Kernel 5.11 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2021-03-08_Kernel_5.11_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
CharDSon Hardware Model: ASUSTeK COMPUTER INC. X553MA, Processor: Intel® Celeron(R) CPU N2830 @ 2.16GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64 [1] 1. ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms WARN ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Dell Latitude 3380, Processor: Intel® Celeron(R) CPU 3865U @ 1.80GHz × 2, RAM 3.5 GiB, Kernel 5.11.4-50.fc33.x86_64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: HP ProBook 430 G6, Processor: Intel® Celeron(R) CPU 4205U @ 1.80GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Lenovo ideapad 330-15IKB, Processor: Intel® Core™ i3-8130U CPU @ 2.20GHz × 4, RAM 7.7 GiB, Kernel 5.11.4-50.fc33.x86_64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
FreddyW Dell Latitude E5570, i5-6300U, 32GiB RAM, kernel-5.11.5-50.fc33.x86_64 [1] 1. #1936171, See https://bugzilla.redhat.com/show_bug.cgi?id=1936171 . System does not boot, kernel panic at sysinit.target. Only bootable with acpi=off.
Josevaldo Kernel: 5.11.3-300.fc34.x86_64 CPU: Intel Xeon E5-2630L v3 @ 2.900GHz [1] 1. Test suite complete PASS
Mario CPU: Intel Core i5-4210M CPU @ 2.60GHz x 4, GPU: NV117 / Intel HD Graphics 4600, Memory: 15,5GiB
Mario CPU: Intel Core i7-9700K CPU @ 3.60GHz x 8, GPU: NV168, Memory: 15,5GiB
alciregi F33 Raspberry Pi 3 headless aarch64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 4 8GB headless aarch64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo ThinkCentre M73z [1] 1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alphacluster CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570 [1] 1. No issues reported
anamika Oracle VM, Kernel test week iso, 2GB RAM , 2vCPU [1] [2] 1. 1. Test suite called with "default" ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ^C./default/insert_leap_second FAIL ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$ 3. Test suite called with default gets stuck at ./default/insert_leap_second Even after leaving it for 1.5 hours and even after repetetive testing, this test case tends to fail. Also, ./default/cachedrop shows a non-consistent record. I tested for the Test suite called with "default" 3 times, out of which the ./default/cachedrop FAILED 2 times and PASSED once. However overall the Test suite called with "default" tends to FAIL on this mentioned system.
2. All works fine with Test suite called with "performance". Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/cc6WMMPY.o: in function `setup_names': lat_fs.c:(.text+0x831): warning: the use of `tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ expr: syntax error: missing argument after ‘*’ ../scripts/config-run: line 199: [: -gt: unary operator expected ../scripts/config-run: line 204: [: -lt: unary operator expected ../scripts/config-run: line 208: [: -lt: unary operator expected mhz: should take approximately 15 seconds Using config in CONFIG.localhost-live Wed Mar 10 02:31:00 PM EST 2021 Latency measurements Wed Mar 10 02:31:45 PM EST 2021 Calculating file system latency Wed Mar 10 02:31:59 PM EST 2021 Local networking Wed Mar 10 02:36:21 PM EST 2021 Bandwidth measurements Wed Mar 10 02:40:19 PM EST 2021 Calculating context switch overhead Wed Mar 10 02:40:59 PM EST 2021 ./performance/lmbench3 PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$
anthonys53 Dell Latitude E6438, Intel(R) Core(TM) i5-3380M CPU @ 2.90GHz, 8GB RAM [1] 1. When I first re-booted into the test kernel, kernel-5.11.3-50.fc33 on my FC32 machine, I had at least 6 Firefox tabs open from my daily driver kernel. I had no control over selecting or closing the individual tabs in the new kernel, so I simply closed the window. This anomaly did not recur.
anthonys53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33 [1] 1. Ran fine -- no remarks
astauss53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33, kernel-5.11.5-50.fc33 [1] 1. All fine.
bhavdeep009 Tester [1] 1. sudo ./runtests.sh -t performance ... 1381MB ok 1381MB ok 1381MB ok terminal crashes Repeated this process 3 times.
binaryfever Virtual Machine: 4gb RAM, 4 cores [1] 1. insert_leap_second ran for nearly 4 hours with neither pass fail. Killed it and the the rest of the tests passed.
bohrasd OS: Fedora 33 (KDE Plasma) x86_64 Host: ROG Zephyrus G14 GA401IV_GA401IV 1.0 Kernel: 5.11.4-50.fc33.x86_64 Uptime: 1 hour, 10 mins Packages: 2667 (rpm ), 110 (nix-user), 1 (flatpak) Shell: zsh 5.8 Resolution: 2560x1440, 3360x1890 DE: i3 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 2888MiB / 15475MiB [1] 1. Date: Fri Mar 12 10:13:04 AM HKT 2021 Test set: default Kernel: 5.11.4-50.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None ============================================================ Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop Setting time to Sat Mar 13 07:59:50 2021 Scheduling leap second for Sat Mar 13 08:00:00 2021 Sat Mar 13 07:59:57 2021 + 113 us (37) TIME_INS Sat Mar 13 07:59:57 2021 + 500250 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 350 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 500491 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 630 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 500770 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 908 us (38) TIME_OOP Sat Mar 13 07:59:59 2021 + 501200 us (38) TIME_OOP Sat Mar 13 08:00:00 2021 + 1306 us (38) TIME_WAIT Sat Mar 13 08:00:00 2021 + 501407 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 1538 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 501784 us (38) TIME_WAIT Sat Mar 13 08:00:02 2021 + 1890 us (38) TIME_WAIT Leap complete Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... Diff too high: -78401484793..[FAIL] Check timer_create() per process... [OK] Starting test ./default/paxtest Starting test ./default/libhugetlbfs Starting test ./default/sysfs-perms Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/selinux-dac-controls SELinux must be enabled for this test Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/timer-overhead Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0543299 s, 1.9 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00350606 s, 3.0 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/stack-randomness
bojan Lenovo ThinkPad T450s [1] 1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bojan Noname fanless PC with Intel Core i5-8250U [1] 1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bretth 5.11.4 (KVM) [1] 1. Default & performance tests pass
bretth 5.11.5 (KVM) [1] 1. Default & performance tests pass (KVM)
condor virt-manager on f33 Workstation 2 virtual CPUs, 2048 memory. IvyBridge. [1] 1. The default cachedrop test failed!
copperi 5.11.4-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
danniel Acer Aspire E 16 intel core i7 5500, intel HD grafphics 5500 , 8 GB Memory [1] [2] 1. Ok
2. Ok
device Dell XPS 9380 Core i7-8565U, 8GB LPDDR3 2133MHz, 256GB M.2 PCIe NVMe, Killer 1435 802.11ac 2x2 & Bluetooth 4.1
donaldsebleung Test Day Image (kernel 5.11.3) in GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz) [1] 1. Default tests PASS (2 SKIP); performance tests PASS with multiple compiler warnings on implicitly declared lmbench_usage() and make error (permission denied) trying to enter ../scripts directory
donaldsebleung Test Day Image (kernel 5.11.4) on GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz) [1] 1. Default test suite PASS; performance test suite PASS with compiler warnings on lmbench_usage and permission denied trying to access ../scripts/get{list,summary}
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F32 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F33 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
dtometzki HOST: Lenovo ideapad 330s ; Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz; MEMORY: 8,0 GiB [1] 1. [damian@f33 linux]$ dmesg -l err --> No Errors Linux f33 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Boot OK
electronicsumit Test day image on VM [1] 1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS bash-5.0$ uname -a Linux fedora 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
emblaze Raspberry Pi 4B 4GB [1] 1. #1918672, Sound device no longer recognised whereas it is on 5.10.3 (suboptimal playback though) Might need to reopen BZ 1918672 Default and performance tests suites run and passed with linux-firmware-20200918-112 linux-firmware-20210208-117.fc33 breaks WiFi on Raspberry Pi 4 https://bugzilla.redhat.com/show_bug.cgi?id=1934761 (Fix available upstream)
emmrou Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB. [1] 1. Wifi, bluetooth, sound and video worked fine.
evillagr KVM, x86_64, 5.11.4-50.fc33.x86_64 [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
fuller testday-image on MacBook Air A1465 [1] 1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on NUC7i5BNH
fuller testday-image on ThinkCentre M91 [1] 1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on ZaReason i7 8th gen
garrmcnu Test image on VM (KVM) [1] 1. Default and performance tests passed
georgm Lenovo E14 Gen 2, Intel(R) Core(TM) i7-1165G7, 5.11.5-50.fc33.x86_64 [1] 1. I power up the system and enter LUKS password. I directly trigger reboot from login screen. Reboot starts, journal gets stopped as usual (checked with journalctl -b -1), no additional error in journal compared to 5.10.21-200.fc33.x86_64. I cannot press escape to see log messages
geraldosimiao kernel 5.11.4-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5 [1] 1. all tests passed, no regressions found
geraldosimiao kernel 5.11.5-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5 [1] 1. All tests passed, no regressions found.
geraldosimiao kernel-5.11.3-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5 [1] 1. all kernel-tests passed, normal use for a day, no regressions found.
grumpey CPU: 6-Core AMD FX-6100 (-MCP-) speed/min/max: 1461/1400/3300 MHz Kernel: 5.11.3-300.fc34.x86_64 x86_64 Up: 10h 03m Mem: 2087.4/15998.1 MiB (13.0%) St orage: 8.19 TiB (28.6% used) Procs: 323 Shell: Zsh inxi: 3.3.01 [1] 1. 1 rumpey@grumpey:gitrepos/kernel-tests>%sudo ./runtests.sh 2 est suite called with default 3 ./default/cachedrop PASS 4 ./default/insert_leap_second PASS 5 ./default/libhugetlbfs SKIP 6 ./default/memfd PASS 7 ./default/modsign SKIP 8 ./default/mq-memory-corruption PASS 9 ./default/paxtest SKIP 10 ./default/posix_timers PASS 11 ./default/selinux-dac-controls PASS 12 ./default/stack-randomness PASS 13 ./default/sysfs-perms PASS 14 ./default/timer-overhead PASS 15 16 Test suite complete PASS ./performance/lmbench3 PASS Test suite complete PASS
harshmangal HP (8th Gen) Fc33| x86_64 | Intel(R) Core(TM) i5-8250U CPU @ 1.60GH | 8 GiB of RAM | Intel UHD Graphics 620 [1] 1. The performance test is giving code errors.
hhlp CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB [1] 1. No regression noted.... Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 02), Kernel driver in use: r8169
hoboprimate HOST: Acer Aspire 7; CPU: Intel Core i7-7700HQ CPU @ 2.8GHz x 8; GRAPHICS: NV137 / Intel HD Graphics 630; MEMORY: 15,5 GiB [1] 1. Installed kernel-5.11.3-50 from koji on a fedora 33 installation
hricky CPU: Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM: 31,3 GiB, Fedora 33 (Workstation Edition), Kernel: 5.11.4-50.fc33.x86_64 [1] 1. Runs well so far.
hricky Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM 31,3 GiB, Fedora 33 (Workstation Edition), 5.11.4-50.fc33.x86_64 [1] [2] 1. Runs well so far.
2. Runs well so far.
itrymybest80 Fedora 33 (koji update), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.4-2) & 970 EVO M.2. [1] 1. #1885457, I don't have a bluetooth adapter, but I still get fails in dmesg "Bluetooth: hci0: command 0x1001 tx timeout Bluetooth: hci0: BCM: Reading local version info failed (-110) Bluetooth: hci0: command 0xfc4c tx timeout Bluetooth: hci0: BCM: Patch command fc4c failed (-110) Bluetooth: hci0: BCM: Patch failed (-110) Bluetooth: hci0: command 0x0c03 tx timeout Bluetooth: hci0: BCM: Reset failed (-110)" and I still get these amdgpu failures also in dmesg "[drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (2501 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (3128 > 3126), lowering kernel.perf_event_max_sample_rate to 63000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed." Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
keepfloyding Thinkpad X1 Carbon Gen 8 running on Gnome Boxes CPU: Intel Core i7-10510U @ 8x 4.9GHz GPU: Mesa Intel(R) UHD Graphics (CML GT2) RAM: 15661MiB [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL ulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kejmaro testday-image on NUC5i5RYK [1] [2] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./thirdparty/nvidia-module WARN Test suite complete WARN
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
lily ampere hr330a [1] [2] [3] 1. all default and performance testcases passed
2. all default and performance testcases passed
3. all default and performance testcases passed
lily ampere hr350a [1] 1. all default and performance testcases passed
lily dell pem605 [1] 1. all default and performance testcases passed
lily dell per7425 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily dell pesc430 [1] 1. all default and performance testcases passed
lily fujitsu fx700 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily hpe apache [1] 1. all default and performance testcases passed
lily hpe apollo [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily hpe bl460c [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily hpe dl20gen9 [1] 1. all default and performance testcases passed
lily hpe sy660gen9 [1] 1. all default and performance testcases passed
lily ibm x3500m4 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily lenovo rd230 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily qualcomm amberwing [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lmh1 [1] 1. i3 2350M 2.3 ghz kernel 5.13 Sony Corporation Product Name: SVE14A1S1EB
marc84 USB kerneltest-5.11.4.iso on Lenovo ideapad Y570 [1] 1. Basic and Performance test: PASSED
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation [1] 1. regression test passed. no regression noted on daily use.
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.11.3-50.fc33.x86_64 [1] 1. 1. all kernel-tests passed, normal use for a day, no regressions found.
molli123 L390 Yoga, 16GB [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 Ryzen 5 5600X, 64GB, 1060 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 i5-9500T, 16GB [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
mpearson Lenovo P15 [1] 1. No issues seen
mpearson Lenovo P1G3 [1] 1. Everything looked clean to me.
nhnh Host: 20ALCTO1WW ThinkPad X240 , CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT , Memory: 1666MiB / 7830MiB (Bare-Metal, Live run)
nhnh Host: 20ALCTO1WW ThinkPad X240 / CPU: Intel i5-4300U (4) @ 2.900GHz / GPU: Intel Haswell-ULT / Memory: 6200MiB / 7830MiB // Guest-VM: on QEMU/KVM, Q3 5 CHIPSET, UEFI, 2 CPU + 4096MB RAM allocated [1] 1. Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest SKIP Test suite complete PASS ///// 2743MB OK 2743MB OK 2743MB OK Using config in CONFIG.localhost-live Sat Mar 6 06:56:40 AM EST 2021 Latency measurements Sat Mar 6 06:57:06 AM EST 2021 Calculating file system latency Sat Mar 6 06:57:07 AM EST 2021 Local networking Sat Mar 6 07:00:53 AM EST 2021 Bandwidth measurements Sat Mar 6 07:04:11 AM EST 2021 Calculating context switch overhead Sat Mar 6 07:04:15 AM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
nickavem AMD® Ryzen 5 2600x six-core processor × 12 AMD® Radeon rx 5600 xt [1] 1. Works fine on Silverblue 33. Tests require overlaid packages; Toolbox and Podman do not work.
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 BIOS test day image [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
norbertj Test day image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on desktop PC with Ryzen 3200G, B450 chip set and 16 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on old desktop PC with Core i5-750, P55 chip set, Radeon HD 6450 and 4 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
oturpe Lenovo X230
petrvelicka Dell Latitude E6540 w/ i7-4800MQ && Radeon HD 8790M @ Fedora 33 testdayimage
pnemade Lenovo T480s F33 VM [1] 1. Test suite called with default ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/stack-randomness PASS ./default/paxtest SKIP ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/insert_leap_second PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/memfd FAIL Test suite complete FAIL
quiet QEMU Standard PC _Q35 + ICH9, 2009, Memory: 7.7GiB, Processor: Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, Graphics: llvmpipe (LLVM 12.0.0, 256 bits) Dis k: 21.5 GB, OS Name: Fedora 34 Workstation Edition 64-bit, GNOME 40.1.0, Wayland, KVM [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS ./performance/lmbench3 PASS Test suite complete PASS
rai510 Gnome Boxes VM Kernel Test Day Image Ryzen 3400g 8gb ram [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rfm83
rfm83 HP Laptop 14-cf0xxx
rfm83 HP Laptop 14-cf0xxx - Intel Core i5-8250U - 8GB - KVM virtual machine - test day image Fedora 33 [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... fedora_submit.py -u <fasuser> [-p <password>] -l <logfile> The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rimuru test day image on GNOME Boxes; CPU model = Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz [1] [2] 1. sudo ./runtests.sh -t performance mhz: should take approximately 30 seconds Using config in CONFIG.localhost-live Tue Mar 9 07:24:45 PM EST 2021 Latency measurements Tue Mar 9 07:25:46 PM EST 2021 Calculating file system latency Tue Mar 9 07:26:10 PM EST 2021 Local networking Tue Mar 9 07:30:14 PM EST 2021 Bandwidth measurements Tue Mar 9 07:38:08 PM EST 2021 Calculating context switch overhead Tue Mar 9 07:39:20 PM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ronignc Fedora 34 64-bit on a Hewlett-Packard HP Pavilion g6 Notebook PC, 7.7 GiB RAM, Intel® Core™ i5-3210M CPU @ 2.50GHz × 4, AMD® Turks / Intel® HD Graphic s 4000 (IVB GT2), 120.0 GB HD [1] 1. For the default test suits no tests failed, but I did received a warning for the sysfs-perms test "Found world-writable files in sysfs." If I got it right it is the case for this file /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx.
rslnrdnk [1] 1. I have noticed that since 5.10 release of Linux kernel any distro, including Fedora that uses both 5.11 and 5.12 kernel releases get black screen during initial boot process that persists up until the very end, making computer unusable. Switching to other tty's does nothing, so the only solution left is to push power down button or reload and try to use 5.10 kernel instead. This is clearly a some kind of a regression. I am very interested in pinpointing the issue because newer releases will use 5.11 kernels and upwards — which will basically left me out. Please, tell me what I can do to help solve this issue and I'll try to do the best I can. My hardware info can be found there: https://linux-hardware.org/?probe=f40d786ac2
saknl Ryzen 3600xt, Asrock B550m Steel Legend, Radeon 5600xt [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.3-300.fc34.x86_64 [1] 1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:17: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:17: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:26: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:18: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:16: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/ccsRlflH.o: in function `setup_names': lat_fs.c:(.text+0x825): warning: the use of `tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:17: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ 1381MB OK 1381MB OK 1381MB OK Using config in CONFIG.fedora Tue Mar 9 07:50:58 PM IST 2021 Latency measurements Tue Mar 9 08:15:47 PM IST 2021 Calculating file system latency Tue Mar 9 08:15:48 PM IST 2021 Local networking Tue Mar 9 08:19:34 PM IST 2021 Bandwidth measurements Tue Mar 9 08:21:32 PM IST 2021 Calculating context switch overhead Tue Mar 9 08:21:36 PM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.4-300.fc34.x86_64 [1] 1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance [sudo] password for sayak: Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 01:38:46 AM IST 2021 Latency measurements Thu Mar 11 01:57:08 AM IST 2021 Calculating file system latency Thu Mar 11 01:57:09 AM IST 2021 Local networking Thu Mar 11 02:01:00 AM IST 2021 Bandwidth measurements Thu Mar 11 02:02:55 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:03:00 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.5-300.fc34.x86_64 [1] 1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 02:22:08 AM IST 2021 Latency measurements Thu Mar 11 02:40:06 AM IST 2021 Calculating file system latency Thu Mar 11 02:40:08 AM IST 2021 Local networking Thu Mar 11 02:43:54 AM IST 2021 Bandwidth measurements Thu Mar 11 02:45:45 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:45:49 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sgraf Intel NUC10i7FNH, 5.11.4-300.fc34.x86_64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sixpack13 test day image; HW: Intel Core i5-3475S (Ivybridge 3rd Gen.), RAM 12 GB, SATA HD: SAMSUNG HD502HJ [1] 1. ./default/libhugetlbfs: SKIP ./default/paxtest: SKIP === after starting "sudo ./runtests.sh -t performance" I see this ! is this the test or a bug ? Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ ...
sumantrom Test Day image on KVM [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP] [1] 1. first test run failed on cachedrop, but all passed on second run (default, performance). Noted the following in journalctl -k: pcspkr: version magic '5.10.21-200.fc33.x86_64 SMP mod_unload ' should be '5.11.4-50.fc33.x86_64 SMP mod_unload ' Doesn't seem to affect the functionality of the kernel though.
t3rm1n4l Dell Inspiron 3180 11" [1] [2] 1. #1936791, adding bug entry, as noted, appears to be framebuffer issue with AMD STONEY APU, does not boot past GRUB kernel selection on 5.11 kernel, cannot ctrl+alt+del or change to a different tty, only option is to hit the power button and select a different kernel
2. LUKS encryption enabled on this system, system does not boot with 5.11 kernel series, system doesn't even reach the prompt to decrypt the disk, just sits there with a white cursor in the corner of the screen.
theloudspeaker Ideapad Flex 5, Ryzen 5 4500u. 5.11.3-50.fc33.x86_64 [1] 1. Both the tests, default as well as performance tests passed.
theloudspeaker Intel core 2 duo. 2GB RAM 1GB swap. [1] 1. default test suite result is WARN performance test suite result is PASS
trugul ThinkPad X1 Carbon 4th, 8 GB, Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 , Mesa Intel® HD Graphics 520 (SKL GT2)
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO) [1] 1. Default test passed. Performance test passed. No new warnings or errors in dmesg compared to 5.10.
user am GiB, processor AMD® Athlon(tm) ii x2 250 processor × 2 , grafik AMD® Rs880, festplatte GB, Kernel: 5.11.4-50.fc33.x86_64
vty67 Dell Latitude E5470, 4GB RAM, i5 CPU [1] 1. Can't finish booting from ISO testing image, kernel panics during boot and system freezes
vty67 Dell Latitude E6320, 2GB, i3-2330M [1] 1. libhugetlbfs SKIP paxtest SKIP, other PASS, everything works
vty67 HP ProBook 640 G5, 8GB RAM, i5-8265U CPU [1] 1. tests passed, no audio output (headphones, HDMI, internal speakers not detected), HDMI video output OK, WiFi OK
vty67 Thinkpad T440p, 16GB, i5-4300M [1] 1. 1. libhugetlbfs SKIP, paxtest SKIP, other PASS, everything works
yanqiyu X570 + 3900X + Rx550
yosukemat Ryzen 9 5900X X570 - Boxes VM - Test image kerneltest-5.11.4 [1] 1. FAILED Default Test Suite Log - https://pastebin.com/rRjv58ws PASSED Performance Test Suite Log - https://pastebin.com/k9MrKRd6
Wiki Metadata