Latest revision |
Your text |
Line 39: |
Line 39: |
|
| |
|
| == Test Results == | | == Test Results == |
| === Regression Test ===
| |
| {|
| |
| ! User
| |
| ! Profile
| |
| ! [http://fedoraproject.org/wiki/QA:Testcase_kernel_regression Regression]
| |
| ! References
| |
| |-
| |
| | [[User:Anway_Pict|Anway_Pict]]
| |
| | Anway
| |
| | {{result|fail}}<ref>{{bz|1625187}} This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:BikramUTD|BikramUTD]]
| |
| | Dell Alienware 17x + Test day image
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:Prashant|Prashant]]
| |
| | prashantdalvi
| |
| | {{result|pass}}<ref>{{bz|1625187}} This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:Renault|Renault]]
| |
| | F29 x86_64
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:Renault|Renault]]
| |
| | F29 x86_64 4.18.1-300
| |
| | {{result|fail}}<ref>cache drop failed</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:aeperezt|aeperezt]]
| |
| | 4.18.3-300.fc29.x86_64 #1 SMP
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:aeperezt|aeperezt]]
| |
| | 4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:aeperezt|aeperezt]]
| |
| | aeperezt
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | 4.18.1-300.fc29.armv7hl Raspberry Pi 3
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | 4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360)
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | 4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5)
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:alciregi|alciregi]]
| |
| | 4.18.3-300.fc29.x86_64 Intel E5800
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:anandprakash|anandprakash]]
| |
| | VM
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:blackfile|blackfile]]
| |
| | 4.18.1-300.fc29.x86_64 - performance tests
| |
| | {{result|pass}}<ref>/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:blackfile|blackfile]]
| |
| | 4.18.1-300.fc29.x86_64, default tests
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:blinker09|blinker09]]
| |
| | KVM F29 Asus ROG
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:bt0dotninja|bt0dotninja]]
| |
| | Lenovo thinkpad T440s Core i5 vPro F28
| |
| | {{result|pass}}<ref>both test pass
| |
| * from default test:
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
|
| |
| * From performance test:
| |
| Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622.
| |
| ./performance/lmbench3 PASS </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ccaudle|ccaudle]]
| |
| | kernel regression, standard and performance
| |
| | {{result|pass}}<ref>Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell. No regressions seen in sshd or nfs client.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:chuhu|chuhu]]
| |
| | NEC Express5800/R120b-2 8G 16 processors
| |
| | {{result|pass}}<ref>Run trinity and stress-ng testings, did not hit issue.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:chuhu|chuhu]]
| |
| | SGI UV2000 12G memory 64 processors
| |
| | {{result|fail}}<ref>{{bz|1619508}} on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:davisclick|davisclick]]
| |
| | default
| |
| | {{result|pass}}<ref>OK</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:davisclick|davisclick]]
| |
| | destructive
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:davisclick|davisclick]]
| |
| | minimal
| |
| | {{result|pass}}<ref>Ok</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:davisclick|davisclick]]
| |
| | performance
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:davisclick|davisclick]]
| |
| | stress
| |
| | {{result|fail}}<ref>mmap001 0 TINFO : mmap()ing file of 10000 pages or 40960000 bytes
| |
| mmap001 1 TPASS : mmap() completed successfully.
| |
| mmap001 0 TINFO : touching mmaped memory
| |
| mmap001 2 TPASS : we're still here, mmaped area must be good
| |
| mmap001 3 TPASS : synchronizing mmapped page passed
| |
| mmap001 4 TPASS : munmapping testfile.30155 successful
| |
| mmap001 0 TINFO : mmap()ing file of 1000 pages or 4096000 bytes
| |
| mmap001 1 TPASS : mmap() completed successfully.
| |
| mmap001 0 TINFO : touching mmaped memory
| |
| mmap001 2 TPASS : we're still here, mmaped area must be good
| |
| mmap001 3 TPASS : synchronizing mmapped page passed
| |
| mmap001 4 TPASS : munmapping testfile.30156 successful
| |
| mtest01 0 TINFO : Total memory already used on system = 4291964 kbytes
| |
| mtest01 0 TINFO : Total memory used needed to reach maximum = 3975212 kbytes
| |
| mtest01 1 TFAIL : mtest01.c:180: More memory than the maximum amount you specified is already being used</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:decathorpe|decathorpe]]
| |
| | 4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:fredlima|fredlima]]
| |
| | VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vboxguest.ko.xz
| |
| | {{result|fail}}<ref>running for 5 hours, stuck after sysfs-perms with PASS result.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:giardia|giardia]]
| |
| | KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010
| |
| | {{result|pass}}<ref>I like the decision to disable speck crypto cipher in the kernel
| |
| default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
| |
| make[1]: *** [Makefile:114: lmbench] Error 2
| |
| make: *** [Makefile:20: build] Error 2
| |
| In file included from lib_tcp.c:9:
| |
| bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
| |
| #include <rpc/rpc.h>
| |
| ^~~~~~~~~~~
| |
| compilation terminated.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:guazhang|guazhang]]
| |
| | KVM
| |
| | {{result|pass}}<ref> kernel-4.18.1-300.fc29.x86_64 https://upstreamfirst.fedorainfracloud.org/mdadm.git </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jayeshc|jayeshc]]
| |
| | jayeshchaudhari
| |
| | {{result|fail}}<ref>{{bz|1625187}} This test case is for emoji working in Fedora 28 but not in Fedora 29.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jiji|jiji]]
| |
| | 4.18.1-300.fc29.x86_64,kvm
| |
| | {{result|pass}}<ref>run some ipv6 testcases,all pass</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | 4.18.3-300.fc29.x86_64
| |
| | {{result|pass}}<ref>basic protocol traffic, tcp, udp, multicast and sctp</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | geneve basic test
| |
| | {{result|pass}}<ref>geneve basic test, add geneve over ipv4 and ipv6, run traffic</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | gre basic test
| |
| | {{result|pass}}<ref>add gre and run traffic</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | ipv6 socket test
| |
| | {{result|pass}}<ref>basic ipv6 socket options</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | route functions
| |
| | {{result|pass}}<ref>basic route test, route table, rule table and all options for route table and rule</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jishi|jishi]]
| |
| | vxlan basic test
| |
| | {{result|pass}}<ref>add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:jlanfa|jlanfa]]
| |
| | libvirt @ fc28
| |
| | {{result|pass}}<ref>All test passed</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:josereyesjdi|josereyesjdi]]
| |
| |
| |
| | {{result|pass}}<ref>Default, ok</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:josereyesjdi|josereyesjdi]]
| |
| | default
| |
| | {{result|pass}}<ref>Test suite called with default
| |
| ./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
|
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lbazan|lbazan]]
| |
| | Lenovo t470 i5-7200U
| |
| | {{result|pass}}<ref>OK!</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lbazan|lbazan]]
| |
| | Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2)
| |
| | {{result|fail}}<ref>1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
| |
| 2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lilin|lilin]]
| |
| | kvm
| |
| | {{result|pass}}<ref> kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lnie|lnie]]
| |
| | 4.18.1-300.fc29.x86_64 Dell PowerEdge R720
| |
| | {{result|pass}}<ref>default and performance tests passed</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lruzicka|lruzicka]]
| |
| | Fedora 28 with 4.18.1 kernel, default tests
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
| </ref>{{result|pass}}<ref>The libhugetlbfs was skipped, otherwise all tests passed.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lruzicka|lruzicka]]
| |
| | Fedora 28 with 4.18.1 kernel, performance tests
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lruzicka|lruzicka]]
| |
| | Fedora 28 with 4.18.3 kernel, default tests
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:lruzicka|lruzicka]]
| |
| | Fedora 28 with 4.18.3 kernel, performance tests
| |
| | {{result|pass}}<ref>Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:maryonday|maryonday]]
| |
| | 4.16.3-301.fc28.x86_64
| |
| | {{result|pass}}<ref>Nice
| |
| https://paste.fedoraproject.org/paste/IojYqb415u6P6tn87uyLSw</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:masami|masami]]
| |
| | Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K
| |
| | {{result|pass}}<ref>regression test passed. kvm, docker, sound and video worked fine.
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:nabooengineer|nabooengineer]]
| |
| | us_EN
| |
| | {{result|fail}}<ref>Virtual Box Version 5.2.18 r124319, FC29 TestDays
| |
| 4.18.5-300.fc29.x86_64
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
| |
|
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ozeszty|ozeszty]]
| |
| | F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240
| |
| | {{result|pass}}<ref>All good, ./default/libhugetlbfs was skipped.
| |
|
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
| |
|
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
| |
|
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
| |
|
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
|
| |
|
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:ozeszty|ozeszty]]
| |
| | F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m
| |
| | {{result|pass}}<ref>As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pifang|pifang]]
| |
| | Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM
| |
| | {{result|pass}}<ref>4.18.1-300.fc29</ref>{{result|pass}}<ref>ltp vmm relate.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pifang|pifang]]
| |
| | Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM
| |
| | {{result|warn}}<ref>4.18.1-300.fc29</ref>{{result|pass}}<ref>vmm test.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:potty|potty]]
| |
| | default
| |
| | {{result|fail}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
| |
|
| |
| Test suite called with default
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/modsign PASS
| |
| ./default/insert_leap_second FAIL
| |
| ./default/memfd PASS
| |
| ./default/paxtest PASS
| |
| ./default/selinux-dac-controls PASS
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/posix_timers PASS
| |
| ./default/sysfs-perms PASS
| |
| ./default/cachedrop PASS
| |
| ./default/timer-overhead FAIL
| |
| ./default/stack-randomness PASS
| |
|
| |
| Test suite complete FAIL
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>{{result|fail}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
| |
| Test suite called with default
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/modsign PASS
| |
| ./default/insert_leap_second FAIL
| |
| ./default/memfd PASS
| |
| ./default/paxtest PASS
| |
| ./default/selinux-dac-controls PASS
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/posix_timers PASS
| |
| ./default/sysfs-perms PASS
| |
| ./default/cachedrop PASS
| |
| ./default/timer-overhead FAIL
| |
| ./default/stack-randomness PASS
| |
|
| |
| Test suite complete FAIL
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:potty|potty]]
| |
| | minimal
| |
| | {{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
| |
|
| |
| Test suite called with minimal
| |
|
| |
| Test suite complete PASS</ref>{{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
| |
|
| |
| Test suite called with minimal
| |
|
| |
| Test suite complete PASS</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:potty|potty]]
| |
| | performance
| |
| | {{result|pass}}<ref>Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
| |
|
| |
| Test suite called with performance
| |
| ./default/lmbench3 PASS
| |
|
| |
| Test suite complete PASS
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:pyadav|pyadav]]
| |
| | kernel-4.18.3-300.fc29.x86_64 on F28
| |
| | {{result|pass}}<ref>./default/libhugetlbfs test was skipped, rest all passed for default test</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:quadj4|quadj4]]
| |
| | thinkpad Z lenovo running test day image
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:qzhao|qzhao]]
| |
| | KVM
| |
| | {{result|fail}}<ref>{{bz|1619122}} Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32
| |
| Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:saloni raj|saloni raj]]
| |
| | Fedora 29 Dell Latitude
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:spathare|spathare]]
| |
| | 4.18.3-300.fc29.x86_64
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:temjin747|temjin747]]
| |
| | Test Day Image
| |
| | {{result|warn}}<ref>Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2.
| |
| Host machine:
| |
| HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64.
| |
| VM info:
| |
| 2 vCPUs, 2 GB RAM
| |
| KVM hypervisor
| |
| x86_64 architecture
| |
| emulator: /usr/bin/qemu-kvm
| |
| chipset: i440FX
| |
| </ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:testuser|testuser]]
| |
| | x86_64
| |
| | {{result|pass}}<ref>test</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:thom|thom]]
| |
| | Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64
| |
| | {{result|pass}}<ref>Vulnerabilities:
| |
| PTI Inversion
| |
| PTI
| |
| SSB disabled via prctl and seccomp
| |
| __user pointer sanitzation
| |
| Full generic retpoline, IPBP, IRBR_FW</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:truptiPict|truptiPict]]
| |
| |
| |
| | {{result|pass}}
| |
| | <references/>
| |
| |-
| |
| | [[User:xifeng|xifeng]]
| |
| | 4.18.3-300.fc29.x86_64
| |
| | {{result|pass}}<ref> run some cifs tests</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:zsun|zsun]]
| |
| | 4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620)
| |
| | {{result|fail}}<ref>The same issue also happens on 4.18.1-300</ref>{{result|fail}}<ref>Sorry, I mean 4.18.0-1.fc29.aarch64</ref>{{result|fail}}<ref>{{bz|1616193}} ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:zsun|zsun]]
| |
| | 4.18.0-1.fc29.armv7hl with raspberry pi 2
| |
| | {{result|fail}}<ref>The same failure also happens on 4.18.1-300</ref>{{result|fail}}<ref>{{bz|1619081}} ftrace function_graph cause soft lockup</ref>
| |
| | <references/>
| |
| |-
| |
| | [[User:zsun|zsun]]
| |
| | 4.18.1-300.fc29 in kvm
| |
| | {{result|fail}}<ref>{{bz|1619616}} System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.</ref>
| |
| | <references/>
| |
|
| |
| |-
| |
| |}
| |
|
| |
|
| |
|
| |
|
| |
|
| | We usually transfer the result after the test day |
|
| |
|
| [[Category:Fedora 29 Test Days]] | | [[Category:Fedora 29 Test Days]] |