User
|
Profile
|
Regression
|
References
|
JeremyM
|
Sony Vaio Intel i5
|
pass [1]
|
- ↑ Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "
|
MidnightRAT
|
Fedora 30 stock
|
pass [1]
|
- ↑ Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel
uname -a
Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
What can i do ti check my system?
Thanks.
|
alciregi
|
Baremetal i5-7400 8GB RAM
|
pass [1]
|
- ↑ Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
alciregi
|
Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
|
pass [1]
|
- ↑ Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
alciregi
|
RPi3 armv7hl
|
pass [1] pass [2]
|
- ↑ Test suite called with destructive
- ↑ Test suite called with default
|
alciregi
|
Scaleway START1-XS x86_64 cloud instance
|
pass [1]
|
- ↑ Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
alciregi
|
aarch64 on KVM
|
pass [1]
|
- ↑ Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
|
alciregi
|
vmware 4GB ram 2vcpu
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
archmunky
|
Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
|
warn [1]
|
- ↑ Standard: https://apps.fedoraproject.org/kerneltest/logs/34940
sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS
Performance: https://apps.fedoraproject.org/kerneltest/logs/34942
All PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
archmunky
|
Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
|
pass [1]
|
- ↑ runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS
|
atim
|
GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
|
pass [1]
|
- ↑ Test suite called with default - PASS (except paxtest as always)
Test suite called with performance - PASS
|
benjamind
|
VMware Workstation on Fedora 30 host (i7-6500U)
|
pass [1]
|
- ↑ cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately
|
calinoiualex
|
Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
|
pass [1]
|
- ↑ 1. Pass
2. Pass
Ran with performance argument
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
chuhu
|
NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
|
pass [1]
|
- ↑ Ran trinity testings and scheduler testings suits.
|
danniel
|
KVM
|
pass [1]
|
|
dinostar
|
Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
|
pass [1]
|
- ↑ The following test was skipped, everything else was a pass.
./default/libhugetlbfs SKIP
|
eboswell
|
Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
|
pass [1] pass [2]
|
- ↑ Test suite called with performance. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
- ↑ Test suite called with default. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
|
glb
|
Bare metal, Core i7-920, 12GB RAM
|
pass [1]
|
- ↑ All default test suite passed.
|
goodmirek
|
bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
|
pass [1]
|
- ↑ KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.
|
heffer
|
ThinkPad X1 Carbon 5th
|
fail [1] fail [2]
|
|
idanka
|
Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050
|
warn [1]
|
- ↑ ./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass
thirdparty/nvidia-module error
performance: fatal error: rpc/rpc.h: No such file or directory
|
jlanda
|
bare metal ryzen 5 1600x
|
pass
|
|
kiyer
|
Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
|
pass
|
|
kparal
|
Thinkpad T480s, Fedora 30
|
pass
|
|
lewis41
|
i5-6500 CPU @ 3.20GHz
|
pass
|
|
lewis41
|
i5-6500 CPU @ 3.20GHz - 8GB RAM
|
pass
|
|
lnie
|
ProLiant SL4545 G7
|
pass
|
|
luya
|
HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
|
pass [1]
|
- ↑ Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.
|
masami
|
Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
|
pass [1]
|
- ↑ Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.
|
masami
|
Raspberry Pi 3B+ aarch64
|
pass [1]
|
- ↑ kernel regression tests passed.
|
mharpau
|
Fedora 30 T480s i5-8250U iGPU
|
pass
|
|
mimat
|
fedora 30@i7-2630QM
|
pass
|
|
mizhang
|
Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
|
pass
|
|
mizhang
|
Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
|
pass [1]
|
- ↑ LTP from upstream
sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass
fs pass, fsx pass, math pass, hugeltb pass, mm failed with case ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass
|
monot0m
|
Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
monot0m
|
Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m
|
Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
nah Fam
|
vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
|
warn [1]
|
- ↑ Test 1
./default/cachedrop FAIL
Test suite complete FAIL
Test 2
./performance/lmbench3 PASS
Test suite complete PASS
|
nightromantic
|
Bare metal, desktop, F30@Intel i3-8100
|
warn [1]
|
- ↑ ./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS".
./runtests.sh -t performance -- "PASS"
|
numasan
|
HP EliteBook 820 G4
|
pass [1]
|
|
ozeszty
|
F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
|
pass [1]
|
- ↑ ./default/libhugetlbfs skipped as usual, default and performance passed.
|
ozeszty
|
F30 KDE, Skylake laptop on kernel 4.2.2 from koji
|
pass [1]
|
- ↑ ./default/libhugetlbfs skipped, default and performance passed.
|
pmeyer
|
AMD® Athlon(tm) ii x2 250 processor × 2
|
pass [1]
|
- ↑ file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
|
pwhalen
|
Banana Pi (armhfp)
|
pass
|
|
pwhalen
|
Mustang (xgene-1)
|
pass [1] fail [2]
|
|
pwhalen
|
Pine 64 Plus (aarch64 sbc)
|
pass [1]
|
|
pwhalen
|
Raspberry Pi 3B+ (armhfp)
|
pass
|
|
pwhalen
|
Trimslice (armhfp)
|
warn [1]
|
|
pwhalen
|
Wandboard Quad (armhfp)
|
pass [1]
|
|
ralex
|
16 GB Ram | Nvidia GTX 1080
|
pass [1]
|
|
rammodulus
|
Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
|
fail [1]
|
- ↑ Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
rudrapratap
|
qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
|
pass [1]
|
- ↑ Test suite called with default
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/selinux-dac-controls PASS
./default/paxtest PASS
./default/memfd PASS
./default/stack-randomness PASS
./default/cachedrop PASS
./default/mq-memory-corruption PASS
./default/modsign PASS
./default/libhugetlbfs SKIP
./default/insert_leap_second PASS
./default/timer-overhead PASS
Test suite complete PASS
|
salimma
|
Bare metal: Thinkpad T480s
|
pass [1]
|
- ↑ Default and performance profiles pass
|
sumantrom
|
T470s
|
pass [1]
|
|
tmlgcq
|
QEMU with KVM Virtual
|
pass
|
|
tmsp
|
Ryzen 1800X; 16 GB RAM; F30
|
pass
|
|
user
|
default
|
pass
|
|
vascom
|
Bare metal, Core i7-4470, 32GB RAM
|
pass [1]
|
|
weswilliams
|
VMware Workstation 15.1.0 on Fedora 30 host
|
pass [1]
|
- ↑ All default test suite passed.
|