From Fedora Project Wiki

Kernel 5.13 Test Week
Test-days-banner.svg

Date 2021-07-11 to 2021-07-18
Time all week

Website QA/Test Days
IRC #fedora-test-day[?] on Libera
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

This Test Day will focus on the 5.13 Linux kernel. The primary aim is as a rebase candidate for Fedora 35 and 34 and 33.

Who's available[edit]

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:

You can chat with us on IRC. See the infobox on top of the page to learn the right IRC channel.

Prerequisite for Test Day[edit]

  • A fully updated F34 test day image or Fedora 33 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.13 kernel for an existing installation from F34 koji (see below) or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users).
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

Koji download instructions[edit]

Kernel builds can be downloaded from Koji using a command-line tool.

Install Koji if not installed:

sudo dnf install koji

You can list available kernel builds with:

koji list-builds --package=kernel --after="2021-07-13" | grep "5.13"

Download the 5.13 kernel build you wish, for example kernel-5.13.2-300.fc34:

koji download-build --arch=x86_64 kernel-5.13.2-300.fc34

Update your kernel:

sudo dnf update kernel-*.rpm

And reboot.

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

Note to Virtualbox users: By default, the insert_leap_second test will fail, this is because Virtualbox syncs the guest time with the host in the middle of the test. This is not a kernel or test suite failure, it is a Virtualbox design issue. It should skip this test if your kernel-tests repo has been updated since 2021-07-09.

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
Daniels QEMU Standard PC _Q35 + ICH9, 2009_
Pass pass
Fabrizio Curcio KVM Guest F34 on Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz with 16GB RAM (Live Image)
Pass pass
Luigi Votta Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz RAM: 16 GB Asus H170-PRO
Pass pass
Typijay Dell Latitude E6540 i5-4310M
Pass pass
abstractobject https://linux-hardware.org/?probe=2c4c458feb
Pass pass
alciregi KVM on Proxmox VE, x86_64, UEFI
Pass pass
[1]
  1. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi KVM on Proxmox VE, x86_64, bios
Pass pass
alciregi Lenovo V330-15IKB Type 81AX
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo X1 Crabon gen 8
Pass pass
[1]
  1. 5.13.2-300.fc34.x86_64 Test suite called with performance Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Pinebook Pro
Pass pass
[1]
Fail fail
[2]
alciregi Raspberry Pi 3 aarch64 no GUI
Pass pass
[1]
  1. WiFi works. Bluethoot not tested. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
amolenaar Lenovo X1 Carbon 7th / Lenovo X1 Carbon 9th
Pass pass
anantj12 Macbook Pro 2019 - Virtualbox
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ananya26-vishnoi Hp-14s er0003tu Virtual Box
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
ananya26-vishnoi Hp-14s er0003tu Virtualbox
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
andilinux KVM libvirt
Pass pass
[1]
  1. tested on F34 KDE
andilinux Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
Pass pass
[1]
  1. 1. basic set of tests - result: fail 2. performance test suite - result: pass
andilinux Operating System: Fedora 33 KDE Plasma Version: 5.20.5 KDE Frameworks Version: 5.79.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc33.x86_64 OS Type: 64-bit Processors: 2 × AMD EPYC-Rome Processor Memory: 9.5 GiB of RAM Graphics Processor: llvmpipe
Pass pass
andilinux Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.1-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
Pass pass
[1]
  1. -
andilinux Operating System: Fedora 34 KDE Plasma Version: 5.22.3 KDE Frameworks Version: 5.83.0 Qt Version: 5.15.2 Kernel Version: 5.13.2-300.fc34.x86_64 (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i3-2350M CPU @ 2.30GHz Memory: 7.7 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 3000
Pass pass
atim CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
Pass pass
bacbka Virt-manager
Fail fail
[1]
  1. Cachedrop test was failed.
bandithijo https://linux-hardware.org/?probe=3e43acf8af
Pass pass
[1]
bandithijo https://linux-hardware.org/?probe=63d761d915
Pass pass
[1]
belegdol ASUS ZenBook 14 UM425IA
Pass pass
[1]
  1. Regression and performance tests passed, modern standby is finally working on my machine without the need for additional patches.
belegdol ASUS ZenBook 14 UM425IA Ryzen 5 4500U 16 GB RAM
Pass pass
[1]
  1. Modern standby is finally working on my machine without the need for additional patches.
bittin HP 655
Warning warn
[1]
Pass pass
[2]
Warning warn
[3]
Pass pass
Pass pass
Pass pass
Pass pass
Pass pass
Pass pass
Pass pass
  1. Took Sunday off
  2. Took Sunday off
  3. Took Saturday off
bittin Virtualbox
Warning warn
[1]
Warning warn
[2]
Fail fail
Pass pass
Pass pass
Fail fail
Pass pass
Pass pass
Pass pass
  1. Took Sunday off
  2. Took Saturday off
bkircher Lenovo ThinkPad T490s, Intel(R) Core(TM) i5-8365U
Pass pass
[1]
  1. Both passed
bojan Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.13.2-300.fc34.x86_64
Pass pass
[1]
Pass pass
  1. Default and performance tests passed on both machines.
bretth 5.13.1 KVM - 2CPU, 2GB RAM, Q35 chipset
Pass pass
[1]
  1. Default & performance tests pass
bretth 5.13.2 KVM - 2CPU, 2GB RAM, Q35 chipset
Pass pass
[1]
  1. Default & performance tests pass
bruno Inspiron 1545
Pass pass
[1]
  1. RHBZ #1982213 There is a pause during boot that isn't there for 5.12 and earlier kernels. There was a warning for ./default/sysfs-perms. Otherwise things seem to be working OK.
bruno MacBookAir4,2
Pass pass
[1]
  1. There was a warning for ./default/sysfs-perms. The system seems to function normally.
buckaroogeek Raspberry PI 4, 5.13.1-300.fc34.aarch64
Pass pass
[1]
  1. stack-randomness, libhugetlbfs, paxtest have result SKIP. otherwise PASS.
buckaroogeek kvm-libvvirt, x86_64, AMD EPYC Processor (with IBPB)
Pass pass
[1]
  1. ./default/libhugetlbfs, ./default/paxtest, ./default/insert_leap_second have result SKIP; otherwise PASS
clnetbox
Fail fail
[1]
  1. CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getiing stuck at "Initializing nvidia-drm". Tested drivers : 460/465/470
clnetbox Intel Core i7-10875H | 2 x 16 GB (32 GB) DDR4-3200 Crucial | 2 x 500 GB M.2 Samsung 970 EVO Plus | 1 TB Samsung 870 EVO | NVIDIA GeForce RTX 2070 Mobile (Refresh) | Fedora 34 Workstation | GNOME 40
Fail fail
[1]
  1. CLEVO PB70/71 based notebook with MUX design : Kernels 5.13.1 and 5.13.2 don't boot into GUI in DISCRETE mode - getting stuck at "Initializing nvidia-drm". Tested drivers : NVIDIA 460/465/470
condor Virt-manager
Fail fail
[1]
  1. The cachedrop test failed.
coolomatics Gigabyte Technology Co., Ltd. A520M S2H, AMD® Ryzen 5 3600 6-core processor × 12
Fail fail
[1]
  1. RHBZ #445408 RHBZ #442544 /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
coolomatics Lenovo ThinkPad X240, Intel® Core™ i5-4300U CPU @ 1.90GHz × 4
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
copperi 5.13.1-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
Pass pass
csutter Dell XPS 9310 i7-1185G7 32GB (Live Image)
Pass pass
[1]
  1. Regression and performance tests pass
danniel lenovo ideapad S145 I7-8565U 8GB
Pass pass
dhugh ASUS TUF A17 FA706IU_TUF706IU, AMD® Ryzen 7 4800h, 16 GB MEM
Pass pass
donaldsebleung Kernel 5.13.1; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
Pass pass
donaldsebleung Kernel 5.13.2; Hardware: QEMU Standard PC _Q35 + ICH9, 2009_, 2.4GiB memory, Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
Pass pass
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F34
Pass pass
evillagr KVM, x86_64, Test Day IOS updated
Pass pass
flash2071 https://linux-hardware.org/?probe=731361283a
Pass pass
[1]
  1. After `sudo ./runtests.sh` were 2 skips: ./default/libhugetlbfs SKIP ./default/paxtest SKIP
geraldosimiao kernel-5.13.1-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
Pass pass
[1]
  1. All tests PASSED, no regressions found.
geraldosimiao kernel-5.13.2-300.fc34 on Acer Aspire V3-571 v: V2.11 Quad Core Intel Core i7-3632QM
Pass pass
[1]
  1. no regressions found. kernel kernel-5.13.2-300.fc34
glennzo Fedora 34 Workstation / VirtualBox / Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz
Fail fail
[1]
  1. ./default/timer-overhead FAIL
gtwilliams XPS-13
Pass pass
hmorish fedora34, intel core i7-3630QM, RAM8GB, GNOME-Boxes-VM
Pass pass
hyphop Aarch64 amlogic meson khadas VIM3
Warning warn
[1]
  1. RHBZ #123123123 VIM3 soundcard cant works without CONFIG_COMMON_CLK_AXG_AUDIO=m|y grep CONFIG_COMMON_CLK_AXG_AUDIO /boot/config-5.1* /boot/config-5.11.12-300.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.13.13-200.fc34.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set /boot/config-5.14.2-300.fc35.aarch64:# CONFIG_COMMON_CLK_AXG_AUDIO is not set
ibims VirtualBox 6.1.22
Pass pass
[1]
  1. ./default/modsign PASS ./default/memfd PASS ./default/mq-memory-corruption PASS ./default/cachedrop PASS ./default/posix_timers PASS ./default/selinux-dac-controls SKIP ./default/paxtest SKIP ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/stack-randomness PASS ./default/timer-overhead PASS ./default/insert_leap_second SKIP Test suite complete PASS
itrymybest80 x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 21.1.4-1) & 970 EVO M.2
Pass pass
[1]
  1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
jnk0 Thinkpad T580, 32 GB RAM, Intel i7-8650U CPU
Pass pass
kernel tester Desktop i5-6600 bare metal, HD Graphics 530 (Skylake GT2), 16GB RAM, with F34 5.13.1 test day image
Pass pass
[1]
  1. Default and Performance passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
kernel tester Laptop i5-7200U bare metal, 4GB RAM, HD Graphics 620 (Kaby Lake GT2), with F34 5.13.1 test day image
Pass pass
[1]
  1. Default and performance tests passed.
leekaize ASUS X556UR 5.13.2-300.fc34.x86_64
Pass pass
[1]
  1. ./default/sysfs-perms WARN. Found world-writable files in sysfs. /sys/kernel/debug/ieee80211/phy0/rc/fixed_rate_idx
leekaize https://linux-hardware.org/?probe=477a92a37e
Pass pass
[1]
  1. ./default/sysfs-perms WARN Reason of WARN status not indicated.
levait Lenovo Thinkpad X230
Pass pass
[1]
levait https://linux-hardware.org/?probe=a70e5b8b1d
Pass pass
[1]
lily ampere hr330a
Pass pass
[1]
  1. all default and performance testcases passed
lily ampere hr350a
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per7415
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per805
Pass pass
[1]
  1. all default and performance testcases passed
lily fujitsu fx700
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe apache
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe dl120gen10
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe dl360g5
Pass pass
[1]
  1. all default and performance testcases passed
lily ibm x3250m4
Pass pass
[1]
  1. all default and performance testcases passed
lily lenovo rd230
Pass pass
[1]
  1. all default and performance testcases passed
lily lenovo sr655
Pass pass
[1]
  1. all default and performance testcases passed
lily qualcomm amberwing
Pass pass
[1]
  1. all default and performance testcases passed
lily rdma dev
Pass pass
[1]
  1. all default and performance testcases passed
malucious Test Image.Qemu guest. Host: i7-6700K. Asus Z170A.
Pass pass
[1]
  1. /default/libhugetlbfs, and default/paxtest were skipped in the first test.
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F34 Workstation, kernel 5.13.1-300.fc34.x86_64
Pass pass
[1]
  1. All tests passed. no regressions noted. Works fine for daily use.
max_rodriguez Latest VirtualBox VM (Live 5.13.1 Kernel Testing Media): Intel i7-8750H @ 2.200GHz (2 Cores Given), 2048 MB RAM, 15GB Virtual Disk.
Fail fail
[1]
  1. Default Test Suite : PASS [LGTM] Performance Test Suite : FAIL [Crashed 3 times during testing, first run gave multiple GCC warnings if thats normal?]
mbfedora
Pass pass
mborland1 Intel i5-10500 w/32 GB RAM
Pass pass
mcrts https://linux-hardware.org/?probe=eb857365c7
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
merkaba Lenovo ThinkPad T440p
Pass pass
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.13.1-300.fc34.x86_64
Pass pass
[1]
  1. All tests PASSED, no regressions found.
mpearson Lenovo P1G3
Warning warn
[1]
Pass pass
  1. The tests passed - but I seem to be having suspend/resume issues. Nothing obvious in the kernel logs so far - but it's not always coming back from resume. I'll do some more digging but wanted to flag it. Also on dock hotplug the USB hub in the dock isn't detected
mpearson Lenovo T14 AMD G1
Pass pass
mpearson Lenovo X1 nano
Pass pass
mpearson Lenovo X13 G1 AMD
Pass pass
mpearson X1 Carbon G9
Pass pass
mythcat https://linux-hardware.org/?probe=7b4c090391
Pass pass
mzink Lenovo T480s F34 - 5.13.1-300.fc34.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
nhfed kerneltest-5.13.1.iso on bare metal Lenovo X1C9
Pass pass
[1]
  1. Default & performance tests passed.
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 BIOS
Pass pass
nitsharma Virt-manager - boxes
Fail fail
[1]
Fail fail
[2]
  1. ./runtests.sh Failed | /default/cachedrop FAIL ./runtests.sh -t performance Passed sudo semanage boolean -m --off selinuxuser_execheap | cant load memory | SELinux: Could not load policy file /etc/selinux/targeted/policy/policy.32: Cannot allocate memory /sbin/load_policy: Can't load policy: Cannot allocate memory libsemanage.semanage_reload_policy: load_policy returned error code 2. (No such file or directory).
  2. ./default/cachedrop FAIL
norbertj Testday image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Testday image on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
nvisscher Acer Aspire A515-55-576K (Intel Core i5(TM) 1035G1, 8 GB DDR4, Intel UHD Graphics)
Pass pass
[1]
  1. Set getlist and getsummary (in performance/lmbench3/scripts) as executable before performance test. Vulnerabilities (compacted): itlb_multihit:KVM: Mitigation: VMX disabled spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
nvisscher Live test image on Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz, 6 GB DDR3, AMD Radeon HD7850
Pass pass
[1]
  1. Both passed. Performance test suite passed despite errors: /bin/sh: line 1: ../scripts/getlist: Permission denied /bin/sh: line 1: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
oturpe Lenovo ThinkPad X230
Pass pass
prasant1998 Nitro AN515-42,Oracle
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
pwhalen AMD Seattle (AArch64)
Pass pass
pwhalen APM Mustang X-Gene-1 (AArch64)
Pass pass
[1]
Pass pass
  1. 5.13.2-300.fc34.aarch64
pwhalen Nvidia Jetson Xavier NX (aarch64)
Pass pass
[1]
Pass pass
  1. 5.13.2-300.fc34.aarch64
pwhalen Raspberry Pi 2 Model B (armhfp)
Pass pass
pwhalen Raspberry Pi 3 Model B Rev 1.2 (AArch64)
Pass pass
[1]
Pass pass
  1. 5.13.2-300.fc34.aarch64
pwhalen Raspberry Pi 4 4GB (aarch64)
Pass pass
[1]
  1. 5.13.2-300.fc34.aarch64
pwhalen Wandboard Quad (armhfp)
Pass pass
pwhalen fujitsu-fx700 (aarch64)
Pass pass
[1]
Pass pass
  1. 5.13.2-300.fc34.aarch64
quiet HW mode: QEMU Standard PC _Q35 + ICH9, 2009_, Memory 6.4 GiB, CPU Intel® Core™ i7-8665U CPU @ 1.90GHz × 8, GPU llvmpipe (LLVM 12.0.0, 256 bits), Fedora 34 64-bit, GNOME 40.1.0, Wayland, KVM
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled ./performance/lmbench3 PASS Test suite complete PASS
rai510 Gnome Boxes
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rai510 Virtualbox
Fail fail
[1]
  1. Test suite called with default ./default/stack-randomness PASS ./default/insert_leap_second SKIP ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/posix_timers PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP Test suite complete FAIL Your log file is located at: /home/liveuser/kernel-tests/logs/kernel-test-1625868855.log.txt Submit your results to: https://apps.fedoraproject.org/kerneltest/ The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rfm83 HP Laptop 14-cf0xxx - Intel Core i5-8250U - 16GB - KVM virtual machine - test day image Fedora 34
Pass pass
rimuru VirtualBox 6.1, Intel i5
Pass pass
[1]
  1. Default lgtm!
roushan Tested on latest VirtualBox. Image- kerneltest-5.13.1.iso (1.97 GB), 3 GB RAM, Boot Order - Floppy, Optical, Hard Disk, 8 GB data disk vdi
Pass pass
[1]
  1. Skipped 3 tests in virtualbox 1. insert_leap_second, 2. libhugetlbfs 3. paxtest
sammy Fedora 34 test bench running in gnome box. Host OS is Fedora 34 running on HP 240 g8 notebook with 10th gen i3 processor, 8gb ram, 1TB hdd.
Fail fail
[1]
Fail fail
[2]
  1. Date: Tuesday 13 July 2021 05:43:59 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: FAIL Failed Tests: ./default/cachedrop Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Date: Tuesday 13 July 2021 05:48:37 PM IST Test set: performance Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: RESULTHOLDER
  2. Date: Tuesday 13 July 2021 05:25:07 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: FAIL Failed Tests: ./default/cachedrop
sammy contributor tester
Pass pass
[1]
  1. RHBZ #0 Date: Saturday 10 July 2021 04:16:20 PM IST Test set: default Kernel: 5.13.1-300.fc34.x86_64 Release: Fedora release 34 (Thirty Four) Result: PASS Failed Tests: None Warned Tests: None
sbertram Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz, Memory: 4096 MB, DISTRO=Fedora-34-20210424.n.0, 5.13.2-300.fc34.x86_64
Pass pass
sgraf qemu aarch64 VM on Apple M1, 5.13.1-300.fc34.aarch64
Pass pass
sp6ina Matebook 14 2020 AMD
Pass pass
stathisl Dell Inspirion 3542, Intel i3-4005U, 8GB, Intel HD 4400, Default Fedora Workstation 34 Gnome test image
Pass pass
[1]
  1. Both tests PASS (libhugetlibfs and paxtest SKIP)
stethewwolf Fedora server 34 4G Ram 2 core virtualized on KVM
Pass pass
stklcode KVM guest (F34 Host), Skylake-X CPU, 16GB RAM, Live Image
Pass pass
sumantrom lenovo T580, KVM
Pass pass
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
t3rm1n4l Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2
Fail fail
[1]
  1. all tests passed, but still no gui on nvidia driver.
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
Pass pass
[1]
Pass pass
[2]
  1. 5.13.2 all tests passed
  2. all tests passed, works for me
t3rm1n4l Dell Inspiron 3180 11"
Pass pass
[1]
Pass pass
[2]
  1. kernel 13.2 passed tests also
  2. all tests passed, noted the following segfault during testing: "lat_rpc[8552]: segfault at 1000 ip 00007fe965a99a7a sp 00007ffef0411ab8 error 4 in libc-2.33.so[7fe965a20000+14d000] [ 588.142109] Code: f3 0f 1e fa 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 66 <f3> 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83", no issues noted with kernel for daily use.
t3rm1n4l Fedora 33 i7-7700, NVIDIA GT710, 32Gb DDR4, Asus Q170M2
Fail fail
[1]
  1. RPMFUSION NVIDIA driver failed to provide gui on F33. Didn't perform regression tests.
tjuberg
Pass pass
troycurtisjr Dell XPS 17 9700 https://linux-hardware.org/?probe=592276c98f
Pass pass
[1]
  1. Both automated tests passed. Additionally the following worked well: bluetooth audio, smooth Minecraft play, Firefox browsing
udb28 Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4
Pass pass
udb28 Lenovo ThinkPad T430s Processor: Intel® Core™ i5-3320M CPU @ 2.60GHz × 4 Memory: 3.5 GiB
Pass pass
[1]
  1. 1. Default Test PASS 2. Performance Test PASS
ups1610 HP Pavilion 15-eg-0124tx
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vanquisher3498 VirtualBox running on HP AU-623tx
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
vascom Ryzen 7 4750G, 32GB RAM, 5.13.1-300.fc34.x86_64
Pass pass
vk2bea Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz / 16 GB RAM / NVIDIA GK107 [GeForce GT 740] (using Nvidia driver (akmod-nvidia) )
Pass pass
Pass pass
wayne6001 Intel NUC6i5SYK; Intel Core™ i5-6260U CPU @ 1.80GHz × 4; Mesa Intel Iris(R) Graphics 540 (SKL GT3); Memory 15.5 GiB; SSD 512.1 GB; OS Fedora 34 (Workstation Edition); OS Type 64-bit; Gnome 40.1.0; Wayland
Pass pass
[1]
  1. Both Passed
xfgusta VirtualBox 6.1.22_RPMFusion r144080
Pass pass
[1]
  1. No regression found
zwintabris
Pass pass