User
|
Profile
|
Regression
|
References
|
Andyogle
|
MacBook Pro 4GB Intel Core i7-3615QM CPU@2.30GHz x 8
|
pass [1]
|
|
Bodanel
|
Ryzen 3700 - VM with 4 CPUs and 16 GB RAM on nvme SSD
|
pass [1]
|
- ↑ ./runtests.sh
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
Daniels
|
Lenovo 2in1 14 Intel® Pentium(R) CPU 4415U @ 2.30GHz × 4, LIVE (Bare Metal) (Test Image)
|
pass [1]
|
|
Dskobra
|
|
pass [1] pass
|
- ↑ Test suite called with default
./default/timer-overhead PASS
./default/paxtest SKIP
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/sysfs-perms PASS
./default/stack-randomness PASS
./default/cachedrop PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/posix_timers PASS
./default/modsign PASS
./default/selinux-dac-controls PASS
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ElXreno
|
GPU: NVIDIA GT 525M && Intel HD Graphics 3000 | RAM: 4 GB), nouveau
|
pass [1]
|
- ↑ Sometimes an error [1] appears in the logs when booting the system and the system hangs. [1]:
watchdog: BUG: soft lockup - CPU#3 stuck for 22s! [irq/16-iwlwifi:934] . Test ./default/libhugetlbfs and ./default/paxtest was skipped, all other tests passed successfully. Also the NVIDIA 390xx driver is not building. Everything else works fine. Vulnerability status:
itlb_multihit:KVM: Mitigation: VMX disabled |
l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable |
mds:Mitigation: Clear CPU buffers; SMT vulnerable |
meltdown:Mitigation: PTI |
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp |
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization |
spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling |
srbds:Not affected |
tsx_async_abort:Not affected
|
Fedora Kernel Tester
|
i5-6600 bare metal Kernel Test Day Image 5.10.4
|
pass [1]
|
- ↑ Bug=Screen does not come back after sleep. Have to reboot.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
GuiltyDoggy
|
Ryzen 9 5900X - VMWare - Test image 5.10.4-200.fc33.x86_64
|
pass [1]
|
- ↑ Default Test Suite: Passed
Performance Test Suite: Passed
|
HRicky
|
|
pass [1]
|
- ↑ H/W path Device Class Description
===================================================[edit]
system To Be Filled By O.E.M. (To Be Filled By O.E.M.)
/0 bus H97 Pro4
/0/0 memory 64KiB BIOS
/0/d memory 32GiB System Memory
/0/d/0 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/1 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/2 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/d/3 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns)
/0/e processor Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz
/0/e/f memory 256KiB L1 cache
/0/e/10 memory 1MiB L2 cache
/0/e/11 memory 8MiB L3 cache
/0/100 bridge 4th Gen Core Processor DRAM Controller
/0/100/1 bridge Xeon E3-1200 v3/4th Gen Core Processor PCI Express x16 Controller
/0/100/1/0 display Ellesmere [Radeon RX 470/480/570/570X/580/580X/590]
/0/100/1/0.1 multimedia Ellesmere HDMI Audio [Radeon RX 470/480 / 570/580/590]
/0/100/2 display Xeon E3-1200 v3/4th Gen Core Processor Integrated Graphics Controller
/0/100/3 multimedia Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller
/0/100/14 bus 9 Series Chipset Family USB xHCI Controller
/0/100/14/0 usb3 bus xHCI Host Controller
/0/100/14/0/d input Comfort Curve Keyboard 2000
/0/100/14/0/e input USB Optical Mouse
/0/100/14/1 usb4 bus xHCI Host Controller
/0/100/14/1/5 scsi6 storage Mass Storage Device
/0/100/14/1/5/0.0.0 /dev/sdc disk 7665MB Transcend 8GB
/0/100/14/1/5/0.0.0/0 /dev/sdc disk 7665MB
/0/100/14/1/5/0.0.0/0/2 /dev/sdc2 volume 15EiB Windows FAT volume
/0/100/14/1/5/0.0.0/0/3 /dev/sdc3 volume 17MiB EFI (FAT-12/16/32) partition
/0/100/16 communication 9 Series Chipset Family ME Interface #1
/0/100/19 enp0s25 network Ethernet Connection (2) I218-V
/0/100/1a bus 9 Series Chipset Family USB EHCI Controller #2
/0/100/1a/1 usb1 bus EHCI Host Controller
/0/100/1a/1/1 bus USB hub
/0/100/1b multimedia 9 Series Chipset Family HD Audio Controller
/0/100/1c bridge 9 Series Chipset Family PCI Express Root Port 1
/0/100/1c.6 bridge 82801 PCI Bridge
/0/100/1c.6/0 bridge ASM1083/1085 PCIe to PCI Bridge
/0/100/1d bus 9 Series Chipset Family USB EHCI Controller #1
/0/100/1d/1 usb2 bus EHCI Host Controller
/0/100/1d/1/1 bus Integrated Hub
/0/100/1f bridge H97 Chipset LPC Controller
/0/100/1f.2 scsi0 storage 9 Series Chipset Family SATA Controller [AHCI Mode]
/0/100/1f.2/0 /dev/sda disk 240GB KINGSTON SA400S3
/0/100/1f.2/0/1 /dev/sda1 volume 50MiB Windows NTFS volume
/0/100/1f.2/0/2 /dev/sda2 volume 223GiB Windows NTFS volume
/0/100/1f.2/0/3 /dev/sda3 volume 505MiB Windows NTFS volume
/0/100/1f.2/1 /dev/sdb disk 120GB Samsung SSD 850
/0/100/1f.2/1/1 /dev/sdb1 volume 1GiB EXT4 volume
/0/100/1f.2/1/2 /dev/sdb2 volume 110GiB Linux filesystem partition
/0/100/1f.2/0.0.0 /dev/cdrom disk DRW-24D5MT
/0/100/1f.3 bus 9 Series Chipset Family SMBus Controller
/0/1 system PnP device PNP0c01
/0/2 system PnP device PNP0c02
/0/3 system PnP device PNP0b00
/0/4 generic PnP device INT3f0d
/0/5 system PnP device PNP0c02
/0/6 system PnP device PNP0c02
/0/7 system PnP device PNP0c02
|
Josevaldo
|
CPU: Intel i3-2120 (4) @ 3.300GHz - Memory: 3975MiB / 7891MiB
|
pass [1]
|
- ↑ Test suite called with default
./default/posix_timers PASS
./default/paxtest SKIP
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/cachedrop PASS
./default/stack-randomness PASS
./default/modsign PASS
./default/timer-overhead PASS
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/selinux-dac-controls PASS
Test suite complete PASS
Your log file is being submitted...
{
"message": "Upload successful!"
}The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
Mario
|
CPU: Intel® Core™ i7-9700K CPU @ 3.60GHz × 8, GPU: NV168, RAM: 16GB, LIVE (Bare Metal) (Test Image)
|
pass
|
|
Mario
|
Schenker XMG P304 PRO, CPU: Core I5-4210M @2.60GHz x 4, GPU: NV117 / Intel HD 4600, RAM:16GB
|
pass
|
|
Noname
|
Host: 20ALCTO1WW ThinkPad X240, CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT, RAM: 8GB
|
pass
|
|
abrahm
|
Dell XPS 13 9310
|
pass
|
|
abrahm
|
Dell XPS 13 9310, i7-1165G7, f33, 5.10.4-200.fc33.x86_64 from koji
|
pass [1]
|
- ↑ No general issues on this hardware running 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-98.fc33.x86_64, 5.10.2-200.fc33.x86_64, or 5.10.4-200.fc33.x86_64 (all from koji).
|
abrahm
|
Dell XPS 13 9370, i7-8640U, 5.10.4-200.fc33.x86_64 from koji
|
pass
|
|
agurenko
|
Baremetal: Ryzen 5900X, 32 Gb RAM, Radeon RX 5700 XT
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
akumar99
|
VM (AMD Ryzen 9 3900X)
|
pass
|
|
alciregi
|
Dell XPS 13 9360, Intel i7-7500U, F33 Workstation
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
F33 Raspberry Pi 3 aarch64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
F33 Raspberry Pi 4 8GB headless aarch64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alexxvibes
|
GNOME Virtual Box -- 1.9GB Ram / AMD A4-3300 APU / Adata SU650 SSD
|
pass
|
|
alphacluster
|
CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
|
pass [1]
|
|
atim
|
CPU: Quad Core model: AMD Ryzen 3 3300X; Graphics: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 455.45.01
|
pass [1]
|
- ↑ Tests passed.
LGTM so far. FS: BTRFS. Can't say anything at this moment about BTRFS performance and any regressions.
|
augenauf
|
F33 Gnome test box on VirtualBox
|
pass [1]
|
- ↑ no regression noted. everything works as expected in my F33 test system on VirtualBox.
|
augenauf
|
baremetal Thinkpad T440s
|
pass [1]
|
- ↑ Works for me on T440s, no regresssion noted after first day of usage.
|
bittin
|
|
pass [1] pass [2]
|
- ↑ 5.10.5 worked good in Virtualbox here
- ↑ Worked great in my test VM with rawhide in Virtualbox
|
bohrasd
|
ASUS ROG Zephyrus G14 GA401IV_GA401IV 1.0 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 1726MiB / 15477MiB
|
pass [1]
|
|
bojan
|
|
pass [1]
|
- ↑ ThinkPad T450s, default and performance tests with 5.10.2-200.fc33.x86_64 pass. The machine runs Gnome fine. WiFi works, as well as ethernet. Also running this kernel on a noname fanless PC with Intel i5 8250U CPU. No regressions yet.
|
bretth
|
KVM
|
pass [1]
|
- ↑ default and performance tests passed
|
bretth
|
dell 5530
|
pass [1]
|
- ↑ default and performance tests passed
|
cap
|
Thinkpad T440s, 8G, haswell generation
|
pass [1]
|
- ↑ Both runtests and runtests -t performance PASS. Also checked gl, webcam, audio and suspend/resume OK.
|
checkcode
|
|
pass
|
|
chivux
|
[MOTHERBOARD] Manufacturer: Dell Inc., Model: 0H279K. | [BIOS] Brand: Dell Inc. Version: A05. | [CHIPSET] Vendor: Intel Corporation, Model: 82801HM (ICH8M) LPC Interface Controller. | [GRAPHICS] Vendor: Intel, Driver: i915, Model: Mobile GM965/GL960 Integrated Graphics Controller (secondary). | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
|
pass [1]
|
- ↑ Date: Tue Jan 5 10:33:05 AM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
============================[edit]
Date: Tue Jan 5 10:35:05 AM EST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
|
chivux
|
[MOTHERBOARD] Manufacturer: TOSHIBA, Model: Portable PC, Revision: MP. | [BIOS] Brand: Insyde Corp. Version: 6.20. | [CHIPSET] Vendor: Advanced Micro Devices, Inc. [AMD], Model: FCH LPC Bridge. | [GRAFICS] Vendor: AMD, Driver: Radeon, Model: Trinity 2 [Radeon HD 7520G]. | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9)
|
pass [1]
|
- ↑ Date: Mon Jan 4 06:37:36 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
================[edit]
Date: Mon Jan 4 06:41:50 PM EST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
|
clasater
|
Dell XPS 17 9700
|
pass [1]
|
- ↑ Wireless card (Detected Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W), REV=0x354) performance drops dramatically, I get an unstable 150Mbps vs getting 250Mbps with 5.9 kernel
Sound card works with most recent Rawhide 5.10 RC build 1204, but does not work with Latest Fedora 5.9 or this test kernel (probably related to https://blog.fts.scot/2020/07/04/dell-xps-2020-how-to-get-audio-working-on-linux/)
|
clnetbox
|
Intel Core i7-4710MQ CPU (Haswell)
|
fail [1]
|
- ↑ Audio does not work correctly any longer - no sound from internal speakers
Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller (rev 06)
Kernel versions tested : 5.10.2-200.fc33.x86_64 / 5.10.3-200.fc33.x86_64 / 5.10.4-200.fc33.x86_64
|
copperi
|
5.10.5-200.fc33.x86_64 F33 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
|
pass
|
|
creech
|
Acer Aspire 5680, Core 2 Duo T5500, GeForce Go 7600, 2 GB DDR2 RAM
|
fail [1]
|
- ↑ ./default/cachedrop failed, all other test were passed or skipped. Don't know what's up with this fail. The kernel seem to run fine. No problems found so far while using it. Btw.: Performance test is passed.
|
danniel
|
Acer E15 i7 8GB Ram
|
pass
|
|
donaldsebleung
|
Test Day Image using GNOME Boxes (Memory: 1.9 GiB, Processor: Intel® Core™ i5-4250U CPU @ 1.30GHz × 4)
|
pass [1]
|
- ↑ Some default tests ended with "SKIP"; GCC gives multiple warnings "implicit declaration of function 'lmbench_usage'" with performance tests
|
eismann
|
AMD Ryzen 3700X - ASUS Strix X570-E - 32 GB - Radeon VII
|
pass
|
|
ejnersan
|
Dell Vostro 3558, Intel i3-4005U, Test-day Image LiveUSB
|
pass [1]
|
- ↑ [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS
[Performance] Pass
|
ejnersan
|
HP Elitebook 840 G4, Intel i5-7200U, Test-day Image LiveUSB
|
pass [1]
|
- ↑ [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS
[Performance] Pass
|
emmrou
|
Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
|
pass [1]
|
- ↑ Everything works fine: sound, video, Wi-fi, bluetooth.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
engineerfear
|
Dell Inspiron 5505 AMD 4700U Live CD Test Image
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609886321.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
engineerfear
|
Lenovo Thinkbook 14 Gen 2 ITL - Intel 11th Gen i5 - live test day image
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second SKIP
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop SKIP
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign SKIP
./default/stack-randomness PASS
./default/selinux-dac-controls SKIP
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609987767.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ersen
|
Desktop PC with Intel Core i3-4160 @3.60 GHz
|
pass [1]
|
- ↑ Tested with kernel 5.10.3-200.fc33.x86_64, both tests passed.
GPU: Intel Integrated Graphics
Ethernet: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller
No Wi-Fi.
|
eschruefer@ca-musings.de
|
|
warn [1]
|
- ↑ Aarch64: Screen is garbled on a Raspberry Pi 4B. Screen looks as if out of sync (only squashed vertical lines).
|
figonzal
|
VM: QEMU/KVM, CPU: 2 vCPU / 8 CPU, RAM: 2048 MiB / 7831 MiB, x86_64
|
pass [1]
|
|
filiperosset
|
Intel(R) Core(TM) i7-10750H CPU @ 2.60GHz (running inside a VM 8Gig, 12 vcpus)
|
pass [1] fail [2]
|
- ↑ # performance test
sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.raw
Tue Jan 5 12:27:13 AM -03 2021
Latency measurements
Tue Jan 5 12:28:15 AM -03 2021
Calculating file system latency
Tue Jan 5 12:28:27 AM -03 2021
Local networking
Tue Jan 5 12:30:41 AM -03 2021
Bandwidth measurements
Tue Jan 5 12:38:06 AM -03 2021
Calculating context switch overhead
Tue Jan 5 12:38:41 AM -03 2021
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
- ↑ [filiperosset@raw kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/posix_timers PASS
./default/cachedrop PASS
./default/selinux-dac-controls SKIP
./default/stack-randomness PASS
./default/memfd PASS
./default/modsign PASS
./default/insert_leap_second PASS
./default/sysfs-perms PASS
./default/paxtest SKIP
./default/libhugetlbfs SKIP
./default/mq-memory-corruption PASS
./default/timer-overhead FAIL
Test suite complete FAIL
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
[filiperosset@raw kernel-tests]$
|
frantisekz
|
i5-6600k, RX 580
|
pass [1]
|
|
geraldosimiao
|
Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.4
|
pass [1]
|
- ↑ All Kernel regression tests PASSED, normal use for two days without problems.
|
geraldosimiao
|
Kenel 5.10.5-200.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
|
pass [1]
|
- ↑ Kernel regression tests PASSED, default and performance, normal use for a full day without problems.
|
geraldosimiao
|
kerneltest-5.10.4.iso on pendrive live-usb session
|
pass [1]
|
- ↑ I downloaded the kerneltest-5.10.4.iso (from https://jforbes.fedorapeople.org/testweek/ ) and created a pendrive with fedora image writer, them boot it on my Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller, and run the kernel-tests.
|
granissado
|
CPU: AMD Ryzen 7 5800X / RAM: 2x16GB / Test image
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
|
harshmangal
|
HP-VMM-2GB-3vCPU
|
fail [1]
|
- ↑ Test suit called with 'Default'
|
hhlp
|
CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
|
pass [1]
|
- ↑ RHBZ #1701322 No Regression Noted, Great Performance. it seem is it not affected by teh bugs before.
|
hozansahin
|
|
pass [1]
|
- ↑ ./runtests.sh
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
hozansahin
|
CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
hozansahin
|
CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX (Test İmage)
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
itrymybest80
|
Fedora 33 (koji upgrade), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.2) & 970 EVO M.2
|
pass [1]
|
- ↑ RHBZ #1911939 RHBZ #1909891 RHBZ #1887439 RHBZ #1885457 RHBZ #1883621 RHBZ #1884347 Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped. Bugs: 1) VA-API hardware acceleration broken with MESA 20.3 on AMD GPUs. 2) Steam will launch in an invisible window and you have to tab to grab it. 3) Booting Fedora (enter encryption key) now running in 640x480 and wrong 4:3 ratio. 4) Audio cracking and goes on/off multiple times during the boot sequence. 5) I'm still receiving the "run script kernel-core-5.10.4-200.fc33.x86_64 sort: fflush failed: 'standard output': Broken pipe sort: write error gzip: stdout: Broken pipe gzip: stdout: Broken pipe sort: write failed: 'standard output': Broken pipe sort: write error" while installing the kernel-core and kernel-debug-core package 6) DMESG [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. 7) DMESG show_signal_msg: 91 callbacks suppressed lat_rpc[12785]: segfault at 1000 ip 00007fa20b0b63b5 sp 00007fff196daa58 error 4 in libc-2.32.so[7fa20af7a000+14f000]. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
itsmefma
|
default
|
pass [1]
|
- ↑ Thikpad x1 carbon ( using boxes)
|
ivzhh
|
Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz, 4300 MHz; nVidia GP104M [GeForce GTX 1070 Mobile]; Samsung Electronics NVMe SSD Controller SM961/PM961; Intel Dual Band Wireless-AC 3168NGW [Stone Peak]; Qualcomm Atheros Killer E2500 Gigabit Ethernet Controller
|
fail [1]
|
- ↑ Computer automatically shutdown after passing "cachedrop" test in "sudo ./runtests.sh"
|
jadarius
|
Host: LIFEBOOK E754 10601583232 CPU: Intel i5-4200M (4) @ 3.100GHz GPU: Intel 4th Gen Core Processor Memory: 1525MiB / 7832MiB
|
pass [1]
|
|
jasonhong
|
Ryzen 3600 VM with 4 CPU and 8 GB RAM - copr image 5.10.4-200.fc33.x86_64
|
pass [1] pass [2]
|
- ↑ All (Default and Performance) tests passed
- ↑ Default Test Suite: Passed
Performance Test Suite: Passed
|
jbonilla
|
Dell XPS 17 9700
|
pass [1]
|
- ↑ Audio is still not working on Dell XPS 17 9700 (Dummy Output):
All of the tests passed. System performs well with the exception that audio devices not being detected.
Date: Sun Jan 3 07:20:44 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
================================================[edit]
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Mon Jan 4 18:59:50 2021
Scheduling leap second for Mon Jan 4 19:00:00 2021
Mon Jan 4 18:59:57 2021 + 246 us (37) TIME_INS
Mon Jan 4 18:59:57 2021 + 500512 us (37) TIME_INS
Mon Jan 4 18:59:58 2021 + 777 us (37) TIME_INS
Mon Jan 4 18:59:58 2021 + 501046 us (37) TIME_INS
Mon Jan 4 18:59:59 2021 + 1331 us (37) TIME_INS
Mon Jan 4 18:59:59 2021 + 501494 us (37) TIME_INS
Mon Jan 4 18:59:59 2021 + 1616 us (38) TIME_OOP
Mon Jan 4 18:59:59 2021 + 501731 us (38) TIME_OOP
Mon Jan 4 19:00:00 2021 + 1887 us (38) TIME_WAIT
Mon Jan 4 19:00:00 2021 + 502072 us (38) TIME_WAIT
Mon Jan 4 19:00:01 2021 + 2333 us (38) TIME_WAIT
Mon Jan 4 19:00:01 2021 + 502598 us (38) TIME_WAIT
Mon Jan 4 19:00:02 2021 + 2849 us (38) TIME_WAIT
Leap complete
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/paxtest
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0295871 s, 3.5 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00444862 s, 2.4 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/timer-overhead
Starting test ./default/libhugetlbfs
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/stack-randomness
Starting test ./default/selinux-dac-controls
<no matches>
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/sysfs-perms
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
|
jcwillia
|
Intel(R) Core(TM) i7-5557U CPU @ 3.10GHz (4 cores), 32GB RAM
|
pass
|
|
jnk0
|
Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
|
pass [1]
|
- ↑ 1. All tests passed.
Gnome freezes when screen is locked. No input is possible via mouse or keyboard. Multiple monitors connected via docking station. Worked fine with kernel 5.9.
|
johnh12345
|
Oracle VM VirtualBox Fedora 33 5.10.4-200.fc33.x86_64 2 CPUs 4GB RAM
|
fail [1] fail [2]
|
- ↑ Had to hit control-c on the insert leap second test as it would just hang.
cat kernel-test-1609904486.log.txt
Date: Tue Jan 5 10:41:26 PM EST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: FAIL
Failed Tests: ./default/insert_leap_second ./default/timer-overhead
Warned Tests: None
================================================[edit]
Starting test ./default/sysfs-perms
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/insert_leap_second
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/timer-overhead
Unacceptable long delay; asked for 1000 usec, got 2597 usec
Test failure.
Starting test ./default/stack-randomness
Starting test ./default/libhugetlbfs
Starting test ./default/paxtest
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0533018 s, 2.0 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00343501 s, 3.1 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/selinux-dac-controls
<no matches>
- ↑ Had to hit control-C on the insert leap second as it would just hang there. All other tests passed.
|
jortegi
|
|
pass
|
|
jpbn
|
iMac warly 2008 efi
|
fail
|
|
kabirgupta
|
|
pass
|
|
kameleon
|
CPU: Intel Core i5-8250U @ 1.60GHz
|
pass
|
|
kameleon
|
CPU: Intel Core i5-8250U @ 1.60GHz RAM: 4G DDR
|
pass [1]
|
- ↑ Tested on Fedora 33 VM using Boxes
While running runtests.sh - t performance, received the following error:
"In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2"
|
keepfloyding
|
|
fail [1]
|
- ↑ Default test suite failed.
bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop FAIL
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete FAIL
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance suite passed.
|
keepfloyding
|
Thinkpad X1 Carbon Gen 8. 16 gb RAM i7 CPU; Run on Gnome Boxes
|
fail [1]
|
- ↑ Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Performance suite passed.
|
kennyh7279
|
Ryzen 5 2600, Radeon 5600XT, 32GB RAM, Fedora 33 Workstation
|
pass [1]
|
- ↑ Date: Tue Jan 5 12:56:58 PM PST 2021
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
Date: Tue Jan 5 12:59:18 PM PST 2021
Test set: performance
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
|
kiko964
|
Intel Core i7-4702MQ VirtualBox
|
pass [1] fail [2]
|
- ↑ Performance tests passed
- ↑ Default test: Failed
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
knarra
|
20QES2P40L (LENOVO_MT_20QE_BU_Think_FM_ThinkPad X1 Carbon 7th)
|
pass [1]
|
- ↑ bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
1382MB OK
1382MB OK
1382MB OK
mhz: should take approximately 297 seconds
Using config in CONFIG.localhost-live
Tue Jan 5 08:42:57 AM EST 2021
Latency measurements
Tue Jan 5 08:50:44 AM EST 2021
Calculating file system latency
Tue Jan 5 08:54:33 AM EST 2021
Local networking
Tue Jan 5 09:01:26 AM EST 2021
Bandwidth measurements
Tue Jan 5 10:04:18 AM EST 2021
Calculating context switch overhead
Tue Jan 5 10:16:13 AM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
bash-5.0$ sudo ./runtests.sh -t performance
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 | static psize;
| ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
94 | return;
| ^~~~~~
lib_sched.c:46:1: note: declared here
46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
| ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
| ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
| ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
149 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
76 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
|
kubot
|
Intel® Core™ i7-3630QM CPU @ 2.40GHz × 8 ; NVE7 / Intel® HD Graphics 4000 (IVB GT2); RAM 8gb. 1TB samsung evo 850 ssd
|
pass
|
|
kuladog
|
F33, bare metal, HP EliteBook 840 G2, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4, 16 GB RAM
|
pass [1]
|
- ↑ 1. Both default, and performance tests passed.
|
lam
|
i7-9700K, Z390, 1080 Ti, nvidia drivers 460.32.03 (rpmfusion testing repo)
|
pass
|
|
ledufff
|
|
pass [1]
|
- ↑ Temperature improved dramatically.
|
ledufff
|
ThinkPad E495 AMD Ryzen 5 3500U
|
pass [1]
|
- ↑ Temperature improved dramatically.
|
lewis41
|
Test day image on VM
|
pass
|
|
lily
|
HP BL460c G5 bay 4
|
pass
|
|
lily
|
ampere hr330a
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
apm mustang
|
pass
|
|
lily
|
dell pem905
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
dell per7425
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe bl480c
|
pass
|
|
lily
|
hpe dl20gen9
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe sl2x160zg6
|
pass
|
|
lily
|
ibm x3250m4
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
lenovo rd230
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
lenovo st550
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
rdma dev
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lnie
|
HP ProLiant DL120 G6
|
pass
|
|
luya
|
HP Envy X360 Convertible 15 Ryzen 2500U
|
pass [1]
|
- ↑ All test passed with no sign of regression.
|
marc84
|
USB kerneltest-5.10.4.iso on Lenovo ideapad Y570
|
pass [1]
|
- ↑ Run default test suite and performance test suite: PASS
|
masami
|
i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
|
fail [1]
|
- ↑ RHBZ #1912061 suspend/resume doesn't work for me. it looks like same as "Bug 1912061 - Resume failure on 5.10.4-200.fc33 kernel". btw, kernel regression test tool passed and video, sound, kvm are work fine.
|
maumar
|
Live image on Dell Latitude e6540 (i7 4810MQ, Radeon HD 8790M)
|
pass
|
|
mharpau
|
Thinkpad T14s, Ryzen 7 4750U, Renoir GPU
|
pass [1]
|
- ↑ All test passed on kernel 5.10.4-200.fc33.x86_64. Day to day experience is ok without any obvious regression.
|
miguel7ra
|
Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
|
pass [1]
|
|
miguel7ra
|
Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive
|
pass [1]
|
- ↑ 1. Default and Performance Passed
|
morphy2k
|
OS: Fedora 33 Workstation, ENV: baremetal, KERNEL: 5.10.4-200.fc33.x86_64, DEVICE: Lenovo ThinkPad T14 AMD Gen 1, CPU: AMD Ryzen 7 Pro 4750U, RAM: 32GB DDR4-3200
|
pass [1]
|
- ↑ All tests passed. No issues after 2 days of use
|
murph
|
Vendor ID: AuthenticAMD CPU family: 23 Model: 49 Model name: AMD EPYC-Rome Processor Stepping: 0 CPU MHz: 3593.250 BogoMIPS: 7186.50 Virtualization: AMD-V Hypervisor vendor: KVM
|
pass [1]
|
- ↑ Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
|
mzink
|
Lenovo ThinkPad T480s
|
pass [1]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
|
mzink
|
ThinkPad T480s
|
fail [1]
|
- ↑ Screen is not waking up after DPMI sleep while using docking station - not responding to any keys. Builtin display works fine. Older 5.10.0-98.fc33.x86_64 build seems to work fine.
|
nielsenb
|
Compaq 8510w Intel T9300 AMD RV630
|
pass [1]
|
- ↑ libhugetlbfs, paxtest SKIP, all others PASS
|
norbertj
|
Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
|
pass [1]
|
- ↑ paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
|
pass [1]
|
- ↑ paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD 6450 and 4 GiB RAM
|
pass [1]
|
- ↑ paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
oldoc63
|
Intel Gigabyte I5 8 MB Ram 1 T HD uname --all 5.9.16-200.fc33.x86_64 #1 SMP Mon Dec 21 14:08:22 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
|
fail [1]
|
- ↑ [oldoc@localhost ~]$ cd kernel-tests
[oldoc@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop FAIL
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms WARN
./default/timer-overhead PASS
Test suite complete FAIL
Your log file is being submitted...
Traceback (most recent call last):
File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module>
submitclient.login(
File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login
response = openid_login(
File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
[oldoc@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.localhost.localdomain
Tue Dec 29 08:48:17 AM -04 2020
Latency measurements
Tue Dec 29 08:49:19 AM -04 2020
Calculating file system latency
Tue Dec 29 08:49:30 AM -04 2020
Local networking
Tue Dec 29 08:53:27 AM -04 2020
Bandwidth measurements
Tue Dec 29 09:00:10 AM -04 2020
Calculating context switch overhead
Tue Dec 29 09:00:45 AM -04 2020
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
Traceback (most recent call last):
File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module>
submitclient.login(
File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login
response = openid_login(
File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login
raise AuthError(output['message'])
fedora.client.AuthError: Authentication failed
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
oscarholst
|
Lenovo ThinkCentre M92P (Intel Core i5-3550 3.30GHz, 8192MB DDR3 1600MHz, intel graphics) Live iso usb kernel test
|
pass
|
|
oscarholst
|
Lenovo ThinkPad T440s (Intel Core i5-4200U 2.6GHz, 12GB DDR3, Intel HD Graphics 4400) live-usb kernel-test
|
pass [1]
|
|
pdapp
|
Intel board DH87RL G3220 3.0 Ghz , 16 GB RAM, i915,
|
pass [1]
|
- ↑ i915 gpu problem remains.
|
phoebos
|
Test Day live image; ThinkPad T480; Intel(R) Core(TM) i5-8350U CPU @ 1.70GHz
|
pass [1]
|
|
plumchii
|
Samsung NP350V5C-S06FR
|
pass [1]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms WARN
./default/timer-overhead PASS
Test suite complete WARN
Performance Test Passed
|
pwhalen
|
AMD Seattle (aarch64)
|
pass
|
|
pwhalen
|
Ampere eMag
|
pass
|
|
pwhalen
|
BananaPi (ARMv7)
|
pass
|
|
pwhalen
|
BeagleBoneBlack (ARMv7)
|
pass
|
|
pwhalen
|
Mustang (aarch64)
|
pass
|
|
rainmakerraw
|
AMD Threadripper 3960X (24c48t) at stock, Asus RoG Strix TRX40-E Gaming motherboard, 32GB DDR4 3600MHz (16,16,16,36), AMD Radeon Vega 56 (amdgpu), Intel I211-AT NIC
|
pass [1]
|
- ↑ All hardware seems to be working fine as before (on default release kernel 5.9.16). However the sound output has changed from two speaker stereo (which is what's plugged in) to 7.1 surround in the Gnome settings 'test' utility. lm_sensors also now reports an error:
ERROR: Can't get value of subfeature energy1_input: Kernel interface error
energy1: N/A
This is repeated 25 times (energy1, energy2... etc).
As requested on the Wiki page, here is the vulnerability output from the end of the test:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rhachey
|
VirtualBox: oracle 6.1.16 R140961
|
fail [1]
|
- ↑ ./default/cachedrop PASS
./default/insert_leap_second FAIL
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete FAIL
|
rimuru
|
VM: GNOME BOXES, cpu 4, memory 2GB
|
pass [1]
|
- ↑ LGTM
bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/cachedrop PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/stack-randomness PASS
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/memfd PASS
Test suite complete PASS
|
robbinespu
|
Virtualization: oracle (virtualbox 6.1.16. r140961) , Kernel: Linux 5.10.4-200.fc33.x86_64, Architecture: x86-64
|
fail [1]
|
- ↑ $ cat kernel-test-1609405976.log.txt
Date: Thu Dec 31 05:12:56 PM +08 2020
Test set: default
Kernel: 5.10.4-200.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: FAIL
Failed Tests: ./default/insert_leap_second
Warned Tests: None
================================================[edit]
Starting test ./default/stack-randomness
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/paxtest
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/insert_leap_second
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0561409 s, 1.9 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00455177 s, 2.3 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/libhugetlbfs
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... [OK]
Check timer_create() per process... [OK]
Starting test ./default/sysfs-perms
Starting test ./default/timer-overhead
Starting test ./default/selinux-dac-controls
|
rootxaman
|
description: Computer product: Standard PC (Q35 + ICH9, 2009) vendor: QEMU version: pc-q35-5.1 width: 64 bits capabilities: smbios-2.8 dmi-2.8 smp vsyscall32 configuration: boot=normal
|
pass [1]
|
|
sbakker
|
Fedora 33, DELL XPS 13 9310, nvme SSD, AX500 DBS WiFi
|
pass [1]
|
- ↑ WiFi does not survive suspend/resume cycle; can "rmmod" the ath11k_pci module which takes a long while, then reload it. Note that the 5.11 (rc2) kernel from Rawhide does not have this problem.
|
sgraf
|
(1) Virtual Machine, (2) NUC10i7FNH
|
fail [1]
|
- ↑ RHBZ #1911836 Bug 1911836 - Cannot boot kernel 5.10 on Silverblue
|
shiwanibiradar
|
Lenevo ideapad330 KVM 2Gb fedora33
|
pass [1]
|
|
siddharthvipul1
|
F32 on Thinkpad T480s
|
pass [1]
|
- ↑ Test Suite completed with "PASS"
|
siddy555
|
Virtualbox,Acer Aspire A515-51g, Intel i5 7200U 1 core, 2048 / 7837 MB memory, 30 GB VDI. Test Day Image F33, kerneltest-5.10.4.iso
|
fail [1]
|
- ↑ Didn't go through "insert_leap_second" test for lot of time pressed ctrl+c, rest all tests passed. Performance tests passed.
|
simon13
|
|
pass
|
|
skontar
|
ThinkPad L440, Intel Pentium 3550M, RAM 3.56 GiB used: 602.2 MiB (16.5%)
|
fail [1]
|
- ↑ RHBZ #1908736 Used test image. Cachedrop test FAILED.
GPU hangs when opening Firefox or running "Install to hard drive", seems to be the same as https://bugzilla.redhat.com/show_bug.cgi?id=1908736 . Also on start it seems to hang once, you can see random garbage on the screen for a while instead of the grub menu, then it starts.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
smearumi
|
Lenovo G40, Core i5, 8GB RAM, 128SSD
|
pass [1]
|
- ↑ Test suite called with default
./default/modsign PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/cachedrop PASS
./default/paxtest SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/memfd PASS
./default/libhugetlbfs SKIP
./default/selinux-dac-controls PASS
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
Test suite complete PASS
5511MB OK
5511MB OK
5511MB OK
mhz: should take approximately 297 seconds
Using config in CONFIG.localhost.localdomain
Sun Jan 10 06:44:24 PM +06 2021
Latency measurements
Sun Jan 10 06:52:08 PM +06 2021
Calculating file system latency
Sun Jan 10 06:55:56 PM +06 2021
Local networking
Sun Jan 10 07:01:31 PM +06 2021
Bandwidth measurements
Sun Jan 10 08:11:43 PM +06 2021
Calculating context switch overhead
Sun Jan 10 08:24:37 PM +06 2021
./performance/lmbench3 PASS
Test suite complete PASS
|
sumantrom
|
KVM , Kernel Test Week iso, 4GB RAM 2vCPU
|
pass [1]
|
- ↑ All works fine with test suite called with "default"
|
t3rm1n4l
|
ASUS P8Z77 V-pro, i7 3770, 16 Gb Ram
|
pass [1]
|
- ↑ All tests passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
t3rm1n4l
|
Dell Inspiron 3180 11"
|
pass [1] pass [2]
|
- ↑ all tests passed on 5.10.5, previous bug is resolved
- ↑ RHBZ #1911043 all tests pass. Bug can be worked around with amdgpu.dc=0, also happened with 5.10.2-200 (x86_64). have been running 5.10.2 for over a week with no issues (aside from the amdgpu bug). I have no issues on either of the intel desktops I have access to.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
thunderbirdtr
|
16 × Intel® Core™ i7-10875H CPU @ 2.30GHz / Nvidia RTX 2070 Super / 32GB RAM
|
pass [1]
|
- ↑ Tests are ok and nvidia works as well.
|
troycurtisjr
|
Dell XPS 17 9700 - i7-10875H - GeForce RTX 2060 Max-Q - 16GB Ram
|
pass [1]
|
- ↑ RHBZ #1911364 Tests all passed. Kernel booted fine, no functional issues noted, only the install warning noted with Bug 1911364.
Nvidia module working, external monitor works well. Firefox stable and runs video smoothly.
|
trugul
|
Thinkpad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 , 8 GB RAM, Intel® HD Graphics 4400 (HSW GT2), HDD 128 GB
|
pass [1]
|
- ↑ I cannot see that my log file was uploaded, hence this manual input.
[truls@localhost kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Your log file is being submitted...
[truls@localhost kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.localhost.localdomain
Thu Jan 7 12:38:14 PM CET 2021
Latency measurements
Thu Jan 7 12:39:20 PM CET 2021
Calculating file system latency
Thu Jan 7 12:39:21 PM CET 2021
Local networking
Thu Jan 7 12:43:02 PM CET 2021
Bandwidth measurements
Thu Jan 7 12:48:15 PM CET 2021
Calculating context switch overhead
Thu Jan 7 12:48:19 PM CET 2021
./performance/lmbench3 PASS
Test suite complete PASS
|
tseewald
|
Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
|
pass [1]
|
- ↑ 1. Default test passed. Performance test passed. No new warnings or errors in dmesg.
|
udb28
|
KVM , Kernel Test Week iso, 10GB RAM 4vCPU
|
pass [1]
|
- ↑ Test suite with default PASSED
Test suite with performance PASSED
|
uwueviee
|
Fedora 33 i7 3770 AMD R9 380 Bare Metal
|
fail [1]
|
- ↑ cachedrop failed, sysfs-perms warned
|
vascom
|
Ryzen 7 4750G, 32GB RAM
|
pass
|
|
vishald
|
description: CPU product: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz vendor: Intel Corp. physical id: 2c bus info: cpu@0 version: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz serial: NULL slot: SOCKET 0 size: 1405MHz capacity: 2GHz width: 64 bits clock: 100MHz
|
pass [1]
|
|
vty67
|
Dell Latitude E6320, 2GB, i3-2330M
|
pass [1]
|
- ↑ Sound, network, WiFi, suspend, resolution change of external monitor/TV (HDMI connected) - everything seems to be OK
|
vty67
|
Thinkpad T440p, 16GB, i5-4300M
|
pass [1]
|
- ↑ Everything seems to work, but changing external monitor/TV resolution (connected via HDMI) in Gnome Settings locks up system: mouse cursor freezes, no keyboard input possible.
|
xompax
|
|
pass [1]
|
- ↑ Test suite called with default
./default/selinux-dac-controls PASS
./default/cachedrop PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/insert_leap_second PASS
./default/stack-randomness PASS
./default/libhugetlbfs SKIP
./default/mq-memory-corruption PASS
./default/sysfs-perms PASS
./default/modsign PASS
./default/posix_timers PASS
./default/paxtest SKIP
Test suite complete PASS
|
xunjin
|
AMD Ryzen 7 3800X 8-Core Processor, 16GiB System Memory, CT1000P1SSD8, RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller
|
pass [1]
|
|