From Fedora Project Wiki

m (Fix formatting)
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 28: Line 28:


* A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* The 5.10 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1663265 F33 koji] (see below) or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
* The 5.10 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1665895 F33 koji] (see below) or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
* Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
* Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
* Enough free space on HDD
* Enough free space on HDD
Line 35: Line 35:
Kernel builds can be downloaded from Koji using a command line tool:
Kernel builds can be downloaded from Koji using a command line tool:


  koji download-build --arch=x86_64 kernel-5.10.4-200.fc33
  koji download-build --arch=x86_64 kernel-5.10.5-200.fc33


== How to test? ==
== How to test? ==
Line 52: Line 52:


== Test Results ==
== Test Results ==
=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Andyogle|Andyogle]]
| MacBook Pro 4GB Intel Core i7-3615QM CPU@2.30GHz x 8
| {{result|pass}}<ref>Passed. </ref>
| <references/>
|-
| [[User:Bodanel|Bodanel]]
| Ryzen 3700 - VM with 4 CPUs and 16 GB RAM on nvme SSD
| {{result|pass}}<ref>./runtests.sh
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS 
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:Daniels|Daniels]]
| Lenovo 2in1 14 Intel® Pentium(R) CPU 4415U @ 2.30GHz × 4, LIVE (Bare Metal) (Test Image)
| {{result|pass}}<ref>Test Suite : PASS</ref>
| <references/>
|-
| [[User:Dskobra|Dskobra]]
|
| {{result|pass}}<ref>Test suite called with default
./default/timer-overhead                                        PASS   
./default/paxtest                                                SKIP   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/posix_timers                                          PASS   
./default/modsign                                                PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>{{result|pass}}
| <references/>
|-
| [[User:ElXreno|ElXreno]]
| Fedora 33 KDE, bare metal, FUJITSU LIFEBOOK AH531/GFO (CPU: Intel Core i3-2350M | GPU: NVIDIA GT 525M && Intel HD Graphics 3000 | RAM: 4 GB), nouveau
| {{result|pass}}<ref>Sometimes an error [1] appears in the logs when booting the system and the system hangs. [1]: `watchdog: BUG: soft lockup - CPU#3 stuck for 22s! [irq/16-iwlwifi:934]`. Test ./default/libhugetlbfs and ./default/paxtest was skipped, all other tests passed successfully. Also the NVIDIA 390xx driver is not building. Everything else works fine. Vulnerability status:
itlb_multihit:KVM: Mitigation: VMX disabled |
l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable |
mds:Mitigation: Clear CPU buffers; SMT vulnerable |
meltdown:Mitigation: PTI |
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp |
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization |
spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling |
srbds:Not affected |
tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:Fedora Kernel Tester|Fedora Kernel Tester]]
| i5-6600 bare metal Kernel Test Day Image 5.10.4
| {{result|pass}}<ref>Bug=Screen does not come back after sleep. Have to reboot.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
</ref>
| <references/>
|-
| [[User:GuiltyDoggy|GuiltyDoggy]]
| Ryzen 9 5900X - VMWare - Test image 5.10.4-200.fc33.x86_64
| {{result|pass}}<ref>Default Test Suite: Passed
Performance Test Suite: Passed</ref>
| <references/>
|-
| [[User:HRicky|HRicky]]
|
| {{result|pass}}<ref>H/W path                Device      Class          Description
===============================================================
                                    system        To Be Filled By O.E.M. (To Be Filled By O.E.M.)
/0                                  bus            H97 Pro4
/0/0                                memory        64KiB BIOS
/0/d                                memory        32GiB System Memory
/0/d/0                              memory        8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/1                              memory        8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/2                              memory        8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/3                              memory        8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/e                                processor      Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz
/0/e/f                              memory        256KiB L1 cache
/0/e/10                              memory        1MiB L2 cache
/0/e/11                              memory        8MiB L3 cache
/0/100                              bridge        4th Gen Core Processor DRAM Controller
/0/100/1                            bridge        Xeon E3-1200 v3/4th Gen Core Processor PCI Express x16 Controller
/0/100/1/0                          display        Ellesmere [Radeon RX 470/480/570/570X/580/580X/590]
/0/100/1/0.1                        multimedia    Ellesmere HDMI Audio [Radeon RX 470/480 / 570/580/590]
/0/100/2                            display        Xeon E3-1200 v3/4th Gen Core Processor Integrated Graphics Controller
/0/100/3                            multimedia    Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller
/0/100/14                            bus            9 Series Chipset Family USB xHCI Controller
/0/100/14/0              usb3        bus            xHCI Host Controller
/0/100/14/0/d                        input          Comfort Curve Keyboard 2000
/0/100/14/0/e                        input          USB Optical Mouse
/0/100/14/1              usb4        bus            xHCI Host Controller
/0/100/14/1/5            scsi6      storage        Mass Storage Device
/0/100/14/1/5/0.0.0      /dev/sdc    disk          7665MB Transcend 8GB
/0/100/14/1/5/0.0.0/0    /dev/sdc    disk          7665MB
/0/100/14/1/5/0.0.0/0/2  /dev/sdc2  volume        15EiB Windows FAT volume
/0/100/14/1/5/0.0.0/0/3  /dev/sdc3  volume        17MiB EFI (FAT-12/16/32) partition
/0/100/16                            communication  9 Series Chipset Family ME Interface #1
/0/100/19                enp0s25    network        Ethernet Connection (2) I218-V
/0/100/1a                            bus            9 Series Chipset Family USB EHCI Controller #2
/0/100/1a/1              usb1        bus            EHCI Host Controller
/0/100/1a/1/1                        bus            USB hub
/0/100/1b                            multimedia    9 Series Chipset Family HD Audio Controller
/0/100/1c                            bridge        9 Series Chipset Family PCI Express Root Port 1
/0/100/1c.6                          bridge        82801 PCI Bridge
/0/100/1c.6/0                        bridge        ASM1083/1085 PCIe to PCI Bridge
/0/100/1d                            bus            9 Series Chipset Family USB EHCI Controller #1
/0/100/1d/1              usb2        bus            EHCI Host Controller
/0/100/1d/1/1                        bus            Integrated Hub
/0/100/1f                            bridge        H97 Chipset LPC Controller
/0/100/1f.2              scsi0      storage        9 Series Chipset Family SATA Controller [AHCI Mode]
/0/100/1f.2/0            /dev/sda    disk          240GB KINGSTON SA400S3
/0/100/1f.2/0/1          /dev/sda1  volume        50MiB Windows NTFS volume
/0/100/1f.2/0/2          /dev/sda2  volume        223GiB Windows NTFS volume
/0/100/1f.2/0/3          /dev/sda3  volume        505MiB Windows NTFS volume
/0/100/1f.2/1            /dev/sdb    disk          120GB Samsung SSD 850
/0/100/1f.2/1/1          /dev/sdb1  volume        1GiB EXT4 volume
/0/100/1f.2/1/2          /dev/sdb2  volume        110GiB Linux filesystem partition
/0/100/1f.2/0.0.0        /dev/cdrom  disk          DRW-24D5MT
/0/100/1f.3                          bus            9 Series Chipset Family SMBus Controller
/0/1                                system        PnP device PNP0c01
/0/2                                system        PnP device PNP0c02
/0/3                                system        PnP device PNP0b00
/0/4                                generic        PnP device INT3f0d
/0/5                                system        PnP device PNP0c02
/0/6                                system        PnP device PNP0c02
/0/7                                system        PnP device PNP0c02</ref>
| <references/>
|-
| [[User:Josevaldo|Josevaldo]]
| CPU: Intel i3-2120 (4) @ 3.300GHz - Memory: 3975MiB / 7891MiB
| {{result|pass}}<ref>Test suite called with default
./default/posix_timers                                          PASS   
./default/paxtest                                                SKIP   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/cachedrop                                              PASS   
./default/stack-randomness                                      PASS   
./default/modsign                                                PASS   
./default/timer-overhead                                        PASS   
./default/sysfs-perms                                            PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/selinux-dac-controls                                  PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
{
  "message": "Upload successful!"
}The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:Mario|Mario]]
| CPU: Intel® Core™ i7-9700K CPU @ 3.60GHz × 8,  GPU: NV168, RAM: 16GB, LIVE (Bare Metal) (Test Image)
| {{result|pass}}
| <references/>
|-
| [[User:Mario |Mario ]]
| Schenker XMG P304 PRO, CPU: Core I5-4210M @2.60GHz x 4, GPU: NV117 / Intel HD 4600, RAM:16GB
| {{result|pass}}
| <references/>
|-
| [[User:Noname|Noname]]
| Host: 20ALCTO1WW ThinkPad X240, CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT, RAM: 8GB
| {{result|pass}}
| <references/>
|-
| [[User:abrahm|abrahm]]
| Dell XPS 13 9310
| {{result|pass}}
| <references/>
|-
| [[User:abrahm|abrahm]]
| Dell XPS 13 9310, i7-1165G7, f33, 5.10.4-200.fc33.x86_64 from koji
| {{result|pass}}<ref>No general issues on this hardware running 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-98.fc33.x86_64, 5.10.2-200.fc33.x86_64, or 5.10.4-200.fc33.x86_64 (all from koji).</ref>
| <references/>
|-
| [[User:abrahm|abrahm]]
| Dell XPS 13 9370, i7-8640U, 5.10.4-200.fc33.x86_64 from koji
| {{result|pass}}
| <references/>
|-
| [[User:agurenko|agurenko]]
| Baremetal: Ryzen 5900X, 32 Gb RAM, Radeon RX 5700 XT
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:akumar99|akumar99]]
| VM (AMD Ryzen 9 3900X)
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Dell XPS 13 9360, Intel i7-7500U, F33 Workstation
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| F33 Raspberry Pi 3 aarch64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| F33 Raspberry Pi 4 8GB headless aarch64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alexxvibes|alexxvibes]]
| GNOME Virtual Box -- 1.9GB Ram / AMD A4-3300 APU / Adata SU650 SSD
| {{result|pass}}
| <references/>
|-
| [[User:alphacluster|alphacluster]]
| CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
| {{result|pass}}<ref>No issues</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core model: AMD Ryzen 3 3300X; Graphics: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 455.45.01
| {{result|pass}}<ref>Tests passed.
LGTM so far. FS: BTRFS. Can't say anything at this moment about BTRFS performance and any regressions.</ref>
| <references/>
|-
| [[User:augenauf|augenauf]]
| F33 Gnome test box on VirtualBox
| {{result|pass}}<ref>no regression noted. everything works as expected in my F33 test system on VirtualBox.</ref>
| <references/>
|-
| [[User:augenauf|augenauf]]
| baremetal Thinkpad T440s
| {{result|pass}}<ref>Works for me on T440s, no regresssion noted after first day of usage.</ref>
| <references/>
|-
| [[User:bittin|bittin]]
|
| {{result|pass}}<ref>5.10.5 worked good in Virtualbox here</ref>{{result|pass}}<ref>Worked great in my test VM with rawhide in Virtualbox </ref>
| <references/>
|-
| [[User:bohrasd|bohrasd]]
| ASUS ROG Zephyrus G14 GA401IV_GA401IV 1.0 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 1726MiB / 15477MiB
| {{result|pass}}<ref>All tests passed.</ref>
| <references/>
|-
| [[User:bojan|bojan]]
|
| {{result|pass}}<ref>ThinkPad T450s, default and performance tests with 5.10.2-200.fc33.x86_64 pass. The machine runs Gnome fine. WiFi works, as well as ethernet. Also running this kernel on a noname fanless PC with Intel i5 8250U CPU. No regressions yet.</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| KVM
| {{result|pass}}<ref>default and performance tests passed</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| dell 5530
| {{result|pass}}<ref>default and performance tests passed</ref>
| <references/>
|-
| [[User:cap|cap]]
| Thinkpad T440s, 8G, haswell generation
| {{result|pass}}<ref>Both runtests and runtests -t performance PASS. Also checked gl, webcam, audio and suspend/resume OK.</ref>
| <references/>
|-
| [[User:checkcode|checkcode]]
|
| {{result|pass}}
| <references/>
|-
| [[User:chivux|chivux]]
| [PROCESADOR] Intel, Code Name: Merom (Core 2 Duo) 2048K, Technology: 65 nm, Specification: Intel(R) Core(TM)2 Duo CPU T5450 @ 1.66GHz, Instructions: MMX, SSE(1, 2, 3, 3S), x86-64. | [MOTHERBOARD] Manufacturer: Dell Inc., Model: 0H279K. | [BIOS] Brand: Dell Inc. Version: A05. | [CHIPSET] Vendor: Intel Corporation, Model: 82801HM (ICH8M) LPC Interface Controller. | [GRAPHICS] Vendor: Intel, Driver: i915, Model: Mobile GM965/GL960 Integrated Graphics Controller (secondary). | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
| {{result|pass}}<ref>Date: Tue Jan  5 10:33:05 AM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
========================================
Date: Tue Jan  5 10:35:05 AM EST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None</ref>
| <references/>
|-
| [[User:chivux|chivux]]
| [PROCESADOR] Vendor: AMD, Code Name: Trinity X2, Technology: 32 nm, Voltage: 10.800V, Specification: AMD A6-4400M APU with Radeon(tm) HD Graphics, Instructions: MMX(+), SSE(1, 2, 3, 3S, 4.1, 4.2, 4A), XOP, AVX(1), FMA(3, 4), AES, CLMUL, AMD-V, x86-64. | [MOTHERBOARD] Manufacturer: TOSHIBA, Model: Portable PC, Revision: MP. | [BIOS] Brand: Insyde Corp. Version: 6.20. | [CHIPSET] Vendor: Advanced Micro Devices, Inc. [AMD], Model: FCH LPC Bridge. | [GRAFICS] Vendor: AMD, Driver: Radeon, Model: Trinity 2 [Radeon HD 7520G]. | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
| {{result|pass}}<ref>Date: Mon Jan  4 06:37:36 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
============================
Date: Mon Jan  4 06:41:50 PM EST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None</ref>
| <references/>
|-
| [[User:clasater|clasater]]
| Dell XPS 17 9700
| {{result|pass}}<ref>Wireless card (Detected Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W), REV=0x354) performance drops dramatically, I get an unstable 150Mbps vs getting 250Mbps with 5.9 kernel
Sound card works with most recent Rawhide 5.10 RC build 1204, but does not work with Latest Fedora 5.9 or this test kernel (probably related to https://blog.fts.scot/2020/07/04/dell-xps-2020-how-to-get-audio-working-on-linux/)</ref>
| <references/>
|-
| [[User:clnetbox|clnetbox]]
| CLEVO W370SS (SCHENKER XMG A704) | Intel Core i7-4710MQ CPU (Haswell)
| {{result|fail}}<ref>Audio does not work correctly any longer - no sound from internal speakers
Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller (rev 06)
Kernel versions tested : 5.10.2-200.fc33.x86_64 / 5.10.3-200.fc33.x86_64 / 5.10.4-200.fc33.x86_64</ref>
| <references/>
|-
| [[User:copperi|copperi]]
| 5.10.5-200.fc33.x86_64 F33 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
| {{result|pass}}
| <references/>
|-
| [[User:creech|creech]]
| Acer Aspire 5680, Core 2 Duo T5500, GeForce Go 7600, 2 GB DDR2 RAM
| {{result|fail}}<ref>./default/cachedrop failed, all other test were passed or skipped. Don't know what's up with this fail. The kernel seem to run fine. No problems found so far while using it. Btw.: Performance test is passed.</ref>
| <references/>
|-
| [[User:danniel|danniel]]
| Acer E15 i7 8GB Ram
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Test Day Image using GNOME Boxes (Memory: 1.9 GiB, Processor: Intel® Core™ i5-4250U CPU @ 1.30GHz × 4)
| {{result|pass}}<ref>Some default tests ended with "SKIP"; GCC gives multiple warnings "implicit declaration of function 'lmbench_usage'" with performance tests</ref>
| <references/>
|-
| [[User:eismann|eismann]]
| AMD Ryzen 3700X - ASUS Strix X570-E - 32 GB - Radeon VII
| {{result|pass}}
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| Dell Vostro 3558, Intel i3-4005U, Test-day Image LiveUSB
| {{result|pass}}<ref>[Default test] paxtest+libhugetlbfs: SKIP, rest: PASS
[Performance] Pass</ref>
| <references/>
|-
| [[User:ejnersan|ejnersan]]
| HP Elitebook 840 G4, Intel i5-7200U, Test-day Image LiveUSB
| {{result|pass}}<ref>[Default test] paxtest+libhugetlbfs: SKIP, rest: PASS
[Performance] Pass</ref>
| <references/>
|-
| [[User:emmrou|emmrou]]
| Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
| {{result|pass}}<ref>Everything works fine: sound, video, Wi-fi, bluetooth.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:engineerfear|engineerfear]]
| Dell Inspiron 5505 AMD 4700U Live CD Test Image
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609886321.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:engineerfear|engineerfear]]
| Lenovo Thinkbook 14 Gen 2 ITL - Intel 11th Gen i5 - live test day image
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    SKIP   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              SKIP   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                SKIP   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  SKIP   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609987767.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:ersen|ersen]]
| Desktop PC with Intel Core i3-4160 @3.60 GHz
| {{result|pass}}<ref>Tested with kernel 5.10.3-200.fc33.x86_64, both tests passed.
GPU: Intel Integrated Graphics
Ethernet: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller
No Wi-Fi.</ref>
| <references/>
|-
| [[User:eschruefer@ca-musings.de|eschruefer@ca-musings.de]]
|
| {{result|warn}}<ref>Aarch64: Screen is garbled on a Raspberry Pi 4B. Screen looks as if out of sync (only squashed vertical lines).</ref>
| <references/>
|-
| [[User:figonzal|figonzal]]
| VM: QEMU/KVM, CPU: 2 vCPU / 8 CPU, RAM: 2048 MiB / 7831 MiB, x86_64
| {{result|pass}}<ref>1 .- All test passed</ref>
| <references/>
|-
| [[User:filiperosset|filiperosset]]
| Intel(R) Core(TM) i7-10750H CPU @ 2.60GHz (running inside a VM 8Gig, 12 vcpus)
| {{result|pass}}<ref># performance test
sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.raw
Tue Jan  5 12:27:13 AM -03 2021
Latency measurements
Tue Jan  5 12:28:15 AM -03 2021
Calculating file system latency
Tue Jan  5 12:28:27 AM -03 2021
Local networking
Tue Jan  5 12:30:41 AM -03 2021
Bandwidth measurements
Tue Jan  5 12:38:06 AM -03 2021
Calculating context switch overhead
Tue Jan  5 12:38:41 AM -03 2021
./performance/lmbench3                                          PASS
Test suite complete                                              PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>{{result|fail}}<ref>[filiperosset@raw kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/posix_timers                                          PASS
./default/cachedrop                                              PASS
./default/selinux-dac-controls                                  SKIP
./default/stack-randomness                                      PASS
./default/memfd                                                  PASS
./default/modsign                                                PASS
./default/insert_leap_second                                    PASS
./default/sysfs-perms                                            PASS
./default/paxtest                                                SKIP
./default/libhugetlbfs                                          SKIP
./default/mq-memory-corruption                                  PASS
./default/timer-overhead                                        FAIL
Test suite complete                                              FAIL
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
[filiperosset@raw kernel-tests]$ </ref>
| <references/>
|-
| [[User:frantisekz|frantisekz]]
| i5-6600k, RX 580
| {{result|pass}}<ref>No issues spotted!</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.4
| {{result|pass}}<ref>All Kernel regression tests PASSED, normal use for two days without problems.</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| Kenel 5.10.5-200.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
| {{result|pass}}<ref>Kernel regression tests PASSED, default and performance, normal use for a full day without problems. </ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kerneltest-5.10.4.iso on pendrive live-usb session
| {{result|pass}}<ref>I downloaded the kerneltest-5.10.4.iso (from https://jforbes.fedorapeople.org/testweek/ ) and created a pendrive with fedora image writer, them boot it on my Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller, and run the kernel-tests. </ref>
| <references/>
|-
| [[User:granissado|granissado]]
| CPU: AMD Ryzen 7 5800X / RAM: 2x16GB / Test image
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS  </ref>
| <references/>
|-
| [[User:harshmangal|harshmangal]]
| HP-VMM-2GB-3vCPU
| {{result|fail}}<ref>Test suit called with 'Default'</ref>
| <references/>
|-
| [[User:hhlp|hhlp]]
| CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
| {{result|pass}}<ref>{{bz|1701322}} No Regression Noted, Great Performance. it seem is it not affected by teh bugs before.</ref>
| <references/>
|-
| [[User:hozansahin|hozansahin]]
|
| {{result|pass}}<ref> ./runtests.sh
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS 
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:hozansahin|hozansahin]]
| CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:hozansahin|hozansahin]]
| CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX (Test İmage)
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| Fedora 33 (koji upgrade), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.2) & 970 EVO M.2
| {{result|pass}}<ref>{{bz|1911939}} {{bz|1909891}} {{bz|1887439}} {{bz|1885457}} {{bz|1883621}} {{bz|1884347}} Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped. Bugs: 1) VA-API hardware acceleration broken with MESA 20.3 on AMD GPUs. 2) Steam will launch in an invisible window and you have to tab to grab it. 3) Booting Fedora (enter encryption key) now running in 640x480 and wrong 4:3 ratio. 4) Audio cracking and goes on/off multiple times during the boot sequence. 5) I'm still receiving the "run script kernel-core-5.10.4-200.fc33.x86_64 sort: fflush failed: 'standard output': Broken pipe sort: write error gzip: stdout: Broken pipe gzip: stdout: Broken pipe sort: write failed: 'standard output': Broken pipe sort: write error" while installing the kernel-core and kernel-debug-core package 6) DMESG [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. 7) DMESG show_signal_msg: 91 callbacks suppressed lat_rpc[12785]: segfault at 1000 ip 00007fa20b0b63b5 sp 00007fff196daa58 error 4 in libc-2.32.so[7fa20af7a000+14f000]. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled</ref>
| <references/>
|-
| [[User:itsmefma|itsmefma]]
| default
| {{result|pass}}<ref>Thikpad x1 carbon ( using boxes)</ref>
| <references/>
|-
| [[User:ivzhh|ivzhh]]
| Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz, 4300 MHz; nVidia GP104M [GeForce GTX 1070 Mobile]; Samsung Electronics NVMe SSD Controller SM961/PM961; Intel Dual Band Wireless-AC 3168NGW [Stone Peak]; Qualcomm Atheros Killer E2500 Gigabit Ethernet Controller
| {{result|fail}}<ref>Computer automatically shutdown after passing "cachedrop" test in "sudo ./runtests.sh"</ref>
| <references/>
|-
| [[User:jadarius|jadarius]]
| Host: LIFEBOOK E754 10601583232 CPU: Intel i5-4200M (4) @ 3.100GHz GPU: Intel 4th Gen Core Processor Memory: 1525MiB / 7832MiB
| {{result|pass}}<ref>All tests passed.</ref>
| <references/>
|-
| [[User:jasonhong|jasonhong]]
| Ryzen 3600 VM with 4 CPU and 8 GB RAM - copr image 5.10.4-200.fc33.x86_64
| {{result|pass}}<ref>All (Default and Performance) tests passed</ref>{{result|pass}}<ref>Default Test Suite: Passed
Performance Test Suite: Passed</ref>
| <references/>
|-
| [[User:jbonilla|jbonilla]]
| Dell XPS 17 9700
| {{result|pass}}<ref>Audio is still not working on Dell XPS 17 9700 (Dummy Output):
All of the tests passed. System performs well with the exception that audio devices not being detected.
Date: Sun Jan  3 07:20:44 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
============================================================
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Mon Jan  4 18:59:50 2021
Scheduling leap second for Mon Jan  4 19:00:00 2021
Mon Jan  4 18:59:57 2021 +    246 us (37) TIME_INS
Mon Jan  4 18:59:57 2021 + 500512 us (37) TIME_INS
Mon Jan  4 18:59:58 2021 +    777 us (37) TIME_INS
Mon Jan  4 18:59:58 2021 + 501046 us (37) TIME_INS
Mon Jan  4 18:59:59 2021 +  1331 us (37) TIME_INS
Mon Jan  4 18:59:59 2021 + 501494 us (37) TIME_INS
Mon Jan  4 18:59:59 2021 +  1616 us (38) TIME_OOP
Mon Jan  4 18:59:59 2021 + 501731 us (38) TIME_OOP
Mon Jan  4 19:00:00 2021 +  1887 us (38) TIME_WAIT
Mon Jan  4 19:00:00 2021 + 502072 us (38) TIME_WAIT
Mon Jan  4 19:00:01 2021 +  2333 us (38) TIME_WAIT
Mon Jan  4 19:00:01 2021 + 502598 us (38) TIME_WAIT
Mon Jan  4 19:00:02 2021 +  2849 us (38) TIME_WAIT
Leap complete
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/paxtest
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0295871 s, 3.5 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00444862 s, 2.4 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/timer-overhead
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/stack-randomness
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/sysfs-perms
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE</ref>
| <references/>
|-
| [[User:jcwillia|jcwillia]]
| Intel(R) Core(TM) i7-5557U CPU @ 3.10GHz (4 cores), 32GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:jnk0|jnk0]]
| Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
| {{result|pass}}<ref>1. All tests passed.
Gnome freezes when screen is locked. No input is possible via mouse or keyboard. Multiple monitors connected via docking station. Worked fine with kernel 5.9.</ref>
| <references/>
|-
| [[User:johnh12345|johnh12345]]
| Oracle VM VirtualBox Fedora 33 5.10.4-200.fc33.x86_64 2 CPUs 4GB RAM
| {{result|fail}}<ref>Had to hit control-c on the insert leap second test as it would just hang.
cat kernel-test-1609904486.log.txt
Date: Tue Jan  5 10:41:26 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: FAIL
Failed Tests: ./default/insert_leap_second ./default/timer-overhead
Warned Tests: None
============================================================
Starting test ./default/sysfs-perms
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/insert_leap_second
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/timer-overhead
Unacceptable long delay; asked for 1000 usec, got 2597 usec
Test failure.
Starting test ./default/stack-randomness
Starting test ./default/libhugetlbfs
Starting test ./default/paxtest
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0533018 s, 2.0 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00343501 s, 3.1 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/selinux-dac-controls
<no matches>
</ref>{{result|fail}}<ref>Had to hit control-C on the insert leap second as it would just hang there.  All other tests passed.</ref>
| <references/>
|-
| [[User:jortegi|jortegi]]
|
| {{result|pass}}
| <references/>
|-
| [[User:jpbn|jpbn]]
| iMac warly 2008  efi
| {{result|fail}}
| <references/>
|-
| [[User:kabirgupta|kabirgupta]]
|
| {{result|pass}}
| <references/>
|-
| [[User:kameleon|kameleon]]
| CPU: Intel Core i5-8250U @ 1.60GHz
| {{result|pass}}
| <references/>
|-
| [[User:kameleon|kameleon]]
| CPU: Intel Core i5-8250U @ 1.60GHz RAM: 4G DDR
| {{result|pass}}<ref>Tested on Fedora 33 VM using Boxes
While running runtests.sh - t performance, received the following error:
"In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory    38 | #include <rpc/rpc.h>      |          ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory    38 | #include <rpc/rpc.h>      |          ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2"</ref>
| <references/>
|-
| [[User:keepfloyding|keepfloyding]]
|
| {{result|fail}}<ref>Default test suite failed.
bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              FAIL   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance suite passed.</ref>
| <references/>
|-
| [[User:keepfloyding|keepfloyding]]
| Thinkpad X1 Carbon Gen 8. 16 gb RAM i7 CPU; Run on Gnome Boxes
| {{result|fail}}<ref>Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance suite passed.</ref>
| <references/>
|-
| [[User:kennyh7279|kennyh7279]]
| Ryzen 5 2600, Radeon 5600XT, 32GB RAM, Fedora 33 Workstation
| {{result|pass}}<ref>Date: Tue Jan  5 12:56:58 PM PST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
-------------------------------------
Date: Tue Jan  5 12:59:18 PM PST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
</ref>
| <references/>
|-
| [[User:kiko964|kiko964]]
| Intel Core i7-4702MQ VirtualBox
| {{result|pass}}<ref>Performance tests passed</ref>{{result|fail}}<ref>Default test: Failed
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:knarra|knarra]]
| 20QES2P40L (LENOVO_MT_20QE_BU_Think_FM_ThinkPad X1 Carbon 7th)
| {{result|pass}}<ref>bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
1382MB OK
1382MB OK
1382MB OK
mhz: should take approximately 297 seconds
Using config in CONFIG.localhost-live
Tue Jan  5 08:42:57 AM EST 2021
Latency measurements
Tue Jan  5 08:50:44 AM EST 2021
Calculating file system latency
Tue Jan  5 08:54:33 AM EST 2021
Local networking
Tue Jan  5 09:01:26 AM EST 2021
Bandwidth measurements
Tue Jan  5 10:04:18 AM EST 2021
Calculating context switch overhead
Tue Jan  5 10:16:13 AM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
bash-5.0$ sudo ./runtests.sh -t performance
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |  static psize;
      |        ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
  94 |  return;
      |  ^~~~~~
lib_sched.c:46:1: note: declared here
  46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
      | ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
  207 |  retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
      |            ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
  231 |  retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
      |          ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  149 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  76 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
</ref>
| <references/>
|-
| [[User:kubot|kubot]]
| Intel® Core™ i7-3630QM CPU @ 2.40GHz × 8 ; NVE7 / Intel® HD Graphics 4000 (IVB GT2); RAM 8gb. 1TB samsung evo 850 ssd
| {{result|pass}}
| <references/>
|-
| [[User:kuladog|kuladog]]
| F33, bare metal, HP EliteBook 840 G2, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4, 16 GB RAM
| {{result|pass}}<ref>1. Both default, and performance tests passed.</ref>
| <references/>
|-
| [[User:lam|lam]]
| i7-9700K, Z390, 1080 Ti, nvidia drivers 460.32.03 (rpmfusion testing repo)
| {{result|pass}}
| <references/>
|-
| [[User:ledufff|ledufff]]
|
| {{result|pass}}<ref>Temperature improved dramatically.</ref>
| <references/>
|-
| [[User:ledufff|ledufff]]
| ThinkPad E495 AMD Ryzen 5 3500U
| {{result|pass}}<ref>Temperature improved dramatically. </ref>
| <references/>
|-
| [[User:lewis41|lewis41]]
| Test day image on VM
| {{result|pass}}
| <references/>
|-
| [[User:lily|lily]]
| HP BL460c G5 bay 4
| {{result|pass}}
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr330a
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| apm  mustang
| {{result|pass}}
| <references/>
|-
| [[User:lily|lily]]
| dell  pem905
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  per7425
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  bl480c
| {{result|pass}}
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl20gen9
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  sl2x160zg6
| {{result|pass}}
| <references/>
|-
| [[User:lily|lily]]
| ibm  x3250m4
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  rd230
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  st550
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| rdma  dev
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lnie|lnie]]
| HP ProLiant DL120 G6
| {{result|pass}}
| <references/>
|-
| [[User:luya|luya]]
| HP Envy X360 Convertible 15 Ryzen 2500U
| {{result|pass}}<ref>All test passed with no sign of regression.</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| USB kerneltest-5.10.4.iso on Lenovo ideapad Y570
| {{result|pass}}<ref>Run default test suite and performance test suite: PASS</ref>
| <references/>
|-
| [[User:masami|masami]]
| i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
| {{result|fail}}<ref>{{bz|1912061}} suspend/resume doesn't work for me. it looks like same as "Bug 1912061 - Resume failure on 5.10.4-200.fc33 kernel".  btw, kernel regression test tool passed and video, sound, kvm are work fine.</ref>
| <references/>
|-
| [[User:maumar|maumar]]
| Live image on Dell Latitude e6540 (i7 4810MQ, Radeon HD 8790M)
| {{result|pass}}
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T14s, Ryzen 7 4750U, Renoir GPU
| {{result|pass}}<ref> All test passed on kernel 5.10.4-200.fc33.x86_64. Day to day experience is ok without any obvious regression.</ref>
| <references/>
|-
| [[User:miguel7ra|miguel7ra]]
| Model: Lenovo ideapad 320-15IKB | Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
| {{result|pass}}<ref>All tests passed</ref>
| <references/>
|-
| [[User:miguel7ra|miguel7ra]]
| Model: Lenovo ideapad 320-25IKB | Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
| {{result|pass}}<ref>1. Default and Performance Passed</ref>
| <references/>
|-
| [[User:morphy2k|morphy2k]]
| OS: Fedora 33 Workstation, ENV: baremetal, KERNEL: 5.10.4-200.fc33.x86_64, DEVICE: Lenovo ThinkPad T14 AMD Gen 1, CPU: AMD Ryzen 7 Pro 4750U, RAM: 32GB DDR4-3200
| {{result|pass}}<ref>All tests passed. No issues after 2 days of use</ref>
| <references/>
|-
| [[User:murph|murph]]
| Vendor ID:                      AuthenticAMD CPU family:                      23 Model:                          49 Model name:                      AMD EPYC-Rome Processor Stepping:                        0 CPU MHz:                        3593.250 BogoMIPS:                        7186.50 Virtualization:                  AMD-V Hypervisor vendor:              KVM
| {{result|pass}}<ref>Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:mzink|mzink]]
| Lenovo ThinkPad T480s
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:mzink|mzink]]
| ThinkPad T480s
| {{result|fail}}<ref>Screen is not waking up after DPMI sleep while using docking station - not responding to any keys. Builtin display works fine. Older 5.10.0-98.fc33.x86_64 build seems to work fine.</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| Compaq 8510w Intel T9300 AMD RV630
| {{result|pass}}<ref>libhugetlbfs, paxtest SKIP, all others PASS </ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD 6450 and 4 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:oldoc63|oldoc63]]
| Intel Gigabyte I5 8 MB Ram 1 T HD uname --all 5.9.16-200.fc33.x86_64 #1 SMP Mon Dec 21 14:08:22 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
| {{result|fail}}<ref>[oldoc@localhost ~]$ cd kernel-tests
[oldoc@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop                                              FAIL   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            WARN   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
Traceback (most recent call last):
  File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module>
    submitclient.login(
  File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login
    response = openid_login(
  File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
[oldoc@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.localhost.localdomain
Tue Dec 29 08:48:17 AM -04 2020
Latency measurements
Tue Dec 29 08:49:19 AM -04 2020
Calculating file system latency
Tue Dec 29 08:49:30 AM -04 2020
Local networking
Tue Dec 29 08:53:27 AM -04 2020
Bandwidth measurements
Tue Dec 29 09:00:10 AM -04 2020
Calculating context switch overhead
Tue Dec 29 09:00:45 AM -04 2020
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Traceback (most recent call last):
  File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module>
    submitclient.login(
  File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login
    response = openid_login(
  File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
    raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:oscarholst|oscarholst]]
| Lenovo ThinkCentre M92P (Intel Core i5-3550 3.30GHz, 8192MB DDR3 1600MHz, intel graphics) Live iso usb kernel test
| {{result|pass}}
| <references/>
|-
| [[User:oscarholst|oscarholst]]
| Lenovo ThinkPad T440s (Intel Core i5-4200U 2.6GHz, 12GB DDR3, Intel HD Graphics 4400) live-usb kernel-test
| {{result|pass}}<ref>All tests passed.</ref>
| <references/>
|-
| [[User:pdapp|pdapp]]
| Intel board  DH87RL G3220 3.0 Ghz , 16 GB RAM,  i915,
| {{result|pass}}<ref>i915 gpu problem remains.</ref>
| <references/>
|-
| [[User:phoebos|phoebos]]
| Test Day live image; ThinkPad T480; Intel(R) Core(TM) i5-8350U CPU @ 1.70GHz
| {{result|pass}}<ref>All tests passed</ref>
| <references/>
|-
| [[User:plumchii|plumchii]]
| Samsung NP350V5C-S06FR
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            WARN   
./default/timer-overhead                                        PASS   
Test suite complete                                              WARN   
Performance Test Passed</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| AMD Seattle (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Ampere eMag
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| BananaPi (ARMv7)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| BeagleBoneBlack (ARMv7)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Mustang (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:rainmakerraw|rainmakerraw]]
| AMD Threadripper 3960X (24c48t) at stock, Asus RoG Strix TRX40-E Gaming motherboard, 32GB DDR4 3600MHz (16,16,16,36), AMD Radeon Vega 56 (amdgpu), Intel I211-AT NIC
| {{result|pass}}<ref>All hardware seems to be working fine as before (on default release kernel 5.9.16). However the sound output has changed from two speaker stereo (which is what's plugged in) to 7.1 surround in the Gnome settings 'test' utility. lm_sensors also now reports an error:
ERROR: Can't get value of subfeature energy1_input: Kernel interface error
energy1:          N/A
This is repeated 25 times (energy1, energy2... etc).
As requested on the Wiki page, here is the vulnerability output from the end of the test:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:rhachey|rhachey]]
| VirtualBox: oracle 6.1.16 R140961
| {{result|fail}}<ref>./default/cachedrop                                              PASS   
./default/insert_leap_second                                    FAIL   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL   
</ref>
| <references/>
|-
| [[User:rimuru|rimuru]]
| VM: GNOME BOXES, cpu 4, memory 2GB
| {{result|pass}}<ref>LGTM
bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/modsign                                                PASS   
./default/stack-randomness                                      PASS   
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/memfd                                                  PASS   
Test suite complete                                              PASS  </ref>
| <references/>
|-
| [[User:robbinespu|robbinespu]]
|  Virtualization: oracle (virtualbox 6.1.16. r140961) ,  Kernel: Linux 5.10.4-200.fc33.x86_64, Architecture: x86-64
| {{result|fail}}<ref>$ cat kernel-test-1609405976.log.txt
Date: Thu Dec 31 05:12:56 PM +08 2020
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: FAIL
Failed Tests: ./default/insert_leap_second
Warned Tests: None
============================================================
Starting test ./default/stack-randomness
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/paxtest
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/insert_leap_second
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0561409 s, 1.9 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00455177 s, 2.3 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/libhugetlbfs
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/sysfs-perms
Starting test ./default/timer-overhead
Starting test ./default/selinux-dac-controls</ref>
| <references/>
|-
| [[User:rootxaman|rootxaman]]
| description: Computer    product: Standard PC (Q35 + ICH9, 2009)    vendor: QEMU    version: pc-q35-5.1    width: 64 bits    capabilities: smbios-2.8 dmi-2.8 smp vsyscall32    configuration: boot=normal
| {{result|pass}}<ref>1. All tests passed</ref>
| <references/>
|-
| [[User:sbakker|sbakker]]
| Fedora 33, DELL XPS 13 9310, nvme SSD, AX500 DBS WiFi
| {{result|pass}}<ref>WiFi does not survive suspend/resume cycle; can "rmmod" the ath11k_pci module which takes a long while, then reload it. Note that the 5.11 (rc2) kernel from Rawhide does not have this problem.</ref>
| <references/>
|-
| [[User:sgraf|sgraf]]
| (1) Virtual Machine, (2) NUC10i7FNH
| {{result|fail}}<ref>{{bz|1911836}} Bug 1911836 - Cannot boot kernel 5.10 on Silverblue</ref>
| <references/>
|-
| [[User:shiwanibiradar|shiwanibiradar]]
| Lenevo ideapad330  KVM 2Gb fedora33
| {{result|pass}}<ref>All test passed </ref>
| <references/>
|-
| [[User:siddharthvipul1|siddharthvipul1]]
| F32 on Thinkpad T480s
| {{result|pass}}<ref>Test Suite completed with "PASS"</ref>
| <references/>
|-
| [[User:siddy555|siddy555]]
| Virtualbox,Acer Aspire A515-51g, Intel i5 7200U 1 core, 2048 / 7837 MB memory, 30 GB VDI. Test Day Image F33, kerneltest-5.10.4.iso
| {{result|fail}}<ref> Didn't go through "insert_leap_second" test for lot of time pressed ctrl+c, rest all tests passed. Performance tests passed.</ref>
| <references/>
|-
| [[User:simon13|simon13]]
|
| {{result|pass}}
| <references/>
|-
| [[User:skontar|skontar]]
| ThinkPad L440, Intel Pentium 3550M, RAM 3.56 GiB used: 602.2 MiB (16.5%)
| {{result|fail}}<ref>{{bz|1908736}} Used test image. Cachedrop test FAILED.
GPU hangs when opening Firefox or running "Install to hard drive", seems to be the same as https://bugzilla.redhat.com/show_bug.cgi?id=1908736 . Also on start it seems to hang once, you can see random garbage on the screen for a while instead of the grub menu, then it starts.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:smearumi|smearumi]]
| Lenovo G40, Core i5, 8GB RAM, 128SSD
| {{result|pass}}<ref>Test suite called with default
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/cachedrop                                              PASS   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
./default/timer-overhead                                        PASS   
./default/memfd                                                  PASS   
./default/libhugetlbfs                                          SKIP   
./default/selinux-dac-controls                                  PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
Test suite complete                                              PASS
5511MB OK
5511MB OK
5511MB OK
mhz: should take approximately 297 seconds
Using config in CONFIG.localhost.localdomain
Sun Jan 10 06:44:24 PM +06 2021
Latency measurements
Sun Jan 10 06:52:08 PM +06 2021
Calculating file system latency
Sun Jan 10 06:55:56 PM +06 2021
Local networking
Sun Jan 10 07:01:31 PM +06 2021
Bandwidth measurements
Sun Jan 10 08:11:43 PM +06 2021
Calculating context switch overhead
Sun Jan 10 08:24:37 PM +06 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| KVM , Kernel Test Week iso, 4GB RAM 2vCPU
| {{result|pass}}<ref>All works fine with test suite called with "default" </ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| ASUS P8Z77 V-pro, i7 3770, 16 Gb Ram
| {{result|pass}}<ref>All tests passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|pass}}<ref>all tests passed on 5.10.5, previous bug is resolved</ref>{{result|pass}}<ref>{{bz|1911043}} all tests pass. Bug can be worked around with amdgpu.dc=0, also happened with 5.10.2-200 (x86_64). have been running 5.10.2 for over a week with no issues (aside from the amdgpu bug). I have no issues on either of the intel desktops I have access to.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:thunderbirdtr|thunderbirdtr]]
|  16 × Intel® Core™ i7-10875H CPU @ 2.30GHz / Nvidia RTX 2070 Super / 32GB RAM 
| {{result|pass}}<ref>Tests are ok and nvidia works as well. </ref>
| <references/>
|-
| [[User:troycurtisjr|troycurtisjr]]
| Dell XPS 17 9700 -  i7-10875H  - GeForce RTX 2060 Max-Q - 16GB Ram
| {{result|pass}}<ref>{{bz|1911364}} Tests all passed. Kernel booted fine, no functional issues noted, only the install warning noted with Bug 1911364.
Nvidia module working, external monitor works well. Firefox stable and runs video smoothly.</ref>
| <references/>
|-
| [[User:trugul|trugul]]
| Thinkpad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 , 8 GB RAM, Intel® HD Graphics 4400 (HSW GT2), HDD 128 GB
| {{result|pass}}<ref>I cannot see that my log file was uploaded, hence this manual input.
[truls@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
[truls@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.localhost.localdomain
Thu Jan  7 12:38:14 PM CET 2021
Latency measurements
Thu Jan  7 12:39:20 PM CET 2021
Calculating file system latency
Thu Jan  7 12:39:21 PM CET 2021
Local networking
Thu Jan  7 12:43:02 PM CET 2021
Bandwidth measurements
Thu Jan  7 12:48:15 PM CET 2021
Calculating context switch overhead
Thu Jan  7 12:48:19 PM CET 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:tseewald|tseewald]]
| Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
| {{result|pass}}<ref>1. Default test passed. Performance test passed. No new warnings or errors in dmesg.</ref>
| <references/>
|-
| [[User:udb28|udb28]]
| KVM , Kernel Test Week iso, 10GB RAM 4vCPU
| {{result|pass}}<ref>Test suite with default PASSED
Test suite with performance PASSED</ref>
| <references/>
|-
| [[User:uwueviee|uwueviee]]
| Fedora 33 i7 3770 AMD R9 380 Bare Metal
| {{result|fail}}<ref>cachedrop failed, sysfs-perms warned</ref>
| <references/>
|-
| [[User:vascom|vascom]]
| Ryzen 7 4750G, 32GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:vishald|vishald]]
| description: CPU          product: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz          vendor: Intel Corp.          physical id: 2c          bus info: cpu@0          version: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz          serial: NULL          slot: SOCKET 0          size: 1405MHz          capacity: 2GHz          width: 64 bits          clock: 100MHz
| {{result|pass}}<ref> All test passed </ref>
| <references/>
|-
| [[User:vty67|vty67]]
| Dell Latitude E6320, 2GB, i3-2330M
| {{result|pass}}<ref>Sound, network, WiFi, suspend, resolution change of external monitor/TV (HDMI connected) - everything seems to be OK</ref>
| <references/>
|-
| [[User:vty67|vty67]]
| Thinkpad T440p, 16GB, i5-4300M
| {{result|pass}}<ref>Everything seems to work, but changing external monitor/TV resolution (connected via HDMI) in Gnome Settings locks up system: mouse cursor freezes, no keyboard input possible.</ref>
| <references/>
|-
| [[User:xompax|xompax]]
|
| {{result|pass}}<ref>Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/cachedrop                                              PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/insert_leap_second                                    PASS   
./default/stack-randomness                                      PASS   
./default/libhugetlbfs                                          SKIP   
./default/mq-memory-corruption                                  PASS   
./default/sysfs-perms                                            PASS   
./default/modsign                                                PASS   
./default/posix_timers                                          PASS   
./default/paxtest                                                SKIP   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:xunjin|xunjin]]
| AMD Ryzen 7 3800X 8-Core Processor, 16GiB System Memory, CT1000P1SSD8, RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller
| {{result|pass}}<ref>All tests passed :)</ref>
| <references/>
|-
|}
[[Category:Fedora 34 Test Days]]

Latest revision as of 09:13, 29 March 2021

Kernel 5.10 Test Week
Test-days-banner.svg

Date 2021-01-04 to 2021-01-11
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

This Test Day will focus on the 5.10 linux kernel. The primary aim is as a rebase candidate for Fedora 34 and 33 and 32.

Who's available[edit]

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:

You can chat with us on IRC. See the infobox on top of the page to learn the right IRC channel.

Prerequisite for Test Day[edit]

  • A fully updated test day image or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.10 kernel for an existing installation from F33 koji (see below) or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

Koji download instructions[edit]

Kernel builds can be downloaded from Koji using a command line tool:

koji download-build --arch=x86_64 kernel-5.10.5-200.fc33

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.


Test Results[edit]

Regression Test[edit]

User Profile Regression References
Andyogle MacBook Pro 4GB Intel Core i7-3615QM CPU@2.30GHz x 8
Pass pass
[1]
  1. Passed.
Bodanel Ryzen 3700 - VM with 4 CPUs and 16 GB RAM on nvme SSD
Pass pass
[1]
  1. ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Daniels Lenovo 2in1 14 Intel® Pentium(R) CPU 4415U @ 2.30GHz × 4, LIVE (Bare Metal) (Test Image)
Pass pass
[1]
  1. Test Suite : PASS
Dskobra
Pass pass
[1]
Pass pass
  1. Test suite called with default ./default/timer-overhead PASS ./default/paxtest SKIP ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/modsign PASS ./default/selinux-dac-controls PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ElXreno GPU: NVIDIA GT 525M && Intel HD Graphics 3000 | RAM: 4 GB), nouveau
Pass pass
[1]
  1. Sometimes an error [1] appears in the logs when booting the system and the system hangs. [1]: watchdog: BUG: soft lockup - CPU#3 stuck for 22s! [irq/16-iwlwifi:934]. Test ./default/libhugetlbfs and ./default/paxtest was skipped, all other tests passed successfully. Also the NVIDIA 390xx driver is not building. Everything else works fine. Vulnerability status: itlb_multihit:KVM: Mitigation: VMX disabled | l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | mds:Mitigation: Clear CPU buffers; SMT vulnerable | meltdown:Mitigation: PTI | spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | srbds:Not affected | tsx_async_abort:Not affected
Fedora Kernel Tester i5-6600 bare metal Kernel Test Day Image 5.10.4
Pass pass
[1]
  1. Bug=Screen does not come back after sleep. Have to reboot. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
GuiltyDoggy Ryzen 9 5900X - VMWare - Test image 5.10.4-200.fc33.x86_64
Pass pass
[1]
  1. Default Test Suite: Passed Performance Test Suite: Passed
HRicky
Pass pass
[1]
  1. H/W path Device Class Description
    ===================================================[edit]
                                        system         To Be Filled By O.E.M. (To Be Filled By O.E.M.)
    

    /0 bus H97 Pro4 /0/0 memory 64KiB BIOS /0/d memory 32GiB System Memory /0/d/0 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/1 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/2 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/3 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/e processor Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz /0/e/f memory 256KiB L1 cache /0/e/10 memory 1MiB L2 cache /0/e/11 memory 8MiB L3 cache /0/100 bridge 4th Gen Core Processor DRAM Controller /0/100/1 bridge Xeon E3-1200 v3/4th Gen Core Processor PCI Express x16 Controller /0/100/1/0 display Ellesmere [Radeon RX 470/480/570/570X/580/580X/590] /0/100/1/0.1 multimedia Ellesmere HDMI Audio [Radeon RX 470/480 / 570/580/590] /0/100/2 display Xeon E3-1200 v3/4th Gen Core Processor Integrated Graphics Controller /0/100/3 multimedia Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller /0/100/14 bus 9 Series Chipset Family USB xHCI Controller /0/100/14/0 usb3 bus xHCI Host Controller /0/100/14/0/d input Comfort Curve Keyboard 2000 /0/100/14/0/e input USB Optical Mouse /0/100/14/1 usb4 bus xHCI Host Controller /0/100/14/1/5 scsi6 storage Mass Storage Device /0/100/14/1/5/0.0.0 /dev/sdc disk 7665MB Transcend 8GB /0/100/14/1/5/0.0.0/0 /dev/sdc disk 7665MB /0/100/14/1/5/0.0.0/0/2 /dev/sdc2 volume 15EiB Windows FAT volume /0/100/14/1/5/0.0.0/0/3 /dev/sdc3 volume 17MiB EFI (FAT-12/16/32) partition /0/100/16 communication 9 Series Chipset Family ME Interface #1 /0/100/19 enp0s25 network Ethernet Connection (2) I218-V /0/100/1a bus 9 Series Chipset Family USB EHCI Controller #2 /0/100/1a/1 usb1 bus EHCI Host Controller /0/100/1a/1/1 bus USB hub /0/100/1b multimedia 9 Series Chipset Family HD Audio Controller /0/100/1c bridge 9 Series Chipset Family PCI Express Root Port 1 /0/100/1c.6 bridge 82801 PCI Bridge /0/100/1c.6/0 bridge ASM1083/1085 PCIe to PCI Bridge /0/100/1d bus 9 Series Chipset Family USB EHCI Controller #1 /0/100/1d/1 usb2 bus EHCI Host Controller /0/100/1d/1/1 bus Integrated Hub /0/100/1f bridge H97 Chipset LPC Controller /0/100/1f.2 scsi0 storage 9 Series Chipset Family SATA Controller [AHCI Mode] /0/100/1f.2/0 /dev/sda disk 240GB KINGSTON SA400S3 /0/100/1f.2/0/1 /dev/sda1 volume 50MiB Windows NTFS volume /0/100/1f.2/0/2 /dev/sda2 volume 223GiB Windows NTFS volume /0/100/1f.2/0/3 /dev/sda3 volume 505MiB Windows NTFS volume /0/100/1f.2/1 /dev/sdb disk 120GB Samsung SSD 850 /0/100/1f.2/1/1 /dev/sdb1 volume 1GiB EXT4 volume /0/100/1f.2/1/2 /dev/sdb2 volume 110GiB Linux filesystem partition /0/100/1f.2/0.0.0 /dev/cdrom disk DRW-24D5MT /0/100/1f.3 bus 9 Series Chipset Family SMBus Controller /0/1 system PnP device PNP0c01 /0/2 system PnP device PNP0c02 /0/3 system PnP device PNP0b00 /0/4 generic PnP device INT3f0d /0/5 system PnP device PNP0c02 /0/6 system PnP device PNP0c02 /0/7 system PnP device PNP0c02

Josevaldo CPU: Intel i3-2120 (4) @ 3.300GHz - Memory: 3975MiB / 7891MiB
Pass pass
[1]
  1. Test suite called with default ./default/posix_timers PASS ./default/paxtest SKIP ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/stack-randomness PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/selinux-dac-controls PASS Test suite complete PASS Your log file is being submitted... { "message": "Upload successful!" }The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Mario CPU: Intel® Core™ i7-9700K CPU @ 3.60GHz × 8, GPU: NV168, RAM: 16GB, LIVE (Bare Metal) (Test Image)
Pass pass
Mario Schenker XMG P304 PRO, CPU: Core I5-4210M @2.60GHz x 4, GPU: NV117 / Intel HD 4600, RAM:16GB
Pass pass
Noname Host: 20ALCTO1WW ThinkPad X240, CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT, RAM: 8GB
Pass pass
abrahm Dell XPS 13 9310
Pass pass
abrahm Dell XPS 13 9310, i7-1165G7, f33, 5.10.4-200.fc33.x86_64 from koji
Pass pass
[1]
  1. No general issues on this hardware running 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-98.fc33.x86_64, 5.10.2-200.fc33.x86_64, or 5.10.4-200.fc33.x86_64 (all from koji).
abrahm Dell XPS 13 9370, i7-8640U, 5.10.4-200.fc33.x86_64 from koji
Pass pass
agurenko Baremetal: Ryzen 5900X, 32 Gb RAM, Radeon RX 5700 XT
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
akumar99 VM (AMD Ryzen 9 3900X)
Pass pass
alciregi Dell XPS 13 9360, Intel i7-7500U, F33 Workstation
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 3 aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 4 8GB headless aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alexxvibes GNOME Virtual Box -- 1.9GB Ram / AMD A4-3300 APU / Adata SU650 SSD
Pass pass
alphacluster CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
Pass pass
[1]
  1. No issues
atim CPU: Quad Core model: AMD Ryzen 3 3300X; Graphics: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 455.45.01
Pass pass
[1]
  1. Tests passed. LGTM so far. FS: BTRFS. Can't say anything at this moment about BTRFS performance and any regressions.
augenauf F33 Gnome test box on VirtualBox
Pass pass
[1]
  1. no regression noted. everything works as expected in my F33 test system on VirtualBox.
augenauf baremetal Thinkpad T440s
Pass pass
[1]
  1. Works for me on T440s, no regresssion noted after first day of usage.
bittin
Pass pass
[1]
Pass pass
[2]
  1. 5.10.5 worked good in Virtualbox here
  2. Worked great in my test VM with rawhide in Virtualbox
bohrasd ASUS ROG Zephyrus G14 GA401IV_GA401IV 1.0 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 1726MiB / 15477MiB
Pass pass
[1]
  1. All tests passed.
bojan
Pass pass
[1]
  1. ThinkPad T450s, default and performance tests with 5.10.2-200.fc33.x86_64 pass. The machine runs Gnome fine. WiFi works, as well as ethernet. Also running this kernel on a noname fanless PC with Intel i5 8250U CPU. No regressions yet.
bretth KVM
Pass pass
[1]
  1. default and performance tests passed
bretth dell 5530
Pass pass
[1]
  1. default and performance tests passed
cap Thinkpad T440s, 8G, haswell generation
Pass pass
[1]
  1. Both runtests and runtests -t performance PASS. Also checked gl, webcam, audio and suspend/resume OK.
checkcode
Pass pass
chivux [MOTHERBOARD] Manufacturer: Dell Inc., Model: 0H279K. | [BIOS] Brand: Dell Inc. Version: A05. | [CHIPSET] Vendor: Intel Corporation, Model: 82801HM (ICH8M) LPC Interface Controller. | [GRAPHICS] Vendor: Intel, Driver: i915, Model: Mobile GM965/GL960 Integrated Graphics Controller (secondary). | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
Pass pass
[1]
  1. Date: Tue Jan 5 10:33:05 AM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
    ============================[edit]

    Date: Tue Jan 5 10:35:05 AM EST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None

chivux [MOTHERBOARD] Manufacturer: TOSHIBA, Model: Portable PC, Revision: MP. | [BIOS] Brand: Insyde Corp. Version: 6.20. | [CHIPSET] Vendor: Advanced Micro Devices, Inc. [AMD], Model: FCH LPC Bridge. | [GRAFICS] Vendor: AMD, Driver: Radeon, Model: Trinity 2 [Radeon HD 7520G]. | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
Pass pass
[1]
  1. Date: Mon Jan 4 06:37:36 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
    ================[edit]

    Date: Mon Jan 4 06:41:50 PM EST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None

clasater Dell XPS 17 9700
Pass pass
[1]
  1. Wireless card (Detected Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W), REV=0x354) performance drops dramatically, I get an unstable 150Mbps vs getting 250Mbps with 5.9 kernel Sound card works with most recent Rawhide 5.10 RC build 1204, but does not work with Latest Fedora 5.9 or this test kernel (probably related to https://blog.fts.scot/2020/07/04/dell-xps-2020-how-to-get-audio-working-on-linux/)
clnetbox Intel Core i7-4710MQ CPU (Haswell)
Fail fail
[1]
  1. Audio does not work correctly any longer - no sound from internal speakers Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller (rev 06) Kernel versions tested : 5.10.2-200.fc33.x86_64 / 5.10.3-200.fc33.x86_64 / 5.10.4-200.fc33.x86_64
copperi 5.10.5-200.fc33.x86_64 F33 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
Pass pass
creech Acer Aspire 5680, Core 2 Duo T5500, GeForce Go 7600, 2 GB DDR2 RAM
Fail fail
[1]
  1. ./default/cachedrop failed, all other test were passed or skipped. Don't know what's up with this fail. The kernel seem to run fine. No problems found so far while using it. Btw.: Performance test is passed.
danniel Acer E15 i7 8GB Ram
Pass pass
donaldsebleung Test Day Image using GNOME Boxes (Memory: 1.9 GiB, Processor: Intel® Core™ i5-4250U CPU @ 1.30GHz × 4)
Pass pass
[1]
  1. Some default tests ended with "SKIP"; GCC gives multiple warnings "implicit declaration of function 'lmbench_usage'" with performance tests
eismann AMD Ryzen 3700X - ASUS Strix X570-E - 32 GB - Radeon VII
Pass pass
ejnersan Dell Vostro 3558, Intel i3-4005U, Test-day Image LiveUSB
Pass pass
[1]
  1. [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS [Performance] Pass
ejnersan HP Elitebook 840 G4, Intel i5-7200U, Test-day Image LiveUSB
Pass pass
[1]
  1. [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS [Performance] Pass
emmrou Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
Pass pass
[1]
  1. Everything works fine: sound, video, Wi-fi, bluetooth. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
engineerfear Dell Inspiron 5505 AMD 4700U Live CD Test Image
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609886321.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
engineerfear Lenovo Thinkbook 14 Gen 2 ITL - Intel 11th Gen i5 - live test day image
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second SKIP ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop SKIP ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign SKIP ./default/stack-randomness PASS ./default/selinux-dac-controls SKIP ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609987767.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ersen Desktop PC with Intel Core i3-4160 @3.60 GHz
Pass pass
[1]
  1. Tested with kernel 5.10.3-200.fc33.x86_64, both tests passed. GPU: Intel Integrated Graphics Ethernet: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller No Wi-Fi.
eschruefer@ca-musings.de
Warning warn
[1]
  1. Aarch64: Screen is garbled on a Raspberry Pi 4B. Screen looks as if out of sync (only squashed vertical lines).
figonzal VM: QEMU/KVM, CPU: 2 vCPU / 8 CPU, RAM: 2048 MiB / 7831 MiB, x86_64
Pass pass
[1]
  1. 1 .- All test passed
filiperosset Intel(R) Core(TM) i7-10750H CPU @ 2.60GHz (running inside a VM 8Gig, 12 vcpus)
Pass pass
[1]
Fail fail
[2]
  1. # performance test sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.raw Tue Jan 5 12:27:13 AM -03 2021 Latency measurements Tue Jan 5 12:28:15 AM -03 2021 Calculating file system latency Tue Jan 5 12:28:27 AM -03 2021 Local networking Tue Jan 5 12:30:41 AM -03 2021 Bandwidth measurements Tue Jan 5 12:38:06 AM -03 2021 Calculating context switch overhead Tue Jan 5 12:38:41 AM -03 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. [filiperosset@raw kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/posix_timers PASS ./default/cachedrop PASS ./default/selinux-dac-controls SKIP ./default/stack-randomness PASS ./default/memfd PASS ./default/modsign PASS ./default/insert_leap_second PASS ./default/sysfs-perms PASS ./default/paxtest SKIP ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/timer-overhead FAIL Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected [filiperosset@raw kernel-tests]$
frantisekz i5-6600k, RX 580
Pass pass
[1]
  1. No issues spotted!
geraldosimiao Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.4
Pass pass
[1]
  1. All Kernel regression tests PASSED, normal use for two days without problems.
geraldosimiao Kenel 5.10.5-200.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. Kernel regression tests PASSED, default and performance, normal use for a full day without problems.
geraldosimiao kerneltest-5.10.4.iso on pendrive live-usb session
Pass pass
[1]
  1. I downloaded the kerneltest-5.10.4.iso (from https://jforbes.fedorapeople.org/testweek/ ) and created a pendrive with fedora image writer, them boot it on my Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller, and run the kernel-tests.
granissado CPU: AMD Ryzen 7 5800X / RAM: 2x16GB / Test image
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
harshmangal HP-VMM-2GB-3vCPU
Fail fail
[1]
  1. Test suit called with 'Default'
hhlp CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
Pass pass
[1]
  1. RHBZ #1701322 No Regression Noted, Great Performance. it seem is it not affected by teh bugs before.
hozansahin
Pass pass
[1]
  1. ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hozansahin CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hozansahin CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX (Test İmage)
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
itrymybest80 Fedora 33 (koji upgrade), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.2) & 970 EVO M.2
Pass pass
[1]
  1. RHBZ #1911939 RHBZ #1909891 RHBZ #1887439 RHBZ #1885457 RHBZ #1883621 RHBZ #1884347 Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped. Bugs: 1) VA-API hardware acceleration broken with MESA 20.3 on AMD GPUs. 2) Steam will launch in an invisible window and you have to tab to grab it. 3) Booting Fedora (enter encryption key) now running in 640x480 and wrong 4:3 ratio. 4) Audio cracking and goes on/off multiple times during the boot sequence. 5) I'm still receiving the "run script kernel-core-5.10.4-200.fc33.x86_64 sort: fflush failed: 'standard output': Broken pipe sort: write error gzip: stdout: Broken pipe gzip: stdout: Broken pipe sort: write failed: 'standard output': Broken pipe sort: write error" while installing the kernel-core and kernel-debug-core package 6) DMESG [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. 7) DMESG show_signal_msg: 91 callbacks suppressed lat_rpc[12785]: segfault at 1000 ip 00007fa20b0b63b5 sp 00007fff196daa58 error 4 in libc-2.32.so[7fa20af7a000+14f000]. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
itsmefma default
Pass pass
[1]
  1. Thikpad x1 carbon ( using boxes)
ivzhh Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz, 4300 MHz; nVidia GP104M [GeForce GTX 1070 Mobile]; Samsung Electronics NVMe SSD Controller SM961/PM961; Intel Dual Band Wireless-AC 3168NGW [Stone Peak]; Qualcomm Atheros Killer E2500 Gigabit Ethernet Controller
Fail fail
[1]
  1. Computer automatically shutdown after passing "cachedrop" test in "sudo ./runtests.sh"
jadarius Host: LIFEBOOK E754 10601583232 CPU: Intel i5-4200M (4) @ 3.100GHz GPU: Intel 4th Gen Core Processor Memory: 1525MiB / 7832MiB
Pass pass
[1]
  1. All tests passed.
jasonhong Ryzen 3600 VM with 4 CPU and 8 GB RAM - copr image 5.10.4-200.fc33.x86_64
Pass pass
[1]
Pass pass
[2]
  1. All (Default and Performance) tests passed
  2. Default Test Suite: Passed Performance Test Suite: Passed
jbonilla Dell XPS 17 9700
Pass pass
[1]
  1. Audio is still not working on Dell XPS 17 9700 (Dummy Output): All of the tests passed. System performs well with the exception that audio devices not being detected. Date: Sun Jan 3 07:20:44 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
    ================================================[edit]

    Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop

    Setting time to Mon Jan 4 18:59:50 2021 Scheduling leap second for Mon Jan 4 19:00:00 2021 Mon Jan 4 18:59:57 2021 + 246 us (37) TIME_INS Mon Jan 4 18:59:57 2021 + 500512 us (37) TIME_INS Mon Jan 4 18:59:58 2021 + 777 us (37) TIME_INS Mon Jan 4 18:59:58 2021 + 501046 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 1331 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 501494 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 1616 us (38) TIME_OOP Mon Jan 4 18:59:59 2021 + 501731 us (38) TIME_OOP Mon Jan 4 19:00:00 2021 + 1887 us (38) TIME_WAIT Mon Jan 4 19:00:00 2021 + 502072 us (38) TIME_WAIT Mon Jan 4 19:00:01 2021 + 2333 us (38) TIME_WAIT Mon Jan 4 19:00:01 2021 + 502598 us (38) TIME_WAIT Mon Jan 4 19:00:02 2021 + 2849 us (38) TIME_WAIT Leap complete

    Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/paxtest Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0295871 s, 3.5 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00444862 s, 2.4 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/timer-overhead Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/stack-randomness Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/sysfs-perms Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE

jcwillia Intel(R) Core(TM) i7-5557U CPU @ 3.10GHz (4 cores), 32GB RAM
Pass pass
jnk0 Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
Pass pass
[1]
  1. 1. All tests passed. Gnome freezes when screen is locked. No input is possible via mouse or keyboard. Multiple monitors connected via docking station. Worked fine with kernel 5.9.
johnh12345 Oracle VM VirtualBox Fedora 33 5.10.4-200.fc33.x86_64 2 CPUs 4GB RAM
Fail fail
[1]
Fail fail
[2]
  1. Had to hit control-c on the insert leap second test as it would just hang. cat kernel-test-1609904486.log.txt Date: Tue Jan 5 10:41:26 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: FAIL Failed Tests: ./default/insert_leap_second ./default/timer-overhead Warned Tests: None
    ================================================[edit]

    Starting test ./default/sysfs-perms

    Starting test ./default/memfd

    memfd: CREATE

    memfd: BASIC

    memfd: SEAL-WRITE

    memfd: SEAL-SHRINK

    memfd: SEAL-GROW

    memfd: SEAL-RESIZE

    memfd: SHARE-DUP

    memfd: SHARE-MMAP

    memfd: SHARE-OPEN

    memfd: SHARE-FORK

    memfd: SHARE-DUP (shared file-table)

    memfd: SHARE-MMAP (shared file-table)

    memfd: SHARE-OPEN (shared file-table)

    memfd: SHARE-FORK (shared file-table)

    memfd: DONE

    Starting test ./default/modsign

    Successfully loaded signed module

    Successfully loaded unsigned module

    Starting test ./default/mq-memory-corruption

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Test PASSED

    Starting test ./default/insert_leap_second

    Starting test ./default/posix_timers

    Testing posix timers. False negative may happen on CPU execution

    based timers if other threads run on the CPU...

    Check itimer virtual... [OK]

    Check itimer prof... [OK]

    Check itimer real... [OK]

    Check timer_create() per thread... [OK]

    Check timer_create() per process... [OK]

    Starting test ./default/timer-overhead

    Unacceptable long delay; asked for 1000 usec, got 2597 usec

    Test failure.

    Starting test ./default/stack-randomness

    Starting test ./default/libhugetlbfs

    Starting test ./default/paxtest

    Starting test ./default/cachedrop

    100+0 records in

    100+0 records out

    104857600 bytes (105 MB, 100 MiB) copied, 0.0533018 s, 2.0 GB/s

    cat: /proc/sys/vm/drop_caches: Permission denied

    ./drop_caches.sh: line 32: [: -ne: unary operator expected

    cat: /proc/sys/vm/drop_caches: Permission denied

    ./drop_caches.sh: line 32: [: -ne: unary operator expected

    10+0 records in

    10+0 records out

    10485760 bytes (10 MB, 10 MiB) copied, 0.00343501 s, 3.1 GB/s

    cat: /proc/sys/vm/drop_caches: Permission denied

    ./drop_caches.sh: line 32: [: -ne: unary operator expected

    TestPASS: /proc/sys/vm/drop_caches PASS

    Starting test ./default/selinux-dac-controls

    <no matches>

  2. Had to hit control-C on the insert leap second as it would just hang there. All other tests passed.
jortegi
Pass pass
jpbn iMac warly 2008 efi
Fail fail
kabirgupta
Pass pass
kameleon CPU: Intel Core i5-8250U @ 1.60GHz
Pass pass
kameleon CPU: Intel Core i5-8250U @ 1.60GHz RAM: 4G DDR
Pass pass
[1]
  1. Tested on Fedora 33 VM using Boxes While running runtests.sh - t performance, received the following error: "In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2"
keepfloyding
Fail fail
[1]
  1. Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance suite passed.
keepfloyding Thinkpad X1 Carbon Gen 8. 16 gb RAM i7 CPU; Run on Gnome Boxes
Fail fail
[1]
  1. Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance suite passed.
kennyh7279 Ryzen 5 2600, Radeon 5600XT, 32GB RAM, Fedora 33 Workstation
Pass pass
[1]
  1. Date: Tue Jan 5 12:56:58 PM PST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None

    Date: Tue Jan 5 12:59:18 PM PST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None

kiko964 Intel Core i7-4702MQ VirtualBox
Pass pass
[1]
Fail fail
[2]
  1. Performance tests passed
  2. Default test: Failed Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
knarra 20QES2P40L (LENOVO_MT_20QE_BU_Think_FM_ThinkPad X1 Carbon 7th)
Pass pass
[1]
  1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown 1382MB OK 1382MB OK 1382MB OK mhz: should take approximately 297 seconds Using config in CONFIG.localhost-live Tue Jan 5 08:42:57 AM EST 2021 Latency measurements Tue Jan 5 08:50:44 AM EST 2021 Calculating file system latency Tue Jan 5 08:54:33 AM EST 2021 Local networking Tue Jan 5 09:01:26 AM EST 2021 Bandwidth measurements Tue Jan 5 10:04:18 AM EST 2021 Calculating context switch overhead Tue Jan 5 10:16:13 AM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS bash-5.0$ sudo ./runtests.sh -t performance Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
kubot Intel® Core™ i7-3630QM CPU @ 2.40GHz × 8 ; NVE7 / Intel® HD Graphics 4000 (IVB GT2); RAM 8gb. 1TB samsung evo 850 ssd
Pass pass
kuladog F33, bare metal, HP EliteBook 840 G2, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4, 16 GB RAM
Pass pass
[1]
  1. 1. Both default, and performance tests passed.
lam i7-9700K, Z390, 1080 Ti, nvidia drivers 460.32.03 (rpmfusion testing repo)
Pass pass
ledufff
Pass pass
[1]
  1. Temperature improved dramatically.
ledufff ThinkPad E495 AMD Ryzen 5 3500U
Pass pass
[1]
  1. Temperature improved dramatically.
lewis41 Test day image on VM
Pass pass
lily HP BL460c G5 bay 4
Pass pass
lily ampere hr330a
Pass pass
[1]
  1. all default and performance testcases passed
lily apm mustang
Pass pass
lily dell pem905
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per7425
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe bl480c
Pass pass
lily hpe dl20gen9
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe sl2x160zg6
Pass pass
lily ibm x3250m4
Pass pass
[1]
  1. all default and performance testcases passed
lily lenovo rd230
Pass pass
[1]
  1. all default and performance testcases passed
lily lenovo st550
Pass pass
[1]
  1. all default and performance testcases passed
lily rdma dev
Pass pass
[1]
  1. all default and performance testcases passed
lnie HP ProLiant DL120 G6
Pass pass
luya HP Envy X360 Convertible 15 Ryzen 2500U
Pass pass
[1]
  1. All test passed with no sign of regression.
marc84 USB kerneltest-5.10.4.iso on Lenovo ideapad Y570
Pass pass
[1]
  1. Run default test suite and performance test suite: PASS
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
Fail fail
[1]
  1. RHBZ #1912061 suspend/resume doesn't work for me. it looks like same as "Bug 1912061 - Resume failure on 5.10.4-200.fc33 kernel". btw, kernel regression test tool passed and video, sound, kvm are work fine.
maumar Live image on Dell Latitude e6540 (i7 4810MQ, Radeon HD 8790M)
Pass pass
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU
Pass pass
[1]
  1. All test passed on kernel 5.10.4-200.fc33.x86_64. Day to day experience is ok without any obvious regression.
miguel7ra Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
Pass pass
[1]
  1. All tests passed
miguel7ra Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
Pass pass
[1]
  1. 1. Default and Performance Passed
morphy2k OS: Fedora 33 Workstation, ENV: baremetal, KERNEL: 5.10.4-200.fc33.x86_64, DEVICE: Lenovo ThinkPad T14 AMD Gen 1, CPU: AMD Ryzen 7 Pro 4750U, RAM: 32GB DDR4-3200
Pass pass
[1]
  1. All tests passed. No issues after 2 days of use
murph Vendor ID: AuthenticAMD CPU family: 23 Model: 49 Model name: AMD EPYC-Rome Processor Stepping: 0 CPU MHz: 3593.250 BogoMIPS: 7186.50 Virtualization: AMD-V Hypervisor vendor: KVM
Pass pass
[1]
  1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
mzink Lenovo ThinkPad T480s
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
mzink ThinkPad T480s
Fail fail
[1]
  1. Screen is not waking up after DPMI sleep while using docking station - not responding to any keys. Builtin display works fine. Older 5.10.0-98.fc33.x86_64 build seems to work fine.
nielsenb Compaq 8510w Intel T9300 AMD RV630
Pass pass
[1]
  1. libhugetlbfs, paxtest SKIP, all others PASS
norbertj Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD 6450 and 4 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
oldoc63 Intel Gigabyte I5 8 MB Ram 1 T HD uname --all 5.9.16-200.fc33.x86_64 #1 SMP Mon Dec 21 14:08:22 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
Fail fail
[1]
  1. [oldoc@localhost ~]$ cd kernel-tests [oldoc@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop FAIL ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms WARN ./default/timer-overhead PASS Test suite complete FAIL Your log file is being submitted... Traceback (most recent call last): File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module> submitclient.login( File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login response = openid_login( File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected [oldoc@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.localhost.localdomain Tue Dec 29 08:48:17 AM -04 2020 Latency measurements Tue Dec 29 08:49:19 AM -04 2020 Calculating file system latency Tue Dec 29 08:49:30 AM -04 2020 Local networking Tue Dec 29 08:53:27 AM -04 2020 Bandwidth measurements Tue Dec 29 09:00:10 AM -04 2020 Calculating context switch overhead Tue Dec 29 09:00:45 AM -04 2020 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Traceback (most recent call last): File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module> submitclient.login( File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login response = openid_login( File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
oscarholst Lenovo ThinkCentre M92P (Intel Core i5-3550 3.30GHz, 8192MB DDR3 1600MHz, intel graphics) Live iso usb kernel test
Pass pass
oscarholst Lenovo ThinkPad T440s (Intel Core i5-4200U 2.6GHz, 12GB DDR3, Intel HD Graphics 4400) live-usb kernel-test
Pass pass
[1]
  1. All tests passed.
pdapp Intel board DH87RL G3220 3.0 Ghz , 16 GB RAM, i915,
Pass pass
[1]
  1. i915 gpu problem remains.
phoebos Test Day live image; ThinkPad T480; Intel(R) Core(TM) i5-8350U CPU @ 1.70GHz
Pass pass
[1]
  1. All tests passed
plumchii Samsung NP350V5C-S06FR
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms WARN ./default/timer-overhead PASS Test suite complete WARN Performance Test Passed
pwhalen AMD Seattle (aarch64)
Pass pass
pwhalen Ampere eMag
Pass pass
pwhalen BananaPi (ARMv7)
Pass pass
pwhalen BeagleBoneBlack (ARMv7)
Pass pass
pwhalen Mustang (aarch64)
Pass pass
rainmakerraw AMD Threadripper 3960X (24c48t) at stock, Asus RoG Strix TRX40-E Gaming motherboard, 32GB DDR4 3600MHz (16,16,16,36), AMD Radeon Vega 56 (amdgpu), Intel I211-AT NIC
Pass pass
[1]
  1. All hardware seems to be working fine as before (on default release kernel 5.9.16). However the sound output has changed from two speaker stereo (which is what's plugged in) to 7.1 surround in the Gnome settings 'test' utility. lm_sensors also now reports an error: ERROR: Can't get value of subfeature energy1_input: Kernel interface error energy1: N/A This is repeated 25 times (energy1, energy2... etc). As requested on the Wiki page, here is the vulnerability output from the end of the test: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rhachey VirtualBox: oracle 6.1.16 R140961
Fail fail
[1]
  1. ./default/cachedrop PASS ./default/insert_leap_second FAIL ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL
rimuru VM: GNOME BOXES, cpu 4, memory 2GB
Pass pass
[1]
  1. LGTM bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
robbinespu Virtualization: oracle (virtualbox 6.1.16. r140961) , Kernel: Linux 5.10.4-200.fc33.x86_64, Architecture: x86-64
Fail fail
[1]
  1. $ cat kernel-test-1609405976.log.txt Date: Thu Dec 31 05:12:56 PM +08 2020 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: FAIL Failed Tests: ./default/insert_leap_second Warned Tests: None
    ================================================[edit]

    Starting test ./default/stack-randomness Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/paxtest Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/insert_leap_second Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0561409 s, 1.9 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00455177 s, 2.3 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/libhugetlbfs Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/sysfs-perms Starting test ./default/timer-overhead Starting test ./default/selinux-dac-controls

rootxaman description: Computer product: Standard PC (Q35 + ICH9, 2009) vendor: QEMU version: pc-q35-5.1 width: 64 bits capabilities: smbios-2.8 dmi-2.8 smp vsyscall32 configuration: boot=normal
Pass pass
[1]
  1. 1. All tests passed
sbakker Fedora 33, DELL XPS 13 9310, nvme SSD, AX500 DBS WiFi
Pass pass
[1]
  1. WiFi does not survive suspend/resume cycle; can "rmmod" the ath11k_pci module which takes a long while, then reload it. Note that the 5.11 (rc2) kernel from Rawhide does not have this problem.
sgraf (1) Virtual Machine, (2) NUC10i7FNH
Fail fail
[1]
  1. RHBZ #1911836 Bug 1911836 - Cannot boot kernel 5.10 on Silverblue
shiwanibiradar Lenevo ideapad330 KVM 2Gb fedora33
Pass pass
[1]
  1. All test passed
siddharthvipul1 F32 on Thinkpad T480s
Pass pass
[1]
  1. Test Suite completed with "PASS"
siddy555 Virtualbox,Acer Aspire A515-51g, Intel i5 7200U 1 core, 2048 / 7837 MB memory, 30 GB VDI. Test Day Image F33, kerneltest-5.10.4.iso
Fail fail
[1]
  1. Didn't go through "insert_leap_second" test for lot of time pressed ctrl+c, rest all tests passed. Performance tests passed.
simon13
Pass pass
skontar ThinkPad L440, Intel Pentium 3550M, RAM 3.56 GiB used: 602.2 MiB (16.5%)
Fail fail
[1]
  1. RHBZ #1908736 Used test image. Cachedrop test FAILED. GPU hangs when opening Firefox or running "Install to hard drive", seems to be the same as https://bugzilla.redhat.com/show_bug.cgi?id=1908736 . Also on start it seems to hang once, you can see random garbage on the screen for a while instead of the grub menu, then it starts. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
smearumi Lenovo G40, Core i5, 8GB RAM, 128SSD
Pass pass
[1]
  1. Test suite called with default ./default/modsign PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/paxtest SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS Test suite complete PASS 5511MB OK 5511MB OK 5511MB OK mhz: should take approximately 297 seconds Using config in CONFIG.localhost.localdomain Sun Jan 10 06:44:24 PM +06 2021 Latency measurements Sun Jan 10 06:52:08 PM +06 2021 Calculating file system latency Sun Jan 10 06:55:56 PM +06 2021 Local networking Sun Jan 10 07:01:31 PM +06 2021 Bandwidth measurements Sun Jan 10 08:11:43 PM +06 2021 Calculating context switch overhead Sun Jan 10 08:24:37 PM +06 2021 ./performance/lmbench3 PASS Test suite complete PASS
sumantrom KVM , Kernel Test Week iso, 4GB RAM 2vCPU
Pass pass
[1]
  1. All works fine with test suite called with "default"
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb Ram
Pass pass
[1]
  1. All tests passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
t3rm1n4l Dell Inspiron 3180 11"
Pass pass
[1]
Pass pass
[2]
  1. all tests passed on 5.10.5, previous bug is resolved
  2. RHBZ #1911043 all tests pass. Bug can be worked around with amdgpu.dc=0, also happened with 5.10.2-200 (x86_64). have been running 5.10.2 for over a week with no issues (aside from the amdgpu bug). I have no issues on either of the intel desktops I have access to. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
thunderbirdtr 16 × Intel® Core™ i7-10875H CPU @ 2.30GHz / Nvidia RTX 2070 Super / 32GB RAM
Pass pass
[1]
  1. Tests are ok and nvidia works as well.
troycurtisjr Dell XPS 17 9700 - i7-10875H - GeForce RTX 2060 Max-Q - 16GB Ram
Pass pass
[1]
  1. RHBZ #1911364 Tests all passed. Kernel booted fine, no functional issues noted, only the install warning noted with Bug 1911364. Nvidia module working, external monitor works well. Firefox stable and runs video smoothly.
trugul Thinkpad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 , 8 GB RAM, Intel® HD Graphics 4400 (HSW GT2), HDD 128 GB
Pass pass
[1]
  1. I cannot see that my log file was uploaded, hence this manual input. [truls@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... [truls@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.localhost.localdomain Thu Jan 7 12:38:14 PM CET 2021 Latency measurements Thu Jan 7 12:39:20 PM CET 2021 Calculating file system latency Thu Jan 7 12:39:21 PM CET 2021 Local networking Thu Jan 7 12:43:02 PM CET 2021 Bandwidth measurements Thu Jan 7 12:48:15 PM CET 2021 Calculating context switch overhead Thu Jan 7 12:48:19 PM CET 2021 ./performance/lmbench3 PASS Test suite complete PASS
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
Pass pass
[1]
  1. 1. Default test passed. Performance test passed. No new warnings or errors in dmesg.
udb28 KVM , Kernel Test Week iso, 10GB RAM 4vCPU
Pass pass
[1]
  1. Test suite with default PASSED Test suite with performance PASSED
uwueviee Fedora 33 i7 3770 AMD R9 380 Bare Metal
Fail fail
[1]
  1. cachedrop failed, sysfs-perms warned
vascom Ryzen 7 4750G, 32GB RAM
Pass pass
vishald description: CPU product: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz vendor: Intel Corp. physical id: 2c bus info: cpu@0 version: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz serial: NULL slot: SOCKET 0 size: 1405MHz capacity: 2GHz width: 64 bits clock: 100MHz
Pass pass
[1]
  1. All test passed
vty67 Dell Latitude E6320, 2GB, i3-2330M
Pass pass
[1]
  1. Sound, network, WiFi, suspend, resolution change of external monitor/TV (HDMI connected) - everything seems to be OK
vty67 Thinkpad T440p, 16GB, i5-4300M
Pass pass
[1]
  1. Everything seems to work, but changing external monitor/TV resolution (connected via HDMI) in Gnome Settings locks up system: mouse cursor freezes, no keyboard input possible.
xompax
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/insert_leap_second PASS ./default/stack-randomness PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/posix_timers PASS ./default/paxtest SKIP Test suite complete PASS
xunjin AMD Ryzen 7 3800X 8-Core Processor, 16GiB System Memory, CT1000P1SSD8, RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller
Pass pass
[1]
  1. All tests passed :)