From Fedora Project Wiki

(Created page with "{{Infobox_group | name = '''Kernel 5.11 Test Week''' | image = 300px|link=QA/Test Days | date = '''2021-03-08 to 2021-03-15''' | time = all week...")
 
No edit summary
 
(5 intermediate revisions by 2 users not shown)
Line 28: Line 28:


* A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* A fully updated [https://jforbes.fedorapeople.org/testweek/ test day image] or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
* The 5.11 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=IDHERE F33 koji] (see below) or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
* The 5.11 kernel for an existing installation from [https://koji.fedoraproject.org/koji/buildinfo?buildID=1721236 F33 koji] (see below) or [https://copr.fedorainfracloud.org/coprs/jforbes/kernel-stabilization/ kernel-stabilization copr] if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
* Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
* Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
* Enough free space on HDD
* Enough free space on HDD


== Koji download instructions ==  
== Koji download instructions ==  
Kernel builds can be downloaded from Koji using a command-line tool:
Kernel builds can be downloaded from Koji using a command-line tool.


  koji download-build --arch=x86_64 kernel-5.11
Install Koji if not installed:
 
sudo dnf install koji
 
You can list available kernel builds with:
 
koji list-builds --package=kernel --after="2021-03-01"
 
Download the 5.11 kernel build you wish, for example kernel-5.11.3-50.fc33:
 
  koji download-build --arch=x86_64 kernel-5.11.3-50.fc33
 
Update your kernel:
 
sudo dnf update kernel-*.rpm
 
And reboot.


== How to test? ==
== How to test? ==
Line 52: Line 68:


== Test Results ==
== Test Results ==
=== Regression Test ===
{| class="wikitable" width=100%
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:CharDSon|CharDSon]]
| Hardware Model: ASUSTeK COMPUTER INC. X553MA, Processor: Intel® Celeron(R) CPU N2830 @ 2.16GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
| {{result|fail}}<ref>./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              FAIL   
./default/modsign                                                PASS   
./default/sysfs-perms                                            WARN   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:CharDSon|CharDSon]]
| Hardware Model: Dell Latitude 3380, Processor: Intel® Celeron(R) CPU 3865U @ 1.80GHz × 2, RAM 3.5 GiB, Kernel 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:CharDSon|CharDSon]]
| Hardware Model: HP ProBook 430 G6, Processor: Intel® Celeron(R) CPU 4205U @ 1.80GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:CharDSon|CharDSon]]
| Hardware Model: Lenovo ideapad 330-15IKB, Processor: Intel® Core™ i3-8130U CPU @ 2.20GHz × 4, RAM 7.7 GiB, Kernel 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:FreddyW|FreddyW]]
| Dell Latitude E5570, i5-6300U, 32GiB RAM, kernel-5.11.5-50.fc33.x86_64
| {{result|fail}}<ref>{{bz|1936171}} See https://bugzilla.redhat.com/show_bug.cgi?id=1936171 . System does not boot, kernel panic at sysinit.target. Only bootable with acpi=off.</ref>
| <references/>
|-
| [[User:Josevaldo|Josevaldo]]
| Kernel: 5.11.3-300.fc34.x86_64 CPU: Intel Xeon E5-2630L v3 @ 2.900GHz
| {{result|pass}}<ref>Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:Mario|Mario]]
| CPU: Intel Core i5-4210M CPU @ 2.60GHz x 4, GPU: NV117 / Intel HD Graphics 4600, Memory: 15,5GiB
| {{result|pass}}
| <references/>
|-
| [[User:Mario|Mario]]
| CPU: Intel Core i7-9700K CPU @ 3.60GHz x 8, GPU: NV168, Memory: 15,5GiB
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| F33 Raspberry Pi 3 headless aarch64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| F33 Raspberry Pi 4 8GB headless aarch64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Lenovo ThinkCentre M73z
| {{result|pass}}<ref>The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:alphacluster|alphacluster]]
| CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
| {{result|pass}}<ref>No issues reported</ref>
| <references/>
|-
| [[User:anamika|anamika]]
| Oracle VM, Kernel test week iso, 2GB RAM , 2vCPU
| {{result|fail}}<ref>1. Test suite called with "default"
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              FAIL   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
^C./default/insert_leap_second                                    FAIL   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              FAIL   
2. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bash-5.0$
3. Test suite called with default gets stuck at ./default/insert_leap_second
Even after leaving it for 1.5 hours and even after repetetive testing, this test case tends to fail.
Also, ./default/cachedrop shows a non-consistent record. I tested for the Test suite called with "default" 3 times, out of which the ./default/cachedrop FAILED 2 times and PASSED once.
However overall the Test suite called with "default" tends to FAIL on this mentioned system.</ref>{{result|pass}}<ref>All works fine with Test suite called with "performance".
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |  static psize;
      |        ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
  94 |  return;
      |  ^~~~~~
lib_sched.c:46:1: note: declared here
  46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
      | ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
  207 |  retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
      |            ^~~~~~~~~~~~~~~~~
lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
  231 |  retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
      |          ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  149 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  76 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  157 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  153 |    if (parallel <= 0) lmbench_usage(argc, argv, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  53 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
  167 |  static count = 0;
      |        ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  41 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  136 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  116 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  78 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  58 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  492 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  60 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  55 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/cc6WMMPY.o: in function `setup_names':
lat_fs.c:(.text+0x831): warning: the use of `tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  182 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  42 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  46 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  45 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  84 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  203 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  393 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  69 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  413 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  70 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  123 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  66 |    lmbench_usage(ac, av, usage);
      |    ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  39 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  204 |  lmbench_usage(ac, av, usage);
      |  ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  40 |    if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                      ^~~~~~~~~~~~~
expr: syntax error: missing argument after ‘*’
../scripts/config-run: line 199: [: -gt: unary operator expected
../scripts/config-run: line 204: [: -lt: unary operator expected
../scripts/config-run: line 208: [: -lt: unary operator expected
mhz: should take approximately 15 seconds
Using config in CONFIG.localhost-live
Wed Mar 10 02:31:00 PM EST 2021
Latency measurements
Wed Mar 10 02:31:45 PM EST 2021
Calculating file system latency
Wed Mar 10 02:31:59 PM EST 2021
Local networking
Wed Mar 10 02:36:21 PM EST 2021
Bandwidth measurements
Wed Mar 10 02:40:19 PM EST 2021
Calculating context switch overhead
Wed Mar 10 02:40:59 PM EST 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bash-5.0$
</ref>
| <references/>
|-
| [[User:anthonys53|anthonys53]]
| Dell Latitude E6438, Intel(R) Core(TM) i5-3380M CPU @ 2.90GHz, 8GB RAM
| {{result|pass}}<ref>When I first re-booted into the test kernel, kernel-5.11.3-50.fc33 on my FC32 machine, I had at least 6 Firefox tabs open from my daily driver kernel. I had no control over selecting or closing the individual tabs in the new kernel, so I simply closed the window. This anomaly did not recur.</ref>
| <references/>
|-
| [[User:anthonys53|anthonys53]]
| HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33
| {{result|pass}}<ref>Ran fine -- no remarks</ref>
| <references/>
|-
| [[User:astauss53|astauss53]]
| HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33, kernel-5.11.5-50.fc33
| {{result|pass}}<ref>All fine.</ref>
| <references/>
|-
| [[User:bhavdeep009|bhavdeep009]]
| Tester
| {{result|fail}}<ref>sudo ./runtests.sh -t performance
...
1381MB ok
1381MB ok
1381MB ok
terminal crashes
Repeated this process 3 times.</ref>
| <references/>
|-
| [[User:binaryfever|binaryfever]]
| Virtual Machine: 4gb RAM, 4 cores
| {{result|fail}}<ref>insert_leap_second ran for nearly 4 hours with neither pass fail.  Killed it and the the rest of the tests passed. </ref>
| <references/>
|-
| [[User:bohrasd|bohrasd]]
| OS: Fedora 33 (KDE Plasma) x86_64 Host: ROG Zephyrus G14 GA401IV_GA401IV 1.0 Kernel: 5.11.4-50.fc33.x86_64 Uptime: 1 hour, 10 mins Packages: 2667 (rpm), 110 (nix-user), 1 (flatpak) Shell: zsh 5.8 Resolution: 2560x1440, 3360x1890 DE: i3 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 2888MiB / 15475MiB
| {{result|pass}}<ref>Date: Fri Mar 12 10:13:04 AM HKT 2021
Test set: default
Kernel: 5.11.4-50.fc33.x86_64
Release: Fedora release 33 (Thirty Three)
Result: PASS
Failed Tests: None
Warned Tests: None
============================================================
Starting test ./default/insert_leap_second
Setting time to speed up testing
Running for 1 iterations. Press ctrl-c to stop
Setting time to Sat Mar 13 07:59:50 2021
Scheduling leap second for Sat Mar 13 08:00:00 2021
Sat Mar 13 07:59:57 2021 +    113 us (37)      TIME_INS
Sat Mar 13 07:59:57 2021 + 500250 us (37)      TIME_INS
Sat Mar 13 07:59:58 2021 +    350 us (37)      TIME_INS
Sat Mar 13 07:59:58 2021 + 500491 us (37)      TIME_INS
Sat Mar 13 07:59:59 2021 +    630 us (37)      TIME_INS
Sat Mar 13 07:59:59 2021 + 500770 us (37)      TIME_INS
Sat Mar 13 07:59:59 2021 +    908 us (38)      TIME_OOP
Sat Mar 13 07:59:59 2021 + 501200 us (38)      TIME_OOP
Sat Mar 13 08:00:00 2021 +  1306 us (38)      TIME_WAIT
Sat Mar 13 08:00:00 2021 + 501407 us (38)      TIME_WAIT
Sat Mar 13 08:00:01 2021 +  1538 us (38)      TIME_WAIT
Sat Mar 13 08:00:01 2021 + 501784 us (38)      TIME_WAIT
Sat Mar 13 08:00:02 2021 +  1890 us (38)      TIME_WAIT
Leap complete
Starting test ./default/posix_timers
Testing posix timers. False negative may happen on CPU execution
based timers if other threads run on the CPU...
Check itimer virtual... [OK]
Check itimer prof... [OK]
Check itimer real... [OK]
Check timer_create() per thread... Diff too high: -78401484793..[FAIL]
Check timer_create() per process... [OK]
Starting test ./default/paxtest
Starting test ./default/libhugetlbfs
Starting test ./default/sysfs-perms
Starting test ./default/mq-memory-corruption
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Test PASSED
Starting test ./default/selinux-dac-controls
SELinux must be enabled for this test
Starting test ./default/modsign
Successfully loaded signed module
Successfully loaded unsigned module
Starting test ./default/timer-overhead
Starting test ./default/memfd
memfd: CREATE
memfd: BASIC
memfd: SEAL-WRITE
memfd: SEAL-SHRINK
memfd: SEAL-GROW
memfd: SEAL-RESIZE
memfd: SHARE-DUP
memfd: SHARE-MMAP
memfd: SHARE-OPEN
memfd: SHARE-FORK
memfd: SHARE-DUP (shared file-table)
memfd: SHARE-MMAP (shared file-table)
memfd: SHARE-OPEN (shared file-table)
memfd: SHARE-FORK (shared file-table)
memfd: DONE
Starting test ./default/cachedrop
100+0 records in
100+0 records out
104857600 bytes (105 MB, 100 MiB) copied, 0.0543299 s, 1.9 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
10+0 records in
10+0 records out
10485760 bytes (10 MB, 10 MiB) copied, 0.00350606 s, 3.0 GB/s
cat: /proc/sys/vm/drop_caches: Permission denied
./drop_caches.sh: line 32: [: -ne: unary operator expected
TestPASS: /proc/sys/vm/drop_caches PASS
Starting test ./default/stack-randomness
</ref>
| <references/>
|-
| [[User:bojan|bojan]]
| Lenovo ThinkPad T450s
| {{result|pass}}<ref>Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.</ref>
| <references/>
|-
| [[User:bojan|bojan]]
| Noname fanless PC with Intel Core i5-8250U
| {{result|pass}}<ref>Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| 5.11.4 (KVM)
| {{result|pass}}<ref>Default & performance tests pass</ref>
| <references/>
|-
| [[User:bretth|bretth]]
| 5.11.5 (KVM)
| {{result|pass}}<ref>Default & performance tests pass (KVM)</ref>
| <references/>
|-
| [[User:condor|condor]]
| virt-manager on f33 Workstation 2 virtual CPUs, 2048 memory. IvyBridge.
| {{result|fail}}<ref>The default cachedrop test failed!</ref>
| <references/>
|-
| [[User:copperi|copperi]]
| 5.11.4-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
| {{result|pass}}
| <references/>
|-
| [[User:danniel|danniel]]
| Acer Aspire E 16 intel core i7 5500, intel HD grafphics 5500 , 8 GB Memory
| {{result|pass}}<ref>Ok</ref>{{result|pass}}<ref>Ok</ref>
| <references/>
|-
| [[User:device|device]]
| Dell XPS 9380 Core i7-8565U, 8GB LPDDR3 2133MHz, 256GB M.2 PCIe NVMe, Killer 1435 802.11ac 2x2 & Bluetooth 4.1
| {{result|pass}}
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Test Day Image (kernel 5.11.3) in GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
| {{result|pass}}<ref>Default tests PASS (2 SKIP); performance tests PASS with multiple compiler warnings on implicitly declared lmbench_usage() and make error (permission denied) trying to enter ../scripts directory</ref>
| <references/>
|-
| [[User:donaldsebleung|donaldsebleung]]
| Test Day Image (kernel 5.11.4) on GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
| {{result|pass}}<ref>Default test suite PASS; performance test suite PASS with compiler warnings on lmbench_usage and permission denied trying to access ../scripts/get{list,summary}</ref>
| <references/>
|-
| [[User:drakkai|drakkai]]
| Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F32
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable</ref>
| <references/>
|-
| [[User:drakkai|drakkai]]
| Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F33
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable</ref>
| <references/>
|-
| [[User:dtometzki|dtometzki]]
| HOST: Lenovo ideapad 330s ; Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz; MEMORY: 8,0 GiB
| {{result|pass}}<ref>[damian@f33 linux]$ dmesg -l err --> No Errors
Linux f33 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Boot OK
</ref>
| <references/>
|-
| [[User:electronicsumit|electronicsumit]]
| Test day image on VM
| {{result|fail}}<ref>bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/modsign                                                PASS   
./default/cachedrop                                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/posix_timers                                          PASS   
./default/libhugetlbfs                                          SKIP   
./default/timer-overhead                                        PASS   
./default/mq-memory-corruption                                  PASS   
bash-5.0$ uname -a
Linux fedora 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
</ref>
| <references/>
|-
| [[User:emblaze|emblaze]]
| Raspberry Pi 4B 4GB
| {{result|pass}}<ref>{{bz|1918672}} Sound device no longer recognised whereas it is on 5.10.3 (suboptimal playback though)
Might need to reopen BZ 1918672
Default and performance tests suites run and passed with linux-firmware-20200918-112
linux-firmware-20210208-117.fc33 breaks WiFi on Raspberry Pi 4
https://bugzilla.redhat.com/show_bug.cgi?id=1934761 (Fix available upstream)
</ref>
| <references/>
|-
| [[User:emmrou|emmrou]]
| Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
| {{result|pass}}<ref>Wifi, bluetooth, sound and video worked fine.</ref>
| <references/>
|-
| [[User:evillagr|evillagr]]
| KVM, x86_64, 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              PASS   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:fuller|fuller]]
| testday-image on MacBook Air A1465
| {{result|pass}}<ref>sudo ./runtests.sh -t performance
...
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126</ref>
| <references/>
|-
| [[User:fuller|fuller]]
| testday-image on NUC7i5BNH
| {{result|pass}}
| <references/>
|-
| [[User:fuller|fuller]]
| testday-image on ThinkCentre M91
| {{result|pass}}<ref>sudo ./runtests.sh -t performance
...
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126</ref>
| <references/>
|-
| [[User:fuller|fuller]]
| testday-image on ZaReason i7 8th gen
| {{result|pass}}
| <references/>
|-
| [[User:garrmcnu|garrmcnu]]
| Test image on VM (KVM)
| {{result|pass}}<ref>Default and performance tests passed</ref>
| <references/>
|-
| [[User:georgm|georgm]]
| Lenovo E14 Gen 2, Intel(R) Core(TM) i7-1165G7, 5.11.5-50.fc33.x86_64
| {{result|fail}}<ref>I power up the system and enter LUKS password. I directly trigger reboot from login screen. Reboot starts, journal gets stopped as usual (checked with journalctl -b -1), no additional error in journal compared to 5.10.21-200.fc33.x86_64.
I cannot press escape to see log messages</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel 5.11.4-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
| {{result|pass}}<ref>all tests passed, no regressions found</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel 5.11.5-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
| {{result|pass}}<ref>All tests passed, no regressions found.</ref>
| <references/>
|-
| [[User:geraldosimiao|geraldosimiao]]
| kernel-5.11.3-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
| {{result|pass}}<ref>all kernel-tests passed, normal use for a day, no regressions found.</ref>
| <references/>
|-
| [[User:grumpey|grumpey]]
| CPU: 6-Core AMD FX-6100 (-MCP-) speed/min/max: 1461/1400/3300 MHz Kernel: 5.11.3-300.fc34.x86_64 x86_64 Up: 10h 03m Mem: 2087.4/15998.1 MiB (13.0%) Storage: 8.19 TiB (28.6% used) Procs: 323 Shell: Zsh inxi: 3.3.01
| {{result|pass}}<ref>1 rumpey@grumpey:gitrepos/kernel-tests>%sudo ./runtests.sh
  2 est suite called with default
  3 ./default/cachedrop                                              PASS
  4 ./default/insert_leap_second                                    PASS
  5 ./default/libhugetlbfs                                          SKIP
  6 ./default/memfd                                                  PASS
  7 ./default/modsign                                                SKIP
  8 ./default/mq-memory-corruption                                  PASS
  9 ./default/paxtest                                                SKIP
10 ./default/posix_timers                                          PASS
11 ./default/selinux-dac-controls                                  PASS
12 ./default/stack-randomness                                      PASS
13 ./default/sysfs-perms                                            PASS
14 ./default/timer-overhead                                        PASS
15
16 Test suite complete                                              PASS
./performance/lmbench3                                          PASS
Test suite complete                                              PASS</ref>
| <references/>
|-
| [[User:harshmangal|harshmangal]]
| HP (8th Gen) Fc33| x86_64 | Intel(R) Core(TM) i5-8250U CPU @ 1.60GH | 8 GiB of RAM | Intel UHD Graphics 620
| {{result|pass}}<ref>The performance test is giving code errors.</ref>
| <references/>
|-
| [[User:hhlp|hhlp]]
| CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
| {{result|pass}}<ref>No regression noted.... Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 02), Kernel driver in use: r8169</ref>
| <references/>
|-
| [[User:hoboprimate|hoboprimate]]
| HOST: Acer Aspire 7; CPU: Intel Core i7-7700HQ CPU @ 2.8GHz x 8; GRAPHICS: NV137 / Intel HD Graphics 630; MEMORY: 15,5 GiB
| {{result|pass}}<ref>Installed kernel-5.11.3-50 from koji on a fedora 33 installation</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| CPU: Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM: 31,3 GiB, Fedora 33 (Workstation Edition), Kernel: 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Runs well so far.</ref>
| <references/>
|-
| [[User:hricky|hricky]]
| Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM 31,3 GiB, Fedora 33 (Workstation Edition), 5.11.4-50.fc33.x86_64
| {{result|pass}}<ref>Runs well so far.</ref>{{result|pass}}<ref>Runs well so far.</ref>
| <references/>
|-
| [[User:itrymybest80|itrymybest80]]
| Fedora 33 (koji update), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.4-2) & 970 EVO M.2.
| {{result|pass}}<ref>{{bz|1885457}} I don't have a bluetooth adapter, but I still get fails in dmesg "Bluetooth: hci0: command 0x1001 tx timeout Bluetooth: hci0: BCM: Reading local version info failed (-110) Bluetooth: hci0: command 0xfc4c tx timeout Bluetooth: hci0: BCM: Patch command fc4c failed (-110) Bluetooth: hci0: BCM: Patch failed (-110) Bluetooth: hci0: command 0x0c03 tx timeout Bluetooth: hci0: BCM: Reset failed (-110)" and I still get these amdgpu failures also in dmesg "[drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (2501 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (3128 > 3126), lowering kernel.perf_event_max_sample_rate to 63000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed." Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.</ref>
| <references/>
|-
| [[User:keepfloyding|keepfloyding]]
| Thinkpad X1 Carbon Gen 8 running on Gnome Boxes CPU: Intel Core i7-10510U @ 8x 4.9GHz GPU: Mesa Intel(R) UHD Graphics (CML GT2)  RAM:  15661MiB
| {{result|fail}}<ref>Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              FAIL   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              FAIL   
ulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:kejmaro|kejmaro]]
| testday-image on NUC5i5RYK
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
./thirdparty/nvidia-module                                      WARN   
Test suite complete                                              WARN    </ref>{{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr330a
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| ampere  hr350a
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  pem605
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  per7425
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| dell  pesc430
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| fujitsu  fx700
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  apache
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  apollo
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  bl460c
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  dl20gen9
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| hpe  sy660gen9
| {{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| ibm  x3500m4
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| lenovo  rd230
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:lily|lily]]
| qualcomm  amberwing
| {{result|pass}}<ref>all default and performance testcases passed</ref>{{result|pass}}<ref>all default and performance testcases passed</ref>
| <references/>
|-
| [[User:marc84|marc84]]
| USB kerneltest-5.11.4.iso on Lenovo ideapad Y570
| {{result|pass}}<ref>Basic and Performance test: PASSED</ref>
| <references/>
|-
| [[User:masami|masami]]
| i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
| {{result|pass}}<ref>regression test passed. no regression noted on daily use.</ref>
| <references/>
|-
| [[User:mharpau|mharpau]]
| Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.11.3-50.fc33.x86_64
| {{result|pass}}<ref>1. all kernel-tests passed, normal use for a day, no regressions found. </ref>
| <references/>
|-
| [[User:molli123|molli123]]
| L390 Yoga, 16GB
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:molli123|molli123]]
| Ryzen 5 5600X, 64GB, 1060
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:molli123|molli123]]
| i5-9500T, 16GB
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
</ref>
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo P15
| {{result|pass}}<ref>No issues seen</ref>
| <references/>
|-
| [[User:mpearson|mpearson]]
| Lenovo P1G3
| {{result|pass}}<ref>Everything looked clean to me.</ref>
| <references/>
|-
| [[User:nhnh|nhnh]]
| Host: 20ALCTO1WW ThinkPad X240 , CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT , Memory: 1666MiB / 7830MiB (Bare-Metal, Live run)
| {{result|pass}}
| <references/>
|-
| [[User:nhnh|nhnh]]
| Host: 20ALCTO1WW ThinkPad X240 / CPU: Intel i5-4300U (4) @ 2.900GHz  / GPU: Intel Haswell-ULT / Memory: 6200MiB / 7830MiB // Guest-VM: on QEMU/KVM, Q35 CHIPSET, UEFI, 2 CPU + 4096MB RAM allocated
| {{result|warn}}<ref>Test suite called with default
./default/modsign                                                PASS   
./default/cachedrop                                              PASS   
./default/selinux-dac-controls                                  PASS   
./default/sysfs-perms                                            PASS   
./default/stack-randomness                                      PASS   
./default/posix_timers                                          PASS   
./default/libhugetlbfs                                          SKIP   
./default/timer-overhead                                        PASS   
./default/mq-memory-corruption                                  PASS   
./default/insert_leap_second                                    PASS   
./default/memfd                                                  PASS   
./default/paxtest                                                SKIP   
Test suite complete                                              PASS
/////
2743MB OK
2743MB OK
2743MB OK
Using config in CONFIG.localhost-live
Sat Mar  6 06:56:40 AM EST 2021
Latency measurements
Sat Mar  6 06:57:06 AM EST 2021
Calculating file system latency
Sat Mar  6 06:57:07 AM EST 2021
Local networking
Sat Mar  6 07:00:53 AM EST 2021
Bandwidth measurements
Sat Mar  6 07:04:11 AM EST 2021
Calculating context switch overhead
Sat Mar  6 07:04:15 AM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:nickavem|nickavem]]
| AMD® Ryzen 5 2600x six-core processor × 12 AMD® Radeon rx 5600 xt
| {{result|pass}}<ref>Works fine on Silverblue 33. Tests require overlaid packages; Toolbox and Podman do not work.
</ref>
| <references/>
|-
| [[User:nielsenb|nielsenb]]
| HP Compaq 8510w Intel T9300 AMD RV630 BIOS test day image
| {{result|pass}}<ref>Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS </ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Test day image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Test day image on desktop PC with Ryzen 3200G, B450 chip set and 16 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:norbertj|norbertj]]
| Test day image on old desktop PC with Core i5-750, P55 chip set, Radeon HD 6450 and 4 GiB RAM
| {{result|pass}}<ref>libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.</ref>
| <references/>
|-
| [[User:petrvelicka|petrvelicka]]
| Dell Latitude E6540 w/ i7-4800MQ && Radeon HD 8790M @ Fedora 33 testdayimage
| {{result|pass}}
| <references/>
|-
| [[User:pnemade|pnemade]]
| Lenovo T480s F33 VM
| {{result|fail}}<ref>Test suite called with default
./default/sysfs-perms                                            PASS   
./default/cachedrop                                              PASS   
./default/libhugetlbfs                                          SKIP   
./default/mq-memory-corruption                                  PASS   
./default/stack-randomness                                      PASS   
./default/paxtest                                                SKIP   
./default/selinux-dac-controls                                  PASS   
./default/modsign                                                PASS   
./default/insert_leap_second                                    PASS   
./default/posix_timers                                          PASS   
./default/timer-overhead                                        PASS   
./default/memfd                                                  FAIL   
Test suite complete                                              FAIL
</ref>
| <references/>
|-
| [[User:rai510|rai510]]
| Gnome Boxes VM  Kernel Test Day Image  Ryzen 3400g 8gb ram
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:rfm83|rfm83]]
|
| {{result|pass}}
| <references/>
|-
| [[User:rfm83|rfm83]]
| HP Laptop 14-cf0xxx
| {{result|pass}}
| <references/>
|-
| [[User:rfm83|rfm83]]
| HP Laptop 14-cf0xxx - Intel Core i5-8250U - 8GB - KVM virtual machine - test day image Fedora 33
| {{result|pass}}<ref>Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              PASS   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
fedora_submit.py -u <fasuser> [-p <password>] -l <logfile>
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:rimuru|rimuru]]
| test day image on GNOME Boxes; CPU model = Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
| {{result|pass}}<ref>sudo ./runtests.sh -t performance
mhz: should take approximately 30 seconds
Using config in CONFIG.localhost-live
Tue Mar  9 07:24:45 PM EST 2021
Latency measurements
Tue Mar  9 07:25:46 PM EST 2021
Calculating file system latency
Tue Mar  9 07:26:10 PM EST 2021
Local networking
Tue Mar  9 07:30:14 PM EST 2021
Bandwidth measurements
Tue Mar  9 07:38:08 PM EST 2021
Calculating context switch overhead
Tue Mar  9 07:39:20 PM EST 2021
/bin/sh: ../scripts/getlist: Permission denied
/bin/sh: ../scripts/getsummary: Permission denied
make: *** [Makefile:110: summary] Error 126
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>{{result|fail}}<ref>bash-5.0$ sudo ./runtests.sh
Test suite called with default
./default/selinux-dac-controls                                  PASS   
./default/posix_timers                                          PASS   
./default/cachedrop                                              FAIL   
./default/modsign                                                PASS   
./default/sysfs-perms                                            PASS   
./default/insert_leap_second                                    PASS   
./default/mq-memory-corruption                                  PASS   
./default/memfd                                                  PASS   
./default/timer-overhead                                        PASS   
./default/libhugetlbfs                                          SKIP   
./default/paxtest                                                SKIP   
./default/stack-randomness                                      PASS   
Test suite complete                                              FAIL   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
The signer's common name is kernel-signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:rslnrdnk|rslnrdnk]]
|
| {{result|fail}}<ref>I have noticed that since 5.10 release of Linux kernel any distro, including Fedora that uses both 5.11 and 5.12 kernel releases get black screen during initial boot process that persists up until the very end, making computer unusable. Switching to other tty's does nothing, so the only solution left is to push power down button or reload and try to use 5.10 kernel instead. This is clearly a some kind of a regression.
I am very interested in pinpointing the issue because newer releases will use 5.11 kernels and upwards — which will basically left me out. Please, tell me what I can do to help solve this issue and I'll try to do the best I can. My hardware info can be found there: https://linux-hardware.org/?probe=f40d786ac2</ref>
| <references/>
|-
| [[User:saknl|saknl]]
| Ryzen 3600xt, Asrock B550m Steel Legend, Radeon 5600xt
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| <references/>
|-
| [[User:sayaksarkar|sayaksarkar]]
| KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.3-300.fc34.x86_64
| {{result|pass}}<ref>[sayak@fedora kernel-tests]$ sudo ./runtests.sh
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:17: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |        static  psize;
      |                ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:17: warning: ‘return’ with no value, in function returning non-void
  94 |                return;
      |                ^~~~~~
lib_sched.c:46:1: note: declared here
  46 | handle_scheduler(int childno, int benchproc, int nbenchprocs)
      | ^~~~~~~~~~~~~~~~
lib_sched.c: In function ‘sched_pin’:
lib_sched.c:207:26: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration]
  207 |                retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask);
      |                          ^~~~~~~~~~~~~~~~~
lib_sched.c:231:18: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration]
  231 |        retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask);
      |                  ^~~~~~~~~~~~~~~~~
bw_file_rd.c: In function ‘main’:
bw_file_rd.c:149:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  149 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
bw_mem.c: In function ‘main’:
bw_mem.c:76:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  76 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
bw_mmap_rd.c: In function ‘main’:
bw_mmap_rd.c:64:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
bw_pipe.c: In function ‘main’:
bw_pipe.c:157:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  157 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
bw_tcp.c: In function ‘main’:
bw_tcp.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
bw_unix.c: In function ‘main’:
bw_unix.c:153:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  153 |                        if (parallel <= 0) lmbench_usage(argc, argv, usage);
      |                                            ^~~~~~~~~~~~~
lat_select.c: In function ‘main’:
lat_select.c:53:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  53 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_select.c: In function ‘doit’:
lat_select.c:167:16: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int]
  167 |        static count = 0;
      |                ^~~~~
lat_pipe.c: In function ‘main’:
lat_pipe.c:41:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  41 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_rpc.c: In function ‘main’:
lat_rpc.c:136:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  136 |                                lmbench_usage(ac, av, usage);
      |                                ^~~~~~~~~~~~~
lat_syscall.c: In function ‘main’:
lat_syscall.c:116:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  116 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_tcp.c: In function ‘main’:
lat_tcp.c:64:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |                                lmbench_usage(ac, av, usage);
      |                                ^~~~~~~~~~~~~
lat_udp.c: In function ‘main’:
lat_udp.c:78:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  78 |                                lmbench_usage(ac, av, usage);
      |                                ^~~~~~~~~~~~~
lat_mmap.c: In function ‘main’:
lat_mmap.c:58:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  58 |                                lmbench_usage(ac, av, usage);
      |                                ^~~~~~~~~~~~~
mhz.c: In function ‘main’:
mhz.c:492:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  492 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
lat_proc.c: In function ‘main’:
lat_proc.c:60:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  60 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_pagefault.c: In function ‘main’:
lat_pagefault.c:54:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_connect.c: In function ‘main’:
lat_connect.c:63:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
lat_fs.c: In function ‘main’:
lat_fs.c:55:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  55 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
/usr/bin/ld: /tmp/ccsRlflH.o: in function `setup_names':
lat_fs.c:(.text+0x825): warning: the use of `tempnam' is dangerous, better use `mkstemp'
lat_sig.c: In function ‘main’:
lat_sig.c:182:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  182 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_mem_rd.c: In function ‘main’:
lat_mem_rd.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_ctx.c: In function ‘main’:
lat_ctx.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  74 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_sem.c: In function ‘main’:
lat_sem.c:42:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  42 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_unix.c: In function ‘main’:
lat_unix.c:46:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  46 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_fifo.c: In function ‘main’:
lat_fifo.c:45:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  45 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_http.c: In function ‘main’:
lat_http.c:84:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  84 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
lat_fcntl.c: In function ‘main’:
lat_fcntl.c:203:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  203 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_unix_connect.c: In function ‘main’:
lat_unix_connect.c:63:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  63 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_ops.c: In function ‘main’:
lat_ops.c:393:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  393 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
line.c: In function ‘main’:
line.c:54:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  54 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
tlb.c: In function ‘main’:
tlb.c:69:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  69 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
par_mem.c: In function ‘main’:
par_mem.c:64:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  64 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
par_ops.c: In function ‘main’:
par_ops.c:413:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  413 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
stream.c: In function ‘main’:
stream.c:70:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  70 |                                lmbench_usage(ac, av, usage);
      |                                ^~~~~~~~~~~~~
cache.c: In function ‘main’:
cache.c:123:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  123 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
lat_dram_page.c: In function ‘main’:
lat_dram_page.c:66:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  66 |                        lmbench_usage(ac, av, usage);
      |                        ^~~~~~~~~~~~~
lat_pmake.c: In function ‘main’:
lat_pmake.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  47 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_rand.c: In function ‘main’:
lat_rand.c:39:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  39 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
lat_usleep.c: In function ‘main’:
lat_usleep.c:204:17: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  204 |                lmbench_usage(ac, av, usage);
      |                ^~~~~~~~~~~~~
lat_cmd.c: In function ‘main’:
lat_cmd.c:40:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration]
  40 |                        if (parallel <= 0) lmbench_usage(ac, av, usage);
      |                                            ^~~~~~~~~~~~~
1381MB OK
1381MB OK
1381MB OK
Using config in CONFIG.fedora
Tue Mar  9 07:50:58 PM IST 2021
Latency measurements
Tue Mar  9 08:15:47 PM IST 2021
Calculating file system latency
Tue Mar  9 08:15:48 PM IST 2021
Local networking
Tue Mar  9 08:19:34 PM IST 2021
Bandwidth measurements
Tue Mar  9 08:21:32 PM IST 2021
Calculating context switch overhead
Tue Mar  9 08:21:36 PM IST 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$
</ref>
| <references/>
|-
| [[User:sayaksarkar|sayaksarkar]]
| KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.4-300.fc34.x86_64
| {{result|pass}}<ref>[sayak@fedora kernel-tests]$ sudo ./runtests.sh
[sudo] password for sayak:
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
[sudo] password for sayak:
Test suite called with performance
Using config in CONFIG.fedora
Thu Mar 11 01:38:46 AM IST 2021
Latency measurements
Thu Mar 11 01:57:08 AM IST 2021
Calculating file system latency
Thu Mar 11 01:57:09 AM IST 2021
Local networking
Thu Mar 11 02:01:00 AM IST 2021
Bandwidth measurements
Thu Mar 11 02:02:55 AM IST 2021
Calculating context switch overhead
Thu Mar 11 02:03:00 AM IST 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
</ref>
| <references/>
|-
| [[User:sayaksarkar|sayaksarkar]]
| KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.5-300.fc34.x86_64
| {{result|pass}}<ref>[sayak@fedora kernel-tests]$ sudo ./runtests.sh
[sudo] password for sayak:
Test suite called with default
./default/cachedrop                                              PASS   
./default/insert_leap_second                                    PASS   
./default/libhugetlbfs                                          SKIP   
./default/memfd                                                  PASS   
./default/modsign                                                PASS   
./default/mq-memory-corruption                                  PASS   
./default/paxtest                                                SKIP   
./default/posix_timers                                          PASS   
./default/selinux-dac-controls                                  PASS   
./default/stack-randomness                                      PASS   
./default/sysfs-perms                                            PASS   
./default/timer-overhead                                        PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
[sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance
Test suite called with performance
Using config in CONFIG.fedora
Thu Mar 11 02:22:08 AM IST 2021
Latency measurements
Thu Mar 11 02:40:06 AM IST 2021
Calculating file system latency
Thu Mar 11 02:40:08 AM IST 2021
Local networking
Thu Mar 11 02:43:54 AM IST 2021
Bandwidth measurements
Thu Mar 11 02:45:45 AM IST 2021
Calculating context switch overhead
Thu Mar 11 02:45:49 AM IST 2021
./performance/lmbench3                                          PASS   
Test suite complete                                              PASS   
Your log file is being submitted...
FAS password:
Upload successful!
The following information is not submitted with your log;
it is for informational purposes only.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
</ref>
| <references/>
|-
| [[User:sgraf|sgraf]]
| Intel NUC10i7FNH, 5.11.4-300.fc34.x86_64
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
</ref>
| <references/>
|-
| [[User:sixpack13|sixpack13]]
| test day image; HW: Intel Core i5-3475S (Ivybridge 3rd Gen.), RAM 12 GB, SATA HD: SAMSUNG HD502HJ
| {{result|pass}}<ref>./default/libhugetlbfs: SKIP
./default/paxtest: SKIP
===
after starting "sudo ./runtests.sh -t performance"
I see this !
is this the test or a bug ?
Test suite called with performance
lib_timing.c: In function ‘touch’:
lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]
1626 |  static psize;
      |        ^~~~~
lib_sched.c: In function ‘handle_scheduler’:
lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void
  94 |  return;
      |  ^~~~~~
...</ref>
| <references/>
|-
| [[User:sumantrom|sumantrom]]
| Test Day image on KVM
| {{result|fail}}<ref>/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
| {{result|pass}}<ref>first test run failed on cachedrop, but all passed on second run (default, performance).
Noted the following in journalctl -k:
pcspkr: version magic '5.10.21-200.fc33.x86_64 SMP mod_unload ' should be '5.11.4-50.fc33.x86_64 SMP mod_unload '
Doesn't seem to affect the functionality of the kernel though.</ref>
| <references/>
|-
| [[User:t3rm1n4l|t3rm1n4l]]
| Dell Inspiron 3180 11"
| {{result|fail}}<ref>{{bz|1936791}} adding bug entry, as noted, appears to be framebuffer issue with AMD STONEY APU, does not boot past GRUB kernel selection on 5.11 kernel, cannot ctrl+alt+del or change to a different tty, only option is to hit the power button and select a different kernel</ref>{{result|fail}}<ref>LUKS encryption enabled on this system, system does not boot with 5.11 kernel series, system doesn't even reach the prompt to decrypt the disk, just sits there with a white cursor in the corner of the screen.</ref>
| <references/>
|-
| [[User:theloudspeaker|theloudspeaker]]
| Ideapad Flex 5, Ryzen 5 4500u. 5.11.3-50.fc33.x86_64
| {{result|pass}}<ref>Both the tests, default as well as performance tests passed.</ref>
| <references/>
|-
| [[User:theloudspeaker|theloudspeaker]]
| Intel core 2 duo. 2GB RAM 1GB swap.
| {{result|pass}}<ref>default test suite result is WARN
performance test suite result is PASS</ref>
| <references/>
|-
| [[User:trugul|trugul]]
| ThinkPad X1 Carbon 4th, 8 GB, Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 , Mesa Intel® HD Graphics 520 (SKL GT2)
| {{result|pass}}
| <references/>
|-
| [[User:tseewald|tseewald]]
| Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
| {{result|pass}}<ref>Default test passed. Performance test passed. No new warnings or errors in dmesg compared to 5.10.</ref>
| <references/>
|-
| [[User:user|user]]
| am  GiB, processor AMD® Athlon(tm) ii x2 250 processor × 2 , grafik AMD® Rs880, festplatte  GB, Kernel: 5.11.4-50.fc33.x86_64
| {{result|pass}}
| <references/>
|-
| [[User:vty67|vty67]]
| Dell Latitude E5470, 4GB RAM, i5 CPU 
| {{result|fail}}<ref>Can't finish booting from ISO testing image, kernel panics during boot and system freezes </ref>
| <references/>
|-
| [[User:vty67|vty67]]
| Dell Latitude E6320, 2GB, i3-2330M
| {{result|pass}}<ref>libhugetlbfs SKIP paxtest SKIP, other PASS, everything works </ref>
| <references/>
|-
| [[User:vty67|vty67]]
| HP ProBook 640 G5, 8GB RAM, i5-8265U CPU 
| {{result|pass}}<ref>tests passed, no audio output (headphones, HDMI,  internal speakers not detected), HDMI video output OK, WiFi OK</ref>
| <references/>
|-
| [[User:vty67|vty67]]
| Thinkpad T440p, 16GB, i5-4300M
| {{result|pass}}<ref> 1. libhugetlbfs SKIP, paxtest SKIP, other PASS, everything works </ref>
| <references/>
|-
| [[User:yosukemat|yosukemat]]
| Ryzen 9 5900X X570 - Boxes VM - Test image kerneltest-5.11.4
| {{result|fail}}<ref>FAILED Default Test Suite Log - https://pastebin.com/rRjv58ws
PASSED Performance Test Suite Log - https://pastebin.com/k9MrKRd6</ref>
| <references/>
|-
|}
[[Category:Fedora 34 Test Days]]

Latest revision as of 09:02, 29 March 2021

Kernel 5.11 Test Week
Test-days-banner.svg

Date 2021-03-08 to 2021-03-15
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

This Test Day will focus on the 5.11 Linux kernel. The primary aim is as a rebase candidate for Fedora 34 and 33 and 32.

Who's available[edit]

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:

You can chat with us on IRC. See the infobox on top of the page to learn the right IRC channel.

Prerequisite for Test Day[edit]

  • A fully updated test day image or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.11 kernel for an existing installation from F33 koji (see below) or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

Koji download instructions[edit]

Kernel builds can be downloaded from Koji using a command-line tool.

Install Koji if not installed:

sudo dnf install koji

You can list available kernel builds with:

koji list-builds --package=kernel --after="2021-03-01"

Download the 5.11 kernel build you wish, for example kernel-5.11.3-50.fc33:

koji download-build --arch=x86_64 kernel-5.11.3-50.fc33

Update your kernel:

sudo dnf update kernel-*.rpm

And reboot.

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.


Test Results[edit]

Regression Test[edit]

User Profile Regression References
CharDSon Hardware Model: ASUSTeK COMPUTER INC. X553MA, Processor: Intel® Celeron(R) CPU N2830 @ 2.16GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Fail fail
[1]
  1. ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms WARN ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Dell Latitude 3380, Processor: Intel® Celeron(R) CPU 3865U @ 1.80GHz × 2, RAM 3.5 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: HP ProBook 430 G6, Processor: Intel® Celeron(R) CPU 4205U @ 1.80GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Lenovo ideapad 330-15IKB, Processor: Intel® Core™ i3-8130U CPU @ 2.20GHz × 4, RAM 7.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
FreddyW Dell Latitude E5570, i5-6300U, 32GiB RAM, kernel-5.11.5-50.fc33.x86_64
Fail fail
[1]
  1. RHBZ #1936171 See https://bugzilla.redhat.com/show_bug.cgi?id=1936171 . System does not boot, kernel panic at sysinit.target. Only bootable with acpi=off.
Josevaldo Kernel: 5.11.3-300.fc34.x86_64 CPU: Intel Xeon E5-2630L v3 @ 2.900GHz
Pass pass
[1]
  1. Test suite complete PASS
Mario CPU: Intel Core i5-4210M CPU @ 2.60GHz x 4, GPU: NV117 / Intel HD Graphics 4600, Memory: 15,5GiB
Pass pass
Mario CPU: Intel Core i7-9700K CPU @ 3.60GHz x 8, GPU: NV168, Memory: 15,5GiB
Pass pass
alciregi F33 Raspberry Pi 3 headless aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 4 8GB headless aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo ThinkCentre M73z
Pass pass
[1]
  1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alphacluster CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
Pass pass
[1]
  1. No issues reported
anamika Oracle VM, Kernel test week iso, 2GB RAM , 2vCPU
Fail fail
[1]
Pass pass
[2]
  1. 1. Test suite called with "default" ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ^C./default/insert_leap_second FAIL ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$ 3. Test suite called with default gets stuck at ./default/insert_leap_second Even after leaving it for 1.5 hours and even after repetetive testing, this test case tends to fail. Also, ./default/cachedrop shows a non-consistent record. I tested for the Test suite called with "default" 3 times, out of which the ./default/cachedrop FAILED 2 times and PASSED once. However overall the Test suite called with "default" tends to FAIL on this mentioned system.
  2. All works fine with Test suite called with "performance". Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/cc6WMMPY.o: in function setup_names': lat_fs.c:(.text+0x831): warning: the use of tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ expr: syntax error: missing argument after ‘*’ ../scripts/config-run: line 199: [: -gt: unary operator expected ../scripts/config-run: line 204: [: -lt: unary operator expected ../scripts/config-run: line 208: [: -lt: unary operator expected mhz: should take approximately 15 seconds Using config in CONFIG.localhost-live Wed Mar 10 02:31:00 PM EST 2021 Latency measurements Wed Mar 10 02:31:45 PM EST 2021 Calculating file system latency Wed Mar 10 02:31:59 PM EST 2021 Local networking Wed Mar 10 02:36:21 PM EST 2021 Bandwidth measurements Wed Mar 10 02:40:19 PM EST 2021 Calculating context switch overhead Wed Mar 10 02:40:59 PM EST 2021 ./performance/lmbench3 PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$
anthonys53 Dell Latitude E6438, Intel(R) Core(TM) i5-3380M CPU @ 2.90GHz, 8GB RAM
Pass pass
[1]
  1. When I first re-booted into the test kernel, kernel-5.11.3-50.fc33 on my FC32 machine, I had at least 6 Firefox tabs open from my daily driver kernel. I had no control over selecting or closing the individual tabs in the new kernel, so I simply closed the window. This anomaly did not recur.
anthonys53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33
Pass pass
[1]
  1. Ran fine -- no remarks
astauss53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33, kernel-5.11.5-50.fc33
Pass pass
[1]
  1. All fine.
bhavdeep009 Tester
Fail fail
[1]
  1. sudo ./runtests.sh -t performance ... 1381MB ok 1381MB ok 1381MB ok terminal crashes Repeated this process 3 times.
binaryfever Virtual Machine: 4gb RAM, 4 cores
Fail fail
[1]
  1. insert_leap_second ran for nearly 4 hours with neither pass fail. Killed it and the the rest of the tests passed.
bohrasd OS: Fedora 33 (KDE Plasma) x86_64 Host: ROG Zephyrus G14 GA401IV_GA401IV 1.0 Kernel: 5.11.4-50.fc33.x86_64 Uptime: 1 hour, 10 mins Packages: 2667 (rpm), 110 (nix-user), 1 (flatpak) Shell: zsh 5.8 Resolution: 2560x1440, 3360x1890 DE: i3 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 2888MiB / 15475MiB
Pass pass
[1]
  1. Date: Fri Mar 12 10:13:04 AM HKT 2021 Test set: default Kernel: 5.11.4-50.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
    ================================================[edit]

    Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop

    Setting time to Sat Mar 13 07:59:50 2021 Scheduling leap second for Sat Mar 13 08:00:00 2021 Sat Mar 13 07:59:57 2021 + 113 us (37) TIME_INS Sat Mar 13 07:59:57 2021 + 500250 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 350 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 500491 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 630 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 500770 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 908 us (38) TIME_OOP Sat Mar 13 07:59:59 2021 + 501200 us (38) TIME_OOP Sat Mar 13 08:00:00 2021 + 1306 us (38) TIME_WAIT Sat Mar 13 08:00:00 2021 + 501407 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 1538 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 501784 us (38) TIME_WAIT Sat Mar 13 08:00:02 2021 + 1890 us (38) TIME_WAIT Leap complete

    Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... Diff too high: -78401484793..[FAIL] Check timer_create() per process... [OK] Starting test ./default/paxtest Starting test ./default/libhugetlbfs Starting test ./default/sysfs-perms Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/selinux-dac-controls SELinux must be enabled for this test Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/timer-overhead Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0543299 s, 1.9 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00350606 s, 3.0 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/stack-randomness

bojan Lenovo ThinkPad T450s
Pass pass
[1]
  1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bojan Noname fanless PC with Intel Core i5-8250U
Pass pass
[1]
  1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bretth 5.11.4 (KVM)
Pass pass
[1]
  1. Default & performance tests pass
bretth 5.11.5 (KVM)
Pass pass
[1]
  1. Default & performance tests pass (KVM)
condor virt-manager on f33 Workstation 2 virtual CPUs, 2048 memory. IvyBridge.
Fail fail
[1]
  1. The default cachedrop test failed!
copperi 5.11.4-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
Pass pass
danniel Acer Aspire E 16 intel core i7 5500, intel HD grafphics 5500 , 8 GB Memory
Pass pass
[1]
Pass pass
[2]
  1. Ok
  2. Ok
device Dell XPS 9380 Core i7-8565U, 8GB LPDDR3 2133MHz, 256GB M.2 PCIe NVMe, Killer 1435 802.11ac 2x2 & Bluetooth 4.1
Pass pass
donaldsebleung Test Day Image (kernel 5.11.3) in GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
Pass pass
[1]
  1. Default tests PASS (2 SKIP); performance tests PASS with multiple compiler warnings on implicitly declared lmbench_usage() and make error (permission denied) trying to enter ../scripts directory
donaldsebleung Test Day Image (kernel 5.11.4) on GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
Pass pass
[1]
  1. Default test suite PASS; performance test suite PASS with compiler warnings on lmbench_usage and permission denied trying to access ../scripts/get{list,summary}
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F32
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F33
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
dtometzki HOST: Lenovo ideapad 330s ; Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz; MEMORY: 8,0 GiB
Pass pass
[1]
  1. [damian@f33 linux]$ dmesg -l err --> No Errors Linux f33 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Boot OK
electronicsumit Test day image on VM
Fail fail
[1]
  1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS bash-5.0$ uname -a Linux fedora 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
emblaze Raspberry Pi 4B 4GB
Pass pass
[1]
  1. RHBZ #1918672 Sound device no longer recognised whereas it is on 5.10.3 (suboptimal playback though) Might need to reopen BZ 1918672 Default and performance tests suites run and passed with linux-firmware-20200918-112 linux-firmware-20210208-117.fc33 breaks WiFi on Raspberry Pi 4 https://bugzilla.redhat.com/show_bug.cgi?id=1934761 (Fix available upstream)
emmrou Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
Pass pass
[1]
  1. Wifi, bluetooth, sound and video worked fine.
evillagr KVM, x86_64, 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
fuller testday-image on MacBook Air A1465
Pass pass
[1]
  1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on NUC7i5BNH
Pass pass
fuller testday-image on ThinkCentre M91
Pass pass
[1]
  1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on ZaReason i7 8th gen
Pass pass
garrmcnu Test image on VM (KVM)
Pass pass
[1]
  1. Default and performance tests passed
georgm Lenovo E14 Gen 2, Intel(R) Core(TM) i7-1165G7, 5.11.5-50.fc33.x86_64
Fail fail
[1]
  1. I power up the system and enter LUKS password. I directly trigger reboot from login screen. Reboot starts, journal gets stopped as usual (checked with journalctl -b -1), no additional error in journal compared to 5.10.21-200.fc33.x86_64. I cannot press escape to see log messages
geraldosimiao kernel 5.11.4-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. all tests passed, no regressions found
geraldosimiao kernel 5.11.5-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. All tests passed, no regressions found.
geraldosimiao kernel-5.11.3-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. all kernel-tests passed, normal use for a day, no regressions found.
grumpey CPU: 6-Core AMD FX-6100 (-MCP-) speed/min/max: 1461/1400/3300 MHz Kernel: 5.11.3-300.fc34.x86_64 x86_64 Up: 10h 03m Mem: 2087.4/15998.1 MiB (13.0%) Storage: 8.19 TiB (28.6% used) Procs: 323 Shell: Zsh inxi: 3.3.01
Pass pass
[1]
  1. 1 rumpey@grumpey:gitrepos/kernel-tests>%sudo ./runtests.sh 2 est suite called with default 3 ./default/cachedrop PASS 4 ./default/insert_leap_second PASS 5 ./default/libhugetlbfs SKIP 6 ./default/memfd PASS 7 ./default/modsign SKIP 8 ./default/mq-memory-corruption PASS 9 ./default/paxtest SKIP 10 ./default/posix_timers PASS 11 ./default/selinux-dac-controls PASS 12 ./default/stack-randomness PASS 13 ./default/sysfs-perms PASS 14 ./default/timer-overhead PASS 15 16 Test suite complete PASS ./performance/lmbench3 PASS Test suite complete PASS
harshmangal x86_64 | Intel(R) Core(TM) i5-8250U CPU @ 1.60GH | 8 GiB of RAM | Intel UHD Graphics 620
Pass pass
[1]
  1. The performance test is giving code errors.
hhlp CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
Pass pass
[1]
  1. No regression noted.... Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 02), Kernel driver in use: r8169
hoboprimate HOST: Acer Aspire 7; CPU: Intel Core i7-7700HQ CPU @ 2.8GHz x 8; GRAPHICS: NV137 / Intel HD Graphics 630; MEMORY: 15,5 GiB
Pass pass
[1]
  1. Installed kernel-5.11.3-50 from koji on a fedora 33 installation
hricky CPU: Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM: 31,3 GiB, Fedora 33 (Workstation Edition), Kernel: 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Runs well so far.
hricky Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM 31,3 GiB, Fedora 33 (Workstation Edition), 5.11.4-50.fc33.x86_64
Pass pass
[1]
Pass pass
[2]
  1. Runs well so far.
  2. Runs well so far.
itrymybest80 Fedora 33 (koji update), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.4-2) & 970 EVO M.2.
Pass pass
[1]
  1. RHBZ #1885457 I don't have a bluetooth adapter, but I still get fails in dmesg "Bluetooth: hci0: command 0x1001 tx timeout Bluetooth: hci0: BCM: Reading local version info failed (-110) Bluetooth: hci0: command 0xfc4c tx timeout Bluetooth: hci0: BCM: Patch command fc4c failed (-110) Bluetooth: hci0: BCM: Patch failed (-110) Bluetooth: hci0: command 0x0c03 tx timeout Bluetooth: hci0: BCM: Reset failed (-110)" and I still get these amdgpu failures also in dmesg "[drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (2501 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (3128 > 3126), lowering kernel.perf_event_max_sample_rate to 63000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed." Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
keepfloyding Thinkpad X1 Carbon Gen 8 running on Gnome Boxes CPU: Intel Core i7-10510U @ 8x 4.9GHz GPU: Mesa Intel(R) UHD Graphics (CML GT2) RAM: 15661MiB
Fail fail
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL ulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kejmaro testday-image on NUC5i5RYK
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./thirdparty/nvidia-module WARN Test suite complete WARN
  2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
lily ampere hr330a
Pass pass
[1]
Pass pass
[2]
Pass pass
[3]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
  3. all default and performance testcases passed
lily ampere hr350a
Pass pass
[1]
  1. all default and performance testcases passed
lily dell pem605
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per7425
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily dell pesc430
Pass pass
[1]
  1. all default and performance testcases passed
lily fujitsu fx700
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe apache
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe apollo
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe bl460c
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe dl20gen9
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe sy660gen9
Pass pass
[1]
  1. all default and performance testcases passed
lily ibm x3500m4
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily lenovo rd230
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily qualcomm amberwing
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
marc84 USB kerneltest-5.11.4.iso on Lenovo ideapad Y570
Pass pass
[1]
  1. Basic and Performance test: PASSED
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
Pass pass
[1]
  1. regression test passed. no regression noted on daily use.
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.11.3-50.fc33.x86_64
Pass pass
[1]
  1. 1. all kernel-tests passed, normal use for a day, no regressions found.
molli123 L390 Yoga, 16GB
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 Ryzen 5 5600X, 64GB, 1060
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 i5-9500T, 16GB
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
mpearson Lenovo P15
Pass pass
[1]
  1. No issues seen
mpearson Lenovo P1G3
Pass pass
[1]
  1. Everything looked clean to me.
nhnh Host: 20ALCTO1WW ThinkPad X240 , CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT , Memory: 1666MiB / 7830MiB (Bare-Metal, Live run)
Pass pass
nhnh Host: 20ALCTO1WW ThinkPad X240 / CPU: Intel i5-4300U (4) @ 2.900GHz / GPU: Intel Haswell-ULT / Memory: 6200MiB / 7830MiB // Guest-VM: on QEMU/KVM, Q35 CHIPSET, UEFI, 2 CPU + 4096MB RAM allocated
Warning warn
[1]
  1. Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest SKIP Test suite complete PASS ///// 2743MB OK 2743MB OK 2743MB OK Using config in CONFIG.localhost-live Sat Mar 6 06:56:40 AM EST 2021 Latency measurements Sat Mar 6 06:57:06 AM EST 2021 Calculating file system latency Sat Mar 6 06:57:07 AM EST 2021 Local networking Sat Mar 6 07:00:53 AM EST 2021 Bandwidth measurements Sat Mar 6 07:04:11 AM EST 2021 Calculating context switch overhead Sat Mar 6 07:04:15 AM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
nickavem AMD® Ryzen 5 2600x six-core processor × 12 AMD® Radeon rx 5600 xt
Pass pass
[1]
  1. Works fine on Silverblue 33. Tests require overlaid packages; Toolbox and Podman do not work.
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 BIOS test day image
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
norbertj Test day image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on desktop PC with Ryzen 3200G, B450 chip set and 16 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on old desktop PC with Core i5-750, P55 chip set, Radeon HD 6450 and 4 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
petrvelicka Dell Latitude E6540 w/ i7-4800MQ && Radeon HD 8790M @ Fedora 33 testdayimage
Pass pass
pnemade Lenovo T480s F33 VM
Fail fail
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/stack-randomness PASS ./default/paxtest SKIP ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/insert_leap_second PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/memfd FAIL Test suite complete FAIL
rai510 Gnome Boxes VM Kernel Test Day Image Ryzen 3400g 8gb ram
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rfm83
Pass pass
rfm83 HP Laptop 14-cf0xxx
Pass pass
rfm83 HP Laptop 14-cf0xxx - Intel Core i5-8250U - 8GB - KVM virtual machine - test day image Fedora 33
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... fedora_submit.py -u <fasuser> [-p <password>] -l <logfile> The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rimuru test day image on GNOME Boxes; CPU model = Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
Pass pass
[1]
Fail fail
[2]
  1. sudo ./runtests.sh -t performance mhz: should take approximately 30 seconds Using config in CONFIG.localhost-live Tue Mar 9 07:24:45 PM EST 2021 Latency measurements Tue Mar 9 07:25:46 PM EST 2021 Calculating file system latency Tue Mar 9 07:26:10 PM EST 2021 Local networking Tue Mar 9 07:30:14 PM EST 2021 Bandwidth measurements Tue Mar 9 07:38:08 PM EST 2021 Calculating context switch overhead Tue Mar 9 07:39:20 PM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rslnrdnk
Fail fail
[1]
  1. I have noticed that since 5.10 release of Linux kernel any distro, including Fedora that uses both 5.11 and 5.12 kernel releases get black screen during initial boot process that persists up until the very end, making computer unusable. Switching to other tty's does nothing, so the only solution left is to push power down button or reload and try to use 5.10 kernel instead. This is clearly a some kind of a regression. I am very interested in pinpointing the issue because newer releases will use 5.11 kernels and upwards — which will basically left me out. Please, tell me what I can do to help solve this issue and I'll try to do the best I can. My hardware info can be found there: https://linux-hardware.org/?probe=f40d786ac2
saknl Ryzen 3600xt, Asrock B550m Steel Legend, Radeon 5600xt
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.3-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:17: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:17: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:26: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:18: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:16: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/ccsRlflH.o: in function setup_names': lat_fs.c:(.text+0x825): warning: the use of tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:17: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ 1381MB OK 1381MB OK 1381MB OK Using config in CONFIG.fedora Tue Mar 9 07:50:58 PM IST 2021 Latency measurements Tue Mar 9 08:15:47 PM IST 2021 Calculating file system latency Tue Mar 9 08:15:48 PM IST 2021 Local networking Tue Mar 9 08:19:34 PM IST 2021 Bandwidth measurements Tue Mar 9 08:21:32 PM IST 2021 Calculating context switch overhead Tue Mar 9 08:21:36 PM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.4-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance [sudo] password for sayak: Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 01:38:46 AM IST 2021 Latency measurements Thu Mar 11 01:57:08 AM IST 2021 Calculating file system latency Thu Mar 11 01:57:09 AM IST 2021 Local networking Thu Mar 11 02:01:00 AM IST 2021 Bandwidth measurements Thu Mar 11 02:02:55 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:03:00 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.5-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 02:22:08 AM IST 2021 Latency measurements Thu Mar 11 02:40:06 AM IST 2021 Calculating file system latency Thu Mar 11 02:40:08 AM IST 2021 Local networking Thu Mar 11 02:43:54 AM IST 2021 Bandwidth measurements Thu Mar 11 02:45:45 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:45:49 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sgraf Intel NUC10i7FNH, 5.11.4-300.fc34.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sixpack13 test day image; HW: Intel Core i5-3475S (Ivybridge 3rd Gen.), RAM 12 GB, SATA HD: SAMSUNG HD502HJ
Pass pass
[1]
  1. ./default/libhugetlbfs: SKIP ./default/paxtest: SKIP

    =[edit]

    after starting "sudo ./runtests.sh -t performance" I see this ! is this the test or a bug ?

    Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]

    1626 |  static psize;
         |         ^~~~~
    

    lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void

      94 |   return;
         |   ^~~~~~
    

    ...

sumantrom Test Day image on KVM
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
Pass pass
[1]
  1. first test run failed on cachedrop, but all passed on second run (default, performance). Noted the following in journalctl -k: pcspkr: version magic '5.10.21-200.fc33.x86_64 SMP mod_unload ' should be '5.11.4-50.fc33.x86_64 SMP mod_unload ' Doesn't seem to affect the functionality of the kernel though.
t3rm1n4l Dell Inspiron 3180 11"
Fail fail
[1]
Fail fail
[2]
  1. RHBZ #1936791 adding bug entry, as noted, appears to be framebuffer issue with AMD STONEY APU, does not boot past GRUB kernel selection on 5.11 kernel, cannot ctrl+alt+del or change to a different tty, only option is to hit the power button and select a different kernel
  2. LUKS encryption enabled on this system, system does not boot with 5.11 kernel series, system doesn't even reach the prompt to decrypt the disk, just sits there with a white cursor in the corner of the screen.
theloudspeaker Ideapad Flex 5, Ryzen 5 4500u. 5.11.3-50.fc33.x86_64
Pass pass
[1]
  1. Both the tests, default as well as performance tests passed.
theloudspeaker Intel core 2 duo. 2GB RAM 1GB swap.
Pass pass
[1]
  1. default test suite result is WARN performance test suite result is PASS
trugul ThinkPad X1 Carbon 4th, 8 GB, Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 , Mesa Intel® HD Graphics 520 (SKL GT2)
Pass pass
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
Pass pass
[1]
  1. Default test passed. Performance test passed. No new warnings or errors in dmesg compared to 5.10.
user am GiB, processor AMD® Athlon(tm) ii x2 250 processor × 2 , grafik AMD® Rs880, festplatte GB, Kernel: 5.11.4-50.fc33.x86_64
Pass pass
vty67 Dell Latitude E5470, 4GB RAM, i5 CPU
Fail fail
[1]
  1. Can't finish booting from ISO testing image, kernel panics during boot and system freezes
vty67 Dell Latitude E6320, 2GB, i3-2330M
Pass pass
[1]
  1. libhugetlbfs SKIP paxtest SKIP, other PASS, everything works
vty67 HP ProBook 640 G5, 8GB RAM, i5-8265U CPU
Pass pass
[1]
  1. tests passed, no audio output (headphones, HDMI, internal speakers not detected), HDMI video output OK, WiFi OK
vty67 Thinkpad T440p, 16GB, i5-4300M
Pass pass
[1]
  1. 1. libhugetlbfs SKIP, paxtest SKIP, other PASS, everything works
yosukemat Ryzen 9 5900X X570 - Boxes VM - Test image kerneltest-5.11.4
Fail fail
[1]
  1. FAILED Default Test Suite Log - https://pastebin.com/rRjv58ws PASSED Performance Test Suite Log - https://pastebin.com/k9MrKRd6