Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
Ahmedalmeleh | Vmware on Asus Vivobook X409JA (Intel Core i5 1035G1 | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
akumar99 | Virtualbox, Ryzen 3900x | ||
alciregi | Lenovo V330-15IKB Type 81AX | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Lenovo X1 Crabon gen 8 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not
affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Pinebook Pro | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Branch predictor hardening
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | Raspberry Pi 3 aarch64 no GUI | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alciregi | i5-7400 8GB RAM Desktop | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
alexhaydock | Lenovo ThinkPad X240 | [1] |
1.
Default kernel regression test case run passed
|
atim | CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII | ||
bandithijo | kernel-5.15.2-200.fc35.x86_64 on Lenovo ThinkPad X260 Intel i5-6300U | [1] |
1.
Default & Performance tests pass
|
belegdol | Ryzen 5 5600x, RTX 2070, ASRock Fatal1ty B450 Gaming-ITXac | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
bittin | Virtualbox - F34 | ||
bittin | Virtualbox - F34 - 5.15.3 | ||
bittin | Virtualbox - F35 | ||
bittin | Virtualbox - F35 - 5.15.3 | ||
bojan | Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.15.2-200.fc35.x86_64 | [1] |
1.
Both default and performance tests pass on ThinkPad T450s. The kernel also runs on the other machine from the profile.
|
bretth | 5.15.2 KVM | [1] |
1.
Default & performance tests pass
|
bretth | 5.15.3 KVM | [1] |
1.
Default & performance tests pass
|
bytehackr | Kernel 5.15.2 on Lenovo P1 Gen3 | [1] |
1.
Default test Pass.
|
clnetbox | SCHENKER XMG PRO 17 (CLEVO PB71) | Intel Core i7-10875H | 16 GB (32 GB) DDR4-3200 Crucial | NVIDIA GeForce RTX 2070 Refresh | [1] |
1.
Everything works as expected ... no noticeable issues so far.
|
condor | HP EliteBook 8470p baremetal w/Intel i5-3320M processor | ||
condor | virt-manager, test day image | ||
copperi | 5.15.2-200.fc34.x86_64 F35 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200] | ||
couchfox | Dell Inspiron 7577 - Intel Core i5-7300HQ | [1] |
1.
Performance test: PASS
|
couchfox | Dell Inspironn7577 - Intel Core i5-7300HQ | [1] |
1.
All PASS (unless SKIP)
|
daniels | Lenovo 2in1 14 IdeaPad Intel Core Processor (Skylake, IBRS) × 4 QEMU Standard PC _Q35 + ICH9, 2009_ | [1] |
1.
Regression and Performance Tests : Passed (Gnome 40.4)
|
dbrendel | T14s Gen1 in kvm | ||
donaldsebleung | Kernel 5.15.2; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4 | ||
donaldsebleung | Kernel 5.15.3; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization | ||
dumprop | Virtualbox - F35 | [1] |
1.
./default/cachedrop PASS
./default/insert_leap_second SKIP
./default/libhugetlbfs
SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead FAIL
Test suite complete FAIL
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
fuller | https://linux-hardware.org/?probe=f850c51db9 | ||
garrmcnu | Test image on VM (KVM) | [1] |
1.
Default and performance tests passed
|
geraldosimiao | kernel-5.15.2-200.fc35.x86_64 on KVM- Qemu - UEFI | [1] |
1.
No regressions found
|
geraldosimiao | kernel-5.15.2-200.fc35.x86_64 on baremetal ACER Aspire | [1] |
1.
ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000
Kernel regression tests PASSED
|
geraldosimiao | kernel-5.15.3-200.fc35.x86_64 on baremetal ACER Aspire | [1] |
1.
ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000. Kernel regression tests PASSED
|
grgivs | GNOME Boxes (test day image) | [1] |
1.
./default/cachedrop FAIL
./default/paxtest SKIP
./default/libhugetlbfs SKIP
|
gtwilliams | KDE F35 Intel(R) Xeon(R) W-2225 CPU @ 4.10GHz | ||
guiltydoggy | Ryzen 5900X X570 - Fedora Kinoite 35 - Tests run on bare metal in Toolbox | [1] |
1.
Test suite called with default
./default/cachedrop FAIL
./default/insert_leap_second SKIP
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign SKIP
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls SKIP
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
Test suite complete FAIL
./drop_caches.sh: line 45: /proc/sys/vm/drop_caches: Permission denied 14 │ TestError: Can't free pagecache 15 │ 5432496 16 │ Could not run tests
|
hobbes1069 | [1] |
1.
I've also been using the kernel for a day or two without any issues.
|
|
hricky | AMD Athlon(tm) 64 X2 Dual Core Processor 4200+, 4 GB RAM, Bare Metal, 5.15.5-200.fc35, CoreOS | [1] [2] [3] |
1.
performance
2. destructive 3. stress |
hricky | Intel Core i5-2500 CPU @ 3.30 GHz, 32 GB RAM, Test Day Image | [1] [2] [3] |
1.
performance
2. destructive 3. stress |
hricky | Intel(R) Celeron(R) CPU G3900 @ 2.80GHz, 4GB RAM, Bare Metal, CoreOS/Next, kernel-5.15.5-200.fc35 | [1] [2] [3] |
1.
performance
2. destructive 3. stress |
hricky | Intel(R) Celeron(R) D CPU 3.33GHz, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next | [1] [2] [3] |
1.
performance
2. destructive 3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL |
hricky | Intel(R) Pentium(R) D CPU, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next | [1] [2] [3] [4] |
1.
performance
2. destructive 3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL 4. default |
hricky | Intel® Core™ i7-4790 CPU, 32 GB RAM, Bare Metal, Fedora Linux 35 (Workstation Edition) | [1] [2] [3] |
1.
performance
2. destructive 3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL |
hricky | Pentium(R) Dual-Core CPU E5200 @ 2.50GHz, 4 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next | [1] [2] [3] |
1.
performance
2. destructive 3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL |
idanka | GNOME Boxes (test day image) hw: Fujitsu P520, i5 4570, nvidia gtx 1650 | [1] |
1.
Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT
disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
imalone | Legion 5 Pro 16ACH6H 5800H RTX3070 | [1] |
1.
Test suite and performance test suite. thirdparty test PASS. Skipped: ./default/paxtest ./default/libhugetlbfs.
MediaTek mt7921e, bluetooth and wireless working with 5.15.2-200.fc35.x86_64
|
itrymybest80 | 5.15.2-200.fc35.x86_64 (koji/upgrade) | [1] |
1.
Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
|
itrymybest80 | 5.15.3-200.fc35.x86_64 (koji/update) | [1] |
1.
Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
|
jakfrost | default | [1] |
1.
Ran test on bare metal UEFI system with AMD 5600G CPU (on board graphics). Used live ISO to run tests without installing to system. All tests came back PASS.
|
jimrayjoebob | Gigabyte B550M DS3H, Ryzen 5 5600g, test day image | ||
jishi@redhat.com | Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GH | [1] [2] [3] [4] [5] |
1.
ipv6 basic socket test
2. route table basic, add/delete/modify/flush/list route with ip route command 3. geneve basic, 1. add geneve over ipv4 and ipv6 2. ping over geneve 3. check geneve header in the packets 4. run iperf over geneve 4. vxlan basic test, 1. add vxlan over ipv4 and ipv6 , ip link add vxlan1 type vxlan id 42 remote $remote_ip local $local_ip dev $dev 2. run ping over vxlan 3. check vxlan header in the packet 4. run iperf over vxlan 5. gre basic: 1. add gre with ip link add gre1 type gre local $local_addr remote $remote_addr 2. ping over gre 3. check gre header for the packet 4. run iperf over gre |
jpbn | F35 | [1] |
1.
test PASS
performance test Fail (first time Terminal crash; 2nd time terminal and firefox crash)
|
jpbn | Hewlett-Packard HP Compaq 8100 Elite SFF PC Intel® Core™ i5 CPU 650 @ 3.20GHz × 4 | ||
jritter | Lenovo ThinkPad W530 | ||
kisk | VirtualBox VM Fedora 35, Kernel updated to 5.15.2-200.fc35.x86_64 | [1] |
1.
The tests in the default test suite that were skipped: cachedrop, insert_leap_second, and paxtest. The other tests passed.
Vulnerability status: /sys/devices/system/cpu/vulnerabilities/...
The
performance tests hang on bandwidth measurements.
|
kodirovshchik | Kernel: 5.15.2-200.fc35.x86_64 Release: Fedora release 35 (Thirty Five) | [1] |
1.
Test suite called with default:
./default/libhugetlbfs SKIP
./default/paxtest SKIP
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
kokoseij | Inspiron 5515 with Ryzen 5700U / DDR4 8GB RAM | [1] [2] |
1.
Updated from Pre-existing Fedora 35 setup.
All test cases and performance tests passed without an issue.
2. Updated from pre-existing Fedora 35 environment |
lejeczek | Lenovo e14 g3 AMD Ryzen 4500U | [1] |
1.
Thanks!
Test suite called with default
./default/cachedrop PASS
./default/insert_leap_second PASS
./default/libhugetlbfs SKIP
./default/memfd PASS
./default/modsign PASS
./default/mq-memory-corruption PASS
./default/paxtest SKIP
./default/posix_timers PASS
./default/selinux-dac-controls PASS
./default/stack-randomness PASS
./default/sysfs-perms PASS
./default/timer-overhead PASS
./thirdparty/nvidia-module WARN
|
lily | ampere hr350a | [1] [2] |
1.
all default and performance testcases passed
2. all default and performance testcases passed |
lily | apm mustang | [1] |
1.
all default and performance testcases passed
|
lily | dell pe | [1] |
1.
all default and performance testcases passed
|
lily | dell per7415 | [1] |
1.
all default and performance testcases passed
|
lily | fujitsu fx700 | [1] |
1.
all default and performance testcases passed
|
lily | hp moonshot | [1] |
1.
all default and performance testcases passed
|
lily | hpe apollo | [1] |
1.
all default and performance testcases passed
|
lily | hpe dl325gen10 | [1] |
1.
all default and performance testcases passed
|
lily | hpe dl560egen8 | [1] |
1.
all default and performance testcases passed
|
lily | ibm x3250m4 | [1] |
1.
all default and performance testcases passed
|
lily | lenovo rd230 | [1] |
1.
all default and performance testcases passed
|
lily | qualcomm amberwing | [1] |
1.
all default and performance testcases passed
|
marc84 | kerneltest-5.15.2.iso on HP Laptop 14-cf2033wm | [1] |
1.
Test suite called with default: ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/paxtest SKIP
./default/timer-overhead PASS ./default/memfd PASS
./default/cachedrop FAIL ./default/mq-memory-corruption PASS ./default/modsign PASS
./default/posix_timers PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP
Test suite complete FAIL
|
masami | i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, UEFI, F35 Workstation, 5.15.2-200.fc35.x86_64 | [1] |
1.
Default & performance tests passed. Works fine for daily use.
|
niarch | Oracle Virtual Box - 2 processors, 4GB RAM Thinkpad T580 running over Kubuntu 20.04 | ||
nicolas | AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K | ||
nicolas | AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K FEDORA 35 KDE KERNEL 5.15.2-200.FC35.X86_64 | ||
norbertj | kerneltest-5.12.2.iso on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM | [1] |
1.
paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
|
norbertj | kerneltest-5.15.2.iso on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM | [1] |
1.
paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
|
norbertj | kerneltest-5.15.2.iso on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM | [1] |
1.
paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted. Sorry, typo in Profile for my other PC: I also meant kerneltest-5.15.2.iso.
|
oprizal | 5.15.2-200.fc35.x86_64 on AMD A9-9420 radeon r5 | [1] |
1.
#2023035,
1. Noticed if including `kernel-devel` during the update will give warnings on running scriptlet part and most likely to failed (take too long) on verifying part.
2. Machine can't suspend, reboot,
and shutdown on AMD A9-9420 radeon r5. In the past, on kernel 5.12.x my machine only failed to wake up from suspend on main laptop monitor but not on second monitor connected via HDMI.
Installation done on kernel 5.14.18-300.fc35
|
oprizal | 5.15.3-200.fc35.x86_64 on AMD A9-9420 radeon r5 | [1] |
1.
#2023035,
On 5.15.3 have same problem with 5.15.2, can't suspend, reboot, and poweroff. All regression test passed. Since I can't find other user here with AMD system that have same issue with me, may be it's
just something wrong with my installation.
|
oumuamua | Kernel 5.15.2 (VirtualBox) | [1] |
1.
Default test suite Pass
|
pwhalen | AMD Seattle (AArch64) | ||
pwhalen | APM Mustang X-Gene-1 (AArch64) | ||
pwhalen | Firefly2(rk3399) | ||
pwhalen | HR330a (aarch64) | ||
pwhalen | Nvidia Jetson Nano (aarch64) | ||
pwhalen | Nvidia Jetson Xavier NX (aarch64) | ||
pwhalen | Raspberry Pi 2 Model B (armhfp) | ||
pwhalen | Raspberry Pi 4 4GB (aarch64) | ||
rai510 | Gnome Boxes Kernel 5.15.2 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
rainmakerraw | AMD Threadripper 3960X, Asus RoG Strix-E Gaming, 32GB DDR4 3600cl16, Samsung Evo Plus 960 nVME, Radeon Vega 56 | [1] |
1.
No issues.
|
rhodry | |||
rhodry | ASUS ROG STRIX G153QY. AMD Ryzen 9 5900hx. Radeon RX6800. Fedora 35. Kernel-5.15.2-200.fc35 | ||
sammy | Fedora 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd | [1] [2] [3] [4] [5] [6] |
1.
#0,
x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
2. #0, x86_64 kernel-5.15.2-200.fc35 passed default and performance tests. 3. #0, x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests. 4. #0, x86_64 kernel-5.15.2-200.fc35 passed default and performance tests. 5. #0, Kernel x86_64 kernel-5.15.2-200.fc35 passed runtests and performance test. 6. Kernel x86_64 kernel-5.15.2-200.fc35 did not pass runtests but passed performance test. |
sammy | Fedora Cinnamon 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd | [1] |
1.
#0,
x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
|
sgraf | 5.15.2 KVM with GUI | [1] |
1.
Default and performance tests pass. GUI/Gnome works without any issues.
|
skipperTux | kernel-5.15.2-200.fc35 Dell Precision 7560 | [1] |
1.
Mobile Dell Precision-Workstation 7560, Intel Xeon W-11955M, 64 GB ECC SODIMM, NVIDIA T1200 4 GB, Intel UHD
Default & Performance tests PASS, libhugetlbfs and paxtest SKIP
|
solinvictuz | Gnome Boxes | [1] |
1.
default + performance
|
solinvictuz | kerneltest iso on Dell XPS 13 7390, i7-10510U, 15,4GiB, UHD Graphics (CML GT2) | [1] |
1.
default & performance test passed
|
t3rm1n4l | Dell Inspiron 3180 11" | [1] [2] |
1.
All tests passed, bugs resolved in 5.15.3
2. passes regression and performance tests. Unable to put laptop to sleep with 5.15.2 kernel, works fine in 5.14.18 |
t3rm1n4l | i7-3770 16GB DDR3 @1600Mhz (XMP) Nvidia GTX1060 6 Gb | [1] |
1.
5.15.3 all tests passed
|
terkel | Kernel 5.15.2 on Dell XPS 13 9310 | [1] |
1.
Default & Performance tests pass
|
tharadash | HP EliteBook 840 G6 with SecureBoot | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not
affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
|
tharadash | HP Envy x360 13-ar0600nz | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
tharadash | HP z820 workstation, FirePro w7000, UEFI | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
tharadash | Intel NUC DC53427HYE | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
tharadash | Intel Z77, i7-3770k, RX570, SecureBoot | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
tripledes | Bare metal - AMD Ryzen 2700x, ASUS x470 Prime-PRO, AMD GPU (rx470 8GB) | ||
trugul | Lenovo ThinkPad Yoga 260, Intel® Core™ i5-6200U CPU @ 2.30GHz × 4, Mesa Intel® HD Graphics 520 (SKL GT2) | ||
user | bare metal fedora34 workstation on Gigabyte Technology Co., Ltd. GA-880GM-UD2H 64-bit | ||
vpv | Lenovo ThinkPad T480s, F35, 5.15.2-200.fc35.x86_64 | [1] |
1.
My kernel is tainted, because I have enable_fbc and enable_guc. The tests still pass.
|
wayne6001 | 5.15.2-200.fc35.x86_64 on Dell XPS 13 9350, Fedora 35 | [1] |
1.
Passed both default and performance tests
|
wayne6001 | 5.15.2-200.fc35.x86_64 on nuc6i5syk | [1] |
1.
default and performance tests pass
|
woodywoodah | Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) | [1] |
1.
cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well.
|
woodywoodah | Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) 5.15.2-200.fc35.x86_64 | [1] |
1.
cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not
affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
|
xfgusta | [1] |
1.
all default and performance testcases passed
|
|
yasharjit | [1] |
1.
All default and performance test cases passed.
|
|
yasharjit | GNOME Boxes | [1] |
1.
All default and performances test cases passed
|
zackds | Lenovo desktop 4th gen i3/ 8 GB DDR3/ 250 GB HDD ( https://linux-hardware.org/?probe=2e7ed34d33 ) | [1] |
1.
With the official test image even though it is Fedora 34, both tests PASS, libhugetlbfs & paxtest was skipped.
|
zeten30 | ThinkPad T14s Gen 1 |