From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 63: Line 63:
'''Note to Virtualbox users:'''  By default, the insert_leap_second test will fail, this is because Virtualbox syncs the guest time with the host in the middle of the test. This is not a kernel or test suite failure, it is a Virtualbox design issue. It should skip this test if your kernel-tests repo has been updated since 2021-09-12.
'''Note to Virtualbox users:'''  By default, the insert_leap_second test will fail, this is because Virtualbox syncs the guest time with the host in the middle of the test. This is not a kernel or test suite failure, it is a Virtualbox design issue. It should skip this test if your kernel-tests repo has been updated since 2021-09-12.


If you have problems with any of the tests, have a look in the [http://testdays.fedorainfracloud.org/events/125 results page]. Please include the vulnerability output at the end of the test suite in the comments.  
If you have problems with any of the tests, have a look in the [http://testdays.fedorainfracloud.org/events/124 results page]. Please include the vulnerability output at the end of the test suite in the comments.  
  If you don't see it, please file a new bug to [https://bugzilla.redhat.com Bugzilla], probably against <code>kernel</code> component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.
  If you don't see it, please file a new bug to [https://bugzilla.redhat.com Bugzilla], probably against <code>kernel</code> component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.


== Test Results ==
== Test Results ==
=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Ahmedalmeleh|Ahmedalmeleh]]
| Vmware on Asus Vivobook X409JA (Intel Core i5 1035G1
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:akumar99|akumar99]]
| Virtualbox, Ryzen 3900x
| {{result|fail}}{{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lenovo V330-15IKB Type 81AX
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lenovo X1 Crabon gen 8
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Pinebook Pro
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Branch predictor hardening
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Raspberry Pi 3 aarch64 no GUI
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| i5-7400 8GB RAM Desktop
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alexhaydock|alexhaydock]]
| Lenovo ThinkPad X240
| {{result|pass}}<ref>Default kernel regression test case run passed</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
| {{result|pass}}
| <references/>
|-
| [[User:bandithijo|bandithijo]]
| kernel-5.15.2-200.fc35.x86_64 on Lenovo ThinkPad X260 Intel i5-6300U
| {{result|pass}}<ref>Default & Performance tests pass</ref>
| <references/>
|-
| [[User:belegdol|belegdol]]
| Ryzen 5 5600x, RTX 2070, ASRock Fatal1ty B450 Gaming-ITXac
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>{{result|pass}}
| <references/>
|-
| [[User:bittin|bittin]]
| Virtualbox - F34
| {{result|pass}}{{result|fail}}{{result|pass}}{{result|pass}}
| <references/>
|-
| [[User:bittin|bittin]]
| Virtualbox - F34 - 5.15.3
| {{result|pass}}
| <references/>
|-
| [[User:bittin|bittin]]
| Virtualbox - F35
| {{result|pass}}{{result|pass}}{{result|fail}}{{result|pass}}
| <references/>
|-
| [[User:bittin|bittin]]
| Virtualbox - F35 - 5.15.3
| {{result|pass}}
| <references/>
|-
| [[User:bojan|bojan]]
| Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.15.2-200.fc35.x86_64
| {{result|pass}}<ref>Both default and performance tests pass on ThinkPad T450s. The kernel also runs on the other machine from the profile.</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| 5.15.2 KVM
| {{result|pass}}<ref>Default & performance tests pass</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| 5.15.3 KVM
| {{result|pass}}<ref> Default & performance tests pass </ref>
| <references/>
|-
| [[User:bytehackr|bytehackr]]
|  Kernel 5.15.2 on Lenovo P1 Gen3
| {{result|pass}}<ref> Default test Pass.</ref>
| <references/>
|-
| [[User:clnetbox|clnetbox]]
| SCHENKER XMG PRO 17 (CLEVO PB71) | Intel Core i7-10875H | 16 GB (32 GB) DDR4-3200 Crucial | NVIDIA GeForce RTX 2070 Refresh
| {{result|pass}}<ref>Everything works as expected ... no noticeable issues so far.</ref>
| <references/>
|-
| [[User:condor|condor]]
| HP EliteBook 8470p baremetal w/Intel i5-3320M processor
| {{result|pass}}
| <references/>
|-
| [[User:condor|condor]]
| virt-manager, test day image
| {{result|pass}}
| <references/>
|-
| [[User:copperi|copperi]]
| 5.15.2-200.fc34.x86_64 F35 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
| {{result|pass}}
| <references/>
|-
| [[User:couchfox|couchfox]]
| Dell Inspiron 7577 - Intel Core i5-7300HQ
| {{result|pass}}<ref>Performance test: PASS</ref>
| <references/>
|-
| [[User:couchfox|couchfox]]
| Dell Inspironn7577 - Intel Core i5-7300HQ
| {{result|pass}}<ref>All PASS (unless SKIP)</ref>
| <references/>
|-
| [[User:daniels|daniels]]
| Lenovo 2in1 14 IdeaPad Intel Core Processor (Skylake, IBRS) × 4  QEMU Standard PC _Q35 + ICH9, 2009_
| {{result|pass}}<ref>Regression and Performance Tests : Passed (Gnome 40.4)</ref>
| <references/>
|-
| [[User:dbrendel|dbrendel]]
| T14s Gen1 in kvm
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Kernel 5.15.2; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Kernel 5.15.3; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
| {{result|pass}}
| <references/>
|-
| [[User:dumprop|dumprop]]
| Virtualbox - F35
| {{result|fail}}<ref>./default/cachedrop                                              PASS   
./default/insert_leap_second                                    SKIP   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        FAIL   
Test suite complete                                              FAIL   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:fuller|fuller]]
| https://linux-hardware.org/?probe=f850c51db9
| {{result|pass}}
| <references/>
|-
| [[User:garrmcnu|garrmcnu]]
| Test image on VM (KVM)
| {{result|pass}}<ref>Default and performance tests passed</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.15.2-200.fc35.x86_64 on KVM- Qemu - UEFI
| {{result|pass}}<ref>No regressions found</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.15.2-200.fc35.x86_64 on baremetal ACER Aspire
| {{result|pass}}<ref>ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000
Kernel regression tests PASSED</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.15.3-200.fc35.x86_64 on baremetal ACER Aspire
| {{result|pass}}<ref>ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000.  Kernel regression tests PASSED </ref>
| <references/>
|-
| [[User:grgivs|grgivs]]
| GNOME Boxes (test day image)
| {{result|fail}}<ref>./default/cachedrop    FAIL
./default/paxtest        SKIP
./default/libhugetlbfs  SKIP</ref>
| <references/>
|-
| [[User:gtwilliams|gtwilliams]]
| KDE F35 Intel(R) Xeon(R) W-2225 CPU @ 4.10GHz
| {{result|pass}}
| <references/>
|-
| [[User:guiltydoggy|guiltydoggy]]
| Ryzen 5900X X570 - Fedora Kinoite 35 - Tests run on bare metal in Toolbox
| {{result|fail}}<ref>Test suite called with default
./default/cachedrop                                              FAIL   
./default/insert_leap_second                                    SKIP   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                SKIP   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  SKIP   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              FAIL
./drop_caches.sh: line 45: /proc/sys/vm/drop_caches: Permission denied  14  │ TestError: Can't free pagecache  15  │  5432496  16  │ Could not run tests</ref>
| <references/>
|-
| [[User:hobbes1069|hobbes1069]]
|
| {{result|pass}}<ref>I've also been using the kernel for a day or two without any issues.</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| AMD Athlon(tm) 64 X2 Dual Core Processor 4200+, 4 GB RAM, Bare Metal, 5.15.5-200.fc35, CoreOS
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel Core i5-2500 CPU @ 3.30 GHz, 32 GB RAM, Test Day Image
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|pass}}<ref>stress</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel(R) Celeron(R) CPU G3900 @ 2.80GHz, 4GB RAM, Bare Metal, CoreOS/Next, kernel-5.15.5-200.fc35
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel(R) Celeron(R) D CPU 3.33GHz, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel(R) Pentium(R) D CPU, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL</ref>{{result|pass}}<ref>default</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel® Core™ i7-4790 CPU, 32 GB RAM, Bare Metal, Fedora Linux 35 (Workstation Edition)
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Pentium(R) Dual-Core CPU E5200 @ 2.50GHz, 4 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
| {{result|pass}}<ref>performance</ref>{{result|pass}}<ref>destructive</ref>{{result|fail}}<ref>stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL</ref>
| <references/>
|-
| [[User:idanka|idanka]]
| GNOME Boxes (test day image) hw: Fujitsu P520, i5 4570, nvidia gtx 1650
| {{result|pass}}<ref>Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:imalone|imalone]]
| Legion 5 Pro 16ACH6H 5800H RTX3070
| {{result|pass}}<ref>Test suite and performance test suite. thirdparty test PASS. Skipped: ./default/paxtest ./default/libhugetlbfs.
MediaTek mt7921e, bluetooth and wireless working with 5.15.2-200.fc35.x86_64</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| 5.15.2-200.fc35.x86_64 (koji/upgrade)
| {{result|pass}}<ref>Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| 5.15.3-200.fc35.x86_64 (koji/update)
| {{result|pass}}<ref>Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.</ref>
| <references/>
|-
| [[User:jakfrost|jakfrost]]
| default
| {{result|pass}}<ref>Ran test on bare metal UEFI system with AMD 5600G CPU (on board graphics). Used live ISO to run tests without installing to system. All tests came back PASS.</ref>
| <references/>
|-
| [[User:jimrayjoebob|jimrayjoebob]]
| Gigabyte B550M DS3H, Ryzen 5 5600g, test day image
| {{result|pass}}
| <references/>
|-
| [[User:jishi@redhat.com|jishi@redhat.com]]
| Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GH
| {{result|pass}}<ref>ipv6 basic socket test</ref>{{result|pass}}<ref>route table basic,  add/delete/modify/flush/list route with ip route command</ref>{{result|pass}}<ref>geneve basic, 1. add geneve over ipv4 and ipv6 2. ping over geneve 3. check geneve header in the packets 4. run iperf over geneve</ref>{{result|pass}}<ref>vxlan basic test, 1. add vxlan over ipv4 and ipv6 , ip link add vxlan1 type vxlan id 42 remote $remote_ip local $local_ip dev $dev 2. run ping over vxlan 3. check vxlan header in the packet 4. run iperf over vxlan</ref>{{result|pass}}<ref>gre basic: 1. add gre with ip link add gre1 type gre local $local_addr remote $remote_addr 2. ping over gre 3. check gre header for the packet 4. run iperf over gre</ref>
| <references/>
|-
| [[User:jpbn|jpbn]]
| F35
| {{result|warn}}<ref>test PASS
performance test Fail  (first time Terminal crash; 2nd time terminal and firefox crash)</ref>
| <references/>
|-
| [[User:jritter|jritter]]
| Lenovo ThinkPad W530
| {{result|pass}}
| <references/>
|-
| [[User:kisk|kisk]]
| VirtualBox VM Fedora 35, Kernel updated to 5.15.2-200.fc35.x86_64
| {{result|fail}}<ref>The tests in the default test suite that were skipped: cachedrop, insert_leap_second, and paxtest. The other tests passed.
Vulnerability status: /sys/devices/system/cpu/vulnerabilities/...
The performance tests hang on bandwidth measurements. </ref>
| <references/>
|-
| [[User:kodirovshchik|kodirovshchik]]
| Kernel: 5.15.2-200.fc35.x86_64 Release: Fedora release 35 (Thirty Five)
| {{result|pass}}<ref>Test suite called with default:
./default/libhugetlbfs              SKIP   
./default/paxtest                    SKIP
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>{{result|pass}}
| <references/>
|-
| [[User:kokoseij|kokoseij]]
| Inspiron 5515 with Ryzen 5700U / DDR4 8GB RAM
| {{result|pass}}<ref>Updated from Pre-existing Fedora 35 setup.
All test cases and performance tests passed without an issue.</ref>{{result|pass}}<ref>Updated from pre-existing Fedora 35 environment</ref>
| <references/>
|-
| [[User:lejeczek|lejeczek]]
| Lenovo e14 g3 AMD Ryzen 4500U
| {{result|pass}}<ref>Thanks!
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
./thirdparty/nvidia-module                                      WARN  </ref>
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr350a
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| apm  mustang
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  pe
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  per7415
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| fujitsu  fx700
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hp  moonshot
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  apollo
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl325gen10
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl560egen8
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| ibm  x3250m4
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  rd230
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| qualcomm  amberwing
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| kerneltest-5.15.2.iso on HP Laptop 14-cf2033wm
| {{result|fail}}<ref>Test suite called with default: ./default/selinux-dac-controls    PASS    ./default/sysfs-perms  PASS    ./default/paxtest      SKIP 
./default/timer-overhead  PASS    ./default/memfd  PASS    ./default/cachedrop  FAIL    ./default/mq-memory-corruption    PASS    ./default/modsign  PASS   
./default/posix_timers  PASS    ./default/stack-randomness  PASS    ./default/insert_leap_second  PASS    ./default/libhugetlbfs  SKIP   
Test suite complete      FAIL</ref>
| <references/>
|-
| [[User:masami|masami]]
| i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, UEFI, F35 Workstation, 5.15.2-200.fc35.x86_64
| {{result|pass}}<ref> Default & performance tests passed. Works fine for daily use.</ref>
| <references/>
|-
| [[User:niarch|niarch]]
| Oracle Virtual Box - 2 processors, 4GB RAM Thinkpad T580 running over Kubuntu 20.04
| {{result|pass}}
| <references/>
|-
| [[User:nicolas|nicolas]]
| AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K
| {{result|pass}}
| <references/>
|-
| [[User:nicolas|nicolas]]
| AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K FEDORA 35 KDE KERNEL 5.15.2-200.FC35.X86_64
| {{result|pass}}
| <references/>
|-
| [[User:norbertj|norbertj]]
| kerneltest-5.12.2.iso on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| kerneltest-5.15.2.iso on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| kerneltest-5.15.2.iso on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM
| {{result|pass}}<ref>paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted. Sorry, typo in Profile for my other PC: I also meant kerneltest-5.15.2.iso.</ref>
| <references/>
|-
| [[User:oprizal|oprizal]]
| 5.15.2-200.fc35.x86_64 on AMD A9-9420 radeon r5
| {{result|pass}}<ref>{{bz|2023035}} 1. Noticed if including `kernel-devel` during the update will give warnings on running scriptlet part and most likely to failed (take too long) on verifying part.
2. Machine can't suspend, reboot, and shutdown on AMD A9-9420 radeon r5. In the past, on kernel 5.12.x my machine only failed to wake up from suspend on main laptop monitor but not on second monitor connected via HDMI.
Installation done on kernel 5.14.18-300.fc35</ref>
| <references/>
|-
| [[User:oprizal|oprizal]]
| 5.15.3-200.fc35.x86_64 on AMD A9-9420 radeon r5
| {{result|pass}}<ref>{{bz|2023035}} On 5.15.3 have same problem with 5.15.2, can't suspend, reboot, and poweroff. All regression test passed. Since I can't find other user here with AMD system that have same issue with me, may be it's just something wrong with my installation. </ref>
| <references/>
|-
| [[User:oumuamua|oumuamua]]
| Kernel 5.15.2 (VirtualBox)
| {{result|pass}}<ref>Default test suite Pass</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| AMD Seattle (AArch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| APM Mustang X-Gene-1 (AArch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Firefly2(rk3399)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| HR330a (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Nvidia Jetson Nano (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Nvidia Jetson Xavier NX (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 2 Model B (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 4 4GB (aarch64)
| {{result|pass}}
| <references/>
|-
| [[User:rai510|rai510]]
| Gnome Boxes Kernel 5.15.2
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:rainmakerraw|rainmakerraw]]
| AMD Threadripper 3960X, Asus RoG Strix-E Gaming, 32GB DDR4 3600cl16, Samsung Evo Plus 960 nVME, Radeon Vega 56
| {{result|pass}}<ref>No issues.</ref>
| <references/>
|-
| [[User:rhodry|rhodry]]
|
| {{result|pass}}
| <references/>
|-
| [[User:rhodry|rhodry]]
| ASUS ROG STRIX G153QY. AMD Ryzen 9 5900hx. Radeon RX6800. Fedora 35. Kernel-5.15.2-200.fc35
| {{result|pass}}
| <references/>
|-
| [[User:sammy|sammy]]
| Fedora 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd
| {{result|fail}}<ref>{{bz|0}} x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests. </ref>{{result|pass}}<ref>{{bz|0}} x86_64 kernel-5.15.2-200.fc35 passed default and performance tests. </ref>{{result|fail}}<ref>{{bz|0}} x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests. </ref>{{result|pass}}<ref>{{bz|0}} x86_64 kernel-5.15.2-200.fc35 passed default and performance tests. </ref>{{result|pass}}<ref>{{bz|0}} Kernel x86_64 kernel-5.15.2-200.fc35 passed runtests and performance test. </ref>{{result|fail}}<ref>Kernel x86_64 kernel-5.15.2-200.fc35 did not pass runtests but passed performance test.</ref>
| <references/>
|-
| [[User:sammy|sammy]]
| Fedora Cinnamon 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd
| {{result|fail}}<ref>{{bz|0}} x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests. </ref>
| <references/>
|-
| [[User:sgraf|sgraf]]
| 5.15.2 KVM with GUI
| {{result|pass}}<ref>Default and performance tests pass. GUI/Gnome works without any issues.</ref>
| <references/>
|-
| [[User:skipperTux|skipperTux]]
| kernel-5.15.2-200.fc35 Dell Precision 7560
| {{result|pass}}<ref>Mobile Dell Precision-Workstation 7560, Intel Xeon W-11955M, 64 GB ECC SODIMM, NVIDIA T1200 4 GB, Intel UHD
Default & Performance tests PASS, libhugetlbfs and paxtest SKIP</ref>
| <references/>
|-
| [[User:solinvictuz|solinvictuz]]
| Gnome Boxes
| {{result|pass}}<ref>default + performance</ref>
| <references/>
|-
| [[User:solinvictuz|solinvictuz]]
| kerneltest iso on Dell XPS 13 7390, i7-10510U, 15,4GiB, UHD Graphics (CML GT2)
| {{result|pass}}<ref>default & performance test passed</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|pass}}<ref>All tests passed, bugs resolved in 5.15.3</ref>{{result|pass}}<ref>passes regression and performance tests. Unable to put laptop to sleep with 5.15.2 kernel, works fine in 5.14.18</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| i7-3770 16GB DDR3 @1600Mhz (XMP) Nvidia GTX1060 6 Gb
| {{result|pass}}<ref>5.15.3 all tests passed</ref>
| <references/>
|-
| [[User:terkel|terkel]]
| Kernel 5.15.2 on Dell XPS 13 9310
| {{result|pass}}<ref>Default & Performance tests pass </ref>
| <references/>
|-
| [[User:tharadash|tharadash]]
| HP EliteBook 840 G6 with SecureBoot
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled</ref>
| <references/>
|-
| [[User:tharadash|tharadash]]
| HP Envy x360 13-ar0600nz
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:tharadash|tharadash]]
| HP z820 workstation, FirePro w7000, UEFI
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:tharadash|tharadash]]
| Intel NUC DC53427HYE
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:tharadash|tharadash]]
| Intel Z77, i7-3770k, RX570, SecureBoot
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:tripledes|tripledes]]
| Bare metal - AMD Ryzen 2700x, ASUS x470 Prime-PRO, AMD GPU (rx470 8GB)
| {{result|pass}}
| <references/>
|-
| [[User:trugul|trugul]]
| Lenovo ThinkPad Yoga 260, Intel® Core™ i5-6200U CPU @ 2.30GHz × 4, Mesa Intel® HD Graphics 520 (SKL GT2)
| {{result|pass}}
| <references/>
|-
| [[User:user|user]]
| bare metal fedora34 workstation on Gigabyte Technology Co., Ltd. GA-880GM-UD2H 64-bit
| {{result|pass}}
| <references/>
|-
| [[User:vpv|vpv]]
| Lenovo ThinkPad T480s, F35, 5.15.2-200.fc35.x86_64
| {{result|pass}}<ref>My kernel is tainted, because I have enable_fbc and enable_guc. The tests still pass.</ref>
| <references/>
|-
| [[User:wayne6001|wayne6001]]
| 5.15.2-200.fc35.x86_64 on Dell XPS 13 9350, Fedora 35
| {{result|pass}}<ref>Passed both default and performance tests</ref>
| <references/>
|-
| [[User:wayne6001|wayne6001]]
| 5.15.2-200.fc35.x86_64 on nuc6i5syk
| {{result|pass}}<ref>default and performance tests pass</ref>
| <references/>
|-
| [[User:woodywoodah|woodywoodah]]
| Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U )
| {{result|fail}}<ref>cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well. </ref>
| <references/>
|-
| [[User:woodywoodah|woodywoodah]]
| Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) 5.15.2-200.fc35.x86_64
| {{result|fail}}<ref>cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:xfgusta|xfgusta]]
|
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}
| <references/>
|-
| [[User:yasharjit|yasharjit]]
|
| {{result|pass}}<ref>All default and performance test cases passed.</ref>
| <references/>
|-
| [[User:yasharjit|yasharjit]]
| GNOME Boxes
| {{result|pass}}<ref>All default and performances test cases passed</ref>
| <references/>
|-
| [[User:zackds|zackds]]
| Lenovo desktop 4th gen i3/ 8 GB DDR3/ 250 GB HDD ( https://linux-hardware.org/?probe=2e7ed34d33 )
| {{result|pass}}<ref>With the official test image even though it is Fedora 34, both tests PASS, libhugetlbfs & paxtest was skipped.</ref>
| <references/>
|-
| [[User:zeten30|zeten30]]
| ThinkPad T14s Gen 1
| {{result|pass}}
| <references/>
|-
|}


[[Category:Fedora 36 Test Days]]
[[Category:Fedora 36 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)