Kernel 5.14 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2021-09-12_Kernel_5.14_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and realoaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Daniels Kernel Test 5.14 _86 .100 ISO:QEMU Standard PC _Q35 + ICH9, 2009_ Lenovo Idea Pad 2in1 ,Intel Core Processor (Skylake, IBRS) × 4 [1] 1. SUITE Passed : Performance Crashed the Terminal Test at: Bandwidth Read
Renault x86_64
Richie112 KVM [1] 1. Using the kernel in a vm for most of the morning and have experienced no issues. Allocated 4 core (AMD 3700x) and 4G of ram. Tasks have included coding and compiling in Golang, browsing the internet and watching videos from various providers. I will continue to use for the rest of the day and report back if I experience any issues.
aalam AMD Ryzen 7 5700G, B450, 5.14.1-300.fc35.x86_64 [1] 1. kernel regression: Passed
akumar99 VMware VM (AMD Ryzen 3900x - 4 core, 8 GB RAM, 40 GB HDD) -Test image [1] 1. Test suites passed. Did some basic work like browsing and songs, all seemed to work fine.
alciregi Lenovo 81AX [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 headless aarch64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba TECRA A40-D [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
atim Bare metal. CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII [1] 1. Tests passed.
atim Hyper-V; Fedora 34 [1] 1. All tests passed. Now GPU acceleration work with 5.14 kernel.
bacbka kernel-5.14.5-300.fc34 Intel(R) Core(TM)2 Quad CPU Q8300
bittin HP 655
bittin Virtualbox [1] 1. 5.13.3 kernel works testing 5.13.4 now
bojan Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.14.3-300.fc34.x86_64 [1] 1. Both machines boot this kernel without issues. Default/performance tests PASS.
bretth KVM [1] 1. Default & performance tests pass
bretth KVM - 5.14.3 [1] 1. Default & performance tests passed
bretth KVM - 5.14.4 [1] 1. Default & performance tests passed
bretth KVM - 5.14.5 [1] 1. Default & performance tests passed
chivux Description: Notebook, product: Satellite L855D (PSKG2M), vendor: TOSHIBA, version: PSKG2M-00NTM1, width: 64 bits. Description: CPU, product: AMD A6-4 400M APU with Radeon(tm) HD Graphics, vendor: Advanced Micro Devices [AMD], AMD A6-4400M APU with Radeon(tm) HD Graphics, size: 2694MHz, capacity: 2700MHz, width: 64 bits, clock: 100MHz, capabilities: lm fpu fpu_exception wp vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp x86-64 constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 popcnt aes xsave avx f16c lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs xop skinit wdt lwp fma4 tce nodeid_msr tbm topoext perfctr_core perfctr_nb cpb hw_pstate ssbd vmmcall bmi1 arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold cpufreq configuration: cores=2 enabledcores=2 threads=2. Description: System Memory, slot: System board or motherboard, size: 10GiB
condor AARCH64 f34 bare metal [1] 1. There were numerous warnings during the performance test from implicit declaration of function ‘lmbench_usage’, several warnings from : warning: implicit declaration of function ‘sched_getaffinity’ , and one warning of each of the following warning: type defaults to ‘int’ in declaration of ‘psize’ , and function ‘handle_scheduler’ warning: ‘return’ with no value. Also, lib_sched.c: note: declared here handle_scheduler().
condor AARCH64 f35 bare metal [1] 1. There were numerous warnings during the performance test from implicit declaration of function ‘lmbench_usage’, several warnings from : warning: implicit declaration of function ‘sched_getaffinity’ , and one warning of each of the following warning: type defaults to ‘int’ in declaration of ‘psize’ , and function ‘handle_scheduler’ warning: ‘return’ with no value. Also, lib_sched.c: note: declared here handle_scheduler().
condor x86_64 bare metal f33 Workstation w/ 5.14.2-300 kernel from Koji [1] 1. There were numerous warnings during the performance test from implicit declaration of function ‘lmbench_usage’, several warnings from : warning: implicit declaration of function ‘sched_getaffinity’ , and one warning of each of the following warning: type defaults to ‘int’ in declaration of ‘psize’ , and function ‘handle_scheduler’ warning: ‘return’ with no value. Also, lib_sched.c: note: declared here handle_scheduler().
copperi 5.14.2-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
donaldsebleung Kernel 5.14.2; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4G RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM Virtualization
donaldsebleung Kernel 5.14.3; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4G RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM Virtualization
donaldsebleung Kernel 5.14.4; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4G RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM Virtualization
donaldsebleung Kernel 5.14.5; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4G RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM Virtualization
geraldosimiao ACER Aspire - 8 × Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000 [1] [2] [3] [4] 1. kernel-5.14.5-300.fc34.x86_64 => ALL tests PASSED
2. kernel-5.14.4-300.fc34.x86_64 => all tests PASSED
3. kernel-5.14.3-300.fc34.x86_64 => ALL tests PASSED
4. kernel-5.14.2-300.fc34.x86_64 => ALL tests passed, no regressions found.
geraldosimiao Fedora-KDE-Live-x86_64-35-20210906.n.0 on KVM/qemu/virt-manager [1] 1. 5.14.1-300.fc35.x86_64 PASSED all regression tests
giperborey Fedora 34, Dell XPS 17 (9700), Kernel 5.14.5-300
hmorish Fedora34
holgerschranz [1] 1. Medium: Fedora-Server 35: Fedora-Server-dvd-x86_64-35-20210913.n.0.iso OS: Windows 10 Home 21H1 Build: 19043.1202 Virtualisation: QEMU 6.1 ( -m 4096, -accel hax, -machine pc-q35-2.12, -smp 2) Update to: Kernel 5.14.3-300-fc35.x86_64
hurrhnn Intel Core i7-9700KF, 24GB RAM, MSI Z390 motherboard with 250GB SSD as root drive, Updated from existing Fedora 35 Prerelease installation using koji. [1] 1. Passed performance test.
hyphop Aarch64 amlogic meson khadas VIM3 [1] 1. VIM3 sound card cant work without CONFIG_COMMON_CLK_AXG_AUDIO=m|y grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1* /boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
ibims Lenovo TP T420, Intel Core i5-2520M, Graphics driver i915 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
imabug Asus X75A laptop Core i5-5230M kernel 5.14.4-300.fc35.x86_64 [1] 1. Default tests passed
imabug Intel Xeon E3-1240 5.14.3-300.fc34.x86_64 [1] [2] 1. Default and performance tests passed
2. Default test suite passed.
imabug Intel Xeon E3-1240 5.14.4-300.fc34.x86_64 [1] 1. Default and performance tests passed
imabug Intel Xeon W3690 kernel 5.14.4-300.fc34.x86_64 [1] 1. Default tests passed
imabug Intel Xeon W3690 kernel 5.14.5-300.fc34.x86_64 [1] 1. Default tests passed
itrymybest80 kernel-5.14.2-300.fc34.x86_64
jpbn uefi Fed 35, x86_64
larouxn AMD Ryzen 9 5900X, B550, 5.14.2-300.fc34.x86_64 [1] 1. Default test suite and performance test suite both passed.
leekaize ASUS X556UR Intel i5-6200U 5.14.5-300.fc34.x86_64 [1] 1. Default test suite returns WARN for ./default/sysfs-perms (Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx).
leekaize https://linux-hardware.org/?probe=7441498212 [1] 1. Default test suite returns WARN for ./default/sysfs-perms (Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx).
levait Dell D620 [1] 1. default: PASS, performance: PASS
lily ampere hr330a [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily ampere hr350a [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily apm mustang [1] 1. all default and performance testcases passed
lily dell pem605 [1] 1. all default and performance testcases passed
lily dell per7425 [1] 1. all default and performance testcases passed
lily dell pesc430 [1] 1. all default and performance testcases passed
lily fujitsu fx700 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily hpe apollo [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily hpe dl320egen8 [1] 1. all default and performance testcases passed
lily hpe moonshot [1] 1. all default and performance testcases passed
lily hpe tm200 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily ibm x3250m4 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily lenovo rd230 [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily qualcomm amberwing [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
malucious Asus Z170A i7-6700K libvirt host. 4GB ram 2 core virtual guest. Test image [1] 1. Two test skipped on runtests.sh. paxtest and libhugetlbfs.
marc84 kerneltest-5.14.2.iso on HP Laptop 14-cf2033wm [1] 1. Default & Performance Test: PASSED
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, 5.14.3-300.fc34.x86_64 [1] 1. kernel regression test passed. Works fine for daily use.
mgolvers AMD Ryzen 7 3700X KVM [1] 1. Performance test crashes the Terminal on 2 vCPU + 2 GB RAM. Performance test pass on 8 vCPU + 16 GB RAM Default tests pass.
mosesdenny [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
nielsenb HP Compaq 8510w Intel T9300 AMD RV630
norbertj kerneltest-5.14.2.iso on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.14.2.iso on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.14.2.iso on old desktop PC with Core i5-750, P55 chipset, Radeon HD 6450 and 4 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
oturpe F34 test day image running in a Gnome Box. Hardware is Lenovo Thinkpad X230. [1] 1. Both tests passed.
pkalorog [1] 1. Both runs of the test suite resulted in PASS.
pkalorog Kernel 5.14 [1] 1. Both runs of the test suite resulted in PASS.
pkalorog Kernel 5.14.2-300, KVM-Virtualization, x86_64 [1] 1. Both runs of the test suite resulted in PASS.
pnemade F35 Silverblue, KVM, mr_IN, x86_64 [1] 1. Both tests passed.
quiet HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.5 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedor a 34 64-bit, GNOME 40.4.0, Wayland, KVM [1] 1.
rai510 Gnome Boxes [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/timer-overhead PASS ./default/paxtest SKIP ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/modsign PASS ./default/memfd PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1631394930.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 Gnome Boxes Kernel 5.14.3 Latest iso [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 VirtualBox Amd ryzen [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/insert_leap_second SKIP ./default/timer-overhead PASS ./default/paxtest SKIP ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/modsign PASS ./default/memfd PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 Virtualbox Intel [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/insert_leap_second SKIP ./default/timer-overhead PASS ./default/paxtest SKIP ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/modsign PASS ./default/memfd PASS ./default/mq-memory-corruption PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 Virtualbox latest 5.14.3 iso [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rimuru VirtualBox 6.1, Intel i5, F34 Test Day Image
sammy Fedora 34 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd [1] [2] 1. #0, 5.14.2-300.fc35.x86_64 all passed routine and performance tests.
2. #0, Kernel x86_64 kernel-5.14.2-300.fc34 passed run and performance tests.
sammy Fedora 34 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd [1] 1. #0, works fine.
sammy Fedora 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd [1] [2] [3] [4] [5] [6] [7] 1. #1, kernel-5.14.6-300.fc35 failed cachedrop test and passed performance tests.
2. #0, kernel-5.14.6-300.fc35 passed run and performance tests.
3. #0, kernel-5.14.5-300.fc35 passed run and performance tests.
4. #0, kernel-5.14.5-300.fc35 passed run and performance tests.
5. #0, kernel-5.14.4-300.fc35 passed routine and performance tests.
6. #1, cachedrop test failed. performance test passed.
7. #0, kernel-5.14.4-300.fc35 passed routine and performance tests.
sgraf KVM 5.14.3-300.fc35.x86_64 [1] 1. Default & performance tests passed VM with GUI works as expected
shdwchn10 Workstation,bare metal,ru_RU,x86_64 [1] 1. 5.14.2-300.fc35.x86_64 all tests (performance too) passed nothing special, looks like usual kernel
sumantrom T580 baremetal [1] 1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
t3rm1n4l Dell Inspiron 3180 11" [1] [2] [3] 1. Kernel-5.14.5-300.fc34.x86_64 regression tests passed
2. 5.14.4-300.fc35.x86_64 - regression tests passed, lgtm
3. all regression tests passed, been using 5.14 kernel for quite some time, no issues noted.
t3rm1n4l Virtualbox-6.1.26 guest VM [1] [2] [3] 1. kernel-5.14.5-300.fc34 works for me
2. kernel-5.14.4-300.fc34.x86_64 works fine, all tests passed
3. kernel-5.14.3-300.fc34.x86_64 core dumped during boot and didn't load sound or network drivers. Host has a Intel i7-7700 with 32 Gb RAM.
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO) [1] 1. Default test passed. Performance test passed. No new warnings or errors in dmesg.
xfgusta VirtualBox-6.1.26-2
Wiki Metadata