From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 41: Line 41:
== Test Results ==
== Test Results ==


=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:JeremyM|JeremyM]]
| Sony Vaio Intel i5
| {{result|pass}}<ref>Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/ so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "</ref>
| <references/>
|-
| [[User:MidnightRAT|MidnightRAT]]
| Fedora 30 stock
| {{result|pass}}<ref>Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel
uname -a
Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
What can i do ti check my system?
Thanks.</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Baremetal i5-7400 8GB RAM
| {{result|pass}}<ref>Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU
| {{result|pass}}<ref>Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| RPi3 armv7hl
| {{result|pass}}<ref>Test suite called with destructive
</ref>{{result|pass}}<ref>Test suite called with default</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Scaleway START1-XS x86_64 cloud instance
| {{result|pass}}<ref>Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| aarch64 on KVM
| {{result|pass}}<ref>Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| vmware 4GB ram 2vcpu
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM
| {{result|warn}}<ref>Standard: https://apps.fedoraproject.org/kerneltest/logs/34940
sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest PASS
Performance: https://apps.fedoraproject.org/kerneltest/logs/34942
All PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
</ref>
| <references/>
|-
| [[User:archmunky|archmunky]]
| Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM
| {{result|pass}}<ref>runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS</ref>
| <references/>
|-
| [[User:atim|atim]]
| CPU: Quad Core AMD Athlon X4 845 | GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30
| {{result|pass}}<ref>Test suite called with default - PASS (except paxtest as always)
Test suite called with performance - PASS
</ref>
| <references/>
|-
| [[User:benjamind|benjamind]]
| VMware Workstation on Fedora 30 host (i7-6500U)
| {{result|pass}}<ref>cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately</ref>
| <references/>
|-
| [[User:calinoiualex|calinoiualex]]
| Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz
| {{result|pass}}<ref>1. Pass
2. Pass
Ran with performance argument
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes);
| {{result|pass}}<ref>Ran trinity testings and scheduler testings suits. </ref>
| <references/>
|-
| [[User:danniel|danniel]]
| KVM
| {{result|pass}}<ref>works </ref>
| <references/>
|-
| [[User:dinostar|dinostar]]
| Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop
| {{result|pass}}<ref>The following test was skipped, everything else was a pass.
./default/libhugetlbfs                                          SKIP</ref>
| <references/>
|-
| [[User:eboswell|eboswell]]
| Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory
| {{result|pass}}<ref>Test suite called with performance. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
</ref>{{result|pass}}<ref>Test suite called with default. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:glb|glb]]
| Bare metal, Core i7-920, 12GB RAM
| {{result|pass}}<ref>All default test suite passed.</ref>
| <references/>
|-
| [[User:goodmirek|goodmirek]]
| bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4
| {{result|pass}}<ref>KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.</ref>
| <references/>
|-
| [[User:heffer|heffer]]
| ThinkPad X1 Carbon 5th
| {{result|fail}}<ref>WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577
Works fine with kernel-5.1.18-300.fc30.x86_64</ref>{{result|fail}}<ref>{{bz|1724357}} Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357</ref>
| <references/>
|-
| [[User:idanka|idanka]]
| Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 /  GeForce GTX 1050
| {{result|warn}}<ref>./default/libhugetlbfs SKIP ./default/paxtest FAIL  all other pass
thirdparty/nvidia-module  error
performance: fatal error: rpc/rpc.h: No such file or directory</ref>
| <references/>
|-
| [[User:jlanda|jlanda]]
| bare metal ryzen 5 1600x
| {{result|pass}}
| <references/>
|-
| [[User:kiyer|kiyer]]
| Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk
| {{result|pass}}
| <references/>
|-
| [[User:kparal|kparal]]
| Thinkpad T480s, Fedora 30
| {{result|pass}}
| <references/>
|-
| [[User:lewis41|lewis41]]
| i5-6500 CPU @ 3.20GHz
| {{result|pass}}
| <references/>
|-
| [[User:lewis41|lewis41]]
| i5-6500 CPU @ 3.20GHz - 8GB RAM
| {{result|pass}}
| <references/>
|-
| [[User:lnie|lnie]]
| ProLiant SL4545 G7
| {{result|pass}}
| <references/>
|-
| [[User:luya|luya]]
| HP Envy x360 15-cp0xxx (Ryzen 2500U APU)
| {{result|pass}}<ref>Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.</ref>
| <references/>
|-
| [[User:masami|masami]]
| Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630
| {{result|pass}}<ref>Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days,  didn't get any kernel oops/warnings.</ref>
| <references/>
|-
| [[User:masami|masami]]
| Raspberry Pi 3B+ aarch64
| {{result|pass}}<ref>kernel regression tests passed. </ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Fedora 30 T480s i5-8250U iGPU
| {{result|pass}}
| <references/>
|-
| [[User:mimat|mimat]]
| fedora 30@i7-2630QM
| {{result|pass}}
| <references/>
|-
| [[User:mizhang|mizhang]]
| Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2
| {{result|pass}}
| <references/>
|-
| [[User:mizhang|mizhang]]
| Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64
| {{result|pass}}<ref>LTP from upstream
sched pass, syscalls failed with case move_pages12,  can pass, cve pass, commands pass, containers pass, dio pass
fs pass, fsx pass, math pass, hugeltb pass, mm  failed with case ksm06_1 and ksm06_2 , numa  failed with case move_pages12  , nptl pass, pty pass,timers pass, ipc pass, tracing pass</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-3317U CPU @ 1.70GHz × 4
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i5-7200U CPU @ 2.50GHz × 4
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:monot0m|monot0m]]
| Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling</ref>
| <references/>
|-
| [[User:nah Fam|nah Fam]]
| vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu
| {{result|warn}}<ref>Test 1
./default/cachedrop                                              FAIL     
Test suite complete                                              FAIL 
Test 2
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:nightromantic|nightromantic]]
| Bare metal, desktop, F30@Intel i3-8100
| {{result|warn}}<ref>./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS".
./runtests.sh -t performance -- "PASS"</ref>
| <references/>
|-
| [[User:numasan|numasan]]
| HP EliteBook 820 G4
| {{result|pass}}<ref>Test set: default</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr
| {{result|pass}}<ref>./default/libhugetlbfs skipped as usual, default and performance passed.</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F30 KDE, Skylake laptop on kernel 4.2.2 from koji
| {{result|pass}}<ref>./default/libhugetlbfs skipped, default and performance passed. </ref>
| <references/>
|-
| [[User:pmeyer|pmeyer]]
| AMD® Athlon(tm) ii x2 250 processor × 2
| {{result|pass}}<ref>file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Banana Pi (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Mustang (xgene-1)
| {{result|pass}}<ref>make not installed on first run. Second attempt passed - https://apps.fedoraproject.org/kerneltest/logs/34914</ref>{{result|fail}}<ref>https://apps.fedoraproject.org/kerneltest/kernel/5.2.2-200.fc30.aarch64</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Pine 64 Plus (aarch64 sbc)
| {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34917</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Raspberry Pi 3B+ (armhfp)
| {{result|pass}}
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Trimslice (armhfp)
| {{result|warn}}<ref>Test suite complete - WARN
https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| <references/>
|-
| [[User:pwhalen|pwhalen]]
| Wandboard Quad (armhfp)
| {{result|pass}}<ref>https://apps.fedoraproject.org/kerneltest/logs/34921</ref>
| <references/>
|-
| [[User:ralex|ralex]]
| Ryyzen 2600x | 16 GB Ram | Nvidia GTX 1080
| {{result|pass}}<ref>Default passed (https://apps.fedoraproject.org/kerneltest/logs/35167)
Performance passed (https://apps.fedoraproject.org/kerneltest/logs/35168)</ref>
| <references/>
|-
| [[User:rammodulus|rammodulus]]
| Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration.
| {{result|fail}}<ref>Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling</ref>
| <references/>
|-
| [[User:rudrapratap|rudrapratap]]
| qemu-kvm-3.0.1-3.fc29.x86_64 , base -  fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64
| {{result|pass}}<ref>Test suite called with default
./default/posix_timers                                          PASS   
./default/sysfs-perms                                            PASS   
./default/selinux-dac-controls                                  PASS   
./default/paxtest                                                PASS   
./default/memfd                                                  PASS   
./default/stack-randomness                                      PASS   
./default/cachedrop                                              PASS   
./default/mq-memory-corruption                                  PASS   
./default/modsign                                                PASS   
./default/libhugetlbfs                                          SKIP   
./default/insert_leap_second                                    PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS  </ref>
| <references/>
|-
| [[User:salimma|salimma]]
| Bare metal: Thinkpad T480s
| {{result|pass}}<ref>Default and performance profiles pass</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| T470s
| {{result|pass}}<ref>Called with default</ref>
| <references/>
|-
| [[User:tmlgcq|tmlgcq]]
| QEMU with KVM Virtual
| {{result|pass}}
| <references/>
|-
| [[User:tmsp|tmsp]]
| Ryzen 1800X; 16 GB RAM; F30
| {{result|pass}}
| <references/>
|-
| [[User:user|user]]
| default
| {{result|pass}}
| <references/>
|-
| [[User:vascom|vascom]]
| Bare metal, Core i7-4470, 32GB RAM
| {{result|pass}}<ref>All good.</ref>
| <references/>
|-
| [[User:weswilliams|weswilliams]]
| VMware Workstation 15.1.0 on Fedora 30 host
| {{result|pass}}<ref>All default test suite passed.</ref>
| <references/>
|-
|}


   
   
[[Category:Fedora 31 Test Days]]
[[Category:Fedora 31 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)