Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Fedora compose checker
Missing expected images: Server dvd i386 Workstation live i386 Server boot i386 Kde live i386 Failed openQA tests: 97/128 (x86_64), 1/2 (arm) New failures (same test did not fail in Rawhide-20180102.n.0): ID: 183659 Test: x86_64 Server-boot-iso install_default@uefi URL: https://openqa.fedo

Fedora 27 updates-testing report

2018-01-03 Thread updates
The following Fedora 27 Security updates need testing: Age URL 39 https://bodhi.fedoraproject.org/updates/FEDORA-2017-15efa72a0c docker-1.13.1-44.git584d391.fc27 35 https://bodhi.fedoraproject.org/updates/FEDORA-2017-913288e9a9 mongodb-3.4.10-1.fc27 32 https://bodhi.fedoraproject.o

Re: Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 20:43 +, Fedora compose checker wrote: > Missing expected images: > > Server dvd i386 > Workstation live i386 > Server boot i386 > Kde live i386 These are due to: https://github.com/rhinstaller/lorax/pull/299 Once a lorax package build with that fix shows up in Rawhide

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 16:39:34 -0800 Adam Williamson wrote: > On Wed, 2018-01-03 at 15:02 -0800, Adam Williamson wrote: > > Hi folks! > > > > So you might have read some stories today about an issue that's > > being described as a design flaw in some CPUs which makes it > > possible for unprivileg

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 15:02:11 -0800 Adam Williamson wrote: > * We know that the fix can lead to reduced performance in some cases > (this affects synthetic benchmarks rather more than real-world > performance). The kernel team thinks the fix is sufficiently important > that it should go out despit

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Ed Greshko
On 01/04/18 09:13, stan wrote: > Again, from my reading on the web this only affects Intel CPUs of the > last decade. So, no other manufacturer or architecture needs to have > the fix applied. I don't know about that.  Going to https://meltdownattack.com/ it reads Which systems are affected

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 18:13 -0700, stan wrote: > On Wed, 03 Jan 2018 15:02:11 -0800 > Adam Williamson wrote: > > > * We know that the fix can lead to reduced performance in some cases > > (this affects synthetic benchmarks rather more than real-world > > performance). The kernel team thinks the f

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Thu, 4 Jan 2018 09:23:58 +0800 Ed Greshko wrote: > I don't know about that.  Going to https://meltdownattack.com/ it > reads > > Which systems are affected by Meltdown? > Desktop, Laptop, and Cloud computers may be affected by Meltdown. > More technically, every Intel processor which impl

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Thu, 2018-01-04 at 01:35 +, Philip Kovacs wrote: > Any word on the performance hit before you push to stable? Is it > discernible? So far as I've read, the general consensus is that you're probably not going to notice it in most usage. Some specific synthetic benchmarks are showing impac

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 17:48 -0800, Adam Williamson wrote: > > This is certainly not correct. Both the Google researchers and Red > Hat's security team have stated that many other CPUs and CPU families > are affected. ARM has already released a statement acknowledging that > several of their CPUs,

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Thu, 4 Jan 2018 09:23:58 +0800 Ed Greshko wrote: > And how about > https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits >    > ? My comments were directed at Meltdown (formerly called Kaiser, now called kopti). I saw nothing about spectre, so I will

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 19:04 -0700, stan wrote: > On Thu, 4 Jan 2018 09:23:58 +0800 > Ed Greshko wrote: > > > And how about > > https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits > >   > > ? > > My comments were directed at Meltdown (formerly called K

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 17:59:11 -0800 Adam Williamson wrote: > On Wed, 2018-01-03 at 17:48 -0800, Adam Williamson wrote: > > The initial reporting that only Intel CPUs were affected was > > entirely wrong. I think you are conflating exploits. The original exploit, called meltdown or kaiser or ko

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 19:31 -0700, stan wrote: > On Wed, 03 Jan 2018 17:59:11 -0800 > Adam Williamson wrote: > > > On Wed, 2018-01-03 at 17:48 -0800, Adam Williamson wrote: > > > The initial reporting that only Intel CPUs were affected was > > > entirely wrong. > > I think you are conflating e

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Thu, 4 Jan 2018 09:23:58 +0800 Ed Greshko wrote: > And how about > https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits >    > ? > Unless there is a significant performance hit isn't it better to just > be safe and make it for all? Wow, SPECTRE is

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 18:45:14 -0800 Adam Williamson wrote: > Rather, I am not concerning myself with individual exploits with cute > names, because that's sort of a silly way to look at things, in my > opinion. The actual truth of how this went down - as I understand it - > is just not "there was

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Peter Robinson
On Thu, Jan 4, 2018 at 2:49 AM, stan wrote: > On Thu, 4 Jan 2018 09:23:58 +0800 > Ed Greshko wrote: > > >> And how about >> https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits >> ? > >> Unless there is a significant performance hit isn't it better to ju

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Matthew Miller
On Wed, Jan 03, 2018 at 06:06:11PM -0700, stan wrote: > It turns out that AMD processors are not affected by this problem. This is not completely clear. AMD processors seem to be not affected by at least some forms of the "Meltdown" variant of the problem; I don't think we can confidently state an

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 3 Jan 2018 22:24:03 -0500 Matthew Miller wrote: > On Wed, Jan 03, 2018 at 06:06:11PM -0700, stan wrote: > > It turns out that AMD processors are not affected by this problem. > > This is not completely clear. AMD processors seem to be not affected > by at least some forms of the "Meltd

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Thu, 4 Jan 2018 02:59:57 + Peter Robinson wrote: > In the brief look I took at the patches the fixes are only applied if > the processor is vulnerable, so in the case of meltdown, it's only > applied to the affected processors. This is generally the case with > most CPU HW errata, whether

Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Fedora compose checker
Missing expected images: Server dvd i386 Workstation live i386 Server boot i386 Kde live i386 Failed openQA tests: 15/128 (x86_64), 1/2 (arm) Old failures (same test failed in Rawhide-20180102.n.0): ID: 183999 Test: x86_64 Server-dvd-iso server_role_deploy_domain_controller URL: https://op