F29 Kernel 4.17 Test Day

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2018-06-12_Kernel_4.17_Test_Day
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and realoaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Klampth Toshiba Satellite Z930 [1] 1. Stable, no lagging
alciregi Dell XPS 13 9360 [1] 1. default PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
alciregi MacBook Pro 5,5 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
alciregi aarch64 on Raspberry Pi 3 [1] 1. default PASS
alciregi armv7hl on Orange Pi PC [1] 1. default PASS
ankursinha Dell vostro 3400 laptop [1] 1. Performance test doesn't build. Looks like this issue: https://pagure.io/kernel-tests/issue/16
bladerunner Lenovo G700 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
bt0dotninja Lenovo thinkpad T440s Core i5 vPro F28 [1] 1. /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
bwalker@musings.com HP Pavilion 17 [1] [2] 1. #1592067, 1 - system boots unlike stock F28 2 - continue to get window crashes
2. #1592067, 1 - system boots up without black screen seen on stock F28 2 - window system will still crash randomly & sometimes locks in incorrect orientation
chuhu ibm-ls22-03.rhts.eng.brq.redhat.com [1] 1. Kernel: 4.17.0-1.fc29.x86_64 . Run trinity on memory syscalls and stress-ng on deadline/fifo scheduling.
eznoka i7-860-16Go-Radeon 5770-Asus P7P55D
f1yegor Thinkpad T480
fedor72 Ryzen 5 1600 + Asus Prime X370-Pro + 64 gb RAM + NVMe Samsung Evo 960 + Radeon Pro WX 7100
frantisekz T470s
gabibbo97 Clevo W230SS
garrmcnu Test image on VM (KVM) [1] 1. Default and performance tests passed
grzegorzb Dell Vostro 5568 [1] 1. 1. default passed. 2. performance passed.
grzegorzb Hp Microserver gen10 [1] 1. Default - FAIL: ./default/paxtest Performance passed.
guazhang@redhat.com cisco-b420m3-01.rhts.eng.bos.redhat.com
heffer Lenovo ThinkPad X1 Carbon Gen5 [1] 1. System doesn't boot when webcam is enabled in BIOS. See logs here: https://heffer.fedorapeople.org/failed-boot-4.17-thinkpad-x1c5.log.gz With webcam disabled, the system boots and the Regression test passes.
jijianwen Dell PowerEdge 1950 [1] 1. ipv6 tests passed
jlanda KVM Guest [1] [2] 1. Updated using 4.17.0-200.fc28. Step 1 Passed .
2. Failed: ./default/paxtest , ./default/timer-overhead ,
lilin cisco-b200m3-01.rhts.eng.bos.redhat.com [1] 1. run some multipath testcase,all pass
liwan Red Hat KVM Intel Core Processor (Haswell) 8192 MB memory, 32 GB disk space [1] 1. LTP mm part test passed on 4.17.0-1.fc29.x86_64
lkf Lenovo P40 YOGA nvidia [1] 1. 1. default PASS
lnie cisco-b22m3-01.rhts.eng.bos.redhat.com
lruzicka KVM/Libvirt [1] 1. All tests passed, except libhugetlbfs which was skipped. (default profile)
luis.calcaneo@gmail.com
luya Custom desktop AMD Phenom X4 940 with 8GB DDR2 RAM + Sapphire Radeon RX560
malucious Thinkpad T420 Fedora 28 [1] 1. libhugetlbfs test was skipped.
mharpau Thinkpad T480s i5 [1] 1. Default PASS
mzink Gnome Boxes VM on T470s [1] 1. Performace test doesn't build (ignored)
ozeszty Vostro 3560 IvyBridge Intel+AMD [1] 1. 1. PASS; 2. PASS; errors in dmesg: ipmi:dmi: Invalid offset: 0 rtc_cmos 00:01: nvmem registration failed <= this one is new
pifang apm-mustang-ev3-08.khw2.lab.eng.bos.redhat.com [1] 1. ltp mm
pifang cisco-e160dp-01.rhts.eng.bos.redhat.com [1] 1. rhel7's fujitsu memroy testcase, and general memory regression testcase.
pifang dell-pet410-04.khw.lab.eng.bos.redhat.com [1] 1. rhel7's mm function part passed on kernel-4.17.0-1.fc29.x86_64
pifang kvm-02-guest12.rhts.eng.bos.redhat.com [1] 1. ltp mm with kernel-4.17.0-1.fc29.x86_64
qzhao KVM Guest [1] [2] 1. Retest latest kernel kernel-4.17.0-1.fc29, local dump and nfs dump works well.
2. #1585981, Looks like regression bug, will ask developer take a look.
reher ESXi 6.5 (Xeon E5540) guest using test day ISO
reher i5-4210U laptop using test day ISO
shecks i7-4770K, MSI Z97M, Integrated Intel Graphics, 32Gig RAM [1] 1. Both default and performance kernel regression tests passed.
spathare VM Box
sumantrom KVM on Fedora 28 T460s [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
torel [1] 1. Lenovo W510. FC28. Using fc29 kernel 4.17.0-1.fc29.x86_64, tainted with nvidia driver. Work flawlessly. Some bios bug warnings.
tux808 Lenovo Thinkpad A475, Model 20KL0018US [1] 1. All test successful except paxtest
uixters Intel i7 3770k 12gb ram [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
xfor Dell inspiron 15 5565
yn1v Pentium(R) Dual-Core CPU E5400 @ 2.70GHz -RAM 4034Mb [1] 1. $ uname -a Linux localhost 4.17.0-200.fc28.x86_64 #1 SMP Mon Jun 11 18:24:49 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux Connected using cockpit to this machine, nothing unusual.
yn1v Pentium(R) Dual-Core CPU E5400 @ 2.70GHz -RAM 4034Mb - fedora 28 updated with 4.17.0-200.fc28.x86_64 [1] 1. /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
zsun 4.17.0-1.fc29.x86_64, Cisco UCS B200 with Xeon E5520, 6GB memory [1] 1. Ftrace sanity test passed on 4.17.0-1.fc29.x86_64
zsun BeagleBone Black with 4.17.0-1.fc29.armv7hl [1] 1. 4.17.0-1.fc29.armv7hl can boot on BeagleBoneBlack, and ftrace function tracer works fine.
zsun HikeyBoard (aka Hikey 620) with kernel-4.17.0-1.fc29.aarch64 [1] [2] 1. Fedora kernel regression test suit failed in paxtest. Logs submitted.
2. HikeyBoard can boot with this kernel. HikeyBoard can boot with kernel parameter "ftrace=function"
Wiki Metadata