User
|
Profile
|
Regression
|
References
|
Anway_Pict
|
Anway
|
fail [1]
|
- ↑ RHBZ #1625187 This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
|
BikramUTD
|
Dell Alienware 17x + Test day image
|
pass
|
|
Prashant
|
prashantdalvi
|
pass [1]
|
- ↑ RHBZ #1625187 This test case worked for me for Fedora 29 Workstation edition for x86_64 architecture
|
Renault
|
F29 x86_64
|
pass
|
|
Renault
|
F29 x86_64 4.18.1-300
|
fail [1]
|
|
aeperezt
|
4.18.3-300.fc29.x86_64 #1 SMP
|
pass
|
|
aeperezt
|
4.18.3-300.fc29.x86_64 #1 SMP System76 icore 7
|
pass
|
|
aeperezt
|
aeperezt
|
pass
|
|
alciregi
|
4.18.1-300.fc29.armv7hl Raspberry Pi 3
|
pass
|
|
alciregi
|
4.18.3-300.fc29.x86_64 Intel Core i7-7500U (Dell XPS 13 9360)
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
alciregi
|
4.18.3-300.fc29.x86_64 Intel Core2 Duo CPU P8700 (MacBookPro5,5)
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
alciregi
|
4.18.3-300.fc29.x86_64 Intel E5800
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
anandprakash
|
VM
|
pass
|
|
blackfile
|
4.18.1-300.fc29.x86_64 - performance tests
|
pass [1]
|
- ↑ /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
blackfile
|
4.18.1-300.fc29.x86_64, default tests
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
blinker09
|
KVM F29 Asus ROG
|
pass
|
|
bt0dotninja
|
Lenovo thinkpad T440s Core i5 vPro F28
|
pass [1]
|
- ↑ both test pass
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
Argument "" isn't numeric in numeric gt (>) at ../scripts/getsummary line 944, <FD> line 622.
./performance/lmbench3 PASS
|
ccaudle
|
kernel regression, standard and performance
|
pass [1]
|
- ↑ Also verified standard graphical applications worked in KDE, Firefox, MythTv, konsole, plasma shell. No regressions seen in sshd or nfs client.
|
chuhu
|
NEC Express5800/R120b-2 8G 16 processors
|
pass [1]
|
- ↑ Run trinity and stress-ng testings, did not hit issue.
|
chuhu
|
SGI UV2000 12G memory 64 processors
|
fail [1]
|
- ↑ RHBZ #1619508 on the machine, after booting , usb reported error and kernel soft lockup with kernel 4.18.0
|
davisclick
|
default
|
pass [1]
|
|
davisclick
|
destructive
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
davisclick
|
minimal
|
pass [1]
|
|
davisclick
|
performance
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
davisclick
|
stress
|
fail [1]
|
- ↑ mmap001 0 TINFO : mmap()ing file of 10000 pages or 40960000 bytes
mmap001 1 TPASS : mmap() completed successfully.
mmap001 0 TINFO : touching mmaped memory
mmap001 2 TPASS : we're still here, mmaped area must be good
mmap001 3 TPASS : synchronizing mmapped page passed
mmap001 4 TPASS : munmapping testfile.30155 successful
mmap001 0 TINFO : mmap()ing file of 1000 pages or 4096000 bytes
mmap001 1 TPASS : mmap() completed successfully.
mmap001 0 TINFO : touching mmaped memory
mmap001 2 TPASS : we're still here, mmaped area must be good
mmap001 3 TPASS : synchronizing mmapped page passed
mmap001 4 TPASS : munmapping testfile.30156 successful
mtest01 0 TINFO : Total memory already used on system = 4291964 kbytes
mtest01 0 TINFO : Total memory used needed to reach maximum = 3975212 kbytes
mtest01 1 TFAIL : mtest01.c:180: More memory than the maximum amount you specified is already being used
|
decathorpe
|
4.18.3-300.fc29.x86_64, Ryzen 1700X, NVIDIA GTX 1070
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB
|
fredlima
|
VirtualBox 5.2.18 r124319 Windows 7 SP1, F28 4.18.3-300.fc29.x86_64 vbox-guest =/lib/modules/4.18.3-300.fc29.x86_64/kernel/drivers/virt/vboxguest/vboxguest.ko.xz
|
fail [1]
|
- ↑ running for 5 hours, stuck after sysfs-perms with PASS result.
|
giardia
|
KernelTest iso image on Virtualbox running on a MacBook Pro 7,1 13-inch, Mid 2010
|
pass [1]
|
- ↑ I like the decision to disable speck crypto cipher in the kernel
default test passed, performance test erroring out: gmake[2]: *** [Makefile:244: ../bin/x86_64-linux-gnu/lib_tcp.o] Error 1
make[1]: *** [Makefile:114: lmbench] Error 2
make: *** [Makefile:20: build] Error 2
In file included from lib_tcp.c:9:
bench.h:38:10: fatal error: rpc/rpc.h: No such file or directory
#include <rpc/rpc.h>
^~~~~~~~~~~
compilation terminated.
|
guazhang
|
KVM
|
pass [1]
|
|
jayeshc
|
jayeshchaudhari
|
fail [1]
|
- ↑ RHBZ #1625187 This test case is for emoji working in Fedora 28 but not in Fedora 29.
|
jiji
|
4.18.1-300.fc29.x86_64,kvm
|
pass [1]
|
- ↑ run some ipv6 testcases,all pass
|
jishi
|
4.18.3-300.fc29.x86_64
|
pass [1]
|
- ↑ basic protocol traffic, tcp, udp, multicast and sctp
|
jishi
|
geneve basic test
|
pass [1]
|
- ↑ geneve basic test, add geneve over ipv4 and ipv6, run traffic
|
jishi
|
gre basic test
|
pass [1]
|
- ↑ add gre and run traffic
|
jishi
|
ipv6 socket test
|
pass [1]
|
- ↑ basic ipv6 socket options
|
jishi
|
route functions
|
pass [1]
|
- ↑ basic route test, route table, rule table and all options for route table and rule
|
jishi
|
vxlan basic test
|
pass [1]
|
- ↑ add vxlan over ipv4 and ipv6 with remote unicast and multicast, run traffic
|
jlanfa
|
libvirt @ fc28
|
pass [1]
|
|
josereyesjdi
|
|
pass [1]
|
|
josereyesjdi
|
default
|
pass [1]
|
- ↑ Test suite called with default
./default/libhugetlbfs SKIP ./default/modsign PASS ./default/insert_leap_second PASS ./default/memfd PASS ./default/paxtest PASS ./default/selinux-dac-controls PASS ./default/mq-memory-corruption PASS ./default/posix_timers PASS ./default/sysfs-perms PASS ./default/cachedrop PASS ./default/timer-overhead PASS ./default/stack-randomness PASS Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lbazan
|
Lenovo t470 i5-7200U
|
pass [1]
|
|
lbazan
|
Oracle Virtual Box Version 5.2.18 r124319 (Qt5.6.2)
|
fail [1]
|
- ↑ 1. ./default/paxtest FAIL Test suite complete FAIL Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
2. Vulnerability status: /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
lilin
|
kvm
|
pass [1]
|
- ↑ kernel-4.18.3-300.fc29.x86_64,run some multipath testcases,all pass
|
lnie
|
4.18.1-300.fc29.x86_64 Dell PowerEdge R720
|
pass [1]
|
- ↑ default and performance tests passed
|
lruzicka
|
Fedora 28 with 4.18.1 kernel, default tests
|
pass [1] pass [2]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
- ↑ The libhugetlbfs was skipped, otherwise all tests passed.
|
lruzicka
|
Fedora 28 with 4.18.1 kernel, performance tests
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lruzicka
|
Fedora 28 with 4.18.3 kernel, default tests
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
lruzicka
|
Fedora 28 with 4.18.3 kernel, performance tests
|
pass [1]
|
- ↑ Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB, IBRS_FW
|
maryonday
|
4.16.3-301.fc28.x86_64
|
pass [1]
|
|
masami
|
Fedora 28 + 4.18.3-300.fc29.x86_64 on i7-5820K
|
pass [1]
|
- ↑ regression test passed. kvm, docker, sound and video worked fine.
|
nabooengineer
|
us_EN
|
fail [1]
|
- ↑ Virtual Box Version 5.2.18 r124319, FC29 TestDays
4.18.5-300.fc29.x86_64
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
ozeszty
|
F28 with 4.18.3-300.fc29.x86_64 on AMD Athlon X2 + R7 240
|
pass [1]
|
- ↑ All good, ./default/libhugetlbfs was skipped.
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline
|
ozeszty
|
F28 with 4.18.3-300.fc29.x86_64 on Ivy Bridge mobile + AMD HD7670m
|
pass [1]
|
- ↑ As usual, only ./default/libhugetlbfs was skipped. No new errors in dmesg.
|
pifang
|
Dell PowerEdge M805 Quad-Core AMD Opteron(tm) Processor 2350 x2 8G RAM
|
pass [1] pass [2]
|
- ↑ 4.18.1-300.fc29
- ↑ ltp vmm relate.
|
pifang
|
Romley-EP Intel(R) Xeon(R) CPU E5-2697 v2 x2 32G RAM
|
warn [1] pass [2]
|
- ↑ 4.18.1-300.fc29
- ↑ vmm test.
|
potty
|
default
|
fail [1] fail [2]
|
- ↑ Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with default
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/insert_leap_second FAIL
./default/memfd PASS
./default/paxtest PASS
./default/selinux-dac-controls PASS
./default/mq-memory-corruption PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/cachedrop PASS
./default/timer-overhead FAIL
./default/stack-randomness PASS
Test suite complete FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
- ↑ Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with default
./default/libhugetlbfs SKIP
./default/modsign PASS
./default/insert_leap_second FAIL
./default/memfd PASS
./default/paxtest PASS
./default/selinux-dac-controls PASS
./default/mq-memory-corruption PASS
./default/posix_timers PASS
./default/sysfs-perms PASS
./default/cachedrop PASS
./default/timer-overhead FAIL
./default/stack-randomness PASS
Test suite complete FAIL
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
potty
|
minimal
|
pass [1] pass [2]
|
- ↑ Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (Retina, 13-inch, 2014) macOS High Sierra 10.13.5
Test suite called with minimal
Test suite complete PASS
- ↑ Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with minimal
Test suite complete PASS
|
potty
|
performance
|
pass [1]
|
- ↑ Oracle VirtualBox virtual machine from kerneltest-4.18.iso using MacBook Pro (15-inch, 2016) macOS High Sierra 10.13.6
Test suite called with performance
./default/lmbench3 PASS
Test suite complete PASS
Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
|
pyadav
|
kernel-4.18.3-300.fc29.x86_64 on F28
|
pass [1]
|
- ↑ ./default/libhugetlbfs test was skipped, rest all passed for default test
|
quadj4
|
thinkpad Z lenovo running test day image
|
pass
|
|
qzhao
|
KVM
|
fail [1]
|
- ↑ RHBZ #1619122 Bug 1619122 - kdump service failed: Unhandled rela relocation: R_X86_64_PLT32
Both kernel-4.18.0-0.rc8.git2.1.fc29.x86_64 and kernel-4.19.0-0.rc0.git3.1.fc30.x86_64 failed.
|
saloni raj
|
Fedora 29 Dell Latitude
|
pass
|
|
spathare
|
4.18.3-300.fc29.x86_64
|
pass
|
|
temjin747
|
Test Day Image
|
warn [1]
|
- ↑ Something seems wrong with the test image after installing it through KVM/qemu and using it through Virtual Machine Manager. The Gnome activities menu is not visible, nor does pressing the meta key do anything, so I cannot even launch a console session. The only things on the top panel that appear are the power, network, and volume icons. I can click on those icons and can send commands via the VM console window to switch tty's, but that's it. Since I don't know the localhost-live login, I cannot do anything through tty2.
Host machine:
HP Envy x360 with AMD Ryzen 5 2500U (4 core/8 thread) APU with 16 GB RAM running Fedora 28 KDE x64 and kernel 4.17.17-200.fc28.x86_64.
VM info:
2 vCPUs, 2 GB RAM
KVM hypervisor
x86_64 architecture
emulator: /usr/bin/qemu-kvm
chipset: i440FX
|
testuser
|
x86_64
|
pass [1]
|
|
thom
|
Kerneltest ISO image on RHV 4.2, hypervisor 3.10.0-862.6.3el7.x86_64
|
pass [1]
|
- ↑ Vulnerabilities:
PTI Inversion
PTI
SSB disabled via prctl and seccomp
__user pointer sanitzation
Full generic retpoline, IPBP, IRBR_FW
|
truptiPict
|
|
pass
|
|
xifeng
|
4.18.3-300.fc29.x86_64
|
pass [1]
|
|
zsun
|
4.18.0-1.fc29.armv7hl with 96boards hikey (aka Hikey 620)
|
fail [1] fail [2] fail [3]
|
- ↑ The same issue also happens on 4.18.1-300
- ↑ Sorry, I mean 4.18.0-1.fc29.aarch64
- ↑ RHBZ #1616193 ftrace function_graph cause soft lockup on 96boards hikey (aka Hikey 620)
|
zsun
|
4.18.0-1.fc29.armv7hl with raspberry pi 2
|
fail [1] fail [2]
|
- ↑ The same failure also happens on 4.18.1-300
- ↑ RHBZ #1619081 ftrace function_graph cause soft lockup
|
zsun
|
4.18.1-300.fc29 in kvm
|
fail [1]
|
- ↑ RHBZ #1619616 System cannot boot with ftrace=function_graph parameter. Other part of ftrace test works fine.
|