From Fedora Project Wiki

Kernel 5.11 Test Week

Date 2021-03-08 to 2021-03-15
Time all week

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

This Test Day will focus on the 5.11 Linux kernel. The primary aim is as a rebase candidate for Fedora 34 and 33 and 32.

Who's available[edit]

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:

You can chat with us on IRC. See the infobox on top of the page to learn the right IRC channel.

Prerequisite for Test Day[edit]

  • A fully updated test day image or Fedora 33 or 32 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.11 kernel for an existing installation from F33 koji (see below) or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F32 systems.
  • Fedora Silverblue users can test using the koji kernel above as well. Download the kernel locally and install it with rpm-ostree override replace <path to package>
  • Enough free space on HDD

Koji download instructions[edit]

Kernel builds can be downloaded from Koji using a command-line tool.

Install Koji if not installed:

sudo dnf install koji

You can list available kernel builds with:

koji list-builds --package=kernel --after="2021-03-01"

Download the 5.11 kernel build you wish, for example kernel-5.11.3-50.fc33:

koji download-build --arch=x86_64 kernel-5.11.3-50.fc33

Update your kernel:

sudo dnf update kernel-*.rpm

And reboot.

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.


Test Results[edit]

Regression Test[edit]

User Profile Regression References
CharDSon Hardware Model: ASUSTeK COMPUTER INC. X553MA, Processor: Intel® Celeron(R) CPU N2830 @ 2.16GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Fail fail
[1]
  1. ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms WARN ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Dell Latitude 3380, Processor: Intel® Celeron(R) CPU 3865U @ 1.80GHz × 2, RAM 3.5 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: HP ProBook 430 G6, Processor: Intel® Celeron(R) CPU 4205U @ 1.80GHz × 2, RAM 3.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
CharDSon Hardware Model: Lenovo ideapad 330-15IKB, Processor: Intel® Core™ i3-8130U CPU @ 2.20GHz × 4, RAM 7.7 GiB, Kernel 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
FreddyW Dell Latitude E5570, i5-6300U, 32GiB RAM, kernel-5.11.5-50.fc33.x86_64
Fail fail
[1]
  1. RHBZ #1936171 See https://bugzilla.redhat.com/show_bug.cgi?id=1936171 . System does not boot, kernel panic at sysinit.target. Only bootable with acpi=off.
Josevaldo Kernel: 5.11.3-300.fc34.x86_64 CPU: Intel Xeon E5-2630L v3 @ 2.900GHz
Pass pass
[1]
  1. Test suite complete PASS
Mario CPU: Intel Core i5-4210M CPU @ 2.60GHz x 4, GPU: NV117 / Intel HD Graphics 4600, Memory: 15,5GiB
Pass pass
Mario CPU: Intel Core i7-9700K CPU @ 3.60GHz x 8, GPU: NV168, Memory: 15,5GiB
Pass pass
alciregi F33 Raspberry Pi 3 headless aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi F33 Raspberry Pi 4 8GB headless aarch64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo ThinkCentre M73z
Pass pass
[1]
  1. The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Toshiba Portege R930-163, Intel i5-3320M, 4GB RAM, SSD, btrfs
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alphacluster CPU: Ryzen 9 3900X GPU: Radeon RX6800 Mobo: x570
Pass pass
[1]
  1. No issues reported
anamika Oracle VM, Kernel test week iso, 2GB RAM , 2vCPU
Fail fail
[1]
Pass pass
[2]
  1. 1. Test suite called with "default" ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ^C./default/insert_leap_second FAIL ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$ 3. Test suite called with default gets stuck at ./default/insert_leap_second Even after leaving it for 1.5 hours and even after repetetive testing, this test case tends to fail. Also, ./default/cachedrop shows a non-consistent record. I tested for the Test suite called with "default" 3 times, out of which the ./default/cachedrop FAILED 2 times and PASSED once. However overall the Test suite called with "default" tends to FAIL on this mentioned system.
  2. All works fine with Test suite called with "performance". Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:12: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:11: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:9: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/cc6WMMPY.o: in function setup_names': lat_fs.c:(.text+0x831): warning: the use of tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:5: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:4: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:3: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:23: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ expr: syntax error: missing argument after ‘*’ ../scripts/config-run: line 199: [: -gt: unary operator expected ../scripts/config-run: line 204: [: -lt: unary operator expected ../scripts/config-run: line 208: [: -lt: unary operator expected mhz: should take approximately 15 seconds Using config in CONFIG.localhost-live Wed Mar 10 02:31:00 PM EST 2021 Latency measurements Wed Mar 10 02:31:45 PM EST 2021 Calculating file system latency Wed Mar 10 02:31:59 PM EST 2021 Local networking Wed Mar 10 02:36:21 PM EST 2021 Bandwidth measurements Wed Mar 10 02:40:19 PM EST 2021 Calculating context switch overhead Wed Mar 10 02:40:59 PM EST 2021 ./performance/lmbench3 PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected bash-5.0$
anthonys53 Dell Latitude E6438, Intel(R) Core(TM) i5-3380M CPU @ 2.90GHz, 8GB RAM
Pass pass
[1]
  1. When I first re-booted into the test kernel, kernel-5.11.3-50.fc33 on my FC32 machine, I had at least 6 Firefox tabs open from my daily driver kernel. I had no control over selecting or closing the individual tabs in the new kernel, so I simply closed the window. This anomaly did not recur.
anthonys53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33
Pass pass
[1]
  1. Ran fine -- no remarks
astauss53 HP ProDesk 600 G1 SFF with 8GB RAM, Fedora 33, kernel-5.11.5-50.fc33
Pass pass
[1]
  1. All fine.
bhavdeep009 Tester
Fail fail
[1]
  1. sudo ./runtests.sh -t performance ... 1381MB ok 1381MB ok 1381MB ok terminal crashes Repeated this process 3 times.
binaryfever Virtual Machine: 4gb RAM, 4 cores
Fail fail
[1]
  1. insert_leap_second ran for nearly 4 hours with neither pass fail. Killed it and the the rest of the tests passed.
bohrasd OS: Fedora 33 (KDE Plasma) x86_64 Host: ROG Zephyrus G14 GA401IV_GA401IV 1.0 Kernel: 5.11.4-50.fc33.x86_64 Uptime: 1 hour, 10 mins Packages: 2667 (rpm), 110 (nix-user), 1 (flatpak) Shell: zsh 5.8 Resolution: 2560x1440, 3360x1890 DE: i3 CPU: AMD Ryzen 7 4800HS with Radeon Graphics (16) @ 2.900GHz GPU: NVIDIA GeForce RTX 2060 Max-Q GPU: AMD ATI 04:00.0 Renoir Memory: 2888MiB / 15475MiB
Pass pass
[1]
  1. Date: Fri Mar 12 10:13:04 AM HKT 2021 Test set: default Kernel: 5.11.4-50.fc33.x86_64 Release: Fedora release 33 (Thirty Three) Result: PASS Failed Tests: None Warned Tests: None
    ================================================[edit]

    Starting test ./default/insert_leap_second Setting time to speed up testing Running for 1 iterations. Press ctrl-c to stop

    Setting time to Sat Mar 13 07:59:50 2021 Scheduling leap second for Sat Mar 13 08:00:00 2021 Sat Mar 13 07:59:57 2021 + 113 us (37) TIME_INS Sat Mar 13 07:59:57 2021 + 500250 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 350 us (37) TIME_INS Sat Mar 13 07:59:58 2021 + 500491 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 630 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 500770 us (37) TIME_INS Sat Mar 13 07:59:59 2021 + 908 us (38) TIME_OOP Sat Mar 13 07:59:59 2021 + 501200 us (38) TIME_OOP Sat Mar 13 08:00:00 2021 + 1306 us (38) TIME_WAIT Sat Mar 13 08:00:00 2021 + 501407 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 1538 us (38) TIME_WAIT Sat Mar 13 08:00:01 2021 + 501784 us (38) TIME_WAIT Sat Mar 13 08:00:02 2021 + 1890 us (38) TIME_WAIT Leap complete

    Starting test ./default/posix_timers Testing posix timers. False negative may happen on CPU execution based timers if other threads run on the CPU... Check itimer virtual... [OK] Check itimer prof... [OK] Check itimer real... [OK] Check timer_create() per thread... Diff too high: -78401484793..[FAIL] Check timer_create() per process... [OK] Starting test ./default/paxtest Starting test ./default/libhugetlbfs Starting test ./default/sysfs-perms Starting test ./default/mq-memory-corruption Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Test PASSED Starting test ./default/selinux-dac-controls SELinux must be enabled for this test Starting test ./default/modsign Successfully loaded signed module Successfully loaded unsigned module Starting test ./default/timer-overhead Starting test ./default/memfd memfd: CREATE memfd: BASIC memfd: SEAL-WRITE memfd: SEAL-SHRINK memfd: SEAL-GROW memfd: SEAL-RESIZE memfd: SHARE-DUP memfd: SHARE-MMAP memfd: SHARE-OPEN memfd: SHARE-FORK memfd: SHARE-DUP (shared file-table) memfd: SHARE-MMAP (shared file-table) memfd: SHARE-OPEN (shared file-table) memfd: SHARE-FORK (shared file-table) memfd: DONE Starting test ./default/cachedrop 100+0 records in 100+0 records out 104857600 bytes (105 MB, 100 MiB) copied, 0.0543299 s, 1.9 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected 10+0 records in 10+0 records out 10485760 bytes (10 MB, 10 MiB) copied, 0.00350606 s, 3.0 GB/s cat: /proc/sys/vm/drop_caches: Permission denied ./drop_caches.sh: line 32: [: -ne: unary operator expected TestPASS: /proc/sys/vm/drop_caches PASS Starting test ./default/stack-randomness

bojan Lenovo ThinkPad T450s
Pass pass
[1]
  1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bojan Noname fanless PC with Intel Core i5-8250U
Pass pass
[1]
  1. Used 5.11.4 from koji. Both default and performance tests passed. The kernel seems to run OK in general use.
bretth 5.11.4 (KVM)
Pass pass
[1]
  1. Default & performance tests pass
bretth 5.11.5 (KVM)
Pass pass
[1]
  1. Default & performance tests pass (KVM)
condor virt-manager on f33 Workstation 2 virtual CPUs, 2048 memory. IvyBridge.
Fail fail
[1]
  1. The default cachedrop test failed!
copperi 5.11.4-300.fc34.x86_64 F34 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
Pass pass
danniel Acer Aspire E 16 intel core i7 5500, intel HD grafphics 5500 , 8 GB Memory
Pass pass
[1]
Pass pass
[2]
  1. Ok
  2. Ok
device Dell XPS 9380 Core i7-8565U, 8GB LPDDR3 2133MHz, 256GB M.2 PCIe NVMe, Killer 1435 802.11ac 2x2 & Bluetooth 4.1
Pass pass
donaldsebleung Test Day Image (kernel 5.11.3) in GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
Pass pass
[1]
  1. Default tests PASS (2 SKIP); performance tests PASS with multiple compiler warnings on implicitly declared lmbench_usage() and make error (permission denied) trying to enter ../scripts directory
donaldsebleung Test Day Image (kernel 5.11.4) on GNOME Boxes VM (2G RAM, 4 x Intel Core i5-4250U CPU @ 1.30 GHz)
Pass pass
[1]
  1. Default test suite PASS; performance test suite PASS with compiler warnings on lmbench_usage and permission denied trying to access ../scripts/get{list,summary}
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F32
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
drakkai Lenovo ThinkPad T450 (i5-5300U, 16GB RAM) F33
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT vulnerable
dtometzki HOST: Lenovo ideapad 330s ; Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz; MEMORY: 8,0 GiB
Pass pass
[1]
  1. [damian@f33 linux]$ dmesg -l err --> No Errors Linux f33 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Boot OK
electronicsumit Test day image on VM
Fail fail
[1]
  1. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS bash-5.0$ uname -a Linux fedora 5.11.3-50.fc33.x86_64 #1 SMP Fri Mar 5 16:26:37 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
emblaze Raspberry Pi 4B 4GB
Pass pass
[1]
  1. RHBZ #1918672 Sound device no longer recognised whereas it is on 5.10.3 (suboptimal playback though) Might need to reopen BZ 1918672 Default and performance tests suites run and passed with linux-firmware-20200918-112 linux-firmware-20210208-117.fc33 breaks WiFi on Raspberry Pi 4 https://bugzilla.redhat.com/show_bug.cgi?id=1934761 (Fix available upstream)
emmrou Clevo. Memory: 7.7 GiB. Processor: Intel Core I5-4330M CPU @ 2.8GHz x4. Graphics: Intel HG Graphics 4600 (HSW GT2). Disk Capacity: 480 GB.
Pass pass
[1]
  1. Wifi, bluetooth, sound and video worked fine.
evillagr KVM, x86_64, 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
fuller testday-image on MacBook Air A1465
Pass pass
[1]
  1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on NUC7i5BNH
Pass pass
fuller testday-image on ThinkCentre M91
Pass pass
[1]
  1. sudo ./runtests.sh -t performance ... /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126
fuller testday-image on ZaReason i7 8th gen
Pass pass
garrmcnu Test image on VM (KVM)
Pass pass
[1]
  1. Default and performance tests passed
georgm Lenovo E14 Gen 2, Intel(R) Core(TM) i7-1165G7, 5.11.5-50.fc33.x86_64
Fail fail
[1]
  1. I power up the system and enter LUKS password. I directly trigger reboot from login screen. Reboot starts, journal gets stopped as usual (checked with journalctl -b -1), no additional error in journal compared to 5.10.21-200.fc33.x86_64. I cannot press escape to see log messages
geraldosimiao kernel 5.11.4-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. all tests passed, no regressions found
geraldosimiao kernel 5.11.5-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. All tests passed, no regressions found.
geraldosimiao kernel-5.11.3-50.fc33.x86_64 on Acer Aspire V3-571 v: V2.11 CPU: Quad Core Intel Core i7-3632QM GPU: Intel 3rd Gen Core processor Graphics Controller KDE Plasma 5.20.5
Pass pass
[1]
  1. all kernel-tests passed, normal use for a day, no regressions found.
grumpey CPU: 6-Core AMD FX-6100 (-MCP-) speed/min/max: 1461/1400/3300 MHz Kernel: 5.11.3-300.fc34.x86_64 x86_64 Up: 10h 03m Mem: 2087.4/15998.1 MiB (13.0%) Storage: 8.19 TiB (28.6% used) Procs: 323 Shell: Zsh inxi: 3.3.01
Pass pass
[1]
  1. 1 rumpey@grumpey:gitrepos/kernel-tests>%sudo ./runtests.sh 2 est suite called with default 3 ./default/cachedrop PASS 4 ./default/insert_leap_second PASS 5 ./default/libhugetlbfs SKIP 6 ./default/memfd PASS 7 ./default/modsign SKIP 8 ./default/mq-memory-corruption PASS 9 ./default/paxtest SKIP 10 ./default/posix_timers PASS 11 ./default/selinux-dac-controls PASS 12 ./default/stack-randomness PASS 13 ./default/sysfs-perms PASS 14 ./default/timer-overhead PASS 15 16 Test suite complete PASS ./performance/lmbench3 PASS Test suite complete PASS
harshmangal x86_64 | Intel(R) Core(TM) i5-8250U CPU @ 1.60GH | 8 GiB of RAM | Intel UHD Graphics 620
Pass pass
[1]
  1. The performance test is giving code errors.
hhlp CPU: AMD Phenom 8750 Triple- (3) @ 2.400GH, GPU: NVIDIA GeForce 9800 GT, Memory: 1084MiB / 7949MiB
Pass pass
[1]
  1. No regression noted.... Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 02), Kernel driver in use: r8169
hoboprimate HOST: Acer Aspire 7; CPU: Intel Core i7-7700HQ CPU @ 2.8GHz x 8; GRAPHICS: NV137 / Intel HD Graphics 630; MEMORY: 15,5 GiB
Pass pass
[1]
  1. Installed kernel-5.11.3-50 from koji on a fedora 33 installation
hricky CPU: Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM: 31,3 GiB, Fedora 33 (Workstation Edition), Kernel: 5.11.4-50.fc33.x86_64
Pass pass
[1]
  1. Runs well so far.
hricky Intel® Core™ i7-4790 CPU @ 3.60GHz × 8, RAM 31,3 GiB, Fedora 33 (Workstation Edition), 5.11.4-50.fc33.x86_64
Pass pass
[1]
Pass pass
[2]
  1. Runs well so far.
  2. Runs well so far.
itrymybest80 Fedora 33 (koji update), x86_64, PRIME Z270-A, i5-7600K, 16GB DDR4, AMD RX 580 8GB (MESA 20.3.4-2) & 970 EVO M.2.
Pass pass
[1]
  1. RHBZ #1885457 I don't have a bluetooth adapter, but I still get fails in dmesg "Bluetooth: hci0: command 0x1001 tx timeout Bluetooth: hci0: BCM: Reading local version info failed (-110) Bluetooth: hci0: command 0xfc4c tx timeout Bluetooth: hci0: BCM: Patch command fc4c failed (-110) Bluetooth: hci0: BCM: Patch failed (-110) Bluetooth: hci0: command 0x0c03 tx timeout Bluetooth: hci0: BCM: Reset failed (-110)" and I still get these amdgpu failures also in dmesg "[drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (2501 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed. perf: interrupt took too long (3128 > 3126), lowering kernel.perf_event_max_sample_rate to 63000 [drm:retrieve_link_cap [amdgpu]] *ERROR* retrieve_link_cap: Read dpcd data failed." Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
keepfloyding Thinkpad X1 Carbon Gen 8 running on Gnome Boxes CPU: Intel Core i7-10510U @ 8x 4.9GHz GPU: Mesa Intel(R) UHD Graphics (CML GT2) RAM: 15661MiB
Fail fail
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL ulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kejmaro testday-image on NUC5i5RYK
Pass pass
[1]
Pass pass
[2]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./thirdparty/nvidia-module WARN Test suite complete WARN
  2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
lily ampere hr330a
Pass pass
[1]
Pass pass
[2]
Pass pass
[3]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
  3. all default and performance testcases passed
lily ampere hr350a
Pass pass
[1]
  1. all default and performance testcases passed
lily dell pem605
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per7425
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily dell pesc430
Pass pass
[1]
  1. all default and performance testcases passed
lily fujitsu fx700
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe apache
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe apollo
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe bl460c
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily hpe dl20gen9
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe sy660gen9
Pass pass
[1]
  1. all default and performance testcases passed
lily ibm x3500m4
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily lenovo rd230
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily qualcomm amberwing
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
marc84 USB kerneltest-5.11.4.iso on Lenovo ideapad Y570
Pass pass
[1]
  1. Basic and Performance test: PASSED
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, F33 Workstation
Pass pass
[1]
  1. regression test passed. no regression noted on daily use.
mharpau Thinkpad T14s, Ryzen 7 4750U, Renoir GPU - kernel-5.11.3-50.fc33.x86_64
Pass pass
[1]
  1. 1. all kernel-tests passed, normal use for a day, no regressions found.
molli123 L390 Yoga, 16GB
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 Ryzen 5 5600X, 64GB, 1060
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
molli123 i5-9500T, 16GB
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT disabled
mpearson Lenovo P15
Pass pass
[1]
  1. No issues seen
mpearson Lenovo P1G3
Pass pass
[1]
  1. Everything looked clean to me.
nhnh Host: 20ALCTO1WW ThinkPad X240 , CPU: Intel i5-4300U (4) @ 2.900GHz, GPU: Intel Haswell-ULT , Memory: 1666MiB / 7830MiB (Bare-Metal, Live run)
Pass pass
nhnh Host: 20ALCTO1WW ThinkPad X240 / CPU: Intel i5-4300U (4) @ 2.900GHz / GPU: Intel Haswell-ULT / Memory: 6200MiB / 7830MiB // Guest-VM: on QEMU/KVM, Q35 CHIPSET, UEFI, 2 CPU + 4096MB RAM allocated
Warning warn
[1]
  1. Test suite called with default ./default/modsign PASS ./default/cachedrop PASS ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/stack-randomness PASS ./default/posix_timers PASS ./default/libhugetlbfs SKIP ./default/timer-overhead PASS ./default/mq-memory-corruption PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest SKIP Test suite complete PASS ///// 2743MB OK 2743MB OK 2743MB OK Using config in CONFIG.localhost-live Sat Mar 6 06:56:40 AM EST 2021 Latency measurements Sat Mar 6 06:57:06 AM EST 2021 Calculating file system latency Sat Mar 6 06:57:07 AM EST 2021 Local networking Sat Mar 6 07:00:53 AM EST 2021 Bandwidth measurements Sat Mar 6 07:04:11 AM EST 2021 Calculating context switch overhead Sat Mar 6 07:04:15 AM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS
nickavem AMD® Ryzen 5 2600x six-core processor × 12 AMD® Radeon rx 5600 xt
Pass pass
[1]
  1. Works fine on Silverblue 33. Tests require overlaid packages; Toolbox and Podman do not work.
nielsenb HP Compaq 8510w Intel T9300 AMD RV630 BIOS test day image
Pass pass
[1]
  1. Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS
norbertj Test day image on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on desktop PC with Ryzen 3200G, B450 chip set and 16 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
norbertj Test day image on old desktop PC with Core i5-750, P55 chip set, Radeon HD 6450 and 4 GiB RAM
Pass pass
[1]
  1. libhugetlbfs and paxtest SKIP, rest of default tests and performance tests PASS. No regressions noted.
petrvelicka Dell Latitude E6540 w/ i7-4800MQ && Radeon HD 8790M @ Fedora 33 testdayimage
Pass pass
pnemade Lenovo T480s F33 VM
Fail fail
[1]
  1. Test suite called with default ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/libhugetlbfs SKIP ./default/mq-memory-corruption PASS ./default/stack-randomness PASS ./default/paxtest SKIP ./default/selinux-dac-controls PASS ./default/modsign PASS ./default/insert_leap_second PASS ./default/posix_timers PASS ./default/timer-overhead PASS ./default/memfd FAIL Test suite complete FAIL
rai510 Gnome Boxes VM Kernel Test Day Image Ryzen 3400g 8gb ram
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rfm83
Pass pass
rfm83 HP Laptop 14-cf0xxx
Pass pass
rfm83 HP Laptop 14-cf0xxx - Intel Core i5-8250U - 8GB - KVM virtual machine - test day image Fedora 33
Pass pass
[1]
  1. Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop PASS ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete PASS Your log file is being submitted... fedora_submit.py -u <fasuser> [-p <password>] -l <logfile> The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rimuru test day image on GNOME Boxes; CPU model = Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
Pass pass
[1]
Fail fail
[2]
  1. sudo ./runtests.sh -t performance mhz: should take approximately 30 seconds Using config in CONFIG.localhost-live Tue Mar 9 07:24:45 PM EST 2021 Latency measurements Tue Mar 9 07:25:46 PM EST 2021 Calculating file system latency Tue Mar 9 07:26:10 PM EST 2021 Local networking Tue Mar 9 07:30:14 PM EST 2021 Bandwidth measurements Tue Mar 9 07:38:08 PM EST 2021 Calculating context switch overhead Tue Mar 9 07:39:20 PM EST 2021 /bin/sh: ../scripts/getlist: Permission denied /bin/sh: ../scripts/getsummary: Permission denied make: *** [Makefile:110: summary] Error 126 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
  2. bash-5.0$ sudo ./runtests.sh Test suite called with default ./default/selinux-dac-controls PASS ./default/posix_timers PASS ./default/cachedrop FAIL ./default/modsign PASS ./default/sysfs-perms PASS ./default/insert_leap_second PASS ./default/mq-memory-corruption PASS ./default/memfd PASS ./default/timer-overhead PASS ./default/libhugetlbfs SKIP ./default/paxtest SKIP ./default/stack-randomness PASS Test suite complete FAIL Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Checking for kernel signature: The signer's common name is Fedora Secure Boot Signer The signer's common name is kernel-signer Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rslnrdnk
Fail fail
[1]
  1. I have noticed that since 5.10 release of Linux kernel any distro, including Fedora that uses both 5.11 and 5.12 kernel releases get black screen during initial boot process that persists up until the very end, making computer unusable. Switching to other tty's does nothing, so the only solution left is to push power down button or reload and try to use 5.10 kernel instead. This is clearly a some kind of a regression. I am very interested in pinpointing the issue because newer releases will use 5.11 kernels and upwards — which will basically left me out. Please, tell me what I can do to help solve this issue and I'll try to do the best I can. My hardware info can be found there: https://linux-hardware.org/?probe=f40d786ac2
saknl Ryzen 3600xt, Asrock B550m Steel Legend, Radeon 5600xt
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.3-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:17: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int] 1626 | static psize; | ^~~~~ lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:17: warning: ‘return’ with no value, in function returning non-void 94 | return; | ^~~~~~ lib_sched.c:46:1: note: declared here 46 | handle_scheduler(int childno, int benchproc, int nbenchprocs) | ^~~~~~~~~~~~~~~~ lib_sched.c: In function ‘sched_pin’: lib_sched.c:207:26: warning: implicit declaration of function ‘sched_getaffinity’ [-Wimplicit-function-declaration] 207 | retval = sched_getaffinity(0, sz * sizeof(unsigned long), cpumask); | ^~~~~~~~~~~~~~~~~ lib_sched.c:231:18: warning: implicit declaration of function ‘sched_setaffinity’ [-Wimplicit-function-declaration] 231 | retval = sched_setaffinity(0, sz * sizeof(unsigned long), mask); | ^~~~~~~~~~~~~~~~~ bw_file_rd.c: In function ‘main’: bw_file_rd.c:149:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 149 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mem.c: In function ‘main’: bw_mem.c:76:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 76 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_mmap_rd.c: In function ‘main’: bw_mmap_rd.c:64:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_pipe.c: In function ‘main’: bw_pipe.c:157:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 157 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_tcp.c: In function ‘main’: bw_tcp.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ bw_unix.c: In function ‘main’: bw_unix.c:153:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 153 | if (parallel <= 0) lmbench_usage(argc, argv, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘main’: lat_select.c:53:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 53 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_select.c: In function ‘doit’: lat_select.c:167:16: warning: type defaults to ‘int’ in declaration of ‘count’ [-Wimplicit-int] 167 | static count = 0; | ^~~~~ lat_pipe.c: In function ‘main’: lat_pipe.c:41:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 41 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rpc.c: In function ‘main’: lat_rpc.c:136:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 136 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_syscall.c: In function ‘main’: lat_syscall.c:116:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 116 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_tcp.c: In function ‘main’: lat_tcp.c:64:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_udp.c: In function ‘main’: lat_udp.c:78:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 78 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mmap.c: In function ‘main’: lat_mmap.c:58:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 58 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ mhz.c: In function ‘main’: mhz.c:492:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 492 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_proc.c: In function ‘main’: lat_proc.c:60:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 60 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pagefault.c: In function ‘main’: lat_pagefault.c:54:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_connect.c: In function ‘main’: lat_connect.c:63:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fs.c: In function ‘main’: lat_fs.c:55:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 55 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ /usr/bin/ld: /tmp/ccsRlflH.o: in function setup_names': lat_fs.c:(.text+0x825): warning: the use of tempnam' is dangerous, better use `mkstemp' lat_sig.c: In function ‘main’: lat_sig.c:182:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 182 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_mem_rd.c: In function ‘main’: lat_mem_rd.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ctx.c: In function ‘main’: lat_ctx.c:74:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 74 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_sem.c: In function ‘main’: lat_sem.c:42:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 42 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix.c: In function ‘main’: lat_unix.c:46:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 46 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fifo.c: In function ‘main’: lat_fifo.c:45:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 45 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_http.c: In function ‘main’: lat_http.c:84:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 84 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_fcntl.c: In function ‘main’: lat_fcntl.c:203:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 203 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_unix_connect.c: In function ‘main’: lat_unix_connect.c:63:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 63 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_ops.c: In function ‘main’: lat_ops.c:393:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 393 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ line.c: In function ‘main’: line.c:54:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 54 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ tlb.c: In function ‘main’: tlb.c:69:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 69 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_mem.c: In function ‘main’: par_mem.c:64:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 64 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ par_ops.c: In function ‘main’: par_ops.c:413:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 413 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ stream.c: In function ‘main’: stream.c:70:33: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 70 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ cache.c: In function ‘main’: cache.c:123:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 123 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_dram_page.c: In function ‘main’: lat_dram_page.c:66:25: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 66 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_pmake.c: In function ‘main’: lat_pmake.c:47:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 47 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_rand.c: In function ‘main’: lat_rand.c:39:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 39 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_usleep.c: In function ‘main’: lat_usleep.c:204:17: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 204 | lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ lat_cmd.c: In function ‘main’: lat_cmd.c:40:44: warning: implicit declaration of function ‘lmbench_usage’ [-Wimplicit-function-declaration] 40 | if (parallel <= 0) lmbench_usage(ac, av, usage); | ^~~~~~~~~~~~~ 1381MB OK 1381MB OK 1381MB OK Using config in CONFIG.fedora Tue Mar 9 07:50:58 PM IST 2021 Latency measurements Tue Mar 9 08:15:47 PM IST 2021 Calculating file system latency Tue Mar 9 08:15:48 PM IST 2021 Local networking Tue Mar 9 08:19:34 PM IST 2021 Bandwidth measurements Tue Mar 9 08:21:32 PM IST 2021 Calculating context switch overhead Tue Mar 9 08:21:36 PM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.4-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance [sudo] password for sayak: Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 01:38:46 AM IST 2021 Latency measurements Thu Mar 11 01:57:08 AM IST 2021 Calculating file system latency Thu Mar 11 01:57:09 AM IST 2021 Local networking Thu Mar 11 02:01:00 AM IST 2021 Bandwidth measurements Thu Mar 11 02:02:55 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:03:00 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sayaksarkar KVM x86_64, Fedora-Workstation-34-20210307, GNOME 40, Kernel - 5.11.5-300.fc34.x86_64
Pass pass
[1]
  1. [sayak@fedora kernel-tests]$ sudo ./runtests.sh [sudo] password for sayak: Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled [sayak@fedora kernel-tests]$ sudo ./runtests.sh -t performance Test suite called with performance Using config in CONFIG.fedora Thu Mar 11 02:22:08 AM IST 2021 Latency measurements Thu Mar 11 02:40:06 AM IST 2021 Calculating file system latency Thu Mar 11 02:40:08 AM IST 2021 Local networking Thu Mar 11 02:43:54 AM IST 2021 Bandwidth measurements Thu Mar 11 02:45:45 AM IST 2021 Calculating context switch overhead Thu Mar 11 02:45:49 AM IST 2021 ./performance/lmbench3 PASS Test suite complete PASS Your log file is being submitted... FAS password: Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
sgraf Intel NUC10i7FNH, 5.11.4-300.fc34.x86_64
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
sixpack13 test day image; HW: Intel Core i5-3475S (Ivybridge 3rd Gen.), RAM 12 GB, SATA HD: SAMSUNG HD502HJ
Pass pass
[1]
  1. ./default/libhugetlbfs: SKIP ./default/paxtest: SKIP

    =[edit]

    after starting "sudo ./runtests.sh -t performance" I see this ! is this the test or a bug ?

    Test suite called with performance lib_timing.c: In function ‘touch’: lib_timing.c:1626:9: warning: type defaults to ‘int’ in declaration of ‘psize’ [-Wimplicit-int]

    1626 |  static psize;
         |         ^~~~~
    

    lib_sched.c: In function ‘handle_scheduler’: lib_sched.c:94:3: warning: ‘return’ with no value, in function returning non-void

      94 |   return;
         |   ^~~~~~
    

    ...

sumantrom Test Day image on KVM
Fail fail
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: Clear CPU buffers; SMT Host state unknown
t3rm1n4l ASUS P8Z77 V-pro, i7 3770, 16 Gb DDR3 Ram @1600Mhz [XMP]
Pass pass
[1]
  1. first test run failed on cachedrop, but all passed on second run (default, performance). Noted the following in journalctl -k: pcspkr: version magic '5.10.21-200.fc33.x86_64 SMP mod_unload ' should be '5.11.4-50.fc33.x86_64 SMP mod_unload ' Doesn't seem to affect the functionality of the kernel though.
t3rm1n4l Dell Inspiron 3180 11"
Fail fail
[1]
Fail fail
[2]
  1. RHBZ #1936791 adding bug entry, as noted, appears to be framebuffer issue with AMD STONEY APU, does not boot past GRUB kernel selection on 5.11 kernel, cannot ctrl+alt+del or change to a different tty, only option is to hit the power button and select a different kernel
  2. LUKS encryption enabled on this system, system does not boot with 5.11 kernel series, system doesn't even reach the prompt to decrypt the disk, just sits there with a white cursor in the corner of the screen.
theloudspeaker Ideapad Flex 5, Ryzen 5 4500u. 5.11.3-50.fc33.x86_64
Pass pass
[1]
  1. Both the tests, default as well as performance tests passed.
theloudspeaker Intel core 2 duo. 2GB RAM 1GB swap.
Pass pass
[1]
  1. default test suite result is WARN performance test suite result is PASS
trugul ThinkPad X1 Carbon 4th, 8 GB, Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 , Mesa Intel® HD Graphics 520 (SKL GT2)
Pass pass
tseewald Dell Latitude 7490 (Intel i7-8650U, UHD 620, 16GB RAM, 970 EVO)
Pass pass
[1]
  1. Default test passed. Performance test passed. No new warnings or errors in dmesg compared to 5.10.
user am GiB, processor AMD® Athlon(tm) ii x2 250 processor × 2 , grafik AMD® Rs880, festplatte GB, Kernel: 5.11.4-50.fc33.x86_64
Pass pass
vty67 Dell Latitude E5470, 4GB RAM, i5 CPU
Fail fail
[1]
  1. Can't finish booting from ISO testing image, kernel panics during boot and system freezes
vty67 Dell Latitude E6320, 2GB, i3-2330M
Pass pass
[1]
  1. libhugetlbfs SKIP paxtest SKIP, other PASS, everything works
vty67 HP ProBook 640 G5, 8GB RAM, i5-8265U CPU
Pass pass
[1]
  1. tests passed, no audio output (headphones, HDMI, internal speakers not detected), HDMI video output OK, WiFi OK
vty67 Thinkpad T440p, 16GB, i5-4300M
Pass pass
[1]
  1. 1. libhugetlbfs SKIP, paxtest SKIP, other PASS, everything works
yosukemat Ryzen 9 5900X X570 - Boxes VM - Test image kerneltest-5.11.4
Fail fail
[1]
  1. FAILED Default Test Suite Log - https://pastebin.com/rRjv58ws PASSED Performance Test Suite Log - https://pastebin.com/k9MrKRd6