Kernel 5.6 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2020-04-13_Kernel_5.6_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
JoeHannes Asus N82JQ [1] 1. Date: Tue 14 Apr 2020 01:01:46 PM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms
Mac tester Liveusb Fedora test day image 5.6.3 on HP laptop i5-7200U [1] 1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). Performance: terminal session is killed during the test.
Smyleon Liveusb Fedora test day image 5.6.3 on custom desktop i5-6600 [1] 1. 1. Default: FAIL (paxtext=FAIL, libhugetlbfs=SKIP). 2. Performance: PASS. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
alciregi Dell XPS 13 9360, Intel i7-7500U [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 aarch64 (Fedora-IoT) [1] 1. 5.6.3-300.fc32.aarch64
alciregi Sun Fire X4140 Six-Core AMD Opteron(tm) Processor 2427 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-1H9, Intel i5-3340M [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amado86 Kerneltest ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) [1] 1. 1. ./default/timer-overhead FAIL Unacceptable long delay; asked for 2000 usec, got 6136 usec Test failure. Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amado86 Silverblue Fedora 32 nightlies ISO as Virtualbox 6.1 Guest VM (4GB / 2 processors) on Dell Latitude 5590 Host (Win10) [1] 1. Standard tests = FAIL ./default/timer-overhead FAIL Had to disable Guest Additions Time Synchronization for ./default/insert_leap_second test to run (otherwise got stuck in this forever) Performance tests = PASS.
anonymous Acer Aspire A315-42 [1] 1. 1. kernel-test-1586714524.log.txt ./default/libhugetlbfs SKIP ./default/cachedrop FAIL ./default/paxtest FAIL
anonymous Lenovo ThinkPad W530 [1] 1. Date: Mon 13 Apr 2020 11:03:24 AM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: None ============================================================ Starting test ./default/sysfs-perms Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module insmod: ERROR: could not insert module ./minix.ko: Operation not permitted Unsigned module load failed in enforcing mode Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.037024 s, 2.8 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.0086352 s, 1.2 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/timer-overhead cc timer-test.o -o timer-test Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/stack-randomness Starting test ./default/memfd memfd_test.c: In function ‘mfd_assert_get_seals’: memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration] 67 | r = fcntl(fd, F_GET_SEALS); | ^~~~~ memfd_test.c: In function ‘mfd_assert_open’: memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration] 190 | r = open(buf, flags, mode); | ^~~~ | popen memfd_test.c: In function ‘mfd_assert_write’: memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration] 315 | r = fallocate(fd, | ^~~~~~~~~ | alloca memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/paxtest Executable heap (mprotect) : Vulnerable Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop Setting time to Mon Apr 13 19:59:50 2020 Scheduling leap second for Mon Apr 13 20:00:00 2020 Mon Apr 13 19:59:57 2020 + 97 us (0) TIME_INS Mon Apr 13 19:59:57 2020 + 500253 us (0) TIME_INS Mon Apr 13 19:59:58 2020 + 429 us (0) TIME_INS Mon Apr 13 19:59:58 2020 + 500590 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 748 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 500905 us (0) TIME_INS Mon Apr 13 19:59:59 2020 + 1037 us (1) TIME_OOP Mon Apr 13 19:59:59 2020 + 501196 us (1) TIME_OOP Mon Apr 13 20:00:00 2020 + 1312 us (1) TIME_WAIT Mon Apr 13 20:00:00 2020 + 501492 us (1) TIME_WAIT Mon Apr 13 20:00:01 2020 + 1810 us (1) TIME_WAIT Mon Apr 13 20:00:01 2020 + 501966 us (1) TIME_WAIT Mon Apr 13 20:00:02 2020 + 2124 us (1) TIME_WAIT Leap complete
anonymous Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image [1] 1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
archmunky installed, no updates: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon [1] 1. default = PASS, performance = PASS
archmunky installed: CPU: i5-6600k, RAM: 32G, GPU: RX580, MB: MSI Gaming Pro Carbon [1] 1. installed, no updates: default = PASS, performance = PASS; installed, updated: default = PASS , performance = PASS
archmunky liveimage on bare metal: CPU: i5-6600k, RAM: 32GB, GPU: RX 580, MB: MSI Gaming Pro Carbon [1] 1. default = fail on cachedrop, paxtest; performance = pass with getlist and getsummary permission denied errors
atim CPU: Quad Core AMD Athlon X4 845; NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 440.64 [1] 1. All tests passed and all OK.
augenauf F32 beta (nightly build) in Gnome Boxes on Thinkpad T440s [1] 1. kernel: 5.6.2-301.fc32.x86_64
chuhu x86_64 kvm guest [1] [2] 1. Run process regression tests, result is good
2. Run process regression tests, result is good
didiksupriadi41 liveusb on ASUS X550ZE [1] [2] 1. Performance test suite
2. Default test suite : paxtest Failed
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F31 [1] 1. default = PASS, performance = PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
dvdantunes kerneltest-5.6.3.iso run with Boxes 3.34.4-stable on Fedora 31 (5.5.5-200.fc31.x86_64), HP EliteBook 830 G5, Disk: SSD M.2 KXG50ZNV256G TOSHIBA, RAM: 16 GB [1] 1. Test suite: default Date: Sun 19 Apr 2020 02:44:30 AM EDT Kernel version: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/cachedrop ./default/paxtest Additional info: Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
evillagr CPU: AMD FX(tm)-8320 Eight-Core Processor | RAM: 16GB [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
evillagr KVM (host: AMD FX(tm)-8320 Eight-Core Processor | guest:AMD Opteron 63xx class CPU) [1] 1. libhugetlbfs SKIP, paxtest FAIL
fubuki bare metal, i5-4460, 16 GiB DDR3-1600, RX580-4G [1] 1. Linux desktop 5.6.3-300.fc31.x86_64 #1 SMP Thu Apr 9 20:18:55 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
garrmcnu Test image on VM (KVM) [1] 1. ./default/paxtest FAIL
gkaukola HP Pavilion dv6
greenid HP ProBook - Intel® Core™ i7-4610M CPU @ 3.00GHz × 4 [1] 1. ulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ibims Lenovo T420 Intel Core i5-2520M, Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915, 8GB RAM [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/memfd PASS ./default/insert_leap_second PASS ./default/paxtest SKIP ./default/selinux-dac-controls SKIP ./default/modsign PASS ./default/posix_timers PASS Test suite complete PASS The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
jobus HP Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image [1] 1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms ------------------------------------------------------ Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
jobus Toshiba Satellite Pro L770 - 14N / Intel® Core™ i3-2350M CPU @ 2.30GHz × 4 / 8GB RAM / Using Kerneltest ISO Image [1] 1. Date: Tue 14 Apr 2020 11:16:57 PM CEST Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: ./default/sysfs-perms Date: Tue 14 Apr 2020 11:26:16 PM CEST Test set: performance Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: PASS Failed Tests: None Warned Tests: None
joecastrop ASUS FX504GE - https://linux-hardware.org/?probe=25e23d0bf7 Using ISO image [1] 1. #1562347, Test suite called with default: All test pass except ./default/paxtest Performance test fail: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> https://bugzilla.redhat.com/show_bug.cgi?id=1562347 Library already installed: Package libtirpc-1.2.5-1.rc2.fc31.x86_64 is already installed.
jpesco HP Elite 8300 Intel® Core™ i5-3470
kiko964 ASUS X554L Intel Core i3-5010U [1] 1. Date: Tue 14 Apr 2020 07:06:47 AM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/cachedrop Warned Tests: None ============================================================ Starting test ./default/sysfs-perms Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0772849 s, 1.4 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestError: Can't free dentries and inodes 395696 395184 Could not run tests Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/timer-overhead cc timer-test.o -o timer-test Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/stack-randomness Starting test ./default/memfd memfd_test.c: In function ‘mfd_assert_get_seals’: memfd_test.c:67:6: warning: implicit declaration of function ‘fcntl’ [-Wimplicit-function-declaration] 67 | r = fcntl(fd, F_GET_SEALS); | ^~~~~ memfd_test.c: In function ‘mfd_assert_open’: memfd_test.c:190:6: warning: implicit declaration of function ‘open’; did you mean ‘popen’? [-Wimplicit-function-declaration] 190 | r = open(buf, flags, mode); | ^~~~ | popen memfd_test.c: In function ‘mfd_assert_write’: memfd_test.c:315:6: warning: implicit declaration of function ‘fallocate’; did you mean ‘alloca’? [-Wimplicit-function-declaration] 315 | r = fallocate(fd, | ^~~~~~~~~ | alloca memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/paxtest Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop Setting time to Tue Apr 14 19:59:50 2020 Scheduling leap second for Tue Apr 14 20:00:00 2020 Tue Apr 14 19:59:57 2020 + 184 us (37) TIME_INS Tue Apr 14 19:59:57 2020 + 500330 us (37) TIME_INS Tue Apr 14 19:59:58 2020 + 493 us (37) TIME_INS Tue Apr 14 19:59:58 2020 + 500691 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 827 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 500999 us (37) TIME_INS Tue Apr 14 19:59:59 2020 + 1231 us (38) TIME_OOP Tue Apr 14 19:59:59 2020 + 501420 us (38) TIME_OOP Tue Apr 14 20:00:00 2020 + 1662 us (38) TIME_WAIT Tue Apr 14 20:00:00 2020 + 501949 us (38) TIME_WAIT Tue Apr 14 20:00:01 2020 + 2251 us (38) TIME_WAIT Tue Apr 14 20:00:01 2020 + 502563 us (38) TIME_WAIT Tue Apr 14 20:00:02 2020 + 2745 us (38) TIME_WAIT Leap complete Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kle testkernel ISO on KVM (Host: Lenovo Thinkpad T480) [1] 1. 1. Performance test suite: PASSED 2. Default test suite: PASSED
lbrabec F32, Lenovo T480s (i7-8650U) [1] 1. ./default/cachedrop FAIL, ./default/paxtest SKIP, ./default/libhugetlbfs SKIP. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
lfc Intel® Core™ i7-6700 CPU @ 3.40GHz × 8 | RAM: 8 GiB | Disk Capacity: 21.5 GB | Windowing System: Wayland [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
liwan HP DX2300 Intel(R) Celeron(R) CPU 2.80GHz 4096 MB memory, 80 GB disk space [1] 1. ltp/lite
luya HP Envy x360 Convertible cp0xxx Ryzen 5 2500u with 16GB RAM
makelix Lenovo ThinkPad T470s [1] 1. libhugetlbfs SKIP, paxtest FAIL
makelix Lenovo ThinkPad X201 (Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz) [1] 1. libhugetlbfs SKIP, paxtest FAIL
malucious Asus Z170A i7-6700K, 16GB RAM Fedora 32 Workstation Beta [1] 1. ./default/libhugetlbfs and ./default/paxtest were skipped.
marc84 USB kerneltest-5.6.3.iso on Lenovo ideapad Y570 [1] 1. Running Both Basic and Performance test Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
mharpau Thinkpad T480s, i5-8250U, iGPU [1] 1. everything working as expected
molli123 E3-1240 v6, 32GB, 1060 with nouveau driver [1] 1. everything working as expected
mosesdenny [1] 1. Test suite called with default ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS Test suite complete PASS Thu 16 Apr 2020 04:11:15 PM EDT ./performance/lmbench3 PASS Test suite complete PASS
nasirhm KVM on X1-Carbon [1] 1. ./default/paxtest FAIL ./default/libhugetlbfs SKIP
nchudnoff KVM (Host: AMD Phenom II X4 B93 CPU | Guest: 6 GB RAM) [1] 1. All passed (libhugetlbfs SKIP, paxtest SKIP) Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 [1] 1. Performance test suite Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
norbertj Ideapad with Core i3-6006U and 8 GB memory [1] 1. paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
norbertj Old desktop PC with Core i5-750, 4 GB memory and Radeon HD6450 [1] 1. paxtest FAIL, libhugetlbfs SKIP, rest of default test suite PASS. Seems to work besides of that.
novicejava1 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
pfrenard Dell Inspiron 7000 (i7-7500U) [1] 1. ./default/libhugetlbfs SKIPPED, ./default/paxtest SKIPPED
qima x86_64 kvm guest 5.6.4-300.fc32 [1] 1. /kernel/vm/hugepage/libhugetlbfs
quiet Memory: 4.7GiB, CPU: 2x Skylake, IBRS GPU: llvmpipe (LLVM 9.0, 256 bits), GNOME: Version 3.34.5, OS: 64-bit, KVM, Disk: 21.5 GB [1] 1. Default test suite ./default/paxtest FAIL Performance PASS
roypen Fedora 32 on ThinkPad T430 I5-3320M 8GB RAM [1] [2] 1. Performance test suite: PASSED
2. Default test suite: PASSED
sassam Thinkpad T440s (Intel Core i7-4600U), and Raspberry Pi 3B+ [1] 1. Works for me. Regression tests passed on both devices.
simobonfo kerneltest-5.6.3.iso image running using KVM on Lenovo Ideapad 100, core i5 5200u [1] 1. ########## ./runtests.sh ########## All PASS exept: ./default/libhugetlbfs SKIP ./default/paxtest FAIL Test suite complete FAIL ########## ./runtests.sh -t performance ########## Command run with sudo, before doing the test the command "sudo semanage boolean -m --on selinuxuser_execheap" was performed, this is the final result, PASS but with 2 Permission denied. /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
stathisl ASUS X571G, intel i5-9300H running on Boxes with 8 cores and 3GB assigned [1] 1. Failed with VirtualBox 3 times, stuck after ./default/paxtest. Tests completed with boxes but failed again ./default/paxtest FAIL. Date: Mon 13 Apr 2020 12:31:38 PM EDT Test set: default Kernel: 5.6.3-300.fc31.x86_64 Release: Fedora release 31 (Thirty One) Result: FAIL Failed Tests: ./default/paxtest Warned Tests: None
suve AMD Ryzen 7 2700X; Radeon RX Vega 56; running F32 beta [1] 1. Some tests skipped, all ones ran passed. Didn't notice any regressions with F32 so far.
tgerov ThinkPad t480s, i7-8550U, 16G [1] 1. ./default/libhugetlbfs SKIP ./default/paxtest FAIL
theunrealgeek Thinkpad X240 Core i7-4600U, 8GB RAM, Fedora 32 beta up-to-date [1] 1. Kernel: 5.6.3-300.fc32.x86_64 Both regular and performance tests pass and has uploaded results automatically as well.
thuzzik
thuzzik Fedora 32 nightly inside qemu-Boxes - Host Fedora 31 Intel i3-550 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
udb28 Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz Fedora 31 Kernel: x86_64 Linux 5.5.15-200.fc31.x86_64 running KVM kerneltest-5.6.3.iso with vcpus:3 ram: 4096 [1] 1. ./default/paxtest FAIL Vulnerability status: spec_store_bypass: Vulnerable spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization spectre_v1:Mitigration: Full AMD retpoline, STIBP: disabled, RSB filling
udb28 Lenovo G50-80 Intel Core i3-5005U @ 4x 1.9GHz running Fedora 31 with KVM image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 [1] 1. Successfully booted into the core-os image fedora-coreos-5.6-testweek-qemu.x86_64.qcow2 with kernel-core-5.6.3-300.fc31.x86_64
vishald Liveusb Fedora test day image 5.6.3 on dell laptop i3 5000 series [1] 1. Default: FAIL (paxtext=FAIL, libhugetlbfs =SKIP). Performance: terminal session is killed during the test
visitor Proxmox 6.1-3 VM, 4G RAM, 2 cores, SCSI Controller VirtIO [1] 1. first test: ./default/libhugetlbfs SKIP, ./default/paxtest SKIP
Wiki Metadata