Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
Daniels | QEMU Standard PC _Q35 + ICH9, 2009_ | ||
Fabrizio Curcio | KVM Guest F34 on Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz with 16GB RAM (Live Image) | ||
Luigi Votta | Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 16 GB Asus H170-PRO | ||
Typijay | Dell Latitude E6540 i5-4310M | ||
abstractobject | https://linux-hardware.org/?probe=2c4c458feb | ||
alciregi | KVM on Proxmox VE, x86_64, UEFI | [1] |
1.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | KVM on Proxmox VE, x86_64, bios | ||
alciregi | Lenovo V330-15IKB Type 81AX | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Lenovo X1 Crabon gen 8 | [1] |
1.
5.13.2-300.fc34.x86_64
Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX
disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Pinebook Pro | [1] [2] |
1.
5.13.2 works
2. https://lists.fedoraproject.org/archives/list/arm@lists.fedoraproject.org/thread... |
alciregi | Raspberry Pi 3 aarch64 no GUI | [1] |
1.
WiFi works.
Bluethoot not tested.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not
affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
amolenaar | Lenovo X1 Carbon 7th / Lenovo X1 Carbon 9th | ||
anantj12 | Macbook Pro 2019 - Virtualbox | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ananya26-vishnoi | Hp-14s er0003tu Virtual Box | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
ananya26-vishnoi | Hp-14s er0003tu Virtualbox | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
andilinux | KVM libvirt | [1] |
1.
tested on F34 KDE
|
andilinux | Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc33.x86_64 OS Typ e: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe | [1] |
1.
1. basic set of tests - result: fail
2. performance test suite - result: pass
|
andilinux | Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc33.x86_64 OS Typ e: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe | ||
andilinux | Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc34.x86_64 (64-bi t) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000 | [1] |
1.
-
|
andilinux | Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc34.x86_64 (64-bi t) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000 | ||
atim | CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII | ||
bacbka | Virt-manager | [1] |
1.
Cachedrop test was failed.
|
bandithijo | https://linux-hardware.org/?probe=3e43acf8af | [1] |
1.
1. https://apps.fedoraproject.org/kerneltest/logs/49566
2. https://apps.fedoraproject.org/kerneltest/logs/49567
|
bandithijo | https://linux-hardware.org/?probe=63d761d915 | [1] |
1.
Result default test:
https://apps.fedoraproject.org/kerneltest/logs/49563
Result performance test:
https://apps.fedoraproject.org/kerneltest/logs/49564
|
belegdol | ASUS ZenBook 14 UM425IA | [1] |
1.
Regression and performance tests passed, modern standby is finally working on my machine without the need for additional patches.
|
belegdol | ASUS ZenBook 14 UM425IA Ryzen 5 4500U 16 GB RAM | [1] |
1.
Modern standby is finally working on my machine without the need for additional patches.
|
bittin | HP 655 | [1] [2] [3] |
1.
Took Sunday off
2. Took Sunday off 3. Took Saturday off |
bittin | Virtualbox | [1] [2] |
1.
Took Sunday off
2. Took Saturday off |
bkircher | Lenovo ThinkPad T490s, Intel(R) Core(TM) i5-8365U | [1] |
1.
Both passed
|
bojan | Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.13.2-300.fc34.x86_64 | [1] |
1.
Default and performance tests passed on both machines.
|
bretth | 5.13.1 KVM - 2CPU, 2GB RAM, Q35 chipset | [1] |
1.
Default & performance tests pass
|
bretth | 5.13.2 KVM - 2CPU, 2GB RAM, Q35 chipset | [1] |
1.
Default & performance tests pass
|
bruno | Inspiron 1545 | [1] |
1.
#1982213,
There is a pause during boot that isn't there for 5.12 and earlier kernels. There was a warning for ./default/sysfs-perms. Otherwise things seem to be working OK.
|
bruno | MacBookAir4,2 | [1] |
1.
There was a warning for ./default/sysfs-perms.
The system seems to function normally.
|
buckaroogeek | Raspberry PI 4, 5.13.1-300.fc34.aarch64 | [1] |
1.
stack-randomness, libhugetlbfs, paxtest have result SKIP. otherwise PASS.
|
buckaroogeek | kvm-libvvirt, x86_64, AMD EPYC Processor (with IBPB) | [1] |
1.
./default/libhugetlbfs, ./default/paxtest, ./default/insert_leap_second have result SKIP; otherwise PASS
|
clnetbox | [1] |
1.
CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getiing stuck at "Initializing nvidia-drm". Tested drivers : 460/465/470
|
|
clnetbox | SCHENKER XMG PRO 17 | Intel Core i7-10875H | 2 x 16 GB (32 GB) DDR4-3200 Crucial | 2 x 500 GB M.2 Samsung 970 EVO Plus | 1 TB Samsung 870 EVO | NVIDIA GeForce RTX 2070 Mobile (Refresh) | Fedora 34 Workstation | GNOME 40 | [1] |
1.
CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getting stuck at "Initializing nvidia-drm". Tested drivers : NVIDIA 460/465/470
|
condor | Virt-manager | [1] |
1.
The cachedrop test failed.
|
coolomatics | Gigabyte Technology Co., Ltd. A520M S2H, AMD® Ryzen 5 3600 6-core processor × 12 | [1] |
1.
#445408,
#442544,
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
coolomatics | Lenovo ThinkPad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
copperi | 5.13.1-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200] | ||
csutter | Dell XPS 9310 i7-1185G7 32GB (Live Image) | [1] |
1.
Regression and performance tests pass
|
danniel | lenovo ideapad S145 I7-8565U 8GB | ||
dhugh | ASUS TUF A17 FA706IU_TUF706IU, AMD® Ryzen 7 4800h, 16 GB MEM | ||
donaldsebleung | Kernel 5.13.1; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization | ||
donaldsebleung | Kernel 5.13.2; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization | ||
drakkai | Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F34 | ||
evillagr | KVM, x86_64, Test Day IOS updated | ||
flash2071 | https://linux-hardware.org/?probe=731361283a | [1] |
1.
After ```sudo ./runtests.sh``` were 2 skips:
./default/libhugetlbfs SKIP
./default/paxtest SKIP
|
geraldosimiao | kernel-5.13.1-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM | [1] |
1.
All tests PASSED, no regressions found.
|
geraldosimiao | kernel-5.13.2-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM | [1] |
1.
no regressions found. kernel kernel-5.13.2-300.fc34
|
glennzo | Fedora 34 Workstation / VirtualBox / Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz | [1] |
1.
./default/timer-overhead FAIL
|
gtwilliams | XPS-13 | ||
hmorish | fedora34, intel core i7-3630QM, RAM8GB, GNOME-Boxes-VM | ||
hyphop | Aarch64 amlogic meson khadas VIM3 | [1] |
1.
#123123123,
VIM3 soundcard cant works without CONFIG_COMMON_CLK_AXG_AUDIO=m|y
grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1*
/boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not
set
/boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
/boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
|
ibims | VirtualBox 6.1.22 | [1] |
1.
./default/modsign PASS
./default/memfd PASS
./default/mq-memory-corruption
PASS
./default/cachedrop PASS
./default/posix_timers PASS
./default/selinux-dac-controls SKIP
./default/paxtest SKIP
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/stack-randomness PASS
./default/timer-overhead PASS
./default/insert_leap_second SKIP
Test suite complete PASS
|
itrymybest80 | x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 21.1.4-1) & 970 EVO M.2 | [1] |
1.
Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
|
jnk0 | Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU | ||
kernel tester | Desktop i5-6600 bare metal, HD Graphics 530 (Skylake GT2), 16GB RAM, with F34 5.13.1 test day image | [1] |
1.
Default and Performance passed.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX
disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
|
kernel tester | Laptop i5-7200U bare metal, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), with F34 5.13.1 test day image | [1] |
1.
Default and performance tests passed.
|
leekaize | ASUS X556UR 5.13.2-300.fc34.x86_64 | [1] |
1.
./default/sysfs-perms WARN. Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
|
leekaize | https://linux-hardware.org/?probe=477a92a37e | [1] |
1.
./default/sysfs-perms WARN
Reason of WARN status not indicated.
|
levait | Lenovo Thinkpad X230 | [1] |
1.
default: https://apps.fedoraproject.org/kerneltest/logs/49764
performance: https://apps.fedoraproject.org/kerneltest/logs/49766
|
levait | https://linux-hardware.org/?probe=a70e5b8b1d | [1] |
1.
default: https://apps.fedoraproject.org/kerneltest/logs/49581
performance: https://apps.fedoraproject.org/kerneltest/logs/49584
|
lily | ampere hr330a | [1] |
1.
all default and performance testcases passed
|
lily | ampere hr350a | [1] |
1.
all default and performance testcases passed
|
lily | dell per7415 | [1] |
1.
all default and performance testcases passed
|
lily | dell per805 | [1] |
1.
all default and performance testcases passed
|
lily | fujitsu fx700 | [1] |
1.
all default and performance testcases passed
|
lily | hpe apache | [1] |
1.
all default and performance testcases passed
|
lily | hpe dl120gen10 | [1] |
1.
all default and performance testcases passed
|
lily | hpe dl360g5 | [1] |
1.
all default and performance testcases passed
|
lily | ibm x3250m4 | [1] |
1.
all default and performance testcases passed
|
lily | lenovo rd230 | [1] |
1.
all default and performance testcases passed
|
lily | lenovo sr655 | [1] |
1.
all default and performance testcases passed
|
lily | qualcomm amberwing | [1] |
1.
all default and performance testcases passed
|
lily | rdma dev | [1] |
1.
all default and performance testcases passed
|
malucious | Test Image.Qemu guest. Host: i7-6700K. Asus Z170A. | [1] |
1.
/default/libhugetlbfs, and default/paxtest were skipped in the first test.
|
masami | i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, kernel 5.13.1-300.fc34.x86_64 | [1] |
1.
All tests passed. no regressions noted. Works fine for daily use.
|
max_rodriguez | Latest VirtualBox VM (Live 5.13.1 Kernel Testing Media): Intel i7-8750H @ 2.200GHz (2 Cores Given), 2048 MB RAM, 15GB Virtual Disk. | [1] |
1.
Default Test Suite : PASS [LGTM]
Performance Test Suite : FAIL [Crashed 3 times during testing, first run gave multiple GCC warnings if thats normal?]
|
mbfedora | |||
mborland1 | Intel i5-10500 w/32 GB RAM | ||
mcrts | https://linux-hardware.org/?probe=eb857365c7 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
merkaba | Lenovo ThinkPad T440p | ||
mharpau | Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.13.1-300.fc34.x86_64 | [1] |
1.
All tests PASSED, no regressions found.
|
mpearson | Lenovo P1G3 | [1] |
1.
The tests passed - but I seem to be having suspend/resume issues. Nothing obvious in the kernel logs so far - but it's not always coming back from resume. I'll do some more digging but wanted to flag
it.
Also on dock hotplug the USB hub in the dock isn't detected
|
mpearson | Lenovo T14 AMD G1 | ||
mpearson | Lenovo X1 nano | ||
mpearson | Lenovo X13 G1 AMD | ||
mpearson | X1 Carbon G9 | ||
mythcat | https://linux-hardware.org/?probe=7b4c090391 | ||
mzink | Lenovo T480s F34 - 5.13.1-300.fc34.x86_64 | [1] |
1.
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
|
nhfed | kerneltest-5.13.1.iso on bare metal Lenovo X1C9 | [1] |
1.
Default & performance tests passed.
|
nielsenb | HP Compaq 8510w Intel T9300 AMD RV630 BIOS | ||
nitsharma | Virt-manager - boxes | [1] [2] |
1.
./runtests.sh Failed | /default/cachedrop FAIL
./runtests.sh -t performance Passed
sudo semanage boolean -m --off selinuxuser_execheap | cant load
memory | SELinux: Could not load policy file /etc/selinux/targeted/policy/policy.32: Cannot allocate memory
/sbin/load_policy: Can't load policy: Cannot allocate memory
libsemanage.semanage_reload_policy: load_policy returned error code 2. (No such file or directory).
2. ./default/cachedrop FAIL |
norbertj | Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM | [1] |
1.
libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj | Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM | [1] |
1.
libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
norbertj | Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM | [1] |
1.
libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
|
nvisscher | Acer Aspire A515-55-576K (Intel Core i5(TM) 1035G1, 8 GB DDR4, Intel UHD Graphics) | [1] |
1.
Set getlist and getsummary (in performance/lmbench3/scripts) as executable before performance test.
Vulnerabilities (compacted):
itlb_multihit:KVM: Mitigation: VMX
disabled
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
|
nvisscher | Live test image on Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz, 6 GB DDR3, AMD Radeon HD7850 | [1] |
1.
Both passed. Performance test suite passed despite errors:
/bin/sh: line 1: ../scripts/getlist: Permission denied
/bin/sh: line 1: ../scripts/getsummary: Permission denied
make: ***
[Makefile:110: summary] Error 126
./performance/lmbench3 PASS
Test suite complete PASS
|
oturpe | Lenovo ThinkPad X230 | ||
prasant1998 | Nitro AN515-42,Oracle | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
pwhalen | AMD Seattle (AArch64) | ||
pwhalen | APM Mustang X-Gene-1 (AArch64) | [1] |
1.
5.13.2-300.fc34.aarch64
|
pwhalen | Nvidia Jetson Xavier NX (aarch64) | [1] |
1.
5.13.2-300.fc34.aarch64
|
pwhalen | Raspberry Pi 2 Model B (armhfp) | ||
pwhalen | Raspberry Pi 3 Model B Rev 1.2 (AArch64) | [1] |
1.
5.13.2-300.fc34.aarch64
|
pwhalen | Raspberry Pi 4 4GB (aarch64) | [1] |
1.
5.13.2-300.fc34.aarch64
|
pwhalen | Wandboard Quad (armhfp) | ||
pwhalen | fujitsu-fx700 (aarch64) | [1] |
1.
5.13.2-300.fc34.aarch64
|
quiet | HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.4 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedor a 34 64-bit, GNOME 40.1.0, Wayland, KVM | [1] |
1.
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
./performance/lmbench3 PASS
Test suite complete PASS
|
rai510 | Gnome Boxes | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rai510 | Virtualbox | [1] |
1.
Test suite called with default
./default/stack-randomness PASS
./default/insert_leap_second SKIP
./default/cachedrop PASS
./default/timer-overhead FAIL
./default/selinux-dac-controls PASS
./default/modsign PASS
./default/sysfs-perms PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/posix_timers PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
Test suite complete FAIL
Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1625868855.log.txt
Submit your results to: https://apps.fedoraproject.org/kerneltest/
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rfm83 | HP Laptop 14-cf0xxx - Intel Core i5-8250U - 16GB - KVM virtual machine - test day image Fedora 34 | ||
rimuru | VirtualBox 6.1, Intel i5 | [1] |
1.
Default lgtm!
|
roushan | Tested on latest VirtualBox. Image- kerneltest-5.13.1.iso (1.97 GB), 3 GB RAM, Boot Order - Floppy, Optical, Hard Disk, 8 GB data disk vdi | [1] |
1.
Skipped 3 tests in virtualbox
1. insert_leap_second,
2. libhugetlbfs
3. paxtest
|
sammy | Fedora 34 test bench running in gnome box. Host OS is Fedora 34 running on HP 240 g8 notebook with 10th gen i3 processor, 8gb ram, 1TB hdd. | [1] [2] |
1.
Date: Tuesday 13 July 2021 05:43:59 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: FAIL
Failed Tests:
./default/cachedrop
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Date: Tuesday 13 July 2021 05:48:37 PM IST
Test set: performance
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: RESULTHOLDER
2. Date: Tuesday 13 July 2021 05:25:07 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: FAIL Failed Tests: ./default/cachedrop |
sammy | contributor tester | [1] |
1.
#0,
Date: Saturday 10 July 2021 04:16:20 PM IST
Test set: default
Kernel: 5.13.1-300.fc34.x86_64
Release: Fedora release 34 (Thirty Four)
Result: PASS
Failed Tests: None
Warned Tests: None
|
sbertram | Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz, Memory: 4096 MB, DISTRO=Fedora-34-20210424.n.0, 5.13.2-300.fc34.x86_64 | ||
sgraf | qemu aarch64 VM on Apple M1, 5.13.1-300.fc34.aarch64 | ||
sp6ina | Matebook 14 2020 AMD | ||
stathisl | Dell Inspirion 3542, Intel i3-4005U, 8GB, Intel HD 4400, Default Fedora Workstation 34 Gnome test image | [1] |
1.
Both tests PASS (libhugetlibfs and paxtest SKIP)
|
stethewwolf | Fedora server 34 4G Ram 2 core virtualized on KVM | ||
stklcode | KVM guest (F34 Host), Skylake-X CPU, 16GB RAM, Live Image | ||
sumantrom | lenovo T580, KVM | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT
disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
|
t3rm1n4l | Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2 | [1] |
1.
all tests passed, but still no gui on nvidia driver.
|
t3rm1n4l | ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP] | [1] [2] |
1.
5.13.2 all tests passed
2. all tests passed, works for me |
t3rm1n4l | Dell Inspiron 3180 11" | [1] [2] |
1.
kernel 13.2 passed tests also
2. all tests passed, noted the following segfault during testing: "lat_rpc[8552]: segfault at 1000 ip 00007fe965a99a7a sp 00007ffef0411ab8 error 4 in libc-2.33.so[7fe965a20000+14d000] [ 588.142109] Code: f3 0f 1e fa 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 66 <f3> 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83", no issues noted with kernel for daily use. |
t3rm1n4l | Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2 | [1] |
1.
RPMFUSION NVIDIA driver failed to provide gui on F33. Didn't perform regression tests.
|
tjuberg | |||
troycurtisjr | Dell XPS 17 9700 https://linux-hardware.org/?probe=592276c98f | [1] |
1.
Both automated tests passed. Additionally the following worked well: bluetooth audio, smooth Minecraft play, Firefox browsing
|
udb28 | Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 | ||
udb28 | Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 Memory: 3.5 GiB | [1] |
1.
1. Default Test PASS
2. Performance Test PASS
|
ups1610 | HP Pavilion 15-eg-0124tx | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vanquisher3498 | VirtualBox running on HP AU-623tx | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
vascom | Ryzen 7 4750G, 32GB RAM, 5.13.1-300.fc34.x86_64 | ||
vk2bea | Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz / 16 GB RAM / NVIDIA GK107 [GeForce GT 740] (using Nvidia driver (akmod-nvidia) ) | ||
wayne6001 | Intel NUC6i5SYK; Intel Core™ i5-6260U CPU @ 1.80GHz × 4; Mesa Intel Iris(R) Graphics 540 (SKL GT3); Memory 15.5 GiB; SSD 512.1 GB; OS Fedora 34 (Works tation Edition); OS Type 64-bit; Gnome 40.1.0; Wayland | [1] |
1.
Both Passed
|
xfgusta | VirtualBox 6.1.22_RPMFusion r144080 | [1] |
1.
No regression found
|
zwintabris |