Kernel 5.10 Test Week

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2021-01-04_Kernel_5.10_Test_Week
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Andyogle MacBook Pro 4GB Intel Core i7-3615QM CPU@2.30GHz x 8 [1] 1. Passed.
Bodanel Ryzen 3700 - VM with 4 CPUs and 16 GB RAM on nvme SSD [1] 1. ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Daniels Lenovo 2in1 14 Intel® Pentium(R) CPU 4415U @ 2.30GHz × 4, LIVE (Bare Metal) (Test Image) [1] 1. Test Suite : PASS
Dskobra [1] 1. Test suite called with default ./default/timer-overhead PASS ./default/paxtest SKIP ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/cachedrop PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/posix_timers PASS ./default/modsign PASS ./default/selinux-dac-controls PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ElXreno Fedora 33 KDE, bare metal, FUJITSU LIFEBOOK AH531/GFO (CPU: Intel Core i3-2350M | GPU: NVIDIA GT 525M && Intel HD Graphics 3000 | RAM: 4 GB), nouveau [1] 1. Sometimes an error [1] appears in the logs when booting the system and the system hangs. [1]: `watchdog: BUG: soft lockup - CPU#3 stuck for 22s! [irq/16-iwlwifi:934]`. Test ./default/libhugetlbfs and ./default/paxtest was skipped, all other tests passed successfully. Also the NVIDIA 390xx driver is not building. Everything else works fine. Vulnerability status: itlb_multihit:KVM: Mitigation: VMX disabled | l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable | mds:Mitigation: Clear CPU buffers; SMT vulnerable | meltdown:Mitigation: PTI | spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp | spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization | spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling | srbds:Not affected | tsx_async_abort:Not affected
Fedora Kernel Tester i5-6600 bare metal Kernel Test Day Image 5.10.4 [1] 1. Bug=Screen does not come back after sleep. Have to reboot. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
GuiltyDoggy Ryzen 9 5900X - VMWare - Test image 5.10.4-200.fc33.x86_64 [1] 1. Default Test Suite: Passed Performance Test Suite: Passed
HRicky [1] 1. H/W path Device Class Description =============================================================== system To Be Filled By O.E.M. (To Be Filled By O.E.M.) /0 bus H97 Pro4 /0/0 memory 64KiB BIOS /0/d memory 32GiB System Memory /0/d/0 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/1 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/2 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/d/3 memory 8GiB DIMM DDR3 Synchronous 1600 MHz (0.6 ns) /0/e processor Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz /0/e/f memory 256KiB L1 cache /0/e/10 memory 1MiB L2 cache /0/e/11 memory 8MiB L3 cache /0/100 bridge 4th Gen Core Processor DRAM Controller /0/100/1 bridge Xeon E3-1200 v3/4th Gen Core Processor PCI Express x16 Controller /0/100/1/0 display Ellesmere [Radeon RX 470/480/570/570X/580/580X/590] /0/100/1/0.1 multimedia Ellesmere HDMI Audio [Radeon RX 470/480 / 570/580/590] /0/100/2 display Xeon E3-1200 v3/4th Gen Core Processor Integrated Graphics Controller /0/100/3 multimedia Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller /0/100/14 bus 9 Series Chipset Family USB xHCI Controller /0/100/14/0 usb3 bus xHCI Host Controller /0/100/14/0/d input Comfort Curve Keyboard 2000 /0/100/14/0/e input USB Optical Mouse /0/100/14/1 usb4 bus xHCI Host Controller /0/100/14/1/5 scsi6 storage Mass Storage Device /0/100/14/1/5/0.0.0 /dev/sdc disk 7665MB Transcend 8GB /0/100/14/1/5/0.0.0/0 /dev/sdc disk 7665MB /0/100/14/1/5/0.0.0/0/2 /dev/sdc2 volume 15EiB Windows FAT volume /0/100/14/1/5/0.0.0/0/3 /dev/sdc3 volume 17MiB EFI (FAT-12/16/32) partition /0/100/16 communication 9 Series Chipset Family ME Interface #1 /0/100/19 enp0s25 network Ethernet Connection (2) I218-V /0/100/1a bus 9 Series Chipset Family USB EHCI Controller #2 /0/100/1a/1 usb1 bus EHCI Host Controller /0/100/1a/1/1 bus USB hub /0/100/1b multimedia 9 Series Chipset Family HD Audio Controller /0/100/1c bridge 9 Series Chipset Family PCI Express Root Port 1 /0/100/1c.6 bridge 82801 PCI Bridge /0/100/1c.6/0 bridge ASM1083/1085 PCIe to PCI Bridge /0/100/1d bus 9 Series Chipset Family USB EHCI Controller #1 /0/100/1d/1 usb2 bus EHCI Host Controller /0/100/1d/1/1 bus Integrated Hub /0/100/1f bridge H97 Chipset LPC Controller /0/100/1f.2 scsi0 storage 9 Series Chipset Family SATA Controller [AHCI Mode] /0/100/1f.2/0 /dev/sda disk 240GB KINGSTON SA400S3 /0/100/1f.2/0/1 /dev/sda1 volume 50MiB Windows NTFS volume /0/100/1f.2/0/2 /dev/sda2 volume 223GiB Windows NTFS volume /0/100/1f.2/0/3 /dev/sda3 volume 505MiB Windows NTFS volume /0/100/1f.2/1 /dev/sdb disk 120GB Samsung SSD 850 /0/100/1f.2/1/1 /dev/sdb1 volume 1GiB EXT4 volume /0/100/1f.2/1/2 /dev/sdb2 volume 110GiB Linux filesystem partition /0/100/1f.2/0.0.0 /dev/cdrom disk DRW-24D5MT /0/100/1f.3 bus 9 Series Chipset Family SMBus Controller /0/1 system PnP device PNP0c01 /0/2 system PnP device PNP0c02 /0/3 system PnP device PNP0b00 /0/4 generic PnP device INT3f0d /0/5 system PnP device PNP0c02 /0/6 system PnP device PNP0c02 /0/7 system PnP device PNP0c02
Josevaldo CPU: Intel i3-2120 (4) @ 3.300GHz - Memory: 3975MiB / 7891MiB [1] 1. Test suite called with default ./default/posix_timers PASS ./default/paxtest SKIP ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/stack-randomness PASS ./default/modsign PASS ./default/timer-overhead PASS ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/selinux-dac-controls PASS Test suite complete PASS Your log file is being submitted... { "message": "Upload successful!" }The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
Mario CPU: Intel® Core™ i7-9700K CPU @ 3.60GHz × 8, GPU: NV168, RAM: 16GB, LIVE (Bare Metal) (Test Image)
Mario Schenker XMG P304 PRO, CPU: Core I5-4210M @2.60GHz x 4, GPU: NV117 / Intel HD 4600, RAM:16GB
Noname Host: 20ALCTO1WW ThinkPad X240, CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT, RAM: 8GB
abrahm Dell XPS 13 9310
abrahm Dell XPS 13 9310, i7-1165G7, f33, 5.10.4-200.fc33.x86_64 from koji [1] 1. No general issues on this hardware running 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-0.rc7.20201211git33dc9614dc20.97.fc34.x86_64, 5.10.0-98.fc33.x86_64, 5.10.2-200.fc33.x86_64, or 5.10.4-200.fc33.x86_64 (all from koji).
abrahm Dell XPS 13 9370, i7-8640U, 5.10.4-200.fc33.x86_64 from koji
agurenko Baremetal: Ryzen 5900X, 32 Gb RAM, Radeon RX 5700 XT [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
akumar99 VM (AMD Ryzen 9 3900X)
alciregi Dell XPS 13 9360, Intel i7-7500U, F33 Workstation [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 3 aarch64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 4 8GB headless aarch64 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alexxvibes GNOME Virtual Box -- 1.9GB Ram / AMD A4-3300 APU / Adata SU650 SSD
alphacluster CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570 [1] 1. No issues
atim CPU: Quad Core model: AMD Ryzen 3 3300X; Graphics: NVIDIA GP106 [GeForce GTX 1060 6GB] driver: nvidia v: 455.45.01 [1] 1. Tests passed. LGTM so far. FS: BTRFS. Can't say anything at this moment about BTRFS performance and any regressions.
augenauf F33 Gnome test box on VirtualBox [1] 1. no regression noted. everything works as expected in my F33 test system on VirtualBox.
augenauf baremetal Thinkpad T440s [1] 1. Works for me on T440s, no regresssion noted after first day of usage.
bittin [1] [2] 1. 5.10.5 worked good in Virtualbox here
2. Worked great in my test VM with rawhide in Virtualbox
bohrasd ASUS ROG Zephyrus G14 GA401IV_GA401IV 1.0 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 1726MiB / 15477MiB [1] 1. All tests passed.
bojan [1] 1. ThinkPad T450s, default and performance tests with 5.10.2-200.fc33.x86_64 pass. The machine runs Gnome fine. WiFi works, as well as ethernet. Also running this kernel on a noname fanless PC with Intel i5 8250U CPU. No regressions yet.
bretth KVM [1] 1. default and performance tests passed
bretth dell 5530 [1] 1. default and performance tests passed
cap Thinkpad T440s, 8G, haswell generation [1] 1. Both runtests and runtests -t performance PASS. Also checked gl, webcam, audio and suspend/resume OK.
checkcode
chivux [PROCESADOR] Intel, Code Name: Merom (Core 2 Duo) 2048K, Technology: 65 nm, Specification: Intel(R) Core(TM)2 Duo CPU T5450 @ 1.66GHz, Instructions: M MX, SSE(1, 2, 3, 3S), x86-64. | [MOTHERBOARD] Manufacturer: Dell Inc., Model: 0H279K. | [BIOS] Brand: Dell Inc. Version: A05. | [CHIPSET] Vendor: Intel Corporation, Model: 82801HM (ICH8M) LPC Interface Controller. | [GRAPHICS] Vendor: Intel, Driver: i915, Model: Mobile GM965/GL960 Integrated Graphics Controller (secondary). | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9) [1] 1. Date: Tue Jan 5 10:33:05 AM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None ======================================== Date: Tue Jan 5 10:35:05 AM EST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
chivux [PROCESADOR] Vendor: AMD, Code Name: Trinity X2, Technology: 32 nm, Voltage: 10.800V, Specification: AMD A6-4400M APU with Radeon(tm) HD Graphics, Ins tructions: MMX(+), SSE(1, 2, 3, 3S, 4.1, 4.2, 4A), XOP, AVX(1), FMA(3, 4), AES, CLMUL, AMD-V, x86-64. | [MOTHERBOARD] Manufacturer: TOSHIBA, Model: Portable PC, Revision: MP. | [BIOS] Brand: Insyde Corp. Version: 6.20. | [CHIPSET] Vendor: Advanced Micro Devices, Inc. [AMD], Model: FCH LPC Bridge. | [GRAFICS] Vendor: AMD, Driver: Radeon, Model: Trinity 2 [Radeon HD 7520G]. | [Operating System] Kernel: Linux 5.10.4-200.fc33.x86_64, Distribution: Fedora 33 (Workstation Edition), Hostname: localhost-live, Compiler: cc (GCC) 10.2.1 20201125 (Red Hat 10.2.1-9) [1] 1. Date: Mon Jan 4 06:37:36 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None ============================ Date: Mon Jan 4 06:41:50 PM EST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
clasater Dell XPS 17 9700 [1] 1. Wireless card (Detected Killer(R) Wi-Fi 6 AX1650s 160MHz Wireless Network Adapter (201D2W), REV=0x354) performance drops dramatically, I get an unstable 150Mbps vs getting 250Mbps with 5.9 kernel Sound card works with most recent Rawhide 5.10 RC build 1204, but does not work with Latest Fedora 5.9 or this test kernel (probably related to https://blog.fts.scot/2020/07/04/dell-xps-2020-how-to-get-audio-working-on-linux...)
clnetbox CLEVO W370SS (SCHENKER XMG A704) | Intel Core i7-4710MQ CPU (Haswell) [1] 1. Audio does not work correctly any longer - no sound from internal speakers Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller (rev 06) Kernel versions tested : 5.10.2-200.fc33.x86_64 / 5.10.3-200.fc33.x86_64 / 5.10.4-200.fc33.x86_64
copperi 5.10.5-200.fc33.x86_64 F33 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
creech Acer Aspire 5680, Core 2 Duo T5500, GeForce Go 7600, 2 GB DDR2 RAM [1] 1. ./default/cachedrop failed, all other test were passed or skipped. Don't know what's up with this fail. The kernel seem to run fine. No problems found so far while using it. Btw.: Performance test is passed.
danniel Acer E15 i7 8GB Ram
donaldsebleung Test Day Image using GNOME Boxes (Memory: 1.9 GiB, Processor: Intel® Core™ i5-4250U CPU @ 1.30GHz × 4) [1] 1. Some default tests ended with "SKIP"; GCC gives multiple warnings "implicit declaration of function 'lmbench_usage'" with performance tests
eismann AMD Ryzen 3700X - ASUS Strix X570-E - 32 GB - Radeon VII
ejnersan Dell Vostro 3558, Intel i3-4005U, Test-day Image LiveUSB [1] 1. [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS [Performance] Pass
ejnersan HP Elitebook 840 G4, Intel i5-7200U, Test-day Image LiveUSB [1] 1. [Default test] paxtest+libhugetlbfs: SKIP, rest: PASS [Performance] Pass
emmrou Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB. [1] 1. Everything works fine: sound, video, Wi-fi, bluetooth. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
engineerfear Dell Inspiron 5505 AMD 4700U Live CD Test Image [1] 1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609886321.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
engineerfear Lenovo Thinkbook 14 Gen 2 ITL - Intel 11th Gen i5 - live test day image [1] 1. Test suite called with default ./default/insert_leap_second SKIP ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop SKIP ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign SKIP ./default/stack-randomness PASS ./default/selinux-dac-controls SKIP ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1609987767.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ersen Desktop PC with Intel Core i3-4160 @3.60 GHz [1] 1. Tested with kernel 5.10.3-200.fc33.x86_64, both tests passed. GPU: Intel Integrated Graphics Ethernet: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller No Wi-Fi.
eschruefer@ca-musings.de [1] 1. Aarch64: Screen is garbled on a Raspberry Pi 4B. Screen looks as if out of sync (only squashed vertical lines).
figonzal VM: QEMU/KVM, CPU: 2 vCPU / 8 CPU, RAM: 2048 MiB / 7831 MiB, x86_64 [1] 1. 1 .- All test passed
filiperosset Intel(R) Core(TM) i7-10750H CPU @ 2.60GHz (running inside a VM 8Gig, 12 vcpus) [1] [2] 1. # performance test sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.raw Tue Jan 5 12:27:13 AM -03 2021 Latency measurements Tue Jan 5 12:28:15 AM -03 2021 Calculating file system latency Tue Jan 5 12:28:27 AM -03 2021 Local networking Tue Jan 5 12:30:41 AM -03 2021 Bandwidth measurements Tue Jan 5 12:38:06 AM -03 2021 Calculating context switch overhead Tue Jan 5 12:38:41 AM -03 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
2. [filiperosset@raw kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/posix_timers PASS ./default/cachedrop PASS ./default/selinux-dac-controls SKIP ./default/stack-randomness PASS ./default/memfd PASS ./default/modsign PASS ./default/insert_leap_second PASS ./default/sysfs-perms PASS ./default/paxtest SKIP ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/timer-overhead FAIL Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected [filiperosset@raw kernel-tests]$
frantisekz i5-6600k, RX 580 [1] 1. No issues spotted!
geraldosimiao Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.4 [1] 1. All Kernel regression tests PASSED, normal use for two days without problems.
geraldosimiao Kenel 5.10.5-200.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5 [1] 1. Kernel regression tests PASSED, default and performance, normal use for a full day without problems.
geraldosimiao kerneltest-5.10.4.iso on pendrive live-usb session [1] 1. I downloaded the kerneltest-5.10.4.iso (from https://jforbes.fedorapeople.org/testweek/ ) and created a pendrive with fedora image writer, them boot it on my Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller, and run the kernel-tests.
granissado CPU: AMD Ryzen 7 5800X / RAM: 2x16GB / Test image [1] 1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
harshmangal HP-VMM-2GB-3vCPU [1] 1. Test suit called with 'Default'
hhlp CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB [1] 1. #1701322, No Regression Noted, Great Performance. it seem is it not affected by teh bugs before.
hozansahin [1] 1. ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hozansahin CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX [1] 1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
hozansahin CASPER NIRVANA F600 NOTEBOOKCPU: Intel i5-7200U (4) @ 3.100GHz GPU: NVIDIA GeForce 940MX (Test İmage) [1] 1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
itrymybest80 Fedora 33 (koji upgrade), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.2) & 970 EVO M.2 [1] 1. #1911939, #1909891, #1887439, #1885457, #1883621, #1884347, Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped. Bugs: 1) VA-API hardware acceleration broken with MESA 20.3 on AMD GPUs. 2) Steam will launch in an invisible window and you have to tab to grab it. 3) Booting Fedora (enter encryption key) now running in 640x480 and wrong 4:3 ratio. 4) Audio cracking and goes on/off multiple times during the boot sequence. 5) I'm still receiving the "run script kernel-core-5.10.4-200.fc33.x86_64 sort: fflush failed: 'standard output': Broken pipe sort: write error gzip: stdout: Broken pipe gzip: stdout: Broken pipe sort: write failed: 'standard output': Broken pipe sort: write error" while installing the kernel-core and kernel-debug-core package 6) DMESG [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. 7) DMESG show_signal_msg: 91 callbacks suppressed lat_rpc[12785]: segfault at 1000 ip 00007fa20b0b63b5 sp 00007fff196daa58 error 4 in libc-2.32.so[7fa20af7a000+14f000]. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
itsmefma default [1] 1. Thikpad x1 carbon ( using boxes)
ivzhh Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz, 4300 MHz; nVidia GP104M [GeForce GTX 1070 Mobile]; Samsung Electronics NVMe SSD Controller SM961/PM961; Inte l Dual Band Wireless-AC 3168NGW [Stone Peak]; Qualcomm Atheros Killer E2500 Gigabit Ethernet Controller [1] 1. Computer automatically shutdown after passing "cachedrop" test in "sudo ./runtests.sh"
jadarius Host: LIFEBOOK E754 10601583232 CPU: Intel i5-4200M (4) @ 3.100GHz GPU: Intel 4th Gen Core Processor Memory: 1525MiB / 7832MiB [1] 1. All tests passed.
jasonhong Ryzen 3600 VM with 4 CPU and 8 GB RAM - copr image 5.10.4-200.fc33.x86_64 [1] [2] 1. All (Default and Performance) tests passed
2. Default Test Suite: Passed Performance Test Suite: Passed
jbonilla Dell XPS 17 9700 [1] 1. Audio is still not working on Dell XPS 17 9700 (Dummy Output): All of the tests passed. System performs well with the exception that audio devices not being detected. Date: Sun Jan 3 07:20:44 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None ============================================================ Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop Setting time to Mon Jan 4 18:59:50 2021 Scheduling leap second for Mon Jan 4 19:00:00 2021 Mon Jan 4 18:59:57 2021 + 246 us (37) TIME_INS Mon Jan 4 18:59:57 2021 + 500512 us (37) TIME_INS Mon Jan 4 18:59:58 2021 + 777 us (37) TIME_INS Mon Jan 4 18:59:58 2021 + 501046 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 1331 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 501494 us (37) TIME_INS Mon Jan 4 18:59:59 2021 + 1616 us (38) TIME_OOP Mon Jan 4 18:59:59 2021 + 501731 us (38) TIME_OOP Mon Jan 4 19:00:00 2021 + 1887 us (38) TIME_WAIT Mon Jan 4 19:00:00 2021 + 502072 us (38) TIME_WAIT Mon Jan 4 19:00:01 2021 + 2333 us (38) TIME_WAIT Mon Jan 4 19:00:01 2021 + 502598 us (38) TIME_WAIT Mon Jan 4 19:00:02 2021 + 2849 us (38) TIME_WAIT Leap complete Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/paxtest Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0295871 s, 3.5 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00444862 s, 2.4 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/timer-overhead Starting test ./default/libhugetlbfs Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/stack-randomness Starting test ./default/selinux-dac-controls <no matches> Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/sysfs-perms Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE
jcwillia Intel(R) Core(TM) i7-5557U CPU @ 3.10GHz (4 cores), 32GB RAM
jnk0 Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU [1] 1. 1. All tests passed. Gnome freezes when screen is locked. No input is possible via mouse or keyboard. Multiple monitors connected via docking station. Worked fine with kernel 5.9.
johnh12345 Oracle VM VirtualBox Fedora 33 5.10.4-200.fc33.x86_64 2 CPUs 4GB RAM [1] [2] 1. Had to hit control-c on the insert leap second test as it would just hang. cat kernel-test-1609904486.log.txt Date: Tue Jan 5 10:41:26 PM EST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: FAIL Failed Tests: ./default/insert_leap_second ./default/timer-overhead Warned Tests: None ============================================================ Starting test ./default/sysfs-perms Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/insert_leap_second Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/timer-overhead Unacceptable long delay; asked for 1000 usec, got 2597 usec Test failure. Starting test ./default/stack-randomness Starting test ./default/libhugetlbfs Starting test ./default/paxtest Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0533018 s, 2.0 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00343501 s, 3.1 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/selinux-dac-controls <no matches>
2. Had to hit control-C on the insert leap second as it would just hang there. All other tests passed.
jortegi
jpbn iMac warly 2008 efi
kabirgupta
kameleon CPU: Intel Core i5-8250U @ 1.60GHz
kameleon CPU: Intel Core i5-8250U @ 1.60GHz RAM: 4G DDR [1] 1. Tested on Fedora 33 VM using Boxes While running runtests.sh - t performance, received the following error: "In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory 38 | #include <rpc/rpc.h> | ^~~~~~~~~~~ compilation terminated. gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:23: results] Error 2"
keepfloyding [1] 1. Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance suite passed.
keepfloyding Thinkpad X1 Carbon Gen 8. 16 gb RAM i7 CPU; Run on Gnome Boxes [1] 1. Default test suite failed. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop FAIL ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Performance suite passed.
kennyh7279 Ryzen 5 2600, Radeon 5600XT, 32GB RAM, Fedora 33 Workstation [1] 1. Date: Tue Jan 5 12:56:58 PM PST 2021 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None ------------------------------------- Date: Tue Jan 5 12:59:18 PM PST 2021 Test set: performance Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
kiko964 Intel Core i7-4702MQ VirtualBox [1] [2] 1. Performance tests passed
2. Default test: Failed Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
knarra 20QES2P40L (LENOVO_MT_20QE_BU_Think_FM_ThinkPad X1 Carbon 7th) [1] 1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown 1382MB OK 1382MB OK 1382MB OK mhz: should take approximately 297 seconds Using config in CONFIG.localhost-live Tue Jan 5 08:42:57 AM EST 2021 Latency measurements Tue Jan 5 08:50:44 AM EST 2021 Calculating file system latency Tue Jan 5 08:54:33 AM EST 2021 Local networking Tue Jan 5 09:01:26 AM EST 2021 Bandwidth measurements Tue Jan 5 10:04:18 AM EST 2021 Calculating context switch overhead Tue Jan 5 10:16:13 AM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS bash-5.0$ sudo ./runtests.sh -t performance Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
kubot Intel® Core™ i7-3630QM CPU @ 2.40GHz × 8 ; NVE7 / Intel® HD Graphics 4000 (IVB GT2); RAM 8gb. 1TB samsung evo 850 ssd
kuladog F33, bare metal, HP EliteBook 840 G2, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4, 16 GB RAM [1] 1. 1. Both default, and performance tests passed.
lam i7-9700K, Z390, 1080 Ti, nvidia drivers 460.32.03 (rpmfusion testing repo)
ledufff [1] 1. Temperature improved dramatically.
ledufff ThinkPad E495 AMD Ryzen 5 3500U [1] 1. Temperature improved dramatically.
lewis41 Test day image on VM
lily HP BL460c G5 bay 4
lily ampere hr330a [1] 1. all default and performance testcases passed
lily apm mustang
lily dell pem905 [1] 1. all default and performance testcases passed
lily dell per7425 [1] 1. all default and performance testcases passed
lily hpe bl480c
lily hpe dl20gen9 [1] 1. all default and performance testcases passed
lily hpe sl2x160zg6
lily ibm x3250m4 [1] 1. all default and performance testcases passed
lily lenovo rd230 [1] 1. all default and performance testcases passed
lily lenovo st550 [1] 1. all default and performance testcases passed
lily rdma dev [1] 1. all default and performance testcases passed
lnie HP ProLiant DL120 G6
luya HP Envy X360 Convertible 15 Ryzen 2500U [1] 1. All test passed with no sign of regression.
marc84 USB kerneltest-5.10.4.iso on Lenovo ideapad Y570 [1] 1. Run default test suite and performance test suite: PASS
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation [1] 1. #1912061, suspend/resume doesn't work for me. it looks like same as "Bug 1912061 - Resume failure on 5.10.4-200.fc33 kernel". btw, kernel regression test tool passed and video, sound, kvm are work fine.
maumar Live image on Dell Latitude e6540 (i7 4810MQ, Radeon HD 8790M)
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU [1] 1. All test passed on kernel 5.10.4-200.fc33.x86_64. Day to day experience is ok without any obvious regression.
miguel7ra Model: Lenovo ideapad 320-15IKB | Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive [1] 1. All tests passed
miguel7ra Model: Lenovo ideapad 320-25IKB | Memory: 7.6GiB | Processor: Intel Core i5-7200U CPU @ 2.50GHz × 4 | Graphics: Mesa Intel HD Graphics 620 (KBL GT2) | Used "test day image" live distro on a 8GB USB drive [1] 1. 1. Default and Performance Passed
morphy2k OS: Fedora 33 Workstation, ENV: baremetal, KERNEL: 5.10.4-200.fc33.x86_64, DEVICE: Lenovo ThinkPad T14 AMD Gen 1, CPU: AMD Ryzen 7 Pro 4750U, RAM: 32G B DDR4-3200 [1] 1. All tests passed. No issues after 2 days of use
murph Vendor ID: AuthenticAMD CPU family: 23 Model: 49 Model name: AMD EPYC-Rome Processor Stepping: 0 CPU MHz: 3593.250 BogoMIPS: 7186.50 Virtualization: AMD-V Hypervisor vendor: KVM [1] 1. Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
mzink Lenovo ThinkPad T480s [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
mzink ThinkPad T480s [1] 1. Screen is not waking up after DPMI sleep while using docking station - not responding to any keys. Builtin display works fine. Older 5.10.0-98.fc33.x86_64 build seems to work fine.
nielsenb Compaq 8510w Intel T9300 AMD RV630 [1] 1. libhugetlbfs, paxtest SKIP, all others PASS
norbertj Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD 6450 and 4 GiB RAM [1] 1. paxtest and libhugetlbfs SKIP, rest of default tests and performance tests PASS. No regressions noted.
oldoc63 Intel Gigabyte I5 8 MB Ram 1 T HD uname --all 5.9.16-200.fc33.x86_64 #1 SMP Mon Dec 21 14:08:22 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux [1] 1. [oldoc@localhost ~]$ cd kernel-tests [oldoc@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop FAIL ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms WARN ./default/timer-overhead PASS Test suite complete FAIL Your log file is being submitted... Traceback (most recent call last): File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module> submitclient.login( File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login response = openid_login( File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected [oldoc@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.localhost.localdomain Tue Dec 29 08:48:17 AM -04 2020 Latency measurements Tue Dec 29 08:49:19 AM -04 2020 Calculating file system latency Tue Dec 29 08:49:30 AM -04 2020 Local networking Tue Dec 29 08:53:27 AM -04 2020 Bandwidth measurements Tue Dec 29 09:00:10 AM -04 2020 Calculating context switch overhead Tue Dec 29 09:00:45 AM -04 2020 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... Traceback (most recent call last): File "/home/oldoc/kernel-tests/./fedora_submit.py", line 43, in <module> submitclient.login( File "/usr/lib/python3.9/site-packages/fedora/client/openidbaseclient.py", line 303, in login response = openid_login( File "/usr/lib/python3.9/site-packages/fedora/client/openidproxyclient.py", line 138, in openid_login raise AuthError(output['message']) fedora.client.AuthError: Authentication failed The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
oscarholst Lenovo ThinkCentre M92P (Intel Core i5-3550 3.30GHz, 8192MB DDR3 1600MHz, intel graphics) Live iso usb kernel test
oscarholst Lenovo ThinkPad T440s (Intel Core i5-4200U 2.6GHz, 12GB DDR3, Intel HD Graphics 4400) live-usb kernel-test [1] 1. All tests passed.
pdapp Intel board DH87RL G3220 3.0 Ghz , 16 GB RAM, i915, [1] 1. i915 gpu problem remains.
phoebos Test Day live image; ThinkPad T480; Intel(R) Core(TM) i5-8350U CPU @ 1.70GHz [1] 1. All tests passed
plumchii Samsung NP350V5C-S06FR [1] 1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms WARN ./default/timer-overhead PASS Test suite complete WARN Performance Test Passed
pwhalen AMD Seattle (aarch64)
pwhalen Ampere eMag
pwhalen BananaPi (ARMv7)
pwhalen BeagleBoneBlack (ARMv7)
pwhalen Mustang (aarch64)
rainmakerraw AMD Threadripper 3960X (24c48t) at stock, Asus RoG Strix TRX40-E Gaming motherboard, 32GB DDR4 3600MHz (16,16,16,36), AMD Radeon Vega 56 (amdgpu), Int el I211-AT NIC [1] 1. All hardware seems to be working fine as before (on default release kernel 5.9.16). However the sound output has changed from two speaker stereo (which is what's plugged in) to 7.1 surround in the Gnome settings 'test' utility. lm_sensors also now reports an error: ERROR: Can't get value of subfeature energy1_input: Kernel interface error energy1: N/A This is repeated 25 times (energy1, energy2... etc). As requested on the Wiki page, here is the vulnerability output from the end of the test: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rhachey VirtualBox: oracle 6.1.16 R140961 [1] 1. ./default/cachedrop PASS ./default/insert_leap_second FAIL ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL
rimuru VM: GNOME BOXES, cpu 4, memory 2GB [1] 1. LGTM bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/cachedrop PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/stack-randomness PASS ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/memfd PASS Test suite complete PASS
robbinespu Virtualization: oracle (virtualbox 6.1.16. r140961) , Kernel: Linux 5.10.4-200.fc33.x86_64, Architecture: x86-64 [1] 1. $ cat kernel-test-1609405976.log.txt Date: Thu Dec 31 05:12:56 PM +08 2020 Test set: default Kernel: 5.10.4-200.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: FAIL Failed Tests: ./default/insert_leap_second Warned Tests: None ============================================================ Starting test ./default/stack-randomness Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/paxtest Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/insert_leap_second Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0561409 s, 1.9 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00455177 s, 2.3 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/libhugetlbfs Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... [OK] Check timer_create() per process... [OK] Starting test ./default/sysfs-perms Starting test ./default/timer-overhead Starting test ./default/selinux-dac-controls
rootxaman description: Computer product: Standard PC (Q35 + ICH9, 2009) vendor: QEMU version: pc-q35-5.1 width: 64 bits capabilities: smbios -2.8 dmi-2.8 smp vsyscall32 configuration: boot=normal [1] 1. 1. All tests passed
sbakker Fedora 33, DELL XPS 13 9310, nvme SSD, AX500 DBS WiFi [1] 1. WiFi does not survive suspend/resume cycle; can "rmmod" the ath11k_pci module which takes a long while, then reload it. Note that the 5.11 (rc2) kernel from Rawhide does not have this problem.
sgraf (1) Virtual Machine, (2) NUC10i7FNH [1] 1. #1911836, Bug 1911836 - Cannot boot kernel 5.10 on Silverblue
shiwanibiradar Lenevo ideapad330 KVM 2Gb fedora33 [1] 1. All test passed
siddharthvipul1 F32 on Thinkpad T480s [1] 1. Test Suite completed with "PASS"
siddy555 Virtualbox,Acer Aspire A515-51g, Intel i5 7200U 1 core, 2048 / 7837 MB memory, 30 GB VDI. Test Day Image F33, kerneltest-5.10.4.iso [1] 1. Didn't go through "insert_leap_second" test for lot of time pressed ctrl+c, rest all tests passed. Performance tests passed.
simon13
skontar ThinkPad L440, Intel Pentium 3550M, RAM 3.56 GiB used: 602.2 MiB (16.5%) [1] 1. #1908736, Used test image. Cachedrop test FAILED. GPU hangs when opening Firefox or running "Install to hard drive", seems to be the same as https://bugzilla.redhat.com/show_bug.cgi?id=1908736 . Also on start it seems to hang once, you can see random garbage on the screen for a while instead of the grub menu, then it starts. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
smearumi Lenovo G40, Core i5, 8GB RAM, 128SSD [1] 1. Test suite called with default ./default/modsign PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/paxtest SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/memfd PASS ./default/libhugetlbfs SKIP ./default/selinux-dac-controls PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS Test suite complete PASS 5511MB OK 5511MB OK 5511MB OK mhz: should take approximately 297 seconds Using config in CONFIG.localhost.localdomain Sun Jan 10 06:44:24 PM +06 2021 Latency measurements Sun Jan 10 06:52:08 PM +06 2021 Calculating file system latency Sun Jan 10 06:55:56 PM +06 2021 Local networking Sun Jan 10 07:01:31 PM +06 2021 Bandwidth measurements Sun Jan 10 08:11:43 PM +06 2021 Calculating context switch overhead Sun Jan 10 08:24:37 PM +06 2021 ./performance/lmbench3 PASS Test suite complete PASS
sumantrom KVM , Kernel Test Week iso, 4GB RAM 2vCPU [1] 1. All works fine with test suite called with "default"
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb Ram [1] 1. All tests passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
t3rm1n4l Dell Inspiron 3180 11" [1] [2] 1. all tests passed on 5.10.5, previous bug is resolved
2. #1911043, all tests pass. Bug can be worked around with amdgpu.dc=0, also happened with 5.10.2-200 (x86_64). have been running 5.10.2 for over a week with no issues (aside from the amdgpu bug). I have no issues on either of the intel desktops I have access to. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
thunderbirdtr 16 × Intel® Core™ i7-10875H CPU @ 2.30GHz / Nvidia RTX 2070 Super / 32GB RAM [1] 1. Tests are ok and nvidia works as well.
troycurtisjr Dell XPS 17 9700 - i7-10875H - GeForce RTX 2060 Max-Q - 16GB Ram [1] 1. #1911364, Tests all passed. Kernel booted fine, no functional issues noted, only the install warning noted with Bug 1911364. Nvidia module working, external monitor works well. Firefox stable and runs video smoothly.
trugul Thinkpad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4 , 8 GB RAM, Intel® HD Graphics 4400 (HSW GT2), HDD 128 GB [1] 1. I cannot see that my log file was uploaded, hence this manual input. [truls@localhost kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... [truls@localhost kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.localhost.localdomain Thu Jan 7 12:38:14 PM CET 2021 Latency measurements Thu Jan 7 12:39:20 PM CET 2021 Calculating file system latency Thu Jan 7 12:39:21 PM CET 2021 Local networking Thu Jan 7 12:43:02 PM CET 2021 Bandwidth measurements Thu Jan 7 12:48:15 PM CET 2021 Calculating context switch overhead Thu Jan 7 12:48:19 PM CET 2021 ./performance/lmbench3 PASS Test suite complete PASS
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO) [1] 1. 1. Default test passed. Performance test passed. No new warnings or errors in dmesg.
udb28 KVM , Kernel Test Week iso, 10GB RAM 4vCPU [1] 1. Test suite with default PASSED Test suite with performance PASSED
uwueviee Fedora 33 i7 3770 AMD R9 380 Bare Metal [1] 1. cachedrop failed, sysfs-perms warned
vascom Ryzen 7 4750G, 32GB RAM
vishald description: CPU product: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz vendor: Intel Corp. physical id: 2c bus inf o: cpu@0 version: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz serial: NULL slot: SOCKET 0 size: 1405MHz capacity: 2GHz width: 64 bits clock: 100MHz [1] 1. All test passed
vty67 Dell Latitude E6320, 2GB, i3-2330M [1] 1. Sound, network, WiFi, suspend, resolution change of external monitor/TV (HDMI connected) - everything seems to be OK
vty67 Thinkpad T440p, 16GB, i5-4300M [1] 1. Everything seems to work, but changing external monitor/TV resolution (connected via HDMI) in Gnome Settings locks up system: mouse cursor freezes, no keyboard input possible.
xompax [1] 1. Test suite called with default ./default/selinux-dac-controls PASS ./default/cachedrop PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/insert_leap_second PASS ./default/stack-randomness PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/sysfs-perms PASS ./default/modsign PASS ./default/posix_timers PASS ./default/paxtest SKIP Test suite complete PASS
xunjin AMD Ryzen 7 3800X 8-Core Processor, 16GiB System Memory, CT1000P1SSD8, RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller [1] 1. All tests passed :)
Wiki Metadata