F29 Kernel 4.18 Test Day

More information about the event can be found here: http://fedoraproject.org/wiki/Test_Day:2018-08-21_Kernel_4.18_Test_Day
Go back to List of Events.

Results

Clicking on the testcase name will show you the appropriate "how to test" page.
Click on the Enter result button, to enter result.
Note: results are cached and realoaded from the database each 10 seconds.

Regression Test

Username Profile Regression Comments
Enter result
Renault F29 x86_64
Renault F29 x86_64 4.18.1-300 [1] 1. cache drop failed
alciregi 4.18.1-300.fc29.armv7hl Raspberry Pi 3
alciregi 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360) [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
alciregi 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5) [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
alciregi 4.18.3-300.fc29.x86_64 Intel E5800 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
blackfile 4.18.1-300.fc29.x86_64, default tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
bt0dotninja Lenovo thinkpad T440s Core i5 vPro F28 [1] 1. both test pass * from default test: Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW * From performance test: Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622. ./performance/lmbench3 PASS
chuhu NEC Express5800/R120b-2 8G 16 processors [1] 1. Run trinity and stress-ng testings, did not hit issue.
chuhu SGI UV2000 12G memory 64 processors [1] 1. #1619508, on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0
decathorpe 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070 [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB
giardia KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010 [1] 1. I like the decision to disable speck crypto cipher in the kernel default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory #include <rpc/rpc.h> ^~~~~~~~~~~ compilation terminated.
guazhang KVM [1] 1. kernel-4.18.1-300.fc29.x86_64 https://upstreamfirst.fedorainfracloud.org/mdadm.git
jishi 4.18.3-300.fc29.x86_64 [1] 1. basic protocol traffic, tcp, udp, multicast and sctp
jishi geneve basic test [1] 1. geneve basic test, add geneve over ipv4 and ipv6, run traffic
jishi gre basic test [1] 1. add gre and run traffic
jishi ipv6 socket test [1] 1. basic ipv6 socket options
jishi route functions [1] 1. basic route test, route table, rule table and all options for route table and rule
jishi vxlan basic test [1] 1. add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic
jlanfa libvirt @ fc28 [1] 1. All test passed
lilin kvm [1] 1. kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass
lruzicka Fedora 28 with 4.18.1 kernel, default tests [1] [2] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
2. The libhugetlbfs was skipped, otherwise all tests passed.
lruzicka Fedora 28 with 4.18.1 kernel, performance tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lruzicka Fedora 28 with 4.18.3 kernel, default tests [1] 1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
masami Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K [1] 1. regression test passed. kvm, docker, sound and video worked fine.
pifang Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM [1] [2] 1. 4.18.1-300.fc29
2. ltp vmm relate.
pifang Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM [1] [2] 1. 4.18.1-300.fc29
2. vmm test.
pyadav kernel-4.18.3-300.fc29.x86_64 on F28 [1] 1. ./default/libhugetlbfs test was skipped, rest all passed for default test
qzhao KVM [1] 1. #1619122, Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32 Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.
spathare 4.18.3-300.fc29.x86_64
thom Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64 [1] 1. Vulnerabilities: PTI Inversion PTI SSB disabled via prctl and seccomp __user pointer sanitzation Full generic retpoline, IPBP, IRBR_FW
zsun 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620) [1] [2] [3] 1. The same issue also happens on 4.18.1-300
2. Sorry, I mean 4.18.0-1.fc29.aarch64
3. #1616193, ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)
zsun 4.18.0-1.fc29.armv7hl with raspberry pi 2 [1] [2] 1. The same failure also happens on 4.18.1-300
2. #1619081, ftrace function_graph cause soft lockup
zsun 4.18.1-300.fc29 in kvm [1] 1. #1619616, System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.
Wiki Metadata