User
|
Profile
|
Regression
|
References
|
Daniels
|
QEMU Standard PC _Q35 + ICH9, 2009_
|
pass
|
|
Fabrizio Curcio
|
KVM Guest F34 on Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz with 16GB RAM (Live Image)
|
pass
|
|
Luigi Votta
|
Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 16 GB Asus H170-PRO
|
pass
|
|
Typijay
|
Dell Latitude E6540 i5-4310M
|
pass
|
|
abstractobject
|
https://linux-hardware.org/?probe=2c4c458feb
|
pass
|
|
alciregi
|
KVM on Proxmox VE, x86_64, UEFI
|
pass [1]
|
- ↑ Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
KVM on Proxmox VE, x86_64, bios
|
pass
|
|
alciregi
|
Lenovo V330-15IKB Type 81AX
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Lenovo X1 Crabon gen 8
|
pass [1]
|
- ↑ 5.13.2-300.fc34.x86_64
Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi
|
Pinebook Pro
|
pass [1] fail [2]
|
|
alciregi
|
Raspberry Pi 3 aarch64 no GUI
|
pass [1]
|
- ↑ WiFi works.
Bluethoot not tested.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amolenaar
|
Lenovo X1 Carbon 7th / Lenovo X1 Carbon 9th
|
pass
|
|
anantj12
|
Macbook Pro 2019 - Virtualbox
|
pass [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ananya26-vishnoi
|
Hp-14s er0003tu Virtual Box
|
fail [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ananya26-vishnoi
|
Hp-14s er0003tu Virtualbox
|
pass [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
andilinux
|
KVM libvirt
|
pass [1]
|
|
andilinux
|
Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
|
pass [1]
|
- ↑ 1. basic set of tests - result: fail
2. performance test suite - result: pass
|
andilinux
|
Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
|
pass
|
|
andilinux
|
Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
|
pass [1]
|
|
andilinux
|
Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
|
pass
|
|
atim
|
CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
|
pass
|
|
bacbka
|
Virt-manager
|
fail [1]
|
- ↑ Cachedrop test was failed.
|
bandithijo
|
https://linux-hardware.org/?probe=3e43acf8af
|
pass [1]
|
|
bandithijo
|
https://linux-hardware.org/?probe=63d761d915
|
pass [1]
|
|
belegdol
|
ASUS ZenBook 14 UM425IA
|
pass [1]
|
- ↑ Regression and performance tests passed, modern standby is finally working on my machine without the need for additional patches.
|
belegdol
|
ASUS ZenBook 14 UM425IA Ryzen 5 4500U 16 GB RAM
|
pass [1]
|
- ↑ Modern standby is finally working on my machine without the need for additional patches.
|
bittin
|
HP 655
|
warn [1] pass [2] warn [3] pass pass pass pass pass pass pass
|
- ↑ Took Sunday off
- ↑ Took Sunday off
- ↑ Took Saturday off
|
bittin
|
Virtualbox
|
warn [1] warn [2] fail pass pass fail pass pass pass
|
- ↑ Took Sunday off
- ↑ Took Saturday off
|
bkircher
|
Lenovo ThinkPad T490s, Intel(R) Core(TM) i5-8365U
|
pass [1]
|
|
bojan
|
Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.13.2-300.fc34.x86_64
|
pass [1] pass
|
- ↑ Default and performance tests passed on both machines.
|
bretth
|
5.13.1 KVM - 2CPU, 2GB RAM, Q35 chipset
|
pass [1]
|
- ↑ Default & performance tests pass
|
bretth
|
5.13.2 KVM - 2CPU, 2GB RAM, Q35 chipset
|
pass [1]
|
- ↑ Default & performance tests pass
|
bruno
|
Inspiron 1545
|
pass [1]
|
- ↑ RHBZ #1982213 There is a pause during boot that isn't there for 5.12 and earlier kernels. There was a warning for ./default/sysfs-perms. Otherwise things seem to be working OK.
|
bruno
|
MacBookAir4,2
|
pass [1]
|
- ↑ There was a warning for ./default/sysfs-perms.
The system seems to function normally.
|
buckaroogeek
|
Raspberry PI 4, 5.13.1-300.fc34.aarch64
|
pass [1]
|
- ↑ stack-randomness, libhugetlbfs, paxtest have result SKIP. otherwise PASS.
|
buckaroogeek
|
kvm-libvvirt, x86_64, AMD EPYC Processor (with IBPB)
|
pass [1]
|
- ↑ ./default/libhugetlbfs, ./default/paxtest, ./default/insert_leap_second have result SKIP; otherwise PASS
|
clnetbox
|
|
fail [1]
|
- ↑ CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getiing stuck at "Initializing nvidia-drm". Tested drivers : 460/465/470
|
clnetbox
|
Intel Core i7-10875H | 2 x 16 GB (32 GB) DDR4-3200 Crucial | 2 x 500 GB M.2 Samsung 970 EVO Plus | 1 TB Samsung 870 EVO | NVIDIA GeForce RTX 2070 Mobile (Refresh) | Fedora 34 Workstation | GNOME 40
|
fail [1]
|
- ↑ CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getting stuck at "Initializing nvidia-drm". Tested drivers : NVIDIA 460/465/470
|
condor
|
Virt-manager
|
fail [1]
|
- ↑ The cachedrop test failed.
|
coolomatics
|
Gigabyte Technology Co., Ltd. A520M S2H, AMD® Ryzen 5 3600 6-core processor × 12
|
fail [1]
|
- ↑ RHBZ #445408 RHBZ #442544 /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
coolomatics
|
Lenovo ThinkPad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4
|
pass [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
copperi
|
5.13.1-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
|
pass
|
|
csutter
|
Dell XPS 9310 i7-1185G7 32GB (Live Image)
|
pass [1]
|
- ↑ Regression and performance tests pass
|
danniel
|
lenovo ideapad S145 I7-8565U 8GB
|
pass
|
|
dhugh
|
ASUS TUF A17 FA706IU_TUF706IU, AMD® Ryzen 7 4800h, 16 GB MEM
|
pass
|
|
donaldsebleung
|
Kernel 5.13.1; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
|
pass
|
|
donaldsebleung
|
Kernel 5.13.2; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
|
pass
|
|
drakkai
|
Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F34
|
pass
|
|
evillagr
|
KVM, x86_64, Test Day IOS updated
|
pass
|
|
flash2071
|
https://linux-hardware.org/?probe=731361283a
|
pass [1]
|
- ↑ After
`sudo ./runtests.sh ` were 2 skips:
./default/libhugetlbfs SKIP
./default/paxtest SKIP
|
geraldosimiao
|
kernel-5.13.1-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
|
pass [1]
|
- ↑ All tests PASSED, no regressions found.
|
geraldosimiao
|
kernel-5.13.2-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
|
pass [1]
|
- ↑ no regressions found. kernel kernel-5.13.2-300.fc34
|
glennzo
|
Fedora 34 Workstation / VirtualBox / Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz
|
fail [1]
|
- ↑ ./default/timer-overhead FAIL
|
gtwilliams
|
XPS-13
|
pass
|
|
hmorish
|
fedora34, intel core i7-3630QM, RAM8GB, GNOME-Boxes-VM
|
pass
|
|
hyphop
|
Aarch64 amlogic meson khadas VIM3
|
warn [1]
|
- ↑ RHBZ #123123123 VIM3 soundcard cant works without CONFIG_COMMON_CLK_AXG_AUDIO=m|y
grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1*
/boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
/boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
/boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
|
ibims
|
VirtualBox 6.1.22
|
pass [1]
|
- ↑ ./default/modsign PASS
./default/memfd PASS
./default/mq-memory-corruption PASS
./default/cachedrop PASS
./default/posix_timers PASS
./default/selinux-dac-controls SKIP
./default/paxtest SKIP
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/insert_leap_second SKIP
Test suite complete PASS
|
itrymybest80
|
x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 21.1.4-1) & 970 EVO M.2
|
pass [1]
|
- ↑ Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
|
jnk0
|
Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
|
pass
|
|
kernel tester
|
Desktop i5-6600 bare metal, HD Graphics 530 (Skylake GT2), 16GB RAM, with F34 5.13.1 test day image
|
pass [1]
|
- ↑ Default and Performance passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
kernel tester
|
Laptop i5-7200U bare metal, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), with F34 5.13.1 test day image
|
pass [1]
|
- ↑ Default and performance tests passed.
|
leekaize
|
ASUS X556UR 5.13.2-300.fc34.x86_64
|
pass [1]
|
- ↑ ./default/sysfs-perms WARN. Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
|
leekaize
|
https://linux-hardware.org/?probe=477a92a37e
|
pass [1]
|
- ↑ ./default/sysfs-perms WARN
Reason of WARN status not indicated.
|
levait
|
Lenovo Thinkpad X230
|
pass [1]
|
|
levait
|
https://linux-hardware.org/?probe=a70e5b8b1d
|
pass [1]
|
|
lily
|
ampere hr330a
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
ampere hr350a
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
dell per7415
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
dell per805
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
fujitsu fx700
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe apache
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe dl120gen10
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
hpe dl360g5
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
ibm x3250m4
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
lenovo rd230
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
lenovo sr655
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
qualcomm amberwing
|
pass [1]
|
- ↑ all default and performance testcases passed
|
lily
|
rdma dev
|
pass [1]
|
- ↑ all default and performance testcases passed
|
malucious
|
Test Image.Qemu guest. Host: i7-6700K. Asus Z170A.
|
pass [1]
|
- ↑ /default/libhugetlbfs, and default/paxtest were skipped in the first test.
|
masami
|
i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, kernel 5.13.1-300.fc34.x86_64
|
pass [1]
|
- ↑ All tests passed. no regressions noted. Works fine for daily use.
|
max_rodriguez
|
Latest VirtualBox VM (Live 5.13.1 Kernel Testing Media): Intel i7-8750H @ 2.200GHz (2 Cores Given), 2048 MB RAM, 15GB Virtual Disk.
|
fail [1]
|
- ↑ Default Test Suite : PASS [LGTM]
Performance Test Suite : FAIL [Crashed 3 times during testing, first run gave multiple GCC warnings if thats normal?]
|
mbfedora
|
|
pass
|
|
mborland1
|
Intel i5-10500 w/32 GB RAM
|
pass
|
|
mcrts
|
https://linux-hardware.org/?probe=eb857365c7
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
merkaba
|
Lenovo ThinkPad T440p
|
pass
|
|
mharpau
|
Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.13.1-300.fc34.x86_64
|
pass [1]
|
- ↑ All tests PASSED, no regressions found.
|
mpearson
|
Lenovo P1G3
|
warn [1] pass
|
- ↑ The tests passed - but I seem to be having suspend/resume issues. Nothing obvious in the kernel logs so far - but it's not always coming back from resume. I'll do some more digging but wanted to flag it.
Also on dock hotplug the USB hub in the dock isn't detected
|
mpearson
|
Lenovo T14 AMD G1
|
pass
|
|
mpearson
|
Lenovo X1 nano
|
pass
|
|
mpearson
|
Lenovo X13 G1 AMD
|
pass
|
|
mpearson
|
X1 Carbon G9
|
pass
|
|
mythcat
|
https://linux-hardware.org/?probe=7b4c090391
|
pass
|
|
mzink
|
Lenovo T480s F34 - 5.13.1-300.fc34.x86_64
|
pass [1]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
|
nhfed
|
kerneltest-5.13.1.iso on bare metal Lenovo X1C9
|
pass [1]
|
- ↑ Default & performance tests passed.
|
nielsenb
|
HP Compaq 8510w Intel T9300 AMD RV630 BIOS
|
pass
|
|
nitsharma
|
Virt-manager - boxes
|
fail [1] fail [2]
|
- ↑ ./runtests.sh Failed | /default/cachedrop FAIL
./runtests.sh -t performance Passed
sudo semanage boolean -m --off selinuxuser_execheap | cant load memory | SELinux: Could not load policy file /etc/selinux/targeted/policy/policy.32: Cannot allocate memory
/sbin/load_policy: Can't load policy: Cannot allocate memory
libsemanage.semanage_reload_policy: load_policy returned error code 2. (No such file or directory).
- ↑ ./default/cachedrop FAIL
|
norbertj
|
Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj
|
Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM
|
pass [1]
|
- ↑ libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
nvisscher
|
Acer Aspire A515-55-576K (Intel Core i5(TM) 1035G1, 8 GB DDR4, Intel UHD Graphics)
|
pass [1]
|
- ↑ Set getlist and getsummary (in performance/lmbench3/scripts) as executable before performance test.
Vulnerabilities (compacted):
itlb_multihit:KVM: Mitigation: VMX disabled
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
|
nvisscher
|
Live test image on Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz, 6 GB DDR3, AMD Radeon HD7850
|
pass [1]
|
- ↑ Both passed. Performance test suite passed despite errors:
/bin/sh: line 1: ../scripts/getlist: Permission denied
/bin/sh: line 1: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
|
oturpe
|
Lenovo ThinkPad X230
|
pass
|
|
prasant1998
|
Nitro AN515-42,Oracle
|
fail [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
pwhalen
|
AMD Seattle (AArch64)
|
pass
|
|
pwhalen
|
APM Mustang X-Gene-1 (AArch64)
|
pass [1] pass
|
- ↑ 5.13.2-300.fc34.aarch64
|
pwhalen
|
Nvidia Jetson Xavier NX (aarch64)
|
pass [1] pass
|
- ↑ 5.13.2-300.fc34.aarch64
|
pwhalen
|
Raspberry Pi 2 Model B (armhfp)
|
pass
|
|
pwhalen
|
Raspberry Pi 3 Model B Rev 1.2 (AArch64)
|
pass [1] pass
|
- ↑ 5.13.2-300.fc34.aarch64
|
pwhalen
|
Raspberry Pi 4 4GB (aarch64)
|
pass [1]
|
- ↑ 5.13.2-300.fc34.aarch64
|
pwhalen
|
Wandboard Quad (armhfp)
|
pass
|
|
pwhalen
|
fujitsu-fx700 (aarch64)
|
pass [1] pass
|
- ↑ 5.13.2-300.fc34.aarch64
|
quiet
|
HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.4 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedora 34 64-bit, GNOME 40.1.0, Wayland, KVM
|
pass [1]
|
- ↑ Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
./performance/lmbench3 PASS
Test suite complete PASS
|
rai510
|
Gnome Boxes
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rai510
|
Virtualbox
|
fail [1]
|
- ↑ Test suite called with default
./default/stack-randomness PASS
./default/insert_leap_second SKIP
./default/cachedrop PASS
./default/timer-overhead FAIL
./default/selinux-dac-controls PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/posix_timers PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
Test suite complete FAIL
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1625868855.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rfm83
|
HP Laptop 14-cf0xxx - Intel Core i5-8250U - 16GB - KVM virtual machine - test day image Fedora 34
|
pass
|
|
rimuru
|
VirtualBox 6.1, Intel i5
|
pass [1]
|
|
roushan
|
Tested on latest VirtualBox. Image- kerneltest-5.13.1.iso (1.97 GB), 3 GB RAM, Boot Order - Floppy, Optical, Hard Disk, 8 GB data disk vdi
|
pass [1]
|
- ↑ Skipped 3 tests in virtualbox
1. insert_leap_second,
2. libhugetlbfs
3. paxtest
|
sammy
|
Fedora 34 test bench running in gnome box. Host OS is Fedora 34 running on HP 240 g8 notebook with 10th gen i3 processor, 8gb ram, 1TB hdd.
|
fail [1] fail [2]
|
- ↑ Date: Tuesday 13 July 2021 05:43:59 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: FAIL
Failed Tests: ./default/cachedrop
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Date: Tuesday 13 July 2021 05:48:37 PM IST
Test set: performance
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: RESULTHOLDER
- ↑ Date: Tuesday 13 July 2021 05:25:07 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: FAIL
Failed Tests: ./default/cachedrop
|
sammy
|
contributor tester
|
pass [1]
|
- ↑ RHBZ #0 Date: Saturday 10 July 2021 04:16:20 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: PASS
Failed Tests: None
Warned Tests: None
|
sbertram
|
Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz, Memory: 4096 MB, DISTRO=Fedora-34-20210424.n.0, 5.13.2-300.fc34.x86_64
|
pass
|
|
sgraf
|
qemu aarch64 VM on Apple M1, 5.13.1-300.fc34.aarch64
|
pass
|
|
sp6ina
|
Matebook 14 2020 AMD
|
pass
|
|
stathisl
|
Dell Inspirion 3542, Intel i3-4005U, 8GB, Intel HD 4400, Default Fedora Workstation 34 Gnome test image
|
pass [1]
|
- ↑ Both tests PASS (libhugetlibfs and paxtest SKIP)
|
stethewwolf
|
Fedora server 34 4G Ram 2 core virtualized on KVM
|
pass
|
|
stklcode
|
KVM guest (F34 Host), Skylake-X CPU, 16GB RAM, Live Image
|
pass
|
|
sumantrom
|
lenovo T580, KVM
|
pass fail [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
t3rm1n4l
|
Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2
|
fail [1]
|
- ↑ all tests passed, but still no gui on nvidia driver.
|
t3rm1n4l
|
ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
|
pass [1] pass [2]
|
- ↑ 5.13.2 all tests passed
- ↑ all tests passed, works for me
|
t3rm1n4l
|
Dell Inspiron 3180 11"
|
pass [1] pass [2]
|
- ↑ kernel 13.2 passed tests also
- ↑ all tests passed, noted the following segfault during testing: "lat_rpc[8552]: segfault at 1000 ip 00007fe965a99a7a sp 00007ffef0411ab8 error 4 in libc-2.33.so[7fe965a20000+14d000]
[ 588.142109] Code: f3 0f 1e fa 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 66 <f3> 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83", no issues noted with kernel for daily use.
|
t3rm1n4l
|
Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2
|
fail [1]
|
- ↑ RPMFUSION NVIDIA driver failed to provide gui on F33. Didn't perform regression tests.
|
tjuberg
|
|
pass
|
|
troycurtisjr
|
Dell XPS 17 9700 https://linux-hardware.org/?probe=592276c98f
|
pass [1]
|
- ↑ Both automated tests passed. Additionally the following worked well: bluetooth audio, smooth Minecraft play, Firefox browsing
|
udb28
|
Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4
|
pass
|
|
udb28
|
Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 Memory: 3.5 GiB
|
pass [1]
|
- ↑ 1. Default Test PASS
2. Performance Test PASS
|
ups1610
|
HP Pavilion 15-eg-0124tx
|
pass [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vanquisher3498
|
VirtualBox running on HP AU-623tx
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vascom
|
Ryzen 7 4750G, 32GB RAM, 5.13.1-300.fc34.x86_64
|
pass
|
|
vk2bea
|
Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz / 16 GB RAM / NVIDIA GK107 [GeForce GT 740] (using Nvidia driver (akmod-nvidia) )
|
pass pass
|
|
wayne6001
|
Intel NUC6i5SYK; Intel Core™ i5-6260U CPU @ 1.80GHz × 4; Mesa Intel Iris(R) Graphics 540 (SKL GT3); Memory 15.5 GiB; SSD 512.1 GB; OS Fedora 34 (Workstation Edition); OS Type 64-bit; Gnome 40.1.0; Wayland
|
pass [1]
|
|
xfgusta
|
VirtualBox 6.1.22_RPMFusion r144080
|
pass [1]
|
|
zwintabris
|
|
pass
|
|