Username | Profile | Regression | Comments |
---|---|---|---|
Enter result | |||
Anway_Pict | Anway | [1] |
1.
#1625187,
This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
|
BikramUTD | Dell Alienware 17x + Test day image | ||
Prashant | prashantdalvi | [1] |
1.
#1625187,
This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
|
Renault | F29 x86_64 | ||
Renault | F29 x86_64 4.18.1-300 | [1] |
1.
cache drop failed
|
aeperezt | 4.18.3-300.fc29.x86_64 #1 SMP | ||
aeperezt | 4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7 | ||
aeperezt | aeperezt | ||
alciregi | 4.18.1-300.fc29.armv7hl Raspberry Pi 3 | ||
alciregi | 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360) | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
alciregi | 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5) | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
alciregi | 4.18.3-300.fc29.x86_64 Intel E5800 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
anandprakash | VM | ||
blackfile | 4.18.1-300.fc29.x86_64 - performance tests | [1] |
1.
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
blackfile | 4.18.1-300.fc29.x86_64, default tests | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
blinker09 | KVM F29 Asus ROG | ||
bt0dotninja | Lenovo thinkpad T440s Core i5 vPro F28 | [1] |
1.
both test pass
* from default test:
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT
vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
* From performance test:
Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622.
./performance/lmbench3 PASS
|
ccaudle | kernel regression, standard and performance | [1] |
1.
Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell. No regressions seen in sshd or nfs client.
|
chuhu | NEC Express5800/R120b-2 8G 16 processors | [1] |
1.
Run trinity and stress-ng testings, did not hit issue.
|
chuhu | SGI UV2000 12G memory 64 processors | [1] |
1.
#1619508,
on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0
|
davisclick | default | [1] |
1.
OK
|
davisclick | destructive | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
davisclick | minimal | [1] |
1.
Ok
|
davisclick | performance | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
davisclick | stress | [1] |
1.
mmap001 0 TINFO : mmap()ing file of 10000 pages or 40960000 bytes
mmap001 1 TPASS : mmap() completed successfully.
mmap001 0 TINFO : touching mmaped memory
mmap001 2
TPASS : we're still here, mmaped area must be good
mmap001 3 TPASS : synchronizing mmapped page passed
mmap001 4 TPASS : munmapping testfile.30155 successful
mmap001 0 TINFO : mmap()ing file of 1000 pages or 4096000 bytes
mmap001 1 TPASS : mmap() completed successfully.
mmap001 0 TINFO : touching mmaped memory
mmap001 2 TPASS : we're still here, mmaped area must be good
mmap001 3 TPASS : synchronizing mmapped page passed
mmap001 4 TPASS : munmapping testfile.30156 successful
mtest01 0 TINFO : Total memory already used on system = 4291964 kbytes
mtest01 0 TINFO : Total memory used needed to reach maximum = 3975212 kbytes
mtest01 1 TFAIL : mtest01.c:180: More memory than the maximum amount you specified is already being used
|
decathorpe | 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070 | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not
affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB
|
fredlima | VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vbox guest.ko.xz | [1] |
1.
running for 5 hours, stuck after sysfs-perms with PASS result.
|
giardia | KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010 | [1] |
1.
I like the decision to disable speck crypto cipher in the kernel
default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
make[1]:
*** [Makefile:114: lmbench] Error 2
make: *** [Makefile:20: build] Error 2
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
#include <rpc/rpc.h>
^~~~~~~~~~~
compilation terminated.
|
guazhang | KVM | [1] |
1.
kernel-4.18.1-300.fc29.x86_64 https://upstreamfirst.fedorainfracloud.org/mdadm.git
|
jayeshc | jayeshchaudhari | [1] |
1.
#1625187,
This test case is for emoji working in Fedora 28 but not in Fedora 29.
|
jiji | 4.18.1-300.fc29.x86_64,kvm | [1] |
1.
run some ipv6 testcases,all pass
|
jishi | 4.18.3-300.fc29.x86_64 | [1] |
1.
basic protocol traffic, tcp, udp, multicast and sctp
|
jishi | geneve basic test | [1] |
1.
geneve basic test, add geneve over ipv4 and ipv6, run traffic
|
jishi | gre basic test | [1] |
1.
add gre and run traffic
|
jishi | ipv6 socket test | [1] |
1.
basic ipv6 socket options
|
jishi | route functions | [1] |
1.
basic route test, route table, rule table and all options for route table and rule
|
jishi | vxlan basic test | [1] |
1.
add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic
|
jlanfa | libvirt @ fc28 | [1] |
1.
All test passed
|
josereyesjdi | [1] |
1.
Default, ok
|
|
josereyesjdi | default | [1] |
1.
Test suite called with default
./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest PASS
./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lbazan | Lenovo t470 i5-7200U | [1] |
1.
OK!
|
lbazan | Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2) | [1] |
1.
1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
lilin | kvm | [1] |
1.
kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass
|
lnie | 4.18.1-300.fc29.x86_64 Dell PowerEdge R720 | [1] |
1.
default and performance tests passed
|
lruzicka | Fedora 28 with 4.18.1 kernel, default tests | [1] [2] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer
sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
2. The libhugetlbfs was skipped, otherwise all tests passed. |
lruzicka | Fedora 28 with 4.18.1 kernel, performance tests | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer
sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lruzicka | Fedora 28 with 4.18.3 kernel, default tests | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lruzicka | Fedora 28 with 4.18.3 kernel, performance tests | [1] |
1.
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation:
PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
maryonday | 4.16.3-301.fc28.x86_64 | [1] |
1.
Nice
https://paste.fedoraproject.org/paste/IojYqb415u6P6tn87uyLSw
|
masami | Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K | [1] |
1.
regression test passed. kvm, docker, sound and video worked fine.
|
nabooengineer | us_EN | [1] |
1.
Virtual Box Version 5.2.18 r124319, FC29 TestDays
4.18.5-300.fc29.x86_64
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE
Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
ozeszty | F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240 | [1] |
1.
All good, ./default/libhugetlbfs was skipped.
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not
affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
|
ozeszty | F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m | [1] |
1.
As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.
|
pifang | Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM | [1] [2] |
1.
4.18.1-300.fc29
2. ltp vmm relate. |
pifang | Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM | [1] [2] |
1.
4.18.1-300.fc29
2. vmm test. |
potty | default | [1] [2] |
1.
Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with default
./default/libhugetlbfs
SKIP
./default/modsign PASS
./default/insert_leap_second FAIL
./default/memfd PASS
./default/paxtest PASS
./default/selinux-dac-controls PASS
./default/mq-memory-corruption PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/cachedrop PASS
./default/timer-overhead FAIL
./default/stack-randomness PASS
Test suite complete FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with default ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second FAIL ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead FAIL ./default/stack-randomness PASS Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline |
potty | minimal | [1] [2] |
1.
Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with minimal
Test suite complete PASS
2. Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6 Test suite called with minimal Test suite complete PASS |
potty | performance | [1] |
1.
Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with performance
./default/lmbench3 PASS
Test suite
complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
pyadav | kernel-4.18.3-300.fc29.x86_64 on F28 | [1] |
1.
./default/libhugetlbfs test was skipped, rest all passed for default test
|
quadj4 | thinkpad Z lenovo running test day image | ||
qzhao | KVM | [1] |
1.
#1619122,
Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32
Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.
|
saloni raj | Fedora 29 Dell Latitude | ||
spathare | 4.18.3-300.fc29.x86_64 | ||
temjin747 | Test Day Image | [1] |
1.
Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key
do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2.
Host machine:
HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64.
VM info:
2 vCPUs, 2 GB RAM
KVM hypervisor
x86_64 architecture
emulator: /usr/bin/qemu-kvm
chipset: i440FX
|
testuser | x86_64 | [1] |
1.
test
|
thom | Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64 | [1] |
1.
Vulnerabilities:
PTI Inversion
PTI
SSB disabled via prctl and seccomp
__user pointer sanitzation
Full generic retpoline, IPBP, IRBR_FW
|
truptiPict | |||
xifeng | 4.18.3-300.fc29.x86_64 | [1] |
1.
run some cifs tests
|
zsun | 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620) | [1] [2] [3] |
1.
The same issue also happens on 4.18.1-300
2. Sorry, I mean 4.18.0-1.fc29.aarch64 3. #1616193, ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620) |
zsun | 4.18.0-1.fc29.armv7hl with raspberry pi 2 | [1] [2] |
1.
The same failure also happens on 4.18.1-300
2. #1619081, ftrace function_graph cause soft lockup |
zsun | 4.18.1-300.fc29 in kvm | [1] |
1.
#1619616,
System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.
|