Kernel 5.13 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2021-07-11_Kernel_5.13_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and realoaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Daniels QEMU Standard PC _Q35 + ICH9, 2009_
Fabrizio Curcio KVM Guest F34 on Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz with 16GB RAM (Live Image)
Luigi Votta Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 16 GB Asus H170-PRO
Typijay Dell Latitude E6540 i5-4310M
abstractobject https://linux-hardware.org/?probe=2c4c458feb
alciregi KVM on Proxmox VE, x86_64, UEFI [1] 1. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi KVM on Proxmox VE, x86_64, bios
alciregi Lenovo V330-15IKB Type 81AX [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo X1 Crabon gen 8 [1] 1. 5.13.2-300.fc34.x86_64 Test suite called with performance Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Pinebook Pro [1] [2] 1. 5.13.2 works
2. https://lists.fedoraproject.org/archives/list/arm@lists.fedoraproject.org/thread...
alciregi Raspberry Pi 3 aarch64 no GUI [1] 1. WiFi works. Bluethoot not tested. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amolenaar Lenovo X1 Carbon 7th / Lenovo X1 Carbon 9th
anantj12 Macbook Pro 2019 - Virtualbox [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ananya26-vishnoi Hp-14s er0003tu Virtual Box [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ananya26-vishnoi Hp-14s er0003tu Virtualbox [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
andilinux KVM libvirt [1] 1. tested on F34 KDE
andilinux Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc33.x86_64 OS Typ e: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe [1] 1. 1. basic set of tests - result: fail 2. performance test suite - result: pass
andilinux Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc33.x86_64 OS Typ e: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
andilinux Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc34.x86_64 (64-bi t) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000 [1] 1. -
andilinux Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc34.x86_64 (64-bi t) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
atim CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
bacbka Virt-manager [1] 1. Cachedrop test was failed.
bandithijo https://linux-hardware.org/?probe=3e43acf8af [1] 1. 1. https://apps.fedoraproject.org/kerneltest/logs/49566 2. https://apps.fedoraproject.org/kerneltest/logs/49567
bandithijo https://linux-hardware.org/?probe=63d761d915 [1] 1. Result default test: https://apps.fedoraproject.org/kerneltest/logs/49563 Result performance test: https://apps.fedoraproject.org/kerneltest/logs/49564
belegdol ASUS ZenBook 14 UM425IA [1] 1. Regression and performance tests passed, modern standby is finally working on my machine without the need for additional patches.
belegdol ASUS ZenBook 14 UM425IA Ryzen 5 4500U 16 GB RAM [1] 1. Modern standby is finally working on my machine without the need for additional patches.
bittin HP 655 [1] [2] [3] 1. Took Sunday off
2. Took Sunday off
3. Took Saturday off
bittin Virtualbox [1] [2] 1. Took Sunday off
2. Took Saturday off
bkircher Lenovo ThinkPad T490s, Intel(R) Core(TM) i5-8365U [1] 1. Both passed
bojan Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.13.2-300.fc34.x86_64 [1] 1. Default and performance tests passed on both machines.
bretth 5.13.1 KVM - 2CPU, 2GB RAM, Q35 chipset [1] 1. Default & performance tests pass
bretth 5.13.2 KVM - 2CPU, 2GB RAM, Q35 chipset [1] 1. Default & performance tests pass
bruno Inspiron 1545 [1] 1. #1982213, There is a pause during boot that isn't there for 5.12 and earlier kernels. There was a warning for ./default/sysfs-perms. Otherwise things seem to be working OK.
bruno MacBookAir4,2 [1] 1. There was a warning for ./default/sysfs-perms. The system seems to function normally.
buckaroogeek Raspberry PI 4, 5.13.1-300.fc34.aarch64 [1] 1. stack-randomness, libhugetlbfs, paxtest have result SKIP. otherwise PASS.
buckaroogeek kvm-libvvirt, x86_64, AMD EPYC Processor (with IBPB) [1] 1. ./default/libhugetlbfs, ./default/paxtest, ./default/insert_leap_second have result SKIP; otherwise PASS
clnetbox [1] 1. CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getiing stuck at "Initializing nvidia-drm". Tested drivers : 460/465/470
clnetbox SCHENKER XMG PRO 17 | Intel Core i7-10875H | 2 x 16 GB (32 GB) DDR4-3200 Crucial | 2 x 500 GB M.2 Samsung 970 EVO Plus | 1 TB Samsung 870 EVO | NVIDIA GeForce RTX 2070 Mobile (Refresh) | Fedora 34 Workstation | GNOME 40 [1] 1. CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getting stuck at "Initializing nvidia-drm". Tested drivers : NVIDIA 460/465/470
condor Virt-manager [1] 1. The cachedrop test failed.
coolomatics Gigabyte Technology Co., Ltd. A520M S2H, AMD® Ryzen 5 3600 6-core processor × 12 [1] 1. #445408, #442544, /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
coolomatics Lenovo ThinkPad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
copperi 5.13.1-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
csutter Dell XPS 9310 i7-1185G7 32GB (Live Image) [1] 1. Regression and performance tests pass
danniel lenovo ideapad S145 I7-8565U 8GB
dhugh ASUS TUF A17 FA706IU_TUF706IU, AMD® Ryzen 7 4800h, 16 GB MEM
donaldsebleung Kernel 5.13.1; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
donaldsebleung Kernel 5.13.2; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F34
evillagr KVM, x86_64, Test Day IOS updated
flash2071 https://linux-hardware.org/?probe=731361283a [1] 1. After ```sudo ./runtests.sh``` were 2 skips: ./default/libhugetlbfs SKIP ./default/paxtest SKIP
geraldosimiao kernel-5.13.1-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM [1] 1. All tests PASSED, no regressions found.
geraldosimiao kernel-5.13.2-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM [1] 1. no regressions found. kernel kernel-5.13.2-300.fc34
glennzo Fedora 34 Workstation / VirtualBox / Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz [1] 1. ./default/timer-overhead FAIL
gtwilliams XPS-13
hmorish fedora34, intel core i7-3630QM, RAM8GB, GNOME-Boxes-VM
hyphop Aarch64 amlogic meson khadas VIM3 [1] 1. #123123123, VIM3 soundcard cant works without CONFIG_COMMON_CLK_AXG_AUDIO=m|y grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1* /boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
ibims VirtualBox 6.1.22 [1] 1. ./default/modsign PASS ./default/memfd PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/posix_timers PASS ./default/selinux-dac-controls SKIP ./default/paxtest SKIP ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/insert_leap_second SKIP Test suite complete PASS
itrymybest80 x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 21.1.4-1) & 970 EVO M.2 [1] 1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
jnk0 Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
kernel tester Desktop i5-6600 bare metal, HD Graphics 530 (Skylake GT2), 16GB RAM, with F34 5.13.1 test day image [1] 1. Default and Performance passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
kernel tester Laptop i5-7200U bare metal, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), with F34 5.13.1 test day image [1] 1. Default and performance tests passed.
leekaize ASUS X556UR 5.13.2-300.fc34.x86_64 [1] 1. ./default/sysfs-perms WARN. Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
leekaize https://linux-hardware.org/?probe=477a92a37e [1] 1. ./default/sysfs-perms WARN Reason of WARN status not indicated.
levait Lenovo Thinkpad X230 [1] 1. default: https://apps.fedoraproject.org/kerneltest/logs/49764 performance: https://apps.fedoraproject.org/kerneltest/logs/49766
levait https://linux-hardware.org/?probe=a70e5b8b1d [1] 1. default: https://apps.fedoraproject.org/kerneltest/logs/49581 performance: https://apps.fedoraproject.org/kerneltest/logs/49584
lily ampere hr330a [1] 1. all default and performance testcases passed
lily ampere hr350a [1] 1. all default and performance testcases passed
lily dell per7415 [1] 1. all default and performance testcases passed
lily dell per805 [1] 1. all default and performance testcases passed
lily fujitsu fx700 [1] 1. all default and performance testcases passed
lily hpe apache [1] 1. all default and performance testcases passed
lily hpe dl120gen10 [1] 1. all default and performance testcases passed
lily hpe dl360g5 [1] 1. all default and performance testcases passed
lily ibm x3250m4 [1] 1. all default and performance testcases passed
lily lenovo rd230 [1] 1. all default and performance testcases passed
lily lenovo sr655 [1] 1. all default and performance testcases passed
lily qualcomm amberwing [1] 1. all default and performance testcases passed
lily rdma dev [1] 1. all default and performance testcases passed
malucious Test Image.Qemu guest. Host: i7-6700K. Asus Z170A. [1] 1. /default/libhugetlbfs, and default/paxtest were skipped in the first test.
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, kernel 5.13.1-300.fc34.x86_64 [1] 1. All tests passed. no regressions noted. Works fine for daily use.
max_rodriguez Latest VirtualBox VM (Live 5.13.1 Kernel Testing Media): Intel i7-8750H @ 2.200GHz (2 Cores Given), 2048 MB RAM, 15GB Virtual Disk. [1] 1. Default Test Suite : PASS [LGTM] Performance Test Suite : FAIL [Crashed 3 times during testing, first run gave multiple GCC warnings if thats normal?]
mbfedora
mborland1 Intel i5-10500 w/32 GB RAM
mcrts https://linux-hardware.org/?probe=eb857365c7 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
merkaba Lenovo ThinkPad T440p
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.13.1-300.fc34.x86_64 [1] 1. All tests PASSED, no regressions found.
mpearson Lenovo P1G3 [1] 1. The tests passed - but I seem to be having suspend/resume issues. Nothing obvious in the kernel logs so far - but it's not always coming back from resume. I'll do some more digging but wanted to flag it. Also on dock hotplug the USB hub in the dock isn't detected
mpearson Lenovo T14 AMD G1
mpearson Lenovo X1 nano
mpearson Lenovo X13 G1 AMD
mpearson X1 Carbon G9
mythcat https://linux-hardware.org/?probe=7b4c090391
mzink Lenovo T480s F34 - 5.13.1-300.fc34.x86_64 [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
nhfed kerneltest-5.13.1.iso on bare metal Lenovo X1C9 [1] 1. Default & performance tests passed.
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 BIOS
nitsharma Virt-manager - boxes [1] [2] 1. ./runtests.sh Failed | /default/cachedrop FAIL ./runtests.sh -t performance Passed sudo semanage boolean -m --off selinuxuser_execheap | cant load memory | SELinux: Could not load policy file /etc/selinux/targeted/policy/policy.32: Cannot allocate memory /sbin/load_policy: Can't load policy: Cannot allocate memory libsemanage.semanage_reload_policy: load_policy returned error code 2. (No such file or directory).
2. ./default/cachedrop FAIL
norbertj Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM [1] 1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
nvisscher Acer Aspire A515-55-576K (Intel Core i5(TM) 1035G1, 8 GB DDR4, Intel UHD Graphics) [1] 1. Set getlist and getsummary (in performance/lmbench3/scripts) as executable before performance test. Vulnerabilities (compacted): itlb_multihit:KVM: Mitigation: VMX disabled spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
nvisscher Live test image on Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz, 6 GB DDR3, AMD Radeon HD7850 [1] 1. Both passed. Performance test suite passed despite errors: /bin/sh: line 1: ../scripts/getlist: Permission denied /bin/sh: line 1: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
oturpe Lenovo ThinkPad X230
prasant1998 Nitro AN515-42,Oracle [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
pwhalen AMD Seattle (AArch64)
pwhalen APM Mustang X-Gene-1 (AArch64) [1] 1. 5.13.2-300.fc34.aarch64
pwhalen Nvidia Jetson Xavier NX (aarch64) [1] 1. 5.13.2-300.fc34.aarch64
pwhalen Raspberry Pi 2 Model B (armhfp)
pwhalen Raspberry Pi 3 Model B Rev 1.2 (AArch64) [1] 1. 5.13.2-300.fc34.aarch64
pwhalen Raspberry Pi 4 4GB (aarch64) [1] 1. 5.13.2-300.fc34.aarch64
pwhalen Wandboard Quad (armhfp)
pwhalen fujitsu-fx700 (aarch64) [1] 1. 5.13.2-300.fc34.aarch64
quiet HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.4 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedor a 34 64-bit, GNOME 40.1.0, Wayland, KVM [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled ./performance/lmbench3 PASS Test suite complete PASS
rai510 Gnome Boxes [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 Virtualbox [1] 1. Test suite called with default ./default/stack-randomness PASS ./default/insert_leap_second SKIP ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP Test suite complete FAIL Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1625868855.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rfm83 HP Laptop 14-cf0xxx - Intel Core i5-8250U - 16GB - KVM virtual machine - test day image Fedora 34
rimuru VirtualBox 6.1, Intel i5 [1] 1. Default lgtm!
roushan Tested on latest VirtualBox. Image- kerneltest-5.13.1.iso (1.97 GB), 3 GB RAM, Boot Order - Floppy, Optical, Hard Disk, 8 GB data disk vdi [1] 1. Skipped 3 tests in virtualbox 1. insert_leap_second, 2. libhugetlbfs 3. paxtest
sammy Fedora 34 test bench running in gnome box. Host OS is Fedora 34 running on HP 240 g8 notebook with 10th gen i3 processor, 8gb ram, 1TB hdd. [1] [2] 1. Date: Tuesday 13 July 2021 05:43:59 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: FAIL Failed Tests: ./default/cachedrop Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Date: Tuesday 13 July 2021 05:48:37 PM IST Test set: performance Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: RESULTHOLDER
2. Date: Tuesday 13 July 2021 05:25:07 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: FAIL Failed Tests: ./default/cachedrop
sammy contributor tester [1] 1. #0, Date: Saturday 10 July 2021 04:16:20 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: PASS Failed Tests: None Warned Tests: None
sbertram Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz, Memory: 4096 MB, DISTRO=Fedora-34-20210424.n.0, 5.13.2-300.fc34.x86_64
sgraf qemu aarch64 VM on Apple M1, 5.13.1-300.fc34.aarch64
sp6ina Matebook 14 2020 AMD
stathisl Dell Inspirion 3542, Intel i3-4005U, 8GB, Intel HD 4400, Default Fedora Workstation 34 Gnome test image [1] 1. Both tests PASS (libhugetlibfs and paxtest SKIP)
stethewwolf Fedora server 34 4G Ram 2 core virtualized on KVM
stklcode KVM guest (F34 Host), Skylake-X CPU, 16GB RAM, Live Image
sumantrom lenovo T580, KVM [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
t3rm1n4l Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2 [1] 1. all tests passed, but still no gui on nvidia driver.
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP] [1] [2] 1. 5.13.2 all tests passed
2. all tests passed, works for me
t3rm1n4l Dell Inspiron 3180 11" [1] [2] 1. kernel 13.2 passed tests also
2. all tests passed, noted the following segfault during testing: "lat_rpc[8552]: segfault at 1000 ip 00007fe965a99a7a sp 00007ffef0411ab8 error 4 in libc-2.33.so[7fe965a20000+14d000] [ 588.142109] Code: f3 0f 1e fa 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 66 <f3> 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83", no issues noted with kernel for daily use.
t3rm1n4l Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2 [1] 1. RPMFUSION NVIDIA driver failed to provide gui on F33. Didn't perform regression tests.
tjuberg
troycurtisjr Dell XPS 17 9700 https://linux-hardware.org/?probe=592276c98f [1] 1. Both automated tests passed. Additionally the following worked well: bluetooth audio, smooth Minecraft play, Firefox browsing
udb28 Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4
udb28 Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 Memory: 3.5 GiB [1] 1. 1. Default Test PASS 2. Performance Test PASS
ups1610 HP Pavilion 15-eg-0124tx [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vanquisher3498 VirtualBox running on HP AU-623tx [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vascom Ryzen 7 4750G, 32GB RAM, 5.13.1-300.fc34.x86_64
vk2bea Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz / 16 GB RAM / NVIDIA GK107 [GeForce GT 740] (using Nvidia driver (akmod-nvidia) )
wayne6001 Intel NUC6i5SYK; Intel Core™ i5-6260U CPU @ 1.80GHz × 4; Mesa Intel Iris(R) Graphics 540 (SKL GT3); Memory 15.5 GiB; SSD 512.1 GB; OS Fedora 34 (Works tation Edition); OS Type 64-bit; Gnome 40.1.0; Wayland [1] 1. Both Passed
xfgusta VirtualBox 6.1.22_RPMFusion r144080 [1] 1. No regression found
zwintabris
Wiki Metadata