Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
JeremyM | Sony Vaio Intel i5 | [1] |
1.
Both default and performance test passed. Note: When announcing test day on fedoramagazine, please reference this guide: https://docs.fedoraproject.org/en-US/quick-docs/kernel/howto-kernel-testday/
so we avoid comment like: "Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel uname -a Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux What can i do ti check my system? Thanks. "
|
MidnightRAT | Fedora 30 stock | [1] |
1.
Cant find info about check procedure on stock distrro with "kernel-stabilization" kernel
uname -a
Linux rat 5.2.2-200.fc30.x86_64 #1 SMP Sun Jul 21 23:24:06 UTC 2019 x86_64 x86_64 x86_64
GNU/Linux
What can i do ti check my system?
Thanks.
|
alciregi | Baremetal i5-7400 8GB RAM | [1] |
1.
Test suite called with performance
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
alciregi | Lunanode m.16 cloud instance x86_64 16GB RAM 6 vCPU | [1] |
1.
Checking for kernel signature:
The signer's common name is Fedora Secure Boot Signer
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional
cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
alciregi | RPi3 armv7hl | [1] [2] |
1.
Test suite called with destructive
2. Test suite called with default |
alciregi | Scaleway START1-XS x86_64 cloud instance | [1] |
1.
Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
alciregi | aarch64 on KVM | [1] |
1.
Test suite called with default
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable
|
alciregi | vmware 4GB ram 2vcpu | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT
Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
archmunky | Bare metal: i5-6600K, 32GB RAM, 64GB SSD, AMD RX580 8GB; Running Cinnamon 4.0.10 with LightDM | [1] |
1.
Standard: https://apps.fedoraproject.org/kerneltest/logs/34940
sysfs-perms WARN - Found world-writable files in sysfs: /sys/kernel/debug/dri/0/ras/ras_ctrl; libhugetlbfs SKIP; rest
PASS
Performance: https://apps.fedoraproject.org/kerneltest/logs/34942
All PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
archmunky | Libvirt VM, 4 core/4G RAM/20G SSD, Cinnamon, LightDM | [1] |
1.
runtest: libhugetlbfs SKIP, all other PASS; performance: all PASS
|
atim | CPU: Quad Core AMD Athlon X4 845 | GPU: NVIDIA GeForce GTX 1060 6GB (v: 430.26) | Fedora 30 | [1] |
1.
Test suite called with default - PASS (except paxtest as always)
Test suite called with performance - PASS
|
benjamind | VMware Workstation on Fedora 30 host (i7-6500U) | [1] |
1.
cachedrop failed as part of the default test (TestError: Can't free dentries and inodes), but passed when run separately
|
calinoiualex | Test image ran in KVM. 8 cores, 4 GiB RAM. Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz | [1] |
1.
1. Pass
2. Pass
Ran with performance argument
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
|
chuhu | NEC Express5800/R120b-2 [N8100-1708F] FR2.7; Intel(R) Xeon(R) CPU E5620 @ 2.40GHz 7857 MB memory, 1074 GB disk space ( 2 socket 8 core, 16 processor, 2 nodes); | [1] |
1.
Ran trinity testings and scheduler testings suits.
|
danniel | KVM | [1] |
1.
works
|
dinostar | Bare metal, Lenovo T550, i7-5600U , 16 GB RAM, Fedora 30, Cinnamon desktop | [1] |
1.
The following test was skipped, everything else was a pass.
./default/libhugetlbfs SKIP
|
eboswell | Bare metal desktop with test day image, AMD Phenom 8650 triple-core processor, 7 GiB memory | [1] [2] |
1.
Test suite called with performance. Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not
affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling
2. Test suite called with default. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, STIBP: disabled, RSB filling |
glb | Bare metal, Core i7-920, 12GB RAM | [1] |
1.
All default test suite passed.
|
goodmirek | bare metal x86_64, i5-7200U w/embedded GPU, HW model HP 850 G4 | [1] |
1.
KDE, VPN IPsec, VirtualBox 6.0.8, podman 1.4.4.
|
heffer | ThinkPad X1 Carbon 5th | [1] [2] |
1.
WiFi fails with Access Points that support energy saving features: https://bugzilla.kernel.org/show_bug.cgi?id=203577
Works fine with kernel-5.1.18-300.fc30.x86_64
2. #1724357, Regression from closed bug https://bugzilla.redhat.com/show_bug.cgi?id=1724357 |
idanka | Fujitsu Esprimo p520 E85+ / Intel Core i5-4570 / GeForce GTX 1050 | [1] |
1.
./default/libhugetlbfs SKIP ./default/paxtest FAIL all other pass
thirdparty/nvidia-module error
performance: fatal error: rpc/rpc.h: No such file or directory
|
jlanda | bare metal ryzen 5 1600x | ||
kiyer | Virtual machine on hypervisor with 8GB RAM and 30 GB harddisk | ||
kparal | Thinkpad T480s, Fedora 30 | ||
lewis41 | i5-6500 CPU @ 3.20GHz | ||
lewis41 | i5-6500 CPU @ 3.20GHz - 8GB RAM | ||
lnie | ProLiant SL4545 G7 | ||
luya | HP Envy x360 15-cp0xxx (Ryzen 2500U APU) | [1] |
1.
Kernel 5.2.1-200 from the kernel-stabilization has a broken signature for secure boot.
|
masami | Bare metal i7-9700K, 64GB RAM, Intel UHD Graphics630 | [1] |
1.
Kernel regression test passed. Sound, Video, Network, KVM work fine. Running computer around 2 days, didn't get any kernel oops/warnings.
|
masami | Raspberry Pi 3B+ aarch64 | [1] |
1.
kernel regression tests passed.
|
mharpau | Fedora 30 T480s i5-8250U iGPU | ||
mimat | fedora 30@i7-2630QM | ||
mizhang | Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel 5.2.2 | ||
mizhang | Intel(R) Xeon(R) CPU E5-2603, 16GRAM, 2 numa nodes,Fedora 30, kernel-5.2.2-200.fc30.x86_64 | [1] |
1.
LTP from upstream
sched pass, syscalls failed with case move_pages12, can pass, cve pass, commands pass, containers pass, dio pass
fs pass, fsx pass, math pass, hugeltb pass, mm failed with case
ksm06_1 and ksm06_2 , numa failed with case move_pages12 , nptl pass, pty pass,timers pass, ipc pass, tracing pass
|
monot0m | Intel® Core™ i5-2410M CPU @ 2.30GHz × 4 Portege R830 BIOS 4.10 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Intel® Core™ i5-3317U CPU @ 1.70GHz × 4 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Intel® Core™ i5-7200U CPU @ 2.50GHz × 4 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Intel® Core™ i7-4510U CPU @ 2.00GHz × 4 Toshiba Portégé Z30-A BIOS 4.20 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable:
Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
monot0m | Intel® Core™ i7-6500U CPU @ 2.50GHz × 4 Toshiba Portégé Z30-C BIOS 6.80 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable:
Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Intel® Core™ i7-7500U CPU @ 2.70GHz × 4 Toshiba X40-D BIOS 3.60 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable:
Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Intel® Core™ i7-8550U CPU @ 1.80GHz × 8 Toshiba X30T-E BIOS 1.70 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable:
Clear CPU buffers attempted, no microcode; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
monot0m | Toshiba Portégé Z20T-B Intel C M-5Y51 BIOS ver 6.60 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation:
Clear CPU buffers; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
|
nah Fam | vmware. kerneltest-5.2.iso . 2gb RAM 20Gb hd. 1core cpu | [1] |
1.
Test 1
./default/cachedrop FAIL
Test suite complete FAIL
Test 2
./performance/lmbench3
PASS
Test suite complete PASS
|
nightromantic | Bare metal, desktop, F30@Intel i3-8100 | [1] |
1.
./default/sysfs-perms gave me "WARN" result, all the other tests -- "PASS".
./runtests.sh -t performance -- "PASS"
|
numasan | HP EliteBook 820 G4 | [1] |
1.
Test set: default
|
ozeszty | F30 Cinnamon on Dell laptop with IvyBridge/AMD 7670m, kernel 5.2.2 from copr | [1] |
1.
./default/libhugetlbfs skipped as usual, default and performance passed.
|
ozeszty | F30 KDE, Skylake laptop on kernel 4.2.2 from koji | [1] |
1.
./default/libhugetlbfs skipped, default and performance passed.
|
pmeyer | AMD® Athlon(tm) ii x2 250 processor × 2 | [1] |
1.
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564
132196.log.txt
file:///home/liveuser/kernel-tests/logs/kernel-test-1564132445.log.txt
|
pwhalen | Banana Pi (armhfp) | ||
pwhalen | Mustang (xgene-1) | [1] [2] |
1.
make not installed on first run. Second attempt passed - https://apps.fedoraproject.org/kerneltest/logs/34914
2. https://apps.fedoraproject.org/kerneltest/kernel/5.2.2-200.fc30.aarch64 |
pwhalen | Pine 64 Plus (aarch64 sbc) | [1] |
1.
https://apps.fedoraproject.org/kerneltest/logs/34917
|
pwhalen | Raspberry Pi 3B+ (armhfp) | ||
pwhalen | Trimslice (armhfp) | [1] |
1.
Test suite complete - WARN
https://apps.fedoraproject.org/kerneltest/logs/34921
|
pwhalen | Wandboard Quad (armhfp) | [1] |
1.
https://apps.fedoraproject.org/kerneltest/logs/34921
|
ralex | Ryyzen 2600x | 16 GB Ram | Nvidia GTX 1080 | [1] |
1.
Default passed (https://apps.fedoraproject.org/kerneltest/logs/35167)
Performance passed (https://apps.fedoraproject.org/kerneltest/logs/35168)
|
rammodulus | Virtualbox 6.0.8 VM of test day image. All VB defaults except 4 cores, 4GB ram, 30GB HDD, VBoxSVGA graphics controller and 3D acceleration. | [1] |
1.
Default FAIL, performance PASS. Had trouble with the regression test files included on test day iso, had to clone from git for them to run successfully.
Vulnerability
status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT Host state unknown
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
|
rudrapratap | qemu-kvm-3.0.1-3.fc29.x86_64 , base - fedora 29, Intel® Core™ i7-5600U CPU @ 2.60GHz × 4 , kernel - 5.1.11-200.fc29.x86_64 | [1] |
1.
Test suite called with default
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/selinux-dac-controls PASS
./default/paxtest PASS
./default/memfd PASS
./default/stack-randomness PASS
./default/cachedrop PASS
./default/mq-memory-corruption PASS
./default/modsign PASS
./default/libhugetlbfs SKIP
./default/insert_leap_second PASS
./default/timer-overhead PASS
Test suite complete PASS
|
salimma | Bare metal: Thinkpad T480s | [1] |
1.
Default and performance profiles pass
|
sumantrom | T470s | [1] |
1.
Called with default
|
tmlgcq | QEMU with KVM Virtual | ||
tmsp | Ryzen 1800X; 16 GB RAM; F30 | ||
user | default | ||
vascom | Bare metal, Core i7-4470, 32GB RAM | [1] |
1.
All good.
|
weswilliams | VMware Workstation 15.1.0 on Fedora 30 host | [1] |
1.
All default test suite passed.
|