From Fedora Project Wiki

Kernel 5.15 Test Week

Date 2021-11-14 to 2021-11-21
Time all week

Website QA/Test Days
IRC #fedora-test-day[?] on Libera
Mailing list test


Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

This Test Day will focus on the 5.15 Linux kernel. The primary aim is to test on Fedora 35 and 34.

Who's available[edit]

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:

You can chat with us on IRC. See the infobox on top of the page to learn the right IRC channel.

Prerequisite for Test Day[edit]

  • A fully updated F35 test day image or Fedora 34 or 35 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 5.15 kernel for an existing installation from F35 koji (see below) or kernel-stabilization copr if not using the test day image. (koji is recommended for secure boot users).
  • Fedora Silverblue and Kinoite users can test using the koji kernel above as well. Download the kernel, kernel-core, kernel-modules, and kernel-modules-extra packages locally and install it with rpm-ostree override replace <path_to_kernel> <path_to_kernel-core> <path_to_kernel-modules> <path_to_kernel-modules-extra>
  • Enough free space on HDD

Koji download instructions[edit]

Kernel builds can be downloaded from Koji using a command-line tool.

Install Koji if not installed:

sudo dnf install koji

You can list available kernel builds with:

koji list-builds --package=kernel --after="2021-11-12" | grep "5.15"

Download the 5.15 kernel build you wish, for example kernel-5.15.2-300.fc35:

koji download-build --arch=x86_64 kernel-5.15.2-200.fc35

Update your kernel:

sudo dnf update kernel-*.rpm

And reboot.

How to test?[edit]

Run the tests[edit]

  1. Follow the instructions in this test case. For users running the test day image, the tests are pre-installed in /home/liveuser/kernel-tests/.
  2. Visit the result page and enter your result in the 'Regression' column by clicking Enter result.
  3. If there are any other result columns, click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.
  4. While the results from the regression tests are interesting, we are also interested in your overall experience with the new kernels.

Reporting bugs[edit]

Note to Virtualbox users: By default, the insert_leap_second test will fail, this is because Virtualbox syncs the guest time with the host in the middle of the test. This is not a kernel or test suite failure, it is a Virtualbox design issue. It should skip this test if your kernel-tests repo has been updated since 2021-09-12.

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
Ahmedalmeleh Vmware on Asus Vivobook X409JA (Intel Core i5 1035G1
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
akumar99 Virtualbox, Ryzen 3900x
Fail fail
Pass pass
alciregi Lenovo V330-15IKB Type 81AX
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Lenovo X1 Crabon gen 8
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Pinebook Pro
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Branch predictor hardening /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi Raspberry Pi 3 aarch64 no GUI
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Not affected /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alciregi i5-7400 8GB RAM Desktop
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
alexhaydock Lenovo ThinkPad X240
Pass pass
[1]
  1. Default kernel regression test case run passed
atim CPU: AMD Ryzen 3 3300X; Graphics: Radeon VII
Pass pass
bandithijo kernel-5.15.2-200.fc35.x86_64 on Lenovo ThinkPad X260 Intel i5-6300U
Pass pass
[1]
  1. Default & Performance tests pass
belegdol Ryzen 5 5600x, RTX 2070, ASRock Fatal1ty B450 Gaming-ITXac
Pass pass
[1]
Pass pass
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: always-on, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
bittin Virtualbox - F34
Pass pass
Fail fail
Pass pass
Pass pass
bittin Virtualbox - F34 - 5.15.3
Pass pass
bittin Virtualbox - F35
Pass pass
Pass pass
Fail fail
Pass pass
bittin Virtualbox - F35 - 5.15.3
Pass pass
bojan Lenovo ThinkPad T450s, Noname fanless PC with Intel Core i5-8250U, kernel 5.15.2-200.fc35.x86_64
Pass pass
[1]
  1. Both default and performance tests pass on ThinkPad T450s. The kernel also runs on the other machine from the profile.
bretth 5.15.2 KVM
Pass pass
[1]
  1. Default & performance tests pass
bretth 5.15.3 KVM
Pass pass
[1]
  1. Default & performance tests pass
bytehackr Kernel 5.15.2 on Lenovo P1 Gen3
Pass pass
[1]
  1. Default test Pass.
clnetbox Intel Core i7-10875H | 16 GB (32 GB) DDR4-3200 Crucial | NVIDIA GeForce RTX 2070 Refresh
Pass pass
[1]
  1. Everything works as expected ... no noticeable issues so far.
condor HP EliteBook 8470p baremetal w/Intel i5-3320M processor
Pass pass
condor virt-manager, test day image
Pass pass
copperi 5.15.2-200.fc34.x86_64 F35 32Gb Ryzen 7 3700x NVIDIA GP106GL [Quadro P2200]
Pass pass
couchfox Dell Inspiron 7577 - Intel Core i5-7300HQ
Pass pass
[1]
  1. Performance test: PASS
couchfox Dell Inspironn7577 - Intel Core i5-7300HQ
Pass pass
[1]
  1. All PASS (unless SKIP)
daniels Lenovo 2in1 14 IdeaPad Intel Core Processor (Skylake, IBRS) × 4 QEMU Standard PC _Q35 + ICH9, 2009_
Pass pass
[1]
  1. Regression and Performance Tests : Passed (Gnome 40.4)
dbrendel T14s Gen1 in kvm
Pass pass
donaldsebleung Kernel 5.15.2; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4
Pass pass
donaldsebleung Kernel 5.15.3; QEMU Standard PC _Q35 + ICH9, 2009_; 2.4 GiB RAM; Intel Core Processor (Haswell, no TSX, IBRS) x 4; KVM virtualization
Pass pass
dumprop Virtualbox - F35
Fail fail
[1]
  1. ./default/cachedrop PASS ./default/insert_leap_second SKIP ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead FAIL Test suite complete FAIL Your log file is being submitted... Upload successful! The following information is not submitted with your log; it is for informational purposes only. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX unsupported /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
fuller https://linux-hardware.org/?probe=f850c51db9
Pass pass
garrmcnu Test image on VM (KVM)
Pass pass
[1]
  1. Default and performance tests passed
geraldosimiao kernel-5.15.2-200.fc35.x86_64 on KVM- Qemu - UEFI
Pass pass
[1]
  1. No regressions found
geraldosimiao kernel-5.15.2-200.fc35.x86_64 on baremetal ACER Aspire
Pass pass
[1]
  1. ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000 Kernel regression tests PASSED
geraldosimiao kernel-5.15.3-200.fc35.x86_64 on baremetal ACER Aspire
Pass pass
[1]
  1. ACER Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Memory: 15.4 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000. Kernel regression tests PASSED
grgivs GNOME Boxes (test day image)
Fail fail
[1]
  1. ./default/cachedrop FAIL ./default/paxtest SKIP ./default/libhugetlbfs SKIP
gtwilliams KDE F35 Intel(R) Xeon(R) W-2225 CPU @ 4.10GHz
Pass pass
guiltydoggy Ryzen 5900X X570 - Fedora Kinoite 35 - Tests run on bare metal in Toolbox
Fail fail
[1]
  1. Test suite called with default ./default/cachedrop FAIL ./default/insert_leap_second SKIP ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign SKIP ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls SKIP ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS Test suite complete FAIL ./drop_caches.sh: line 45: /proc/sys/vm/drop_caches: Permission denied 14 │ TestError: Can't free pagecache 15 │ 5432496 16 │ Could not run tests
hobbes1069
Pass pass
[1]
  1. I've also been using the kernel for a day or two without any issues.
hricky AMD Athlon(tm) 64 X2 Dual Core Processor 4200+, 4 GB RAM, Bare Metal, 5.15.5-200.fc35, CoreOS
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
  1. performance
  2. destructive
  3. stress
hricky Intel Core i5-2500 CPU @ 3.30 GHz, 32 GB RAM, Test Day Image
Pass pass
[1]
Pass pass
[2]
Pass pass
[3]
  1. performance
  2. destructive
  3. stress
hricky Intel(R) Celeron(R) CPU G3900 @ 2.80GHz, 4GB RAM, Bare Metal, CoreOS/Next, kernel-5.15.5-200.fc35
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
  1. performance
  2. destructive
  3. stress
hricky Intel(R) Celeron(R) D CPU 3.33GHz, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
  1. performance
  2. destructive
  3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
hricky Intel(R) Pentium(R) D CPU, 2 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
Pass pass
[4]
  1. performance
  2. destructive
  3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
  4. default
hricky Intel® Core™ i7-4790 CPU, 32 GB RAM, Bare Metal, Fedora Linux 35 (Workstation Edition)
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
  1. performance
  2. destructive
  3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
hricky Pentium(R) Dual-Core CPU E5200 @ 2.50GHz, 4 GB RAM, Bare Metal, CoreOS 35.20211107.1.0 Next
Pass pass
[1]
Pass pass
[2]
Fail fail
[3]
  1. performance
  2. destructive
  3. stress ./stress/ltp FAIL, ./stress/ltp/ltp/lib/newlib_tests FAIL
idanka GNOME Boxes (test day image) hw: Fujitsu P520, i5 4570, nvidia gtx 1650
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
imalone Legion 5 Pro 16ACH6H 5800H RTX3070
Pass pass
[1]
  1. Test suite and performance test suite. thirdparty test PASS. Skipped: ./default/paxtest ./default/libhugetlbfs. MediaTek mt7921e, bluetooth and wireless working with 5.15.2-200.fc35.x86_64
itrymybest80 5.15.2-200.fc35.x86_64 (koji/upgrade)
Pass pass
[1]
  1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
itrymybest80 5.15.3-200.fc35.x86_64 (koji/update)
Pass pass
[1]
  1. Default & performance regression tests PASS, libhugetlbfs & paxtest was skipped.
jakfrost default
Pass pass
[1]
  1. Ran test on bare metal UEFI system with AMD 5600G CPU (on board graphics). Used live ISO to run tests without installing to system. All tests came back PASS.
jimrayjoebob Gigabyte B550M DS3H, Ryzen 5 5600g, test day image
Pass pass
jishi@redhat.com Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GH
Pass pass
[1]
Pass pass
[2]
Pass pass
[3]
Pass pass
[4]
Pass pass
[5]
  1. ipv6 basic socket test
  2. route table basic, add/delete/modify/flush/list route with ip route command
  3. geneve basic, 1. add geneve over ipv4 and ipv6 2. ping over geneve 3. check geneve header in the packets 4. run iperf over geneve
  4. vxlan basic test, 1. add vxlan over ipv4 and ipv6 , ip link add vxlan1 type vxlan id 42 remote $remote_ip local $local_ip dev $dev 2. run ping over vxlan 3. check vxlan header in the packet 4. run iperf over vxlan
  5. gre basic: 1. add gre with ip link add gre1 type gre local $local_addr remote $remote_addr 2. ping over gre 3. check gre header for the packet 4. run iperf over gre
jpbn F35
Warning warn
[1]
  1. test PASS performance test Fail (first time Terminal crash; 2nd time terminal and firefox crash)
jritter Lenovo ThinkPad W530
Pass pass
kisk VirtualBox VM Fedora 35, Kernel updated to 5.15.2-200.fc35.x86_64
Fail fail
[1]
  1. The tests in the default test suite that were skipped: cachedrop, insert_leap_second, and paxtest. The other tests passed. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/... The performance tests hang on bandwidth measurements.
kodirovshchik Kernel: 5.15.2-200.fc35.x86_64 Release: Fedora release 35 (Thirty Five)
Pass pass
[1]
Pass pass
  1. Test suite called with default: ./default/libhugetlbfs SKIP ./default/paxtest SKIP Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: flush not necessary, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Unknown: Dependent on hypervisor status /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
kokoseij Inspiron 5515 with Ryzen 5700U / DDR4 8GB RAM
Pass pass
[1]
Pass pass
[2]
  1. Updated from Pre-existing Fedora 35 setup. All test cases and performance tests passed without an issue.
  2. Updated from pre-existing Fedora 35 environment
lejeczek Lenovo e14 g3 AMD Ryzen 4500U
Pass pass
[1]
  1. Thanks! Test suite called with default ./default/cachedrop PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP ./default/memfd PASS ./default/modsign PASS ./default/mq-memory-corruption PASS ./default/paxtest SKIP ./default/posix_timers PASS ./default/selinux-dac-controls PASS ./default/stack-randomness PASS ./default/sysfs-perms PASS ./default/timer-overhead PASS ./thirdparty/nvidia-module WARN
lily ampere hr350a
Pass pass
[1]
Pass pass
[2]
  1. all default and performance testcases passed
  2. all default and performance testcases passed
lily apm mustang
Pass pass
[1]
  1. all default and performance testcases passed
lily dell pe
Pass pass
[1]
  1. all default and performance testcases passed
lily dell per7415
Pass pass
[1]
  1. all default and performance testcases passed
lily fujitsu fx700
Pass pass
[1]
  1. all default and performance testcases passed
lily hp moonshot
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe apollo
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe dl325gen10
Pass pass
[1]
  1. all default and performance testcases passed
lily hpe dl560egen8
Pass pass
[1]
  1. all default and performance testcases passed
lily ibm x3250m4
Pass pass
[1]
  1. all default and performance testcases passed
lily lenovo rd230
Pass pass
[1]
  1. all default and performance testcases passed
lily qualcomm amberwing
Pass pass
[1]
  1. all default and performance testcases passed
marc84 kerneltest-5.15.2.iso on HP Laptop 14-cf2033wm
Fail fail
[1]
  1. Test suite called with default: ./default/selinux-dac-controls PASS ./default/sysfs-perms PASS ./default/paxtest SKIP ./default/timer-overhead PASS ./default/memfd PASS ./default/cachedrop FAIL ./default/mq-memory-corruption PASS ./default/modsign PASS ./default/posix_timers PASS ./default/stack-randomness PASS ./default/insert_leap_second PASS ./default/libhugetlbfs SKIP Test suite complete FAIL
masami i7-9700K(UHD Graphics 630), ASRock Z390 Extreme4 baseboard, UEFI, F35 Workstation, 5.15.2-200.fc35.x86_64
Pass pass
[1]
  1. Default & performance tests passed. Works fine for daily use.
niarch Oracle Virtual Box - 2 processors, 4GB RAM Thinkpad T580 running over Kubuntu 20.04
Pass pass
nicolas AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K
Pass pass
nicolas AMD A10 9700 32GBDDR4 2400MHZ ASUS PRIME A320M-K FEDORA 35 KDE KERNEL 5.15.2-200.FC35.X86_64
Pass pass
norbertj kerneltest-5.12.2.iso on desktop PC with Ryzen 3 3200G, B450 chipset and 16 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.15.2.iso on Ideapad V110-15ISK with Core i3-6006U and 8 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted.
norbertj kerneltest-5.15.2.iso on old desktop PC with Core i5-750, P55 chipset, Radeon HD6450 and 4 GiB RAM
Pass pass
[1]
  1. paxtest and libhugetlbfs SKIP (as usual), rest of default tests and performance tests PASS. No regressions noted. Sorry, typo in Profile for my other PC: I also meant kerneltest-5.15.2.iso.
oprizal 5.15.2-200.fc35.x86_64 on AMD A9-9420 radeon r5
Pass pass
[1]
  1. RHBZ #2023035 1. Noticed if including kernel-devel during the update will give warnings on running scriptlet part and most likely to failed (take too long) on verifying part. 2. Machine can't suspend, reboot, and shutdown on AMD A9-9420 radeon r5. In the past, on kernel 5.12.x my machine only failed to wake up from suspend on main laptop monitor but not on second monitor connected via HDMI. Installation done on kernel 5.14.18-300.fc35
oprizal 5.15.3-200.fc35.x86_64 on AMD A9-9420 radeon r5
Pass pass
[1]
  1. RHBZ #2023035 On 5.15.3 have same problem with 5.15.2, can't suspend, reboot, and poweroff. All regression test passed. Since I can't find other user here with AMD system that have same issue with me, may be it's just something wrong with my installation.
oumuamua Kernel 5.15.2 (VirtualBox)
Pass pass
[1]
  1. Default test suite Pass
pwhalen AMD Seattle (AArch64)
Pass pass
pwhalen APM Mustang X-Gene-1 (AArch64)
Pass pass
pwhalen Firefly2(rk3399)
Pass pass
pwhalen HR330a (aarch64)
Pass pass
pwhalen Nvidia Jetson Nano (aarch64)
Pass pass
pwhalen Nvidia Jetson Xavier NX (aarch64)
Pass pass
pwhalen Raspberry Pi 2 Model B (armhfp)
Pass pass
pwhalen Raspberry Pi 4 4GB (aarch64)
Pass pass
rai510 Gnome Boxes Kernel 5.15.2
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
rainmakerraw AMD Threadripper 3960X, Asus RoG Strix-E Gaming, 32GB DDR4 3600cl16, Samsung Evo Plus 960 nVME, Radeon Vega 56
Pass pass
[1]
  1. No issues.
rhodry
Pass pass
rhodry ASUS ROG STRIX G153QY. AMD Ryzen 9 5900hx. Radeon RX6800. Fedora 35. Kernel-5.15.2-200.fc35
Pass pass
sammy Fedora 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd
Fail fail
[1]
Pass pass
[2]
Fail fail
[3]
Pass pass
[4]
Pass pass
[5]
Fail fail
[6]
  1. RHBZ #0 x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
  2. RHBZ #0 x86_64 kernel-5.15.2-200.fc35 passed default and performance tests.
  3. RHBZ #0 x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
  4. RHBZ #0 x86_64 kernel-5.15.2-200.fc35 passed default and performance tests.
  5. RHBZ #0 Kernel x86_64 kernel-5.15.2-200.fc35 passed runtests and performance test.
  6. Kernel x86_64 kernel-5.15.2-200.fc35 did not pass runtests but passed performance test.
sammy Fedora Cinnamon 35 VM running in gnome box. Hardware is HP 240 G8 notebook with i3 1005G1 processor, 8gb RAM, Intel iris plus integrated graphics, 1tb hdd
Fail fail
[1]
  1. RHBZ #0 x86_64 kernel-5.15.2-200.fc35 failed default and passed performance tests.
sgraf 5.15.2 KVM with GUI
Pass pass
[1]
  1. Default and performance tests pass. GUI/Gnome works without any issues.
skipperTux kernel-5.15.2-200.fc35 Dell Precision 7560
Pass pass
[1]
  1. Mobile Dell Precision-Workstation 7560, Intel Xeon W-11955M, 64 GB ECC SODIMM, NVIDIA T1200 4 GB, Intel UHD Default & Performance tests PASS, libhugetlbfs and paxtest SKIP
solinvictuz Gnome Boxes
Pass pass
[1]
  1. default + performance
solinvictuz kerneltest iso on Dell XPS 13 7390, i7-10510U, 15,4GiB, UHD Graphics (CML GT2)
Pass pass
[1]
  1. default & performance test passed
t3rm1n4l Dell Inspiron 3180 11"
Pass pass
[1]
Pass pass
[2]
  1. All tests passed, bugs resolved in 5.15.3
  2. passes regression and performance tests. Unable to put laptop to sleep with 5.15.2 kernel, works fine in 5.14.18
t3rm1n4l i7-3770 16GB DDR3 @1600Mhz (XMP) Nvidia GTX1060 6 Gb
Pass pass
[1]
  1. 5.15.3 all tests passed
terkel Kernel 5.15.2 on Dell XPS 13 9310
Pass pass
[1]
  1. Default & Performance tests pass
tharadash HP EliteBook 840 G6 with SecureBoot
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: TSX disabled /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Mitigation: TSX disabled
tharadash HP Envy x360 13-ar0600nz
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash HP z820 workstation, FirePro w7000, UEFI
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash Intel NUC DC53427HYE
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tharadash Intel Z77, i7-3770k, RX570, SecureBoot
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: VMX disabled /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable: No microcode /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
tripledes Bare metal - AMD Ryzen 2700x, ASUS x470 Prime-PRO, AMD GPU (rx470 8GB)
Pass pass
trugul Lenovo ThinkPad Yoga 260, Intel® Core™ i5-6200U CPU @ 2.30GHz × 4, Mesa Intel® HD Graphics 520 (SKL GT2)
Pass pass
user bare metal fedora34 workstation on Gigabyte Technology Co., Ltd. GA-880GM-UD2H 64-bit
Pass pass
vpv Lenovo ThinkPad T480s, F35, 5.15.2-200.fc35.x86_64
Pass pass
[1]
  1. My kernel is tainted, because I have enable_fbc and enable_guc. The tests still pass.
wayne6001 5.15.2-200.fc35.x86_64 on Dell XPS 13 9350, Fedora 35
Pass pass
[1]
  1. Passed both default and performance tests
wayne6001 5.15.2-200.fc35.x86_64 on nuc6i5syk
Pass pass
[1]
  1. default and performance tests pass
woodywoodah Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U )
Fail fail
[1]
  1. cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well.
woodywoodah Lenovo Thinkpad P14S AMD ( AMD Ryzen 7 PRO 4750U ) 5.15.2-200.fc35.x86_64
Fail fail
[1]
  1. cachedrop test resulted in a FAIL. Everything else passed and the system otherwise seems to be performing well. /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling /sys/devices/system/cpu/vulnerabilities/srbds:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
xfgusta
Pass pass
[1]
Pass pass
  1. all default and performance testcases passed
yasharjit
Pass pass
[1]
  1. All default and performance test cases passed.
yasharjit GNOME Boxes
Pass pass
[1]
  1. All default and performances test cases passed
zackds Lenovo desktop 4th gen i3/ 8 GB DDR3/ 250 GB HDD ( https://linux-hardware.org/?probe=2e7ed34d33 )
Pass pass
[1]
  1. With the official test image even though it is Fedora 34, both tests PASS, libhugetlbfs & paxtest was skipped.
zeten30 ThinkPad T14s Gen 1
Pass pass