From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 67: Line 67:


== Test Results ==
== Test Results ==
=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Daniels|Daniels]]
| QEMU Standard PC _Q35 + ICH9, 2009_
| {{result|pass}}
| <references/>
|-
| [[User:Fabrizio Curcio|Fabrizio Curcio]]
| KVM Guest F34 on Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz with 16GB RAM (Live Image)
| {{result|pass}}
| <references/>
|-
| [[User:Luigi Votta|Luigi Votta]]
| Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 16 GB Asus H170-PRO
| {{result|pass}}
| <references/>
|-
| [[User:Typijay|Typijay]]
| Dell Latitude E6540 i5-4310M
| {{result|pass}}
| <references/>
|-
| [[User:abstractobject|abstractobject]]
| https://linux-hardware.org/?probe=2c4c458feb
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| KVM on Proxmox VE, x86_64, UEFI
| {{result|pass}}<ref>Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| KVM on Proxmox VE, x86_64, bios
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lenovo V330-15IKB Type 81AX
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lenovo X1 Crabon gen 8
| {{result|pass}}<ref>5.13.2-300.fc34.x86_64
Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Pinebook Pro
| {{result|pass}}<ref>5.13.2 works</ref>{{result|fail}}<ref>https://lists.fedoraproject.org/archives/list/arm@lists.fedoraproject.org/thread/FP75DNNFIUUT2TE6UFAMDZCTKRZSCEVR/</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 aarch64 no GUI
| {{result|pass}}<ref>WiFi works.
Bluethoot not tested.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:amolenaar|amolenaar]]
| Lenovo X1 Carbon 7th / Lenovo X1 Carbon 9th
| {{result|pass}}
| <references/>
|-
| [[User:anantj12|anantj12]]
| Macbook Pro 2019 - Virtualbox
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:ananya26-vishnoi|ananya26-vishnoi]]
| Hp-14s er0003tu  Virtual Box
| {{result|fail}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:ananya26-vishnoi|ananya26-vishnoi]]
| Hp-14s er0003tu  Virtualbox
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:andilinux|andilinux]]
| KVM libvirt
| {{result|pass}}<ref>tested on F34 KDE</ref>
| <references/>
|-
| [[User:andilinux|andilinux]]
| Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
| {{result|pass}}<ref>1. basic set of tests  - result: fail
2. performance test suite - result: pass</ref>
| <references/>
|-
| [[User:andilinux|andilinux]]
| Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
| {{result|pass}}
| <references/>
|-
| [[User:andilinux|andilinux]]
| Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
| {{result|pass}}<ref>-</ref>
| <references/>
|-
| [[User:andilinux|andilinux]]
| Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
| {{result|pass}}
| <references/>
|-
| [[User:atim|atim]]
| CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
| {{result|pass}}
| <references/>
|-
| [[User:bacbka|bacbka]]
| Virt-manager
| {{result|fail}}<ref>Cachedrop test was failed.</ref>
| <references/>
|-
| [[User:bandithijo|bandithijo]]
| https://linux-hardware.org/?probe=3e43acf8af
| {{result|pass}}<ref>1. https://apps.fedoraproject.org/kerneltest/logs/49566
2. https://apps.fedoraproject.org/kerneltest/logs/49567</ref>
| <references/>
|-
| [[User:bandithijo|bandithijo]]
| https://linux-hardware.org/?probe=63d761d915
| {{result|pass}}<ref>Result default test:
https://apps.fedoraproject.org/kerneltest/logs/49563
Result performance test:
https://apps.fedoraproject.org/kerneltest/logs/49564</ref>
| <references/>
|-
| [[User:belegdol|belegdol]]
| ASUS ZenBook 14 UM425IA
| {{result|pass}}<ref>Regression and performance tests passed, modern standby is finally working on my machine without the need for additional patches.</ref>
| <references/>
|-
| [[User:belegdol|belegdol]]
| ASUS ZenBook 14 UM425IA Ryzen 5 4500U 16 GB RAM
| {{result|pass}}<ref>Modern standby is finally working on my machine without the need for additional patches.</ref>
| <references/>
|-
| [[User:bittin|bittin]]
| HP 655
| {{result|warn}}<ref>Took Sunday off</ref>{{result|pass}}<ref>Took Sunday off</ref>{{result|warn}}<ref>Took Saturday off </ref>{{result|pass}}{{result|pass}}{{result|pass}}{{result|pass}}{{result|pass}}{{result|pass}}{{result|pass}}
| <references/>
|-
| [[User:bittin|bittin]]
| Virtualbox
| {{result|warn}}<ref>Took Sunday off</ref>{{result|warn}}<ref>Took Saturday off </ref>{{result|fail}}{{result|pass}}{{result|pass}}{{result|fail}}{{result|pass}}{{result|pass}}{{result|pass}}
| <references/>
|-
| [[User:bkircher|bkircher]]
| Lenovo ThinkPad T490s, Intel(R) Core(TM) i5-8365U
| {{result|pass}}<ref>Both passed</ref>
| <references/>
|-
| [[User:bojan|bojan]]
| Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.13.2-300.fc34.x86_64
| {{result|pass}}<ref>Default and performance tests passed on both machines.</ref>{{result|pass}}
| <references/>
|-
| [[User:bretth|bretth]]
| 5.13.1 KVM - 2CPU, 2GB RAM, Q35 chipset
| {{result|pass}}<ref>Default & performance tests pass</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| 5.13.2 KVM - 2CPU, 2GB RAM, Q35 chipset
| {{result|pass}}<ref>Default & performance tests pass</ref>
| <references/>
|-
| [[User:bruno|bruno]]
| Inspiron 1545
| {{result|pass}}<ref>{{bz|1982213}} There is a pause during boot that isn't there for 5.12 and earlier kernels. There was a warning for ./default/sysfs-perms. Otherwise things seem to be working OK.</ref>
| <references/>
|-
| [[User:bruno|bruno]]
| MacBookAir4,2
| {{result|pass}}<ref>There was a warning for ./default/sysfs-perms.
The system seems to function normally.</ref>
| <references/>
|-
| [[User:buckaroogeek|buckaroogeek]]
| Raspberry PI 4, 5.13.1-300.fc34.aarch64
| {{result|pass}}<ref>stack-randomness, libhugetlbfs, paxtest have result SKIP. otherwise PASS.</ref>
| <references/>
|-
| [[User:buckaroogeek|buckaroogeek]]
| kvm-libvvirt, x86_64, AMD EPYC Processor (with IBPB)
| {{result|pass}}<ref>./default/libhugetlbfs, ./default/paxtest, ./default/insert_leap_second have result SKIP; otherwise PASS</ref>
| <references/>
|-
| [[User:clnetbox|clnetbox]]
|
| {{result|fail}}<ref>CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getiing stuck at "Initializing nvidia-drm". Tested drivers : 460/465/470</ref>
| <references/>
|-
| [[User:clnetbox|clnetbox]]
| SCHENKER XMG PRO 17 | Intel Core i7-10875H | 2 x 16 GB (32 GB) DDR4-3200 Crucial | 2 x 500 GB M.2 Samsung 970 EVO Plus | 1 TB Samsung 870 EVO | NVIDIA GeForce RTX 2070 Mobile (Refresh) | Fedora 34 Workstation | GNOME 40
| {{result|fail}}<ref>CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getting stuck at "Initializing nvidia-drm". Tested drivers : NVIDIA 460/465/470</ref>
| <references/>
|-
| [[User:condor|condor]]
| Virt-manager
| {{result|fail}}<ref>The cachedrop test failed.</ref>
| <references/>
|-
| [[User:coolomatics|coolomatics]]
| Gigabyte Technology Co., Ltd. A520M S2H, AMD® Ryzen 5 3600 6-core processor × 12
| {{result|fail}}<ref>{{bz|445408}} {{bz|442544}} /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:coolomatics|coolomatics]]
| Lenovo ThinkPad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:copperi|copperi]]
| 5.13.1-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
| {{result|pass}}
| <references/>
|-
| [[User:csutter|csutter]]
| Dell XPS 9310 i7-1185G7 32GB (Live Image)
| {{result|pass}}<ref>Regression and performance tests pass</ref>
| <references/>
|-
| [[User:danniel|danniel]]
| lenovo ideapad S145 I7-8565U 8GB
| {{result|pass}}
| <references/>
|-
| [[User:dhugh|dhugh]]
| ASUS TUF A17 FA706IU_TUF706IU, AMD® Ryzen 7 4800h, 16 GB MEM
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Kernel 5.13.1; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Kernel 5.13.2; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
| {{result|pass}}
| <references/>
|-
| [[User:drakkai|drakkai]]
| Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F34
| {{result|pass}}
| <references/>
|-
| [[User:evillagr|evillagr]]
| KVM, x86_64, Test Day IOS updated
| {{result|pass}}
| <references/>
|-
| [[User:flash2071|flash2071]]
| https://linux-hardware.org/?probe=731361283a
| {{result|pass}}<ref>After ```sudo ./runtests.sh``` were 2 skips:
./default/libhugetlbfs                                          SKIP
./default/paxtest                                                SKIP
</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.13.1-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
| {{result|pass}}<ref>All tests PASSED, no regressions found.</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.13.2-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
| {{result|pass}}<ref>no regressions found. kernel kernel-5.13.2-300.fc34</ref>
| <references/>
|-
| [[User:glennzo|glennzo]]
| Fedora 34 Workstation / VirtualBox / Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz
| {{result|fail}}<ref>./default/timer-overhead                                        FAIL</ref>
| <references/>
|-
| [[User:gtwilliams|gtwilliams]]
| XPS-13
| {{result|pass}}
| <references/>
|-
| [[User:hmorish|hmorish]]
| fedora34, intel core i7-3630QM, RAM8GB, GNOME-Boxes-VM
| {{result|pass}}
| <references/>
|-
| [[User:hyphop|hyphop]]
| Aarch64 amlogic meson khadas VIM3
| {{result|warn}}<ref>{{bz|123123123}} VIM3 soundcard cant works without  CONFIG_COMMON_CLK_AXG_AUDIO=m|y
grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1*
/boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
/boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
/boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set</ref>
| <references/>
|-
| [[User:ibims|ibims]]
| VirtualBox 6.1.22
| {{result|pass}}<ref>./default/modsign                                                PASS   
./default/memfd                                                  PASS   
./default/mq-memory-corruption                                  PASS   
./default/cachedrop                                              PASS   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  SKIP   
./default/paxtest                                                SKIP   
./default/sysfs-perms                                            PASS   
./default/libhugetlbfs                                          SKIP   
./default/stack-randomness                                      PASS   
./default/timer-overhead                                        PASS   
./default/insert_leap_second                                    SKIP   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 21.1.4-1) & 970 EVO M.2
| {{result|pass}}<ref>Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.</ref>
| <references/>
|-
| [[User:jnk0|jnk0]]
| Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
| {{result|pass}}
| <references/>
|-
| [[User:kernel tester|kernel tester]]
| Desktop i5-6600 bare metal, HD Graphics 530 (Skylake GT2), 16GB RAM, with F34 5.13.1 test day image
| {{result|pass}}<ref>Default and Performance passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
</ref>
| <references/>
|-
| [[User:kernel tester|kernel tester]]
| Laptop i5-7200U bare metal, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), with F34 5.13.1 test day image
| {{result|pass}}<ref>Default and performance tests passed.</ref>
| <references/>
|-
| [[User:leekaize|leekaize]]
| ASUS X556UR 5.13.2-300.fc34.x86_64
| {{result|pass}}<ref> ./default/sysfs-perms WARN. Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx</ref>
| <references/>
|-
| [[User:leekaize|leekaize]]
| https://linux-hardware.org/?probe=477a92a37e
| {{result|pass}}<ref>./default/sysfs-perms WARN
Reason of WARN status not indicated.</ref>
| <references/>
|-
| [[User:levait|levait]]
| Lenovo Thinkpad X230
| {{result|pass}}<ref>default: https://apps.fedoraproject.org/kerneltest/logs/49764
performance: https://apps.fedoraproject.org/kerneltest/logs/49766</ref>
| <references/>
|-
| [[User:levait|levait]]
| https://linux-hardware.org/?probe=a70e5b8b1d
| {{result|pass}}<ref>default: https://apps.fedoraproject.org/kerneltest/logs/49581
performance: https://apps.fedoraproject.org/kerneltest/logs/49584</ref>
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr330a
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr350a
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  per7415
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  per805
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| fujitsu  fx700
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  apache
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl120gen10
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl360g5
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| ibm  x3250m4
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  rd230
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  sr655
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| qualcomm  amberwing
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| rdma  dev
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:malucious|malucious]]
| Test  Image.Qemu guest. Host: i7-6700K. Asus Z170A.
| {{result|pass}}<ref>/default/libhugetlbfs, and default/paxtest were skipped in the first test.</ref>
| <references/>
|-
| [[User:masami|masami]]
| i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, kernel 5.13.1-300.fc34.x86_64
| {{result|pass}}<ref>All tests passed. no regressions noted. Works fine for daily use.</ref>
| <references/>
|-
| [[User:max_rodriguez|max_rodriguez]]
| Latest VirtualBox VM (Live 5.13.1 Kernel Testing Media): Intel i7-8750H @ 2.200GHz (2 Cores Given), 2048 MB RAM, 15GB Virtual Disk.
| {{result|fail}}<ref>Default Test Suite : PASS [LGTM]
Performance Test Suite : FAIL [Crashed 3 times during testing, first run gave multiple GCC warnings if thats normal?]</ref>
| <references/>
|-
| [[User:mbfedora|mbfedora]]
|
| {{result|pass}}
| <references/>
|-
| [[User:mborland1 |mborland1 ]]
| Intel i5-10500 w/32 GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:mcrts|mcrts]]
| https://linux-hardware.org/?probe=eb857365c7
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:merkaba|merkaba]]
| Lenovo ThinkPad T440p
| {{result|pass}}
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.13.1-300.fc34.x86_64
| {{result|pass}}<ref> All tests PASSED, no regressions found. </ref>
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo P1G3
| {{result|warn}}<ref>The tests passed - but I seem to be having suspend/resume issues. Nothing obvious in the kernel logs so far - but it's not always coming back from resume. I'll do some more digging but wanted to flag it.
Also on dock hotplug the USB hub in the dock isn't detected</ref>{{result|pass}}
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo T14 AMD G1
| {{result|pass}}
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo X1 nano
| {{result|pass}}
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo X13 G1 AMD
| {{result|pass}}
| <references/>
|-
| [[User:mpearson|mpearson]]
| X1 Carbon G9
| {{result|pass}}
| <references/>
|-
| [[User:mythcat|mythcat]]
| https://linux-hardware.org/?probe=7b4c090391
| {{result|pass}}
| <references/>
|-
| [[User:mzink|mzink]]
| Lenovo T480s F34 - 5.13.1-300.fc34.x86_64
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop  PASS   
./default/insert_leap_second PASS   
./default/libhugetlbfs SKIP   
./default/memfd PASS   
./default/modsign PASS   
./default/mq-memory-corruption PASS   
./default/paxtest  SKIP   
./default/posix_timers  PASS   
./default/selinux-dac-controls PASS   
./default/stack-randomness PASS   
./default/sysfs-perms PASS   
./default/timer-overhead  PASS
 
Test suite complete PASS</ref>
| <references/>
|-
| [[User:nhfed|nhfed]]
| kerneltest-5.13.1.iso on bare metal Lenovo X1C9
| {{result|pass}}<ref>Default & performance tests passed.</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| HP Compaq 8510w Intel T9300 AMD RV630 BIOS
| {{result|pass}}
| <references/>
|-
| [[User:nitsharma|nitsharma]]
| Virt-manager - boxes
| {{result|fail}}<ref>./runtests.sh Failed | /default/cachedrop                                              FAIL
./runtests.sh -t performance Passed
sudo semanage boolean -m --off selinuxuser_execheap | cant load memory  | SELinux:  Could not load policy file /etc/selinux/targeted/policy/policy.32:  Cannot allocate memory
/sbin/load_policy:  Can't load policy:  Cannot allocate memory
libsemanage.semanage_reload_policy: load_policy returned error code 2. (No such file or directory).</ref>{{result|fail}}<ref>./default/cachedrop                                              FAIL 
</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:nvisscher|nvisscher]]
| Acer Aspire A515-55-576K (Intel Core i5(TM) 1035G1, 8 GB DDR4, Intel UHD Graphics)
| {{result|pass}}<ref>Set getlist and getsummary (in performance/lmbench3/scripts) as executable before performance test.
Vulnerabilities (compacted):
itlb_multihit:KVM: Mitigation: VMX disabled
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling</ref>
| <references/>
|-
| [[User:nvisscher|nvisscher]]
| Live test image on Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz, 6 GB DDR3, AMD Radeon HD7850
| {{result|pass}}<ref>Both passed. Performance test suite passed despite errors:
/bin/sh: line 1: ../scripts/getlist: Permission denied
/bin/sh: line 1: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:oturpe|oturpe]]
| Lenovo ThinkPad X230
| {{result|pass}}
| <references/>
|-
| [[User:prasant1998|prasant1998]]
| Nitro AN515-42,Oracle
| {{result|fail}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| AMD Seattle (AArch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| APM Mustang X-Gene-1 (AArch64)
| {{result|pass}}<ref>5.13.2-300.fc34.aarch64</ref>{{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Nvidia Jetson Xavier NX (aarch64)
| {{result|pass}}<ref>5.13.2-300.fc34.aarch64</ref>{{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 2 Model B (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 3 Model B Rev 1.2 (AArch64)
| {{result|pass}}<ref>5.13.2-300.fc34.aarch64</ref>{{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 4 4GB (aarch64)
| {{result|pass}}<ref>5.13.2-300.fc34.aarch64</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Wandboard Quad (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| fujitsu-fx700 (aarch64)
| {{result|pass}}<ref>5.13.2-300.fc34.aarch64</ref>{{result|pass}}
| <references/>
|-
| [[User:quiet|quiet]]
| HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.4 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedora 34 64-bit, GNOME 40.1.0, Wayland, KVM
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS 
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
</ref>
| <references/>
|-
| [[User:rai510|rai510]]
| Gnome Boxes
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:rai510|rai510]]
| Virtualbox
| {{result|fail}}<ref>Test suite called with default
./default/stack-randomness                                      PASS   
./default/insert_leap_second                                    SKIP   
./default/cachedrop                                              PASS   
./default/timer-overhead                                        FAIL   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/posix_timers                                          PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
Test suite complete                                              FAIL   
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1625868855.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:rfm83|rfm83]]
| HP Laptop 14-cf0xxx - Intel Core i5-8250U - 16GB - KVM virtual machine - test day image Fedora 34
| {{result|pass}}
| <references/>
|-
| [[User:rimuru|rimuru]]
| VirtualBox 6.1, Intel i5
| {{result|pass}}<ref>Default lgtm!
</ref>
| <references/>
|-
| [[User:roushan|roushan]]
| Tested on latest VirtualBox. Image- kerneltest-5.13.1.iso (1.97 GB), 3 GB RAM, Boot Order - Floppy, Optical, Hard Disk, 8 GB data disk vdi
| {{result|pass}}<ref>Skipped 3 tests in virtualbox
1. insert_leap_second,
2. libhugetlbfs
3. paxtest</ref>
| <references/>
|-
| [[User:sammy|sammy]]
| Fedora 34 test bench running in gnome box. Host OS is Fedora 34 running on HP 240 g8 notebook with 10th gen i3 processor, 8gb ram, 1TB hdd.
| {{result|fail}}<ref>Date: Tuesday 13 July 2021 05:43:59 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: FAIL
Failed Tests: ./default/cachedrop
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Date: Tuesday 13 July 2021 05:48:37 PM IST
Test set: performance
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: RESULTHOLDER
</ref>{{result|fail}}<ref>Date: Tuesday 13 July 2021 05:25:07 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: FAIL
Failed Tests: ./default/cachedrop</ref>
| <references/>
|-
| [[User:sammy|sammy]]
| contributor tester
| {{result|pass}}<ref>{{bz|0}} Date: Saturday 10 July 2021 04:16:20 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: PASS
Failed Tests: None
Warned Tests: None</ref>
| <references/>
|-
| [[User:sbertram|sbertram]]
| Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz, Memory: 4096 MB, DISTRO=Fedora-34-20210424.n.0, 5.13.2-300.fc34.x86_64
| {{result|pass}}
| <references/>
|-
| [[User:sgraf|sgraf]]
| qemu aarch64 VM on Apple M1, 5.13.1-300.fc34.aarch64
| {{result|pass}}
| <references/>
|-
| [[User:sp6ina|sp6ina]]
| Matebook 14 2020 AMD
| {{result|pass}}
| <references/>
|-
| [[User:stathisl|stathisl]]
| Dell Inspirion 3542, Intel i3-4005U, 8GB, Intel HD 4400, Default Fedora Workstation 34 Gnome test image
| {{result|pass}}<ref>Both tests PASS (libhugetlibfs and paxtest SKIP)</ref>
| <references/>
|-
| [[User:stethewwolf|stethewwolf]]
| Fedora server 34 4G Ram 2 core virtualized on KVM
| {{result|pass}}
| <references/>
|-
| [[User:stklcode|stklcode]]
| KVM guest (F34 Host), Skylake-X CPU, 16GB RAM, Live Image
| {{result|pass}}
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| lenovo T580, KVM
| {{result|pass}}{{result|fail}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
|  Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2
| {{result|fail}}<ref>all tests passed, but still no gui on nvidia driver.</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
| {{result|pass}}<ref>5.13.2 all tests passed</ref>{{result|pass}}<ref>all tests passed, works for me</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|pass}}<ref>kernel 13.2 passed tests also</ref>{{result|pass}}<ref>all tests passed, noted the following segfault during testing: "lat_rpc[8552]: segfault at 1000 ip 00007fe965a99a7a sp 00007ffef0411ab8 error 4 in libc-2.33.so[7fe965a20000+14d000]
[  588.142109] Code: f3 0f 1e fa 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 66 <f3> 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83", no issues noted with kernel for daily use.</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4,  Asus Q170M2
| {{result|fail}}<ref>RPMFUSION NVIDIA driver failed to provide gui on F33. Didn't perform regression tests.</ref>
| <references/>
|-
| [[User:tjuberg|tjuberg]]
|
| {{result|pass}}
| <references/>
|-
| [[User:troycurtisjr|troycurtisjr]]
| Dell XPS 17 9700 https://linux-hardware.org/?probe=592276c98f
| {{result|pass}}<ref>Both automated tests passed. Additionally the following worked well: bluetooth audio, smooth Minecraft play, Firefox browsing</ref>
| <references/>
|-
| [[User:udb28|udb28]]
| Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4
| {{result|pass}}
| <references/>
|-
| [[User:udb28|udb28]]
| Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 Memory: 3.5 GiB
| {{result|pass}}<ref>1. Default Test PASS
2. Performance Test PASS</ref>
| <references/>
|-
| [[User:ups1610|ups1610]]
| HP Pavilion 15-eg-0124tx
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:vanquisher3498|vanquisher3498]]
| VirtualBox running on HP AU-623tx
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:vascom|vascom]]
| Ryzen 7 4750G, 32GB RAM, 5.13.1-300.fc34.x86_64
| {{result|pass}}
| <references/>
|-
| [[User:vk2bea|vk2bea]]
| Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz  / 16 GB RAM / NVIDIA GK107 [GeForce GT 740] (using Nvidia driver (akmod-nvidia) )
| {{result|pass}}{{result|pass}}
| <references/>
|-
| [[User:wayne6001|wayne6001]]
| Intel NUC6i5SYK; Intel Core™ i5-6260U CPU @ 1.80GHz × 4; Mesa Intel Iris(R) Graphics 540 (SKL GT3); Memory 15.5 GiB; SSD 512.1 GB; OS Fedora 34 (Workstation Edition); OS Type 64-bit; Gnome 40.1.0; Wayland
| {{result|pass}}<ref>Both Passed</ref>
| <references/>
|-
| [[User:xfgusta|xfgusta]]
| VirtualBox 6.1.22_RPMFusion r144080
| {{result|pass}}<ref>No regression found</ref>
| <references/>
|-
| [[User:zwintabris|zwintabris]]
|
| {{result|pass}}
| <references/>
|-
|}


[[Category:Fedora 35 Test Days]]
[[Category:Fedora 35 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)