From Fedora Project Wiki

Fedora Test Day
Echo-testing-48px.png
Kernel 4.18

Date 2018-08-21
Time all day

Website QA/Test Days
IRC #fedora-test-day (webirc)
Mailing list test


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?[edit]

Today's instalment of Fedora Test Day will focus on Kernel 4.18

Who's available?[edit]

The following cast of characters will be available for testing, workarounds, bug fixes, and general discussion ...

Prerequisites for Test Day[edit]

  • A fully updated test day image or Fedora 28 Workstation/Server installation, either on bare metal or VM (please make sure you have no important data on that installation, things might go wrong -- don't do this on your production machine!)
  • The 4.18 kernel for F29 from koji if not using the test day image. (koji is recommended for secure boot users). This kernel should install fine on F27 and F28 systems.
  • Enough free space on HDD

How to test?[edit]

Run the tests[edit]

Visit the result page and click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the Enter result button for the test.

Reporting bugs[edit]

If you have problems with any of the tests, have a look in the results page. Please include the vulnerability output at the end of the test suite in the comments.

If you don't see it, please file a new bug to Bugzilla, probably against kernel component.  If you are unsure about exactly how to file the report or what other information to include, just ask on IRC #fedora-test-day or #fedora-qa and we will help you.

Test Results[edit]

Regression Test[edit]

User Profile Regression References
Anway_Pict Anway
Fail fail
[1]
  1. RHBZ #1625187 This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
BikramUTD Dell Alienware 17x + Test day image
Pass pass
Prashant prashantdalvi
Pass pass
[1]
  1. RHBZ #1625187 This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
Renault F29 x86_64
Pass pass
Renault F29 x86_64 4.18.1-300
Fail fail
[1]
  1. cache drop failed
aeperezt 4.18.3-300.fc29.x86_64 #1 SMP
Pass pass
aeperezt 4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7
Pass pass
aeperezt aeperezt
Pass pass
alciregi 4.18.1-300.fc29.armv7hl Raspberry Pi 3
Pass pass
alciregi 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360)
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
alciregi 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5)
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
alciregi 4.18.3-300.fc29.x86_64 Intel E5800
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
anandprakash VM
Pass pass
blackfile 4.18.1-300.fc29.x86_64 - performance tests
Pass pass
[1]
  1. /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
blackfile 4.18.1-300.fc29.x86_64, default tests
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
blinker09 KVM F29 Asus ROG
Pass pass
bt0dotninja Lenovo thinkpad T440s Core i5 vPro F28
Pass pass
[1]
  1. both test pass
    • from default test:
    Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
    • From performance test:
    Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622. ./performance/lmbench3 PASS
ccaudle kernel regression, standard and performance
Pass pass
[1]
  1. Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell. No regressions seen in sshd or nfs client.
chuhu NEC Express5800/R120b-2 8G 16 processors
Pass pass
[1]
  1. Run trinity and stress-ng testings, did not hit issue.
chuhu SGI UV2000 12G memory 64 processors
Fail fail
[1]
  1. RHBZ #1619508 on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0
davisclick default
Pass pass
[1]
  1. OK
davisclick destructive
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
davisclick minimal
Pass pass
[1]
  1. Ok
davisclick performance
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
davisclick stress
Fail fail
[1]
  1. mmap001 0 TINFO  : mmap()ing file of 10000 pages or 40960000 bytes mmap001 1 TPASS  : mmap() completed successfully. mmap001 0 TINFO  : touching mmaped memory mmap001 2 TPASS  : we're still here, mmaped area must be good mmap001 3 TPASS  : synchronizing mmapped page passed mmap001 4 TPASS  : munmapping testfile.30155 successful mmap001 0 TINFO  : mmap()ing file of 1000 pages or 4096000 bytes mmap001 1 TPASS  : mmap() completed successfully. mmap001 0 TINFO  : touching mmaped memory mmap001 2 TPASS  : we're still here, mmaped area must be good mmap001 3 TPASS  : synchronizing mmapped page passed mmap001 4 TPASS  : munmapping testfile.30156 successful mtest01 0 TINFO  : Total memory already used on system = 4291964 kbytes mtest01 0 TINFO  : Total memory used needed to reach maximum = 3975212 kbytes mtest01 1 TFAIL  : mtest01.c:180: More memory than the maximum amount you specified is already being used
decathorpe 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB
fredlima VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vboxguest.ko.xz
Fail fail
[1]
  1. running for 5 hours, stuck after sysfs-perms with PASS result.
giardia KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010
Pass pass
[1]
  1. I like the decision to disable speck crypto cipher in the kernel default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1 make[1]: *** [Makefile:114: lmbench] Error 2 make: *** [Makefile:20: build] Error 2 In file included from lib_tcp.c:9: bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory #include <rpc/rpc.h> ^~~~~~~~~~~ compilation terminated.
guazhang KVM
Pass pass
[1]
jayeshc jayeshchaudhari
Fail fail
[1]
  1. RHBZ #1625187 This test case is for emoji working in Fedora 28 but not in Fedora 29.
jiji 4.18.1-300.fc29.x86_64,kvm
Pass pass
[1]
  1. run some ipv6 testcases,all pass
jishi 4.18.3-300.fc29.x86_64
Pass pass
[1]
  1. basic protocol traffic, tcp, udp, multicast and sctp
jishi geneve basic test
Pass pass
[1]
  1. geneve basic test, add geneve over ipv4 and ipv6, run traffic
jishi gre basic test
Pass pass
[1]
  1. add gre and run traffic
jishi ipv6 socket test
Pass pass
[1]
  1. basic ipv6 socket options
jishi route functions
Pass pass
[1]
  1. basic route test, route table, rule table and all options for route table and rule
jishi vxlan basic test
Pass pass
[1]
  1. add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic
jlanfa libvirt @ fc28
Pass pass
[1]
  1. All test passed
josereyesjdi
Pass pass
[1]
  1. Default, ok
josereyesjdi default
Pass pass
[1]
  1. Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lbazan Lenovo t470 i5-7200U
Pass pass
[1]
  1. OK!
lbazan Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2)
Fail fail
[1]
  1. 1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
lilin kvm
Pass pass
[1]
  1. kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass
lnie 4.18.1-300.fc29.x86_64 Dell PowerEdge R720
Pass pass
[1]
  1. default and performance tests passed
lruzicka Fedora 28 with 4.18.1 kernel, default tests
Pass pass
[1]
Pass pass
[2]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
  2. The libhugetlbfs was skipped, otherwise all tests passed.
lruzicka Fedora 28 with 4.18.1 kernel, performance tests
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lruzicka Fedora 28 with 4.18.3 kernel, default tests
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
lruzicka Fedora 28 with 4.18.3 kernel, performance tests
Pass pass
[1]
  1. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
maryonday 4.16.3-301.fc28.x86_64
Pass pass
[1]
masami Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K
Pass pass
[1]
  1. regression test passed. kvm, docker, sound and video worked fine.
nabooengineer us_EN
Fail fail
[1]
  1. Virtual Box Version 5.2.18 r124319, FC29 TestDays 4.18.5-300.fc29.x86_64 Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
ozeszty F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240
Pass pass
[1]
  1. All good, ./default/libhugetlbfs was skipped. /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
ozeszty F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m
Pass pass
[1]
  1. As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.
pifang Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM
Pass pass
[1]
Pass pass
[2]
  1. 4.18.1-300.fc29
  2. ltp vmm relate.
pifang Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM
Warning warn
[1]
Pass pass
[2]
  1. 4.18.1-300.fc29
  2. vmm test.
potty default
Fail fail
[1]
Fail fail
[2]
  1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5 Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second FAIL ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/stack-randomness PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
  2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second FAIL ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/stack-randomness PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
potty minimal
Pass pass
[1]
Pass pass
[2]
  1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5 Test suite called with minimal Test suite complete PASS
  2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with minimal Test suite complete PASS
potty performance
Pass pass
[1]
  1. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with performance ./default/lmbench3 PASS Test suite complete PASS Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
pyadav kernel-4.18.3-300.fc29.x86_64 on F28
Pass pass
[1]
  1. ./default/libhugetlbfs test was skipped, rest all passed for default test
quadj4 thinkpad Z lenovo running test day image
Pass pass
qzhao KVM
Fail fail
[1]
  1. RHBZ #1619122 Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32 Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.
saloni raj Fedora 29 Dell Latitude
Pass pass
spathare 4.18.3-300.fc29.x86_64
Pass pass
temjin747 Test Day Image
Warning warn
[1]
  1. Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2. Host machine: HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64. VM info: 2 vCPUs, 2 GB RAM KVM hypervisor x86_64 architecture emulator: /usr/bin/qemu-kvm chipset: i440FX
testuser x86_64
Pass pass
[1]
  1. test
thom Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64
Pass pass
[1]
  1. Vulnerabilities: PTI Inversion PTI SSB disabled via prctl and seccomp __user pointer sanitzation Full generic retpoline, IPBP, IRBR_FW
truptiPict
Pass pass
xifeng 4.18.3-300.fc29.x86_64
Pass pass
[1]
  1. run some cifs tests
zsun 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620)
Fail fail
[1]
Fail fail
[2]
Fail fail
[3]
  1. The same issue also happens on 4.18.1-300
  2. Sorry, I mean 4.18.0-1.fc29.aarch64
  3. RHBZ #1616193 ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)
zsun 4.18.0-1.fc29.armv7hl with raspberry pi 2
Fail fail
[1]
Fail fail
[2]
  1. The same failure also happens on 4.18.1-300
  2. RHBZ #1619081 ftrace function_graph cause soft lockup
zsun 4.18.1-300.fc29 in kvm
Fail fail
[1]
  1. RHBZ #1619616 System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.