From Fedora Project Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 39: Line 39:


== Test Results ==
== Test Results ==
=== Regression Test ===
{|
! User
! Profile
! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
! References
|-
| [[User:Anway_Pict|Anway_Pict]]
| Anway
| {{result|fail}}<ref>{{bz|1625187}} This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture </ref>
| <references/>
|-
| [[User:BikramUTD|BikramUTD]]
| Dell Alienware 17x + Test day image
| {{result|pass}}
| <references/>
|-
| [[User:Prashant|Prashant]]
| prashantdalvi
| {{result|pass}}<ref>{{bz|1625187}} This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture</ref>
| <references/>
|-
| [[User:Renault|Renault]]
| F29 x86_64
| {{result|pass}}
| <references/>
|-
| [[User:Renault|Renault]]
| F29 x86_64 4.18.1-300
| {{result|fail}}<ref>cache drop failed</ref>
| <references/>
|-
| [[User:aeperezt|aeperezt]]
| 4.18.3-300.fc29.x86_64 #1 SMP
| {{result|pass}}
| <references/>
|-
| [[User:aeperezt|aeperezt]]
| 4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7
| {{result|pass}}
| <references/>
|-
| [[User:aeperezt|aeperezt]]
| aeperezt
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| 4.18.1-300.fc29.armv7hl Raspberry Pi 3
| {{result|pass}}
| <references/>
|-
| [[User:alciregi|alciregi]]
| 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360)
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5)
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:alciregi|alciregi]]
| 4.18.3-300.fc29.x86_64 Intel E5800
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:anandprakash|anandprakash]]
| VM
| {{result|pass}}
| <references/>
|-
| [[User:blackfile|blackfile]]
| 4.18.1-300.fc29.x86_64 - performance tests
| {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:blackfile|blackfile]]
| 4.18.1-300.fc29.x86_64, default tests
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
</ref>
| <references/>
|-
| [[User:blinker09|blinker09]]
| KVM F29 Asus ROG
| {{result|pass}}
| <references/>
|-
| [[User:bt0dotninja|bt0dotninja]]
| Lenovo thinkpad T440s Core i5 vPro F28
| {{result|pass}}<ref>both test pass
* from default test:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
* From performance test:
Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622.
./performance/lmbench3                                          PASS  </ref>
| <references/>
|-
| [[User:ccaudle|ccaudle]]
| kernel regression, standard and performance
| {{result|pass}}<ref>Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell.  No regressions seen in sshd or nfs client.</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| NEC Express5800/R120b-2 8G 16 processors
| {{result|pass}}<ref>Run trinity and stress-ng testings, did not hit issue.</ref>
| <references/>
|-
| [[User:chuhu|chuhu]]
| SGI UV2000 12G memory 64 processors
| {{result|fail}}<ref>{{bz|1619508}} on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0</ref>
| <references/>
|-
| [[User:davisclick|davisclick]]
| default
| {{result|pass}}<ref>OK</ref>
| <references/>
|-
| [[User:davisclick|davisclick]]
| destructive
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
</ref>
| <references/>
|-
| [[User:davisclick|davisclick]]
| minimal
| {{result|pass}}<ref>Ok</ref>
| <references/>
|-
| [[User:davisclick|davisclick]]
| performance
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
</ref>
| <references/>
|-
| [[User:davisclick|davisclick]]
| stress
| {{result|fail}}<ref>mmap001    0  TINFO  :  mmap()ing file of 10000 pages or 40960000 bytes
mmap001    1  TPASS  :  mmap() completed successfully.
mmap001    0  TINFO  :  touching mmaped memory
mmap001    2  TPASS  :  we're still here, mmaped area must be good
mmap001    3  TPASS  :  synchronizing mmapped page passed
mmap001    4  TPASS  :  munmapping testfile.30155 successful
mmap001    0  TINFO  :  mmap()ing file of 1000 pages or 4096000 bytes
mmap001    1  TPASS  :  mmap() completed successfully.
mmap001    0  TINFO  :  touching mmaped memory
mmap001    2  TPASS  :  we're still here, mmaped area must be good
mmap001    3  TPASS  :  synchronizing mmapped page passed
mmap001    4  TPASS  :  munmapping testfile.30156 successful
mtest01    0  TINFO  :  Total memory already used on system = 4291964 kbytes
mtest01    0  TINFO  :  Total memory used needed to reach maximum = 3975212 kbytes
mtest01    1  TFAIL  :  mtest01.c:180: More memory than the maximum amount you specified  is already being used</ref>
| <references/>
|-
| [[User:decathorpe|decathorpe]]
| 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB</ref>
| <references/>
|-
| [[User:fredlima|fredlima]]
| VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vboxguest.ko.xz
| {{result|fail}}<ref>running for 5 hours, stuck after sysfs-perms with PASS result.</ref>
| <references/>
|-
| [[User:giardia|giardia]]
| KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010
| {{result|pass}}<ref>I like the decision to disable speck crypto cipher in the kernel
default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
make[1]: *** [Makefile:114: lmbench] Error 2
make: *** [Makefile:20: build] Error 2
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
#include <rpc/rpc.h>
          ^~~~~~~~~~~
compilation terminated.</ref>
| <references/>
|-
| [[User:guazhang|guazhang]]
| KVM
| {{result|pass}}<ref> kernel-4.18.1-300.fc29.x86_64 https://upstreamfirst.fedorainfracloud.org/mdadm.git </ref>
| <references/>
|-
| [[User:jayeshc|jayeshc]]
| jayeshchaudhari
| {{result|fail}}<ref>{{bz|1625187}} This test case is for emoji working in Fedora 28 but not in Fedora 29.</ref>
| <references/>
|-
| [[User:jiji|jiji]]
| 4.18.1-300.fc29.x86_64,kvm
| {{result|pass}}<ref>run some ipv6 testcases,all pass</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| 4.18.3-300.fc29.x86_64
| {{result|pass}}<ref>basic protocol traffic, tcp, udp, multicast and sctp</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| geneve basic test
| {{result|pass}}<ref>geneve basic test, add geneve over ipv4 and ipv6, run traffic</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| gre basic test
| {{result|pass}}<ref>add gre and run traffic</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| ipv6 socket test
| {{result|pass}}<ref>basic ipv6 socket options</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| route functions
| {{result|pass}}<ref>basic route test, route table, rule table and all options for route table and rule</ref>
| <references/>
|-
| [[User:jishi|jishi]]
| vxlan basic test
| {{result|pass}}<ref>add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic</ref>
| <references/>
|-
| [[User:jlanfa|jlanfa]]
| libvirt @ fc28
| {{result|pass}}<ref>All test passed</ref>
| <references/>
|-
| [[User:josereyesjdi|josereyesjdi]]
|
| {{result|pass}}<ref>Default, ok</ref>
| <references/>
|-
| [[User:josereyesjdi|josereyesjdi]]
| default
| {{result|pass}}<ref>Test suite called with default
./default/libhugetlbfs SKIP  ./default/modsign PASS    ./default/insert_leap_second  PASS    ./default/memfd PASS    ./default/paxtest  PASS    ./default/selinux-dac-controls PASS    ./default/mq-memory-corruption  PASS    ./default/posix_timers  PASS    ./default/sysfs-perms PASS    ./default/cachedrop  PASS    ./default/timer-overhead  PASS    ./default/stack-randomness PASS    Test suite complete  PASS   
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
</ref>
| <references/>
|-
| [[User:lbazan|lbazan]]
|  Lenovo t470 i5-7200U
| {{result|pass}}<ref>OK!</ref>
| <references/>
|-
| [[User:lbazan|lbazan]]
| Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2)
| {{result|fail}}<ref>1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:lilin|lilin]]
| kvm
| {{result|pass}}<ref> kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass</ref>
| <references/>
|-
| [[User:lnie|lnie]]
| 4.18.1-300.fc29.x86_64 Dell PowerEdge R720
| {{result|pass}}<ref>default and performance tests passed</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Fedora 28 with 4.18.1 kernel, default tests
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
</ref>{{result|pass}}<ref>The libhugetlbfs was skipped, otherwise all tests passed.</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Fedora 28 with 4.18.1 kernel, performance tests
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Fedora 28 with 4.18.3 kernel, default tests
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
</ref>
| <references/>
|-
| [[User:lruzicka|lruzicka]]
| Fedora 28 with 4.18.3 kernel, performance tests
| {{result|pass}}<ref>Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
</ref>
| <references/>
|-
| [[User:maryonday|maryonday]]
| 4.16.3-301.fc28.x86_64
| {{result|pass}}<ref>Nice
https://paste.fedoraproject.org/paste/IojYqb415u6P6tn87uyLSw</ref>
| <references/>
|-
| [[User:masami|masami]]
| Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K
| {{result|pass}}<ref>regression test passed. kvm, docker, sound and video worked fine.
</ref>
| <references/>
|-
| [[User:nabooengineer|nabooengineer]]
| us_EN
| {{result|fail}}<ref>Virtual Box Version 5.2.18 r124319, FC29 TestDays
4.18.5-300.fc29.x86_64
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240
| {{result|pass}}<ref>All good, ./default/libhugetlbfs was skipped.
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
</ref>
| <references/>
|-
| [[User:ozeszty|ozeszty]]
| F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m
| {{result|pass}}<ref>As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.</ref>
| <references/>
|-
| [[User:pifang|pifang]]
| Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM
| {{result|pass}}<ref>4.18.1-300.fc29</ref>{{result|pass}}<ref>ltp vmm relate.</ref>
| <references/>
|-
| [[User:pifang|pifang]]
| Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM
| {{result|warn}}<ref>4.18.1-300.fc29</ref>{{result|pass}}<ref>vmm test.</ref>
| <references/>
|-
| [[User:potty|potty]]
| default
| {{result|fail}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with default
./default/libhugetlbfs  SKIP
./default/modsign    PASS
./default/insert_leap_second    FAIL
./default/memfd    PASS
./default/paxtest    PASS
./default/selinux-dac-controls    PASS
./default/mq-memory-corruption    PASS
./default/posix_timers    PASS
./default/sysfs-perms    PASS
./default/cachedrop    PASS
./default/timer-overhead    FAIL
./default/stack-randomness    PASS
Test suite complete    FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>{{result|fail}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with default
./default/libhugetlbfs  SKIP
./default/modsign    PASS
./default/insert_leap_second    FAIL
./default/memfd    PASS
./default/paxtest    PASS
./default/selinux-dac-controls    PASS
./default/mq-memory-corruption    PASS
./default/posix_timers    PASS
./default/sysfs-perms    PASS
./default/cachedrop    PASS
./default/timer-overhead    FAIL
./default/stack-randomness    PASS
Test suite complete    FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:potty|potty]]
| minimal
| {{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with minimal
Test suite complete    PASS</ref>{{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with minimal
Test suite complete    PASS</ref>
| <references/>
|-
| [[User:potty|potty]]
| performance
| {{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with performance
./default/lmbench3    PASS
Test suite complete    PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| <references/>
|-
| [[User:pyadav|pyadav]]
| kernel-4.18.3-300.fc29.x86_64 on F28
| {{result|pass}}<ref>./default/libhugetlbfs test was skipped, rest all passed for default test</ref>
| <references/>
|-
| [[User:quadj4|quadj4]]
| thinkpad Z lenovo running test day image
| {{result|pass}}
| <references/>
|-
| [[User:qzhao|qzhao]]
| KVM
| {{result|fail}}<ref>{{bz|1619122}} Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32
Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.</ref>
| <references/>
|-
| [[User:saloni raj|saloni raj]]
| Fedora 29 Dell Latitude
| {{result|pass}}
| <references/>
|-
| [[User:spathare|spathare]]
| 4.18.3-300.fc29.x86_64
| {{result|pass}}
| <references/>
|-
| [[User:temjin747|temjin747]]
| Test Day Image
| {{result|warn}}<ref>Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2.
Host machine:
HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64.
VM info:
2 vCPUs, 2 GB RAM
KVM hypervisor
x86_64 architecture
emulator: /usr/bin/qemu-kvm
chipset: i440FX
</ref>
| <references/>
|-
| [[User:testuser|testuser]]
| x86_64
| {{result|pass}}<ref>test</ref>
| <references/>
|-
| [[User:thom|thom]]
| Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64
| {{result|pass}}<ref>Vulnerabilities:
PTI Inversion
PTI
SSB disabled via prctl and seccomp
__user pointer sanitzation
Full generic retpoline, IPBP, IRBR_FW</ref>
| <references/>
|-
| [[User:truptiPict|truptiPict]]
|
| {{result|pass}}
| <references/>
|-
| [[User:xifeng|xifeng]]
| 4.18.3-300.fc29.x86_64
| {{result|pass}}<ref> run some cifs tests</ref>
| <references/>
|-
| [[User:zsun|zsun]]
| 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620)
| {{result|fail}}<ref>The same issue also happens on 4.18.1-300</ref>{{result|fail}}<ref>Sorry, I mean 4.18.0-1.fc29.aarch64</ref>{{result|fail}}<ref>{{bz|1616193}} ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)</ref>
| <references/>
|-
| [[User:zsun|zsun]]
| 4.18.0-1.fc29.armv7hl with raspberry pi 2
| {{result|fail}}<ref>The same failure also happens on 4.18.1-300</ref>{{result|fail}}<ref>{{bz|1619081}} ftrace function_graph cause soft lockup</ref>
| <references/>
|-
| [[User:zsun|zsun]]
| 4.18.1-300.fc29 in kvm
| {{result|fail}}<ref>{{bz|1619616}} System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.</ref>
| <references/>
|-
|}


We usually transfer the result after the test day


[[Category:Fedora 29 Test Days]]
[[Category:Fedora 29 Test Days]]
Please note that all contributions to Fedora Project Wiki are considered to be released under the Attribution-Share Alike 4.0 International (see Fedora Project Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please solve the following task below and enter the answer in the box (more info):

Cancel Editing help (opens in new window)