User
|
Profile
|
Regression
|
References
|
CharDSon
|
Hardware Model: ASUSTeK COMPUTER INC. X553MA, Processor: Intel® Celeron(R) CPU N2830 @ 2.16GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
|
fail [1]
|
- ↑ ./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop FAIL
./default/modsign PASS
./default/sysfs-perms WARN
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete FAIL
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
CharDSon
|
Hardware Model: Dell Latitude 3380, Processor: Intel® Celeron(R) CPU 3865U @ 1.80GHz × 2, RAM 3.5 GiB, Kernel 5.11.4-50.fc33.x86_64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
CharDSon
|
Hardware Model: HP ProBook 430 G6, Processor: Intel® Celeron(R) CPU 4205U @ 1.80GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
CharDSon
|
Hardware Model: Lenovo ideapad 330-15IKB, Processor: Intel® Core™ i3-8130U CPU @ 2.20GHz × 4, RAM 7.7 GiB, Kernel 5.11.4-50.fc33.x86_64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
FreddyW
|
Dell Latitude E5570, i5-6300U, 32GiB RAM, kernel-5.11.5-50.fc33.x86_64
|
fail [1]
|
|
Josevaldo
|
Kernel: 5.11.3-300.fc34.x86_64 CPU: Intel Xeon E5-2630L v3 @ 2.900GHz
|
pass [1]
|
- ↑ Test suite complete PASS
|
Mario
|
CPU: Intel Core i5-4210M CPU @ 2.60GHz x 4, GPU: NV117 / Intel HD Graphics 4600, Memory: 15,5GiB
|
pass
|
|
Mario
|
CPU: Intel Core i7-9700K CPU @ 3.60GHz x 8, GPU: NV168, Memory: 15,5GiB
|
pass
|
|
alciregi
|
F33 Raspberry Pi 3 headless aarch64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
F33 Raspberry Pi 4 8GB headless aarch64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Lenovo ThinkCentre M73z
|
pass [1]
|
- ↑ The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alphacluster
|
CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
|
pass [1]
|
|
anamika
|
Oracle VM, Kernel test week iso, 2GB RAM , 2vCPU
|
fail [1] pass [2]
|
- ↑ 1. Test suite called with "default"
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop FAIL
./default/modsign PASS
./default/sysfs-perms PASS
^C./default/insert_leap_second FAIL
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete FAIL
2. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bash-5.0$
3. Test suite called with default gets stuck at ./default/insert_leap_second
Even after leaving it for 1.5 hours and even after repetetive testing, this test case tends to fail.
Also, ./default/cachedrop shows a non-consistent record. I tested for the Test suite called with "default" 3 times, out of which the ./default/cachedrop FAILED 2 times and PASSED once.
However overall the Test suite called with "default" tends to FAIL on this mentioned system.
- ↑ All works fine with Test suite called with "performance".
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 | static psize;
| ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
94 | return;
| ^~~~~~
lib_sched.c:46:1: note: declared here
46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
| ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
| ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
| ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
149 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
76 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
157 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
153 | if (parallel <= 0) lmbench_usage(argc, argv, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
53 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
167 | static count = 0;
| ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
41 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
136 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
116 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
78 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
58 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
492 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
60 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
55 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/cc6WMMPY.o: in function
setup_names':
lat_fs.c:(.text+0x831): warning: the use of tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
182 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
42 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
46 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
45 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
84 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
203 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
393 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
69 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
413 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
70 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
123 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
66 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
39 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
204 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
40 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
expr: syntax error: missing argument after ‘*’
../scripts/config-run: line 199: [: -gt: unary operator expected
../scripts/config-run: line 204: [: -lt: unary operator expected
../scripts/config-run: line 208: [: -lt: unary operator expected
mhz: should take approximately 15 seconds
Using config in CONFIG.localhost-live
Wed Mar 10 02:31:00 PM EST 2021
Latency measurements
Wed Mar 10 02:31:45 PM EST 2021
Calculating file system latency
Wed Mar 10 02:31:59 PM EST 2021
Local networking
Wed Mar 10 02:36:21 PM EST 2021
Bandwidth measurements
Wed Mar 10 02:40:19 PM EST 2021
Calculating context switch overhead
Wed Mar 10 02:40:59 PM EST 2021
./performance/lmbench3 PASS
Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bash-5.0$
|
anthonys53
|
Dell Latitude E6438, Intel(R) Core(TM) i5-3380M CPU @ 2.90GHz, 8GB RAM
|
pass [1]
|
- ↑ When I first re-booted into the test kernel, kernel-5.11.3-50.fc33 on my FC32 machine, I had at least 6 Firefox tabs open from my daily driver kernel. I had no control over selecting or closing the individual tabs in the new kernel, so I simply closed the window. This anomaly did not recur.
|
anthonys53
|
HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33
|
pass [1]
|
|
astauss53
|
HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33, kernel-5.11.5-50.fc33
|
pass [1]
|
|
bhavdeep009
|
Tester
|
fail [1]
|
- ↑ sudo ./runtests.sh -t performance
...
1381MB ok
1381MB ok
1381MB ok
terminal crashes
Repeated this process 3 times.
|
binaryfever
|
Virtual Machine: 4gb RAM, 4 cores
|
fail [1]
|
- ↑ insert_leap_second ran for nearly 4 hours with neither pass fail. Killed it and the the rest of the tests passed.
|
bohrasd
|
OS: Fedora 33 (KDE Plasma) x86_64 Host: ROG Zephyrus G14 GA401IV_GA401IV 1.0 Kernel: 5.11.4-50.fc33.x86_64 Uptime: 1 hour, 10 mins Packages: 2667 (rpm), 110 (nix-user), 1 (flatpak) Shell: zsh 5.8 Resolution: 2560x1440, 3360x1890 DE: i3 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 2888MiB / 15475MiB
|
pass [1]
|
- ↑ Date: Fri Mar 12 10:13:04 AM HKT 2021
Test set: default
Kernel: 5.11.4-50.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
================================================[edit]
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Sat Mar 13 07:59:50 2021
Scheduling leap second for Sat Mar 13 08:00:00 2021
Sat Mar 13 07:59:57 2021 + 113 us (37) TIME_INS
Sat Mar 13 07:59:57 2021 + 500250 us (37) TIME_INS
Sat Mar 13 07:59:58 2021 + 350 us (37) TIME_INS
Sat Mar 13 07:59:58 2021 + 500491 us (37) TIME_INS
Sat Mar 13 07:59:59 2021 + 630 us (37) TIME_INS
Sat Mar 13 07:59:59 2021 + 500770 us (37) TIME_INS
Sat Mar 13 07:59:59 2021 + 908 us (38) TIME_OOP
Sat Mar 13 07:59:59 2021 + 501200 us (38) TIME_OOP
Sat Mar 13 08:00:00 2021 + 1306 us (38) TIME_WAIT
Sat Mar 13 08:00:00 2021 + 501407 us (38) TIME_WAIT
Sat Mar 13 08:00:01 2021 + 1538 us (38) TIME_WAIT
Sat Mar 13 08:00:01 2021 + 501784 us (38) TIME_WAIT
Sat Mar 13 08:00:02 2021 + 1890 us (38) TIME_WAIT
Leap complete
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... Diff too high: -78401484793..[FAIL]
Check timer_create() per process... [OK]
Starting test ./default/paxtest
Starting test ./default/libhugetlbfs
Starting test ./default/sysfs-perms
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/selinux-dac-controls
SELinux must be enabled for this test
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/timer-overhead
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0543299 s, 1.9 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00350606 s, 3.0 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/stack-randomness
|
bojan
|
Lenovo ThinkPad T450s
|
pass [1]
|
- ↑ Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
|
bojan
|
Noname fanless PC with Intel Core i5-8250U
|
pass [1]
|
- ↑ Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
|
bretth
|
5.11.4 (KVM)
|
pass [1]
|
- ↑ Default & performance tests pass
|
bretth
|
5.11.5 (KVM)
|
pass [1]
|
- ↑ Default & performance tests pass (KVM)
|
condor
|
virt-manager on f33 Workstation 2 virtual CPUs, 2048 memory. IvyBridge.
|
fail [1]
|
- ↑ The default cachedrop test failed!
|
copperi
|
5.11.4-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
|
pass
|
|
danniel
|
Acer Aspire E 16 intel core i7 5500, intel HD grafphics 5500 , 8 GB Memory
|
pass [1] pass [2]
|
|
device
|
Dell XPS 9380 Core i7-8565U, 8GB LPDDR3 2133MHz, 256GB M.2 PCIe NVMe, Killer 1435 802.11ac 2x2 & Bluetooth 4.1
|
pass
|
|
donaldsebleung
|
Test Day Image (kernel 5.11.3) in GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
|
pass [1]
|
- ↑ Default tests PASS (2 SKIP); performance tests PASS with multiple compiler warnings on implicitly declared lmbench_usage() and make error (permission denied) trying to enter ../scripts directory
|
donaldsebleung
|
Test Day Image (kernel 5.11.4) on GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
|
pass [1]
|
- ↑ Default test suite PASS; performance test suite PASS with compiler warnings on lmbench_usage and permission denied trying to access ../scripts/get{list,summary}
|
drakkai
|
Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F32
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
drakkai
|
Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F33
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
|
dtometzki
|
HOST: Lenovo ideapad 330s ; Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz; MEMORY: 8,0 GiB
|
pass [1]
|
- ↑ [damian@f33 linux]$ dmesg -l err --> No Errors
Linux f33 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Boot OK
|
electronicsumit
|
Test day image on VM
|
fail [1]
|
- ↑ bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/modsign PASS
./default/cachedrop PASS
./default/selinux-dac-controls PASS
./default/sysfs-perms PASS
./default/stack-randomness PASS
./default/posix_timers PASS
./default/libhugetlbfs SKIP
./default/timer-overhead PASS
./default/mq-memory-corruption PASS
bash-5.0$ uname -a
Linux fedora 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
|
emblaze
|
Raspberry Pi 4B 4GB
|
pass [1]
|
- ↑ RHBZ #1918672 Sound device no longer recognised whereas it is on 5.10.3 (suboptimal playback though)
Might need to reopen BZ 1918672
Default and performance tests suites run and passed with linux-firmware-20200918-112
linux-firmware-20210208-117.fc33 breaks WiFi on Raspberry Pi 4
https://bugzilla.redhat.com/show_bug.cgi?id=1934761 (Fix available upstream)
|
emmrou
|
Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
|
pass [1]
|
- ↑ Wifi, bluetooth, sound and video worked fine.
|
evillagr
|
KVM, x86_64, 5.11.4-50.fc33.x86_64
|
pass [1]
|
- ↑ Test suite called with default
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete PASS
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
fuller
|
testday-image on MacBook Air A1465
|
pass [1]
|
- ↑ sudo ./runtests.sh -t performance
...
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
|
fuller
|
testday-image on NUC7i5BNH
|
pass
|
|
fuller
|
testday-image on ThinkCentre M91
|
pass [1]
|
- ↑ sudo ./runtests.sh -t performance
...
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
|
fuller
|
testday-image on ZaReason i7 8th gen
|
pass
|
|
garrmcnu
|
Test image on VM (KVM)
|
pass [1]
|
- ↑ Default and performance tests passed
|
georgm
|
Lenovo E14 Gen 2, Intel(R) Core(TM) i7-1165G7, 5.11.5-50.fc33.x86_64
|
fail [1]
|
- ↑ I power up the system and enter LUKS password. I directly trigger reboot from login screen. Reboot starts, journal gets stopped as usual (checked with journalctl -b -1), no additional error in journal compared to 5.10.21-200.fc33.x86_64.
I cannot press escape to see log messages
|
geraldosimiao
|
kernel 5.11.4-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
|
pass [1]
|
- ↑ all tests passed, no regressions found
|
geraldosimiao
|
kernel 5.11.5-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
|
pass [1]
|
- ↑ All tests passed, no regressions found.
|
geraldosimiao
|
kernel-5.11.3-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
|
pass [1]
|
- ↑ all kernel-tests passed, normal use for a day, no regressions found.
|
grumpey
|
CPU: 6-Core AMD FX-6100 (-MCP-) speed/min/max: 1461/1400/3300 MHz Kernel: 5.11.3-300.fc34.x86_64 x86_64 Up: 10h 03m Mem: 2087.4/15998.1 MiB (13.0%) Storage: 8.19 TiB (28.6% used) Procs: 323 Shell: Zsh inxi: 3.3.01
|
pass [1]
|
- ↑ 1 rumpey@grumpey:gitrepos/kernel-tests>%sudo ./runtests.sh
2 est suite called with default
3 ./default/cachedrop PASS
4 ./default/insert_leap_second PASS
5 ./default/libhugetlbfs SKIP
6 ./default/memfd PASS
7 ./default/modsign SKIP
8 ./default/mq-memory-corruption PASS
9 ./default/paxtest SKIP
10 ./default/posix_timers PASS
11 ./default/selinux-dac-controls PASS
12 ./default/stack-randomness PASS
13 ./default/sysfs-perms PASS
14 ./default/timer-overhead PASS
15
16 Test suite complete PASS
./performance/lmbench3 PASS
Test suite complete PASS
|
harshmangal
|
x86_64 | Intel(R) Core(TM) i5-8250U CPU @ 1.60GH | 8 GiB of RAM | Intel UHD Graphics 620
|
pass [1]
|
- ↑ The performance test is giving code errors.
|
hhlp
|
CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
|
pass [1]
|
- ↑ No regression noted.... Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 02), Kernel driver in use: r8169
|
hoboprimate
|
HOST: Acer Aspire 7; CPU: Intel Core i7-7700HQ CPU @ 2.8GHz x 8; GRAPHICS: NV137 / Intel HD Graphics 630; MEMORY: 15,5 GiB
|
pass [1]
|
- ↑ Installed kernel-5.11.3-50 from koji on a fedora 33 installation
|
hricky
|
CPU: Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM: 31,3 GiB, Fedora 33 (Workstation Edition), Kernel: 5.11.4-50.fc33.x86_64
|
pass [1]
|
|
hricky
|
Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM 31,3 GiB, Fedora 33 (Workstation Edition), 5.11.4-50.fc33.x86_64
|
pass [1] pass [2]
|
- ↑ Runs well so far.
- ↑ Runs well so far.
|
itrymybest80
|
Fedora 33 (koji update), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.4-2) & 970 EVO M.2.
|
pass [1]
|
- ↑ RHBZ #1885457 I don't have a bluetooth adapter, but I still get fails in dmesg "Bluetooth: hci0: command 0x1001 tx timeout Bluetooth: hci0: BCM: Reading local version info failed (-110) Bluetooth: hci0: command 0xfc4c tx timeout Bluetooth: hci0: BCM: Patch command fc4c failed (-110) Bluetooth: hci0: BCM: Patch failed (-110) Bluetooth: hci0: command 0x0c03 tx timeout Bluetooth: hci0: BCM: Reset failed (-110)" and I still get these amdgpu failures also in dmesg "[drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (2501 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (3128 > 3126), lowering kernel.perf_event_max_sample_rate to 63000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed." Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
|
keepfloyding
|
Thinkpad X1 Carbon Gen 8 running on Gnome Boxes CPU: Intel Core i7-10510U @ 8x 4.9GHz GPU: Mesa Intel(R) UHD Graphics (CML GT2) RAM: 15661MiB
|
fail [1]
|
- ↑ Test suite called with default
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop FAIL
./default/modsign PASS
./default/sysfs-perms PASS
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete FAIL
ulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
kejmaro
|
testday-image on NUC5i5RYK
|
pass [1] pass [2]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
./thirdparty/nvidia-module WARN
Test suite complete WARN
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
lily
|
ampere hr330a
|
pass [1] pass [2] pass [3]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
ampere hr350a
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
dell pem605
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
dell per7425
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
dell pesc430
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
fujitsu fx700
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
hpe apache
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe apollo
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
hpe bl460c
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
hpe dl20gen9
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe sy660gen9
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
ibm x3500m4
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
lenovo rd230
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
lily
|
qualcomm amberwing
|
pass [1] pass [2]
|
- ↑ all default and performance testcases passed
- ↑ all default and performance testcases passed
|
marc84
|
USB kerneltest-5.11.4.iso on Lenovo ideapad Y570
|
pass [1]
|
- ↑ Basic and Performance test: PASSED
|
masami
|
i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
|
pass [1]
|
- ↑ regression test passed. no regression noted on daily use.
|
mharpau
|
Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.11.3-50.fc33.x86_64
|
pass [1]
|
- ↑ 1. all kernel-tests passed, normal use for a day, no regressions found.
|
molli123
|
L390 Yoga, 16GB
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
molli123
|
Ryzen 5 5600X, 64GB, 1060
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
molli123
|
i5-9500T, 16GB
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
mpearson
|
Lenovo P15
|
pass [1]
|
|
mpearson
|
Lenovo P1G3
|
pass [1]
|
- ↑ Everything looked clean to me.
|
nhnh
|
Host: 20ALCTO1WW ThinkPad X240 , CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT , Memory: 1666MiB / 7830MiB (Bare-Metal, Live run)
|
pass
|
|
nhnh
|
Host: 20ALCTO1WW ThinkPad X240 / CPU: Intel i5-4300U (4) @ 2.900GHz / GPU: Intel Haswell-ULT / Memory: 6200MiB / 7830MiB // Guest-VM: on QEMU/KVM, Q35 CHIPSET, UEFI, 2 CPU + 4096MB RAM allocated
|
warn [1]
|
- ↑ Test suite called with default
./default/modsign PASS
./default/cachedrop PASS
./default/selinux-dac-controls PASS
./default/sysfs-perms PASS
./default/stack-randomness PASS
./default/posix_timers PASS
./default/libhugetlbfs SKIP
./default/timer-overhead PASS
./default/mq-memory-corruption PASS
./default/insert_leap_second PASS
./default/memfd PASS
./default/paxtest SKIP
Test suite complete PASS
/////
2743MB OK
2743MB OK
2743MB OK
Using config in CONFIG.localhost-live
Sat Mar 6 06:56:40 AM EST 2021
Latency measurements
Sat Mar 6 06:57:06 AM EST 2021
Calculating file system latency
Sat Mar 6 06:57:07 AM EST 2021
Local networking
Sat Mar 6 07:00:53 AM EST 2021
Bandwidth measurements
Sat Mar 6 07:04:11 AM EST 2021
Calculating context switch overhead
Sat Mar 6 07:04:15 AM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
|
nickavem
|
AMD® Ryzen 5 2600x six-core processor × 12 AMD® Radeon rx 5600 xt
|
pass [1]
|
- ↑ Works fine on Silverblue 33. Tests require overlaid packages; Toolbox and Podman do not work.
|
nielsenb
|
HP Compaq 8510w Intel T9300 AMD RV630 BIOS test day image
|
pass [1]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
|
norbertj
|
Test day image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Test day image on desktop PC with Ryzen 3200G, B450 chip set and 16 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Test day image on old desktop PC with Core i5-750, P55 chip set, Radeon HD 6450 and 4 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
petrvelicka
|
Dell Latitude E6540 w/ i7-4800MQ && Radeon HD 8790M @ Fedora 33 testdayimage
|
pass
|
|
pnemade
|
Lenovo T480s F33 VM
|
fail [1]
|
- ↑ Test suite called with default
./default/sysfs-perms PASS
./default/cachedrop PASS
./default/libhugetlbfs SKIP
./default/mq-memory-corruption PASS
./default/stack-randomness PASS
./default/paxtest SKIP
./default/selinux-dac-controls PASS
./default/modsign PASS
./default/insert_leap_second PASS
./default/posix_timers PASS
./default/timer-overhead PASS
./default/memfd FAIL
Test suite complete FAIL
|
rai510
|
Gnome Boxes VM Kernel Test Day Image Ryzen 3400g 8gb ram
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rfm83
|
|
pass
|
|
rfm83
|
HP Laptop 14-cf0xxx
|
pass
|
|
rfm83
|
HP Laptop 14-cf0xxx - Intel Core i5-8250U - 8GB - KVM virtual machine - test day image Fedora 33
|
pass [1]
|
- ↑ Test suite called with default
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete PASS
Your log file is being submitted...
fedora_submit.py -u <fasuser> [-p <password>] -l <logfile>
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rimuru
|
test day image on GNOME Boxes; CPU model = Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
|
pass [1] fail [2]
|
- ↑ sudo ./runtests.sh -t performance
mhz: should take approximately 30 seconds
Using config in CONFIG.localhost-live
Tue Mar 9 07:24:45 PM EST 2021
Latency measurements
Tue Mar 9 07:25:46 PM EST 2021
Calculating file system latency
Tue Mar 9 07:26:10 PM EST 2021
Local networking
Tue Mar 9 07:30:14 PM EST 2021
Bandwidth measurements
Tue Mar 9 07:38:08 PM EST 2021
Calculating context switch overhead
Tue Mar 9 07:39:20 PM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
- ↑ bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/selinux-dac-controls PASS
./default/posix_timers PASS
./default/cachedrop FAIL
./default/modsign PASS
./default/sysfs-perms PASS
./default/insert_leap_second PASS
./default/mq-memory-corruption PASS
./default/memfd PASS
./default/timer-overhead PASS
./default/libhugetlbfs SKIP
./default/paxtest SKIP
./default/stack-randomness PASS
Test suite complete FAIL
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rslnrdnk
|
|
fail [1]
|
- ↑ I have noticed that since 5.10 release of Linux kernel any distro, including Fedora that uses both 5.11 and 5.12 kernel releases get black screen during initial boot process that persists up until the very end, making computer unusable. Switching to other tty's does nothing, so the only solution left is to push power down button or reload and try to use 5.10 kernel instead. This is clearly a some kind of a regression.
I am very interested in pinpointing the issue because newer releases will use 5.11 kernels and upwards — which will basically left me out. Please, tell me what I can do to help solve this issue and I'll try to do the best I can. My hardware info can be found there: https://linux-hardware.org/?probe=f40d786ac2
|
saknl
|
Ryzen 3600xt, Asrock B550m Steel Legend, Radeon 5600xt
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
sayaksarkar
|
KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.3-300.fc34.x86_64
|
pass [1]
|
- ↑ [sayak@fedora kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:17: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 | static psize;
| ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:17: warning: ‘return’ with no value, in function returning non-void
94 | return;
| ^~~~~~
lib_sched.c:46:1: note: declared here
46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
| ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:26: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
| ^~~~~~~~~~~~~~~~~
lib_sched.c:231:18: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
| ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
149 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
76 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
157 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
153 | if (parallel <= 0) lmbench_usage(argc, argv, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
53 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:16: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
167 | static count = 0;
| ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
41 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
136 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
116 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
78 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
58 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
492 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
60 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
55 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/ccsRlflH.o: in function
setup_names':
lat_fs.c:(.text+0x825): warning: the use of tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
182 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
74 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
42 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
46 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
45 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
84 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
203 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
63 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
393 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
54 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
69 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
64 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
413 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
70 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
123 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
66 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
47 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
39 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:17: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
204 | lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
40 | if (parallel <= 0) lmbench_usage(ac, av, usage);
| ^~~~~~~~~~~~~
1381MB OK
1381MB OK
1381MB OK
Using config in CONFIG.fedora
Tue Mar 9 07:50:58 PM IST 2021
Latency measurements
Tue Mar 9 08:15:47 PM IST 2021
Calculating file system latency
Tue Mar 9 08:15:48 PM IST 2021
Local networking
Tue Mar 9 08:19:34 PM IST 2021
Bandwidth measurements
Tue Mar 9 08:21:32 PM IST 2021
Calculating context switch overhead
Tue Mar 9 08:21:36 PM IST 2021
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$
|
sayaksarkar
|
KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.4-300.fc34.x86_64
|
pass [1]
|
- ↑ [sayak@fedora kernel-tests]$ sudo ./runtests.sh
[sudo] password for sayak:
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
[sudo] password for sayak:
Test suite called with performance
Using config in CONFIG.fedora
Thu Mar 11 01:38:46 AM IST 2021
Latency measurements
Thu Mar 11 01:57:08 AM IST 2021
Calculating file system latency
Thu Mar 11 01:57:09 AM IST 2021
Local networking
Thu Mar 11 02:01:00 AM IST 2021
Bandwidth measurements
Thu Mar 11 02:02:55 AM IST 2021
Calculating context switch overhead
Thu Mar 11 02:03:00 AM IST 2021
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
|
sayaksarkar
|
KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.5-300.fc34.x86_64
|
pass [1]
|
- ↑ [sayak@fedora kernel-tests]$ sudo ./runtests.sh
[sudo] password for sayak:
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.fedora
Thu Mar 11 02:22:08 AM IST 2021
Latency measurements
Thu Mar 11 02:40:06 AM IST 2021
Calculating file system latency
Thu Mar 11 02:40:08 AM IST 2021
Local networking
Thu Mar 11 02:43:54 AM IST 2021
Bandwidth measurements
Thu Mar 11 02:45:45 AM IST 2021
Calculating context switch overhead
Thu Mar 11 02:45:49 AM IST 2021
./performance/lmbench3 PASS
Test suite complete PASS
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
|
sgraf
|
Intel NUC10i7FNH, 5.11.4-300.fc34.x86_64
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
sixpack13
|
test day image; HW: Intel Core i5-3475S (Ivybridge 3rd Gen.), RAM 12 GB, SATA HD: SAMSUNG HD502HJ
|
pass [1]
|
- ↑ ./default/libhugetlbfs: SKIP
./default/paxtest: SKIP
after starting "sudo ./runtests.sh -t performance"
I see this !
is this the test or a bug ?
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 | static psize;
| ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
94 | return;
| ^~~~~~
...
|
sumantrom
|
Test Day image on KVM
|
fail [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
t3rm1n4l
|
ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
|
pass [1]
|
- ↑ first test run failed on cachedrop, but all passed on second run (default, performance).
Noted the following in journalctl -k:
pcspkr: version magic '5.10.21-200.fc33.x86_64 SMP mod_unload ' should be '5.11.4-50.fc33.x86_64 SMP mod_unload '
Doesn't seem to affect the functionality of the kernel though.
|
t3rm1n4l
|
Dell Inspiron 3180 11"
|
fail [1] fail [2]
|
- ↑ RHBZ #1936791 adding bug entry, as noted, appears to be framebuffer issue with AMD STONEY APU, does not boot past GRUB kernel selection on 5.11 kernel, cannot ctrl+alt+del or change to a different tty, only option is to hit the power button and select a different kernel
- ↑ LUKS encryption enabled on this system, system does not boot with 5.11 kernel series, system doesn't even reach the prompt to decrypt the disk, just sits there with a white cursor in the corner of the screen.
|
theloudspeaker
|
Ideapad Flex 5, Ryzen 5 4500u. 5.11.3-50.fc33.x86_64
|
pass [1]
|
- ↑ Both the tests, default as well as performance tests passed.
|
theloudspeaker
|
Intel core 2 duo. 2GB RAM 1GB swap.
|
pass [1]
|
- ↑ default test suite result is WARN
performance test suite result is PASS
|
trugul
|
ThinkPad X1 Carbon 4th, 8 GB, Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 , Mesa Intel® HD Graphics 520 (SKL GT2)
|
pass
|
|
tseewald
|
Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
|
pass [1]
|
- ↑ Default test passed. Performance test passed. No new warnings or errors in dmesg compared to 5.10.
|
user
|
am GiB, processor AMD® Athlon(tm) ii x2 250 processor × 2 , grafik AMD® Rs880, festplatte GB, Kernel: 5.11.4-50.fc33.x86_64
|
pass
|
|
vty67
|
Dell Latitude E5470, 4GB RAM, i5 CPU
|
fail [1]
|
- ↑ Can't finish booting from ISO testing image, kernel panics during boot and system freezes
|
vty67
|
Dell Latitude E6320, 2GB, i3-2330M
|
pass [1]
|
- ↑ libhugetlbfs SKIP paxtest SKIP, other PASS, everything works
|
vty67
|
HP ProBook 640 G5, 8GB RAM, i5-8265U CPU
|
pass [1]
|
- ↑ tests passed, no audio output (headphones, HDMI, internal speakers not detected), HDMI video output OK, WiFi OK
|
vty67
|
Thinkpad T440p, 16GB, i5-4300M
|
pass [1]
|
- ↑ 1. libhugetlbfs SKIP, paxtest SKIP, other PASS, everything works
|
yosukemat
|
Ryzen 9 5900X X570 - Boxes VM - Test image kerneltest-5.11.4
|
fail [1]
|
|