Kernel 5.15 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2021-11-14_Kernel_5.15_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Ahmedalmeleh Vmware on Asus Vivobook X409JA (Intel Core i5 1035G1 [1] 1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
akumar99 Virtualbox, Ryzen 3900x
alciregi Lenovo V330-15IKB Type 81AX [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo X1 Crabon gen 8 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Pinebook Pro [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Branch predictor hardening /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 aarch64 no GUI [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi i5-7400 8GB RAM Desktop [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alexhaydock Lenovo ThinkPad X240 [1] 1. Default kernel regression test case run passed
atim CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
bandithijo kernel-5.15.2-200.fc35.x86_64 on Lenovo ThinkPad X260 Intel i5-6300U [1] 1. Default & Performance tests pass
belegdol Ryzen 5 5600x, RTX 2070, ASRock Fatal1ty B450 Gaming-ITXac [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bittin Virtualbox - F34
bittin Virtualbox - F34 - 5.15.3
bittin Virtualbox - F35
bittin Virtualbox - F35 - 5.15.3
bojan Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.15.2-200.fc35.x86_64 [1] 1. Both default and performance tests pass on ThinkPad T450s. The kernel also runs on the other machine from the profile.
bretth 5.15.2 KVM [1] 1. Default & performance tests pass
bretth 5.15.3 KVM [1] 1. Default & performance tests pass
bytehackr Kernel 5.15.2 on Lenovo P1 Gen3 [1] 1. Default test Pass.
clnetbox SCHENKER XMG PRO 17 (CLEVO PB71) | Intel Core i7-10875H | 16 GB (32 GB) DDR4-3200 Crucial | NVIDIA GeForce RTX 2070 Refresh [1] 1. Everything works as expected ... no noticeable issues so far.
condor HP EliteBook 8470p baremetal w/Intel i5-3320M processor
condor virt-manager, test day image
copperi 5.15.2-200.fc34.x86_64 F35 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
couchfox Dell Inspiron 7577 - Intel Core i5-7300HQ [1] 1. Performance test: PASS
couchfox Dell Inspironn7577 - Intel Core i5-7300HQ [1] 1. All PASS (unless SKIP)
daniels Lenovo 2in1 14 IdeaPad Intel Core Processor (Skylake, IBRS) × 4 QEMU Standard PC _Q35 + ICH9, 2009_ [1] 1. Regression and Performance Tests : Passed (Gnome 40.4)
dbrendel T14s Gen1 in kvm
donaldsebleung Kernel 5.15.2; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4
donaldsebleung Kernel 5.15.3; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
dumprop Virtualbox - F35 [1] 1. ./default/cachedrop PASS ./default/insert_leap_second SKIP ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead FAIL Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
fuller https://linux-hardware.org/?probe=f850c51db9
garrmcnu Test image on VM (KVM) [1] 1. Default and performance tests passed
geraldosimiao kernel-5.15.2-200.fc35.x86_64 on KVM- Qemu - UEFI [1] 1. No regressions found
geraldosimiao kernel-5.15.2-200.fc35.x86_64 on baremetal ACER Aspire [1] 1. ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000 Kernel regression tests PASSED
geraldosimiao kernel-5.15.3-200.fc35.x86_64 on baremetal ACER Aspire [1] 1. ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000. Kernel regression tests PASSED
grgivs GNOME Boxes (test day image) [1] 1. ./default/cachedrop FAIL ./default/paxtest SKIP ./default/libhugetlbfs SKIP
gtwilliams KDE F35 Intel(R) Xeon(R) W-2225 CPU @ 4.10GHz
guiltydoggy Ryzen 5900X X570 - Fedora Kinoite 35 - Tests run on bare metal in Toolbox [1] 1. Test suite called with default ./default/cachedrop FAIL ./default/insert_leap_second SKIP ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign SKIP ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls SKIP ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL ./drop_caches.sh: line 45: /proc/sys/vm/drop_caches: Permission denied 14 │ TestError: Can't free pagecache 15 │ 5432496 16 │ Could not run tests
hobbes1069 [1] 1. I've also been using the kernel for a day or two without any issues.
hricky AMD Athlon(tm) 64 X2 Dual Core Processor 4200+, 4 GB RAM, Bare Metal, 5.15.5-200.fc35, CoreOS [1] [2] [3] 1. performance
2. destructive
3. stress
hricky Intel Core i5-2500 CPU @ 3.30 GHz, 32 GB RAM, Test Day Image [1] [2] [3] 1. performance
2. destructive
3. stress
hricky Intel(R) Celeron(R) CPU G3900 @ 2.80GHz, 4GB RAM, Bare Metal, CoreOS/Next, kernel-5.15.5-200.fc35 [1] [2] [3] 1. performance
2. destructive
3. stress
hricky Intel(R) Celeron(R) D CPU 3.33GHz, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next [1] [2] [3] 1. performance
2. destructive
3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
hricky Intel(R) Pentium(R) D CPU, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next [1] [2] [3] [4] 1. performance
2. destructive
3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
4. default
hricky Intel® Core™ i7-4790 CPU, 32 GB RAM, Bare Metal, Fedora Linux 35 (Workstation Edition) [1] [2] [3] 1. performance
2. destructive
3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
hricky Pentium(R) Dual-Core CPU E5200 @ 2.50GHz, 4 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next [1] [2] [3] 1. performance
2. destructive
3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
idanka GNOME Boxes (test day image) hw: Fujitsu P520, i5 4570, nvidia gtx 1650 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
imalone Legion 5 Pro 16ACH6H 5800H RTX3070 [1] 1. Test suite and performance test suite. thirdparty test PASS. Skipped: ./default/paxtest ./default/libhugetlbfs. MediaTek mt7921e, bluetooth and wireless working with 5.15.2-200.fc35.x86_64
itrymybest80 5.15.2-200.fc35.x86_64 (koji/upgrade) [1] 1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
itrymybest80 5.15.3-200.fc35.x86_64 (koji/update) [1] 1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
jakfrost default [1] 1. Ran test on bare metal UEFI system with AMD 5600G CPU (on board graphics). Used live ISO to run tests without installing to system. All tests came back PASS.
jimrayjoebob Gigabyte B550M DS3H, Ryzen 5 5600g, test day image
jishi@redhat.com Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GH [1] [2] [3] [4] [5] 1. ipv6 basic socket test
2. route table basic, add/delete/modify/flush/list route with ip route command
3. geneve basic, 1. add geneve over ipv4 and ipv6 2. ping over geneve 3. check geneve header in the packets 4. run iperf over geneve
4. vxlan basic test, 1. add vxlan over ipv4 and ipv6 , ip link add vxlan1 type vxlan id 42 remote $remote_ip local $local_ip dev $dev 2. run ping over vxlan 3. check vxlan header in the packet 4. run iperf over vxlan
5. gre basic: 1. add gre with ip link add gre1 type gre local $local_addr remote $remote_addr 2. ping over gre 3. check gre header for the packet 4. run iperf over gre
jpbn F35 [1] 1. test PASS performance test Fail (first time Terminal crash; 2nd time terminal and firefox crash)
jpbn Hewlett-Packard HP Compaq 8100 Elite SFF PC Intel® Core™ i5 CPU 650 @ 3.20GHz × 4
jritter Lenovo ThinkPad W530
kisk VirtualBox VM Fedora 35, Kernel updated to 5.15.2-200.fc35.x86_64 [1] 1. The tests in the default test suite that were skipped: cachedrop, insert_leap_second, and paxtest. The other tests passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/... The performance tests hang on bandwidth measurements.
kodirovshchik Kernel: 5.15.2-200.fc35.x86_64 Release: Fedora release 35 (Thirty Five) [1] 1. Test suite called with default: ./default/libhugetlbfs SKIP ./default/paxtest SKIP Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kokoseij Inspiron 5515 with Ryzen 5700U / DDR4 8GB RAM [1] [2] 1. Updated from Pre-existing Fedora 35 setup. All test cases and performance tests passed without an issue.
2. Updated from pre-existing Fedora 35 environment
lejeczek Lenovo e14 g3 AMD Ryzen 4500U [1] 1. Thanks! Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./thirdparty/nvidia-module WARN
lily ampere hr350a [1] [2] 1. all default and performance testcases passed
2. all default and performance testcases passed
lily apm mustang [1] 1. all default and performance testcases passed
lily dell pe [1] 1. all default and performance testcases passed
lily dell per7415 [1] 1. all default and performance testcases passed
lily fujitsu fx700 [1] 1. all default and performance testcases passed
lily hp moonshot [1] 1. all default and performance testcases passed
lily hpe apollo [1] 1. all default and performance testcases passed
lily hpe dl325gen10 [1] 1. all default and performance testcases passed
lily hpe dl560egen8 [1] 1. all default and performance testcases passed
lily ibm x3250m4 [1] 1. all default and performance testcases passed
lily lenovo rd230 [1] 1. all default and performance testcases passed
lily qualcomm amberwing [1] 1. all default and performance testcases passed
marc84 kerneltest-5.15.2.iso on HP Laptop 14-cf2033wm [1] 1. Test suite called with default: ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/paxtest SKIP ./default/timer-overhead PASS ./default/memfd PASS ./default/cachedrop FAIL ./default/mq-memory-corruption PASS ./default/modsign PASS ./default/posix_timers PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, UEFI, F35 Workstation, 5.15.2-200.fc35.x86_64 [1] 1. Default & performance tests passed. Works fine for daily use.
niarch Oracle Virtual Box - 2 processors, 4GB RAM Thinkpad T580 running over Kubuntu 20.04
nicolas AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K
nicolas AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K FEDORA 35 KDE KERNEL 5.15.2-200.FC35.X86_64
norbertj kerneltest-5.12.2.iso on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.15.2.iso on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.15.2.iso on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted. Sorry, typo in Profile for my other PC: I also meant kerneltest-5.15.2.iso.
oprizal 5.15.2-200.fc35.x86_64 on AMD A9-9420 radeon r5 [1] 1. #2023035, 1. Noticed if including `kernel-devel` during the update will give warnings on running scriptlet part and most likely to failed (take too long) on verifying part. 2. Machine can't suspend, reboot, and shutdown on AMD A9-9420 radeon r5. In the past, on kernel 5.12.x my machine only failed to wake up from suspend on main laptop monitor but not on second monitor connected via HDMI. Installation done on kernel 5.14.18-300.fc35
oprizal 5.15.3-200.fc35.x86_64 on AMD A9-9420 radeon r5 [1] 1. #2023035, On 5.15.3 have same problem with 5.15.2, can't suspend, reboot, and poweroff. All regression test passed. Since I can't find other user here with AMD system that have same issue with me, may be it's just something wrong with my installation.
oumuamua Kernel 5.15.2 (VirtualBox) [1] 1. Default test suite Pass
pwhalen AMD Seattle (AArch64)
pwhalen APM Mustang X-Gene-1 (AArch64)
pwhalen Firefly2(rk3399)
pwhalen HR330a (aarch64)
pwhalen Nvidia Jetson Nano (aarch64)
pwhalen Nvidia Jetson Xavier NX (aarch64)
pwhalen Raspberry Pi 2 Model B (armhfp)
pwhalen Raspberry Pi 4 4GB (aarch64)
rai510 Gnome Boxes Kernel 5.15.2 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rainmakerraw AMD Threadripper 3960X, Asus RoG Strix-E Gaming, 32GB DDR4 3600cl16, Samsung Evo Plus 960 nVME, Radeon Vega 56 [1] 1. No issues.
rhodry
rhodry ASUS ROG STRIX G153QY. AMD Ryzen 9 5900hx. Radeon RX6800. Fedora 35. Kernel-5.15.2-200.fc35
sammy Fedora 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd [1] [2] [3] [4] [5] [6] 1. #0, x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
2. #0, x86_64 kernel-5.15.2-200.fc35 passed default and performance tests.
3. #0, x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
4. #0, x86_64 kernel-5.15.2-200.fc35 passed default and performance tests.
5. #0, Kernel x86_64 kernel-5.15.2-200.fc35 passed runtests and performance test.
6. Kernel x86_64 kernel-5.15.2-200.fc35 did not pass runtests but passed performance test.
sammy Fedora Cinnamon 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd [1] 1. #0, x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
sgraf 5.15.2 KVM with GUI [1] 1. Default and performance tests pass. GUI/Gnome works without any issues.
skipperTux kernel-5.15.2-200.fc35 Dell Precision 7560 [1] 1. Mobile Dell Precision-Workstation 7560, Intel Xeon W-11955M, 64 GB ECC SODIMM, NVIDIA T1200 4 GB, Intel UHD Default & Performance tests PASS, libhugetlbfs and paxtest SKIP
solinvictuz Gnome Boxes [1] 1. default + performance
solinvictuz kerneltest iso on Dell XPS 13 7390, i7-10510U, 15,4GiB, UHD Graphics (CML GT2) [1] 1. default & performance test passed
t3rm1n4l Dell Inspiron 3180 11" [1] [2] 1. All tests passed, bugs resolved in 5.15.3
2. passes regression and performance tests. Unable to put laptop to sleep with 5.15.2 kernel, works fine in 5.14.18
t3rm1n4l i7-3770 16GB DDR3 @1600Mhz (XMP) Nvidia GTX1060 6 Gb [1] 1. 5.15.3 all tests passed
terkel Kernel 5.15.2 on Dell XPS 13 9310 [1] 1. Default & Performance tests pass
tharadash HP EliteBook 840 G6 with SecureBoot [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
tharadash HP Envy x360 13-ar0600nz [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash HP z820 workstation, FirePro w7000, UEFI [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash Intel NUC DC53427HYE [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash Intel Z77, i7-3770k, RX570, SecureBoot [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tripledes Bare metal - AMD Ryzen 2700x, ASUS x470 Prime-PRO, AMD GPU (rx470 8GB)
trugul Lenovo ThinkPad Yoga 260, Intel® Core™ i5-6200U CPU @ 2.30GHz × 4, Mesa Intel® HD Graphics 520 (SKL GT2)
user bare metal fedora34 workstation on Gigabyte Technology Co., Ltd. GA-880GM-UD2H 64-bit
vpv Lenovo ThinkPad T480s, F35, 5.15.2-200.fc35.x86_64 [1] 1. My kernel is tainted, because I have enable_fbc and enable_guc. The tests still pass.
wayne6001 5.15.2-200.fc35.x86_64 on Dell XPS 13 9350, Fedora 35 [1] 1. Passed both default and performance tests
wayne6001 5.15.2-200.fc35.x86_64 on nuc6i5syk [1] 1. default and performance tests pass
woodywoodah Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) [1] 1. cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well.
woodywoodah Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) 5.15.2-200.fc35.x86_64 [1] 1. cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
xfgusta [1] 1. all default and performance testcases passed
yasharjit [1] 1. All default and performance test cases passed.
yasharjit GNOME Boxes [1] 1. All default and performances test cases passed
zackds Lenovo desktop 4th gen i3/ 8 GB DDR3/ 250 GB HDD ( https://linux-hardware.org/?probe=2e7ed34d33 ) [1] 1. With the official test image even though it is Fedora 34, both tests PASS, libhugetlbfs & paxtest was skipped.
zeten30 ThinkPad T14s Gen 1
Wiki Metadata