL
|
anonymous
|
Lenovo ThinkPad W530
|
fail [1]
|
- ↑ Date: Mon 13 Apr 2020 11:03:24 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: None
================================================[edit]
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
insmod: ERROR: could not insert module ./minix.ko: Operation not permitted
Unsigned module load failed in enforcing mode
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc timer-test.o -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
67 | r = fcntl(fd, F_GET_SEALS);
| ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
190 | r = open(buf, flags, mode);
| ^~~~
| popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
315 | r = fallocate(fd,
| ^~~~~~~~~
| alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Executable heap (mprotect) : Vulnerable
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Mon Apr 13 19:59:50 2020
Scheduling leap second for Mon Apr 13 20:00:00 2020
Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS
Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS
Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS
Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP
Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP
Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT
Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT
Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT
Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT
Leap complete
|
anonymous
|
Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
|
fail [1]
|
- ↑ Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
archmunky
|
installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
|
pass [1]
|
- ↑ default = PASS, performance = PASS
|
archmunky
|
installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon
|
pass [1]
|
- ↑ installed, no updates: default = PASS, performance = PASS;
installed, updated: default = PASS , performance = PASS
|
archmunky
|
liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon
|
fail [1]
|
- ↑ default = fail on cachedrop, paxtest;
performance = pass with getlist and getsummary permission denied errors
|
atim
|
CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64
|
pass [1]
|
- ↑ All tests passed and all OK.
|
augenauf
|
F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s
|
pass [1]
|
- ↑ kernel: 5.6.2-301.fc32.x86_64
|
didiksupriadi41
|
liveusb on ASUS X550ZE
|
pass [1] fail [2]
|
- ↑ Performance test suite
- ↑ Default test suite : paxtest Failed
|
drakkai
|
Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31
|
pass [1]
|
- ↑ default = PASS, performance = PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
dvdantunes
|
kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB
|
fail [1]
|
- ↑ Test suite: default
Date: Sun 19 Apr 2020 02:44:30 AM EDT
Kernel version: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests:
./default/cachedrop
./default/paxtest
Additional info:
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
evillagr
|
RAM: 16GB
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
evillagr
|
guest:AMD Opteron 63xx class CPU)
|
fail [1]
|
- ↑ libhugetlbfs SKIP, paxtest FAIL
|
fubuki
|
bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G
|
pass [1]
|
- ↑ Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
|
garrmcnu
|
Test image on VM (KVM)
|
fail [1]
|
|
gkaukola
|
HP Pavilion dv6
|
pass
|
|
greenid
|
HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4
|
pass [1]
|
- ↑ ulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ibims
|
Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM
|
pass [1]
|
- ↑ Test suite called with default
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/mq-memory-corruption PASS
./default/cachedrop PASS
./default/memfd PASS
./default/insert_leap_second PASS
./default/paxtest SKIP
./default/selinux-dac-controls SKIP
./default/modsign PASS
./default/posix_timers PASS
Test suite complete PASS
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
jobus
|
HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
|
fail [1]
|
- ↑ Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
jobus
|
Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image
|
fail [1]
|
- ↑ Date: Tue 14 Apr 2020 11:16:57 PM CEST
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: ./default/sysfs-perms
Date: Tue 14 Apr 2020 11:26:16 PM CEST
Test set: performance
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: PASS
Failed Tests: None
Warned Tests: None
|
joecastrop
|
ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image
|
pass [1]
|
- ↑ RHBZ #1562347 Test suite called with default: All test pass except ./default/paxtest
Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
38 | #include <rpc/rpc.h>
https://bugzilla.redhat.com/show_bug.cgi?id=1562347
Library already installed:
Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.
|
jpesco
|
HP Elite 8300 Intel® Core™ i5-3470
|
pass
|
|
kiko964
|
ASUS X554L Intel Core i3-5010U
|
fail [1]
|
- ↑ Date: Tue 14 Apr 2020 07:06:47 AM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/cachedrop
Warned Tests: None
================================================[edit]
Starting test ./default/sysfs-perms
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestError: Can't free dentries and inodes
395696 395184
Could not run tests
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/timer-overhead
cc timer-test.o -o timer-test
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/stack-randomness
Starting test ./default/memfd
memfd_test.c: In function ‘mfd_assert_get_seals’:
memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration]
67 | r = fcntl(fd, F_GET_SEALS);
| ^~~~~
memfd_test.c: In function ‘mfd_assert_open’:
memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration]
190 | r = open(buf, flags, mode);
| ^~~~
| popen
memfd_test.c: In function ‘mfd_assert_write’:
memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration]
315 | r = fallocate(fd,
| ^~~~~~~~~
| alloca
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/paxtest
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Tue Apr 14 19:59:50 2020
Scheduling leap second for Tue Apr 14 20:00:00 2020
Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS
Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS
Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS
Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP
Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP
Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT
Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT
Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT
Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT
Leap complete
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
kle
|
testkernel ISO on KVM (Host: Lenovo Thinkpad T480)
|
pass [1]
|
- ↑ 1. Performance test suite: PASSED
2. Default test suite: PASSED
|
lbrabec
|
F32, Lenovo T480s (i7-8650U)
|
fail [1]
|
- ↑ ./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
lfc
|
RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
liwan
|
HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space
|
pass [1]
|
|
luya
|
HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM
|
pass
|
|
makelix
|
Lenovo ThinkPad T470s
|
fail [1]
|
- ↑ libhugetlbfs SKIP, paxtest FAIL
|
makelix
|
Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz)
|
fail [1]
|
- ↑ libhugetlbfs SKIP, paxtest FAIL
|
malucious
|
Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta
|
pass [1]
|
- ↑ ./default/libhugetlbfs and ./default/paxtest were skipped.
|
marc84
|
USB kerneltest-5.6.3.iso on Lenovo ideapad Y570
|
warn [1]
|
- ↑ Running Both Basic and Performance test
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
mharpau
|
Thinkpad T480s, i5-8250U, iGPU
|
pass [1]
|
- ↑ everything working as expected
|
molli123
|
E3-1240 v6, 32GB, 1060 with nouveau driver
|
pass [1]
|
- ↑ everything working as expected
|
mosesdenny
|
|
pass [1]
|
- ↑ Test suite called with default
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/posix_timers PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/insert_leap_second PASS
Test suite complete PASS
Thu 16 Apr 2020 04:11:15 PM EDT
./performance/lmbench3 PASS
Test suite complete PASS
|
nasirhm
|
KVM on X1-Carbon
|
fail [1]
|
- ↑ ./default/paxtest FAIL
./default/libhugetlbfs SKIP
|
nchudnoff
|
Guest: 6 GB RAM)
|
pass [1]
|
- ↑ All passed (libhugetlbfs SKIP, paxtest SKIP)
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
nielsenb
|
HP Compaq 8510w Intel T9300 AMD RV630
|
pass [1]
|
- ↑ Performance test suite
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
norbertj
|
Ideapad with Core i3-6006U and 8 GB memory
|
fail [1]
|
- ↑ paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
|
norbertj
|
Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450
|
fail [1]
|
- ↑ paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
|
novicejava1
|
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
pfrenard
|
Dell Inspiron 7000 (i7-7500U)
|
fail [1]
|
- ↑ ./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED
|
quiet
|
Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB
|
fail [1]
|
- ↑ Default test suite
./default/paxtest FAIL
Performance PASS
|
roypen
|
Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM
|
pass [1] pass [2]
|
- ↑ Performance test suite: PASSED
- ↑ Default test suite: PASSED
|
sassam
|
Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+
|
pass [1]
|
- ↑ Works for me. Regression tests passed on both devices.
|
simobonfo
|
kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u
|
fail [1]
|
- ↑ ########## ./runtests.sh ##########
All PASS exept:
./default/libhugetlbfs SKIP
./default/paxtest FAIL
Test suite complete FAIL
- ./runtests.sh -t performance ##########
Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied.
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
|
stathisl
|
ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned
|
fail [1]
|
- ↑ Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL.
Date: Mon 13 Apr 2020 12:31:38 PM EDT
Test set: default
Kernel: 5.6.3-300.fc31.x86_64
Release: Fedora release 31 (Thirty One)
Result: FAIL
Failed Tests: ./default/paxtest
Warned Tests: None
|
suve
|
AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta
|
pass [1]
|
- ↑ Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.
|
tgerov
|
ThinkPad t480s, i7-8550U, 16G
|
fail [1]
|
- ↑ ./default/libhugetlbfs SKIP
./default/paxtest FAIL
|
theunrealgeek
|
Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date
|
pass [1]
|
- ↑ Kernel: 5.6.3-300.fc32.x86_64
Both regular and performance tests pass and has uploaded results automatically as well.
|
thuzzik
|
|
pass
|
|
thuzzik
|
Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
udb28
|
Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram:4096
|
fail [1]
|
- ↑ ./default/paxtest FAIL
Vulnerability status:
spec_store_bypass: Vulnerable
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling
|
udb28
|
Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2
|
pass [1]
|
- ↑ Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64
|
visitor
|
Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO
|
pass [1]
|
- ↑ first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP
|