F29 Kernel 4.18 Test Day

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2018-08-21_Kernel_4.18_Test_Day
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and reloaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Anway_Pict Anway [1] 1. #1625187, This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
BikramUTD Dell Alienware 17x + Test day image
Prashant prashantdalvi [1] 1. #1625187, This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
Renault F29 x86_64
Renault F29 x86_64 4.18.1-300 [1] 1. cache drop failed
aeperezt 4.18.3-300.fc29.x86_64 #1 SMP
aeperezt 4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7
aeperezt aeperezt
alciregi 4.18.1-300.fc29.armv7hl Raspberry Pi 3
alciregi 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360) [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
alciregi 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5) [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
alciregi 4.18.3-300.fc29.x86_64 Intel E5800 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
anandprakash VM
blackfile 4.18.1-300.fc29.x86_64 - performance tests [1] 1. /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
blackfile 4.18.1-300.fc29.x86_64, default tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
blinker09 KVM F29 Asus ROG
bt0dotninja Lenovo thinkpad T440s Core i5 vPro F28 [1] 1. both test pass * from default test: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW * From performance test: Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622. ./performance/lmbench3 PASS
ccaudle kernel regression, standard and performance [1] 1. Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell. No regressions seen in sshd or nfs client.
chuhu NEC Express5800/R120b-2 8G 16 processors [1] 1. Run trinity and stress-ng testings, did not hit issue.
chuhu SGI UV2000 12G memory 64 processors [1] 1. #1619508, on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0
davisclick default [1] 1. OK
davisclick destructive [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
davisclick minimal [1] 1. Ok
davisclick performance [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
davisclick stress [1] 1. mmap001 0 TINFO : mmap()ing file of 10000 pages or 40960000 bytes mmap001 1 TPASS : mmap() completed successfully. mmap001 0 TINFO : touching mmaped memory mmap001 2 TPASS : we're still here, mmaped area must be good mmap001 3 TPASS : synchronizing mmapped page passed mmap001 4 TPASS : munmapping testfile.30155 successful mmap001 0 TINFO : mmap()ing file of 1000 pages or 4096000 bytes mmap001 1 TPASS : mmap() completed successfully. mmap001 0 TINFO : touching mmaped memory mmap001 2 TPASS : we're still here, mmaped area must be good mmap001 3 TPASS : synchronizing mmapped page passed mmap001 4 TPASS : munmapping testfile.30156 successful mtest01 0 TINFO : Total memory already used on system = 4291964 kbytes mtest01 0 TINFO : Total memory used needed to reach maximum = 3975212 kbytes mtest01 1 TFAIL : mtest01.c:180: More memory than the maximum amount you specified is already being used
decathorpe 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB
fredlima VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vbox guest.ko.xz [1] 1. running for 5 hours, stuck after sysfs-perms with PASS result.
giardia KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010 [1] 1. I like the decision to disable speck crypto cipher in the kernel default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory #include <rpc/rpc.h> ^~~~~~~~~~~ compilation terminated.
guazhang KVM [1] 1. kernel-4.18.1-300.fc29.x86_64 https://upstreamfirst.fedorainfracloud.org/mdadm.git
jayeshc jayeshchaudhari [1] 1. #1625187, This test case is for emoji working in Fedora 28 but not in Fedora 29.
jiji 4.18.1-300.fc29.x86_64,kvm [1] 1. run some ipv6 testcases,all pass
jishi 4.18.3-300.fc29.x86_64 [1] 1. basic protocol traffic, tcp, udp, multicast and sctp
jishi geneve basic test [1] 1. geneve basic test, add geneve over ipv4 and ipv6, run traffic
jishi gre basic test [1] 1. add gre and run traffic
jishi ipv6 socket test [1] 1. basic ipv6 socket options
jishi route functions [1] 1. basic route test, route table, rule table and all options for route table and rule
jishi vxlan basic test [1] 1. add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic
jlanfa libvirt @ fc28 [1] 1. All test passed
josereyesjdi [1] 1. Default, ok
josereyesjdi default [1] 1. Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lbazan Lenovo t470 i5-7200U [1] 1. OK!
lbazan Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2) [1] 1. 1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
lilin kvm [1] 1. kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass
lnie 4.18.1-300.fc29.x86_64 Dell PowerEdge R720 [1] 1. default and performance tests passed
lruzicka Fedora 28 with 4.18.1 kernel, default tests [1] [2] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
2. The libhugetlbfs was skipped, otherwise all tests passed.
lruzicka Fedora 28 with 4.18.1 kernel, performance tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lruzicka Fedora 28 with 4.18.3 kernel, default tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lruzicka Fedora 28 with 4.18.3 kernel, performance tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
maryonday 4.16.3-301.fc28.x86_64 [1] 1. Nice https://paste.fedoraproject.org/paste/IojYqb415u6P6tn87uyLSw
masami Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K [1] 1. regression test passed. kvm, docker, sound and video worked fine.
nabooengineer us_EN [1] 1. Virtual Box Version 5.2.18 r124319, FC29 TestDays 4.18.5-300.fc29.x86_64 Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
ozeszty F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240 [1] 1. All good, ./default/libhugetlbfs was skipped. /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
ozeszty F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m [1] 1. As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.
pifang Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM [1] [2] 1. 4.18.1-300.fc29
2. ltp vmm relate.
pifang Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM [1] [2] 1. 4.18.1-300.fc29
2. vmm test.
potty default [1] [2] 1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5 Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second FAIL ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/stack-randomness PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second FAIL ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/stack-randomness PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
potty minimal [1] [2] 1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5 Test suite called with minimal Test suite complete PASS
2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with minimal Test suite complete PASS
potty performance [1] 1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with performance ./default/lmbench3 PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
pyadav kernel-4.18.3-300.fc29.x86_64 on F28 [1] 1. ./default/libhugetlbfs test was skipped, rest all passed for default test
quadj4 thinkpad Z lenovo running test day image
qzhao KVM [1] 1. #1619122, Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32 Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.
saloni raj Fedora 29 Dell Latitude
spathare 4.18.3-300.fc29.x86_64
temjin747 Test Day Image [1] 1. Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2. Host machine: HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64. VM info: 2 vCPUs, 2 GB RAM KVM hypervisor x86_64 architecture emulator: /usr/bin/qemu-kvm chipset: i440FX
testuser x86_64 [1] 1. test
thom Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64 [1] 1. Vulnerabilities: PTI Inversion PTI SSB disabled via prctl and seccomp __user pointer sanitzation Full generic retpoline, IPBP, IRBR_FW
truptiPict
xifeng 4.18.3-300.fc29.x86_64 [1] 1. run some cifs tests
zsun 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620) [1] [2] [3] 1. The same issue also happens on 4.18.1-300
2. Sorry, I mean 4.18.0-1.fc29.aarch64
3. #1616193, ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)
zsun 4.18.0-1.fc29.armv7hl with raspberry pi 2 [1] [2] 1. The same failure also happens on 4.18.1-300
2. #1619081, ftrace function_graph cause soft lockup
zsun 4.18.1-300.fc29 in kvm [1] 1. #1619616, System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.
Wiki Metadata