17:01:36 #startmeeting f16-blocker-bug-5-and-a-half 17:01:36 Meeting started Tue Nov 1 17:01:36 2011 UTC. The chair is tflink. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:01:36 Useful Commands: #action #agreed #halp #info #idea #link #topic. 17:01:59 #meetingname f16-blocker-bug-5-and-a-half 17:01:59 The meeting name has been set to 'f16-blocker-bug-5-and-a-half' 17:02:00 #topic roll call 17:02:15 bug 5.5 ? hows that work? 17:02:19 Who's ready for some rather impromptu blocker review? 17:02:34 * cwickert is, although he is not a bugzapper officially 17:02:40 * red_alert 17:02:45 * adamw raises a bottle 17:02:57 fenrus02: it's a secret bug naming system 17:03:11 heh 17:03:11 #meetingname f16-blocker-bug-review-meeting-5-and-a-half 17:03:11 The meeting name has been set to 'f16-blocker-bug-review-meeting-5-and-a-half' 17:03:36 cwickert, red_alert: welcome to the party! 17:03:48 #chair adamw 17:03:48 Current chairs: adamw tflink 17:04:12 hola compadres 17:04:29 hrm, the wiki page doesn't show all the blocker bugs 17:04:46 nvm, it just got updated 17:04:47 * nirik is lurkin 17:04:50 we're only talking about one, right? 17:04:54 I think the updating script runs on the hour 17:05:04 5 proposed blockers, 2 approved 17:05:15 we'll go with the kernel one first 17:05:21 k 17:05:41 how about we use https://bugzilla.redhat.com/showdependencytree.cgi?id=713568&hide_resolved=1 then 17:05:42 * tflink skips the usual formalities 17:05:54 #link https://fedoraproject.org/wiki/Current_Release_Blockers 17:06:31 starting w/ proposed blockers, kernel first 17:06:33 #topic (748516) kernel does not boot with patch to fix invalid EFI remap calls from 2011-10-18 17:06:36 #link http://bugzilla.redhat.com/show_bug.cgi?id=748516 17:06:39 #info Proposed Blocker, ASSIGNED 17:06:56 * dgilmore thinks that using bios mode is an acceptable workaround 17:07:06 so i think we can summarize the impact of this as: EFI boot will fail on an as-yet-unknown number of EFI-supporting systems 17:07:07 i may be alone there 17:07:12 is the "we don't support efi on macs" documented somewhere? 17:07:28 drago01: https://fedoraproject.org/wiki/Fedora_16_Beta_Release_Criteria 17:07:36 criterion 4 17:07:57 it's a bit messy with the way we have the criteria written at present, but our intent is that we don't really support EFI booting on macs. 17:08:03 however, we don't believe this bug would be limited to macs. 17:08:06 it's not so much "we don't support efi on macs" as "we won't block release for EFI issues only on macs" 17:08:09 is there some other popular efi hardware other than mac? 17:08:18 yes 17:08:25 it's becoming increasingly available 17:08:27 do we have verification that it blocks some non-macs? 17:08:39 notting: no, but we have little efi info in general. 17:08:41 and have we always shipped with some EFI hardware not working? 17:08:47 yes. 17:09:04 notting, well, "always" is not the same. efi was not really used anywhere other than mac before. 17:09:17 mjg59 says "it'll happen on anything that has runtime services above the top of RAM" 17:09:31 all the new thinkpads it seems have efi 17:09:35 it's been on servers for a while now but I'm not sure how many people are runnning fedora on baremetal servers 17:09:36 mjg59: is that a common case outside of macs? 17:09:40 as does a bunch of other boards 17:09:50 pretty much all new boards have efi 17:09:56 airlied: It's a completely valid configuration 17:09:57 No clue how common. People still rarely do EFI installs with Fedora. 17:09:57 it doesn't affect my system, so hey, data point. 17:10:02 so we need to start caring more about efi than ever before. 17:10:13 fenrus02: yes 17:10:14 do we need an EFI primer? 17:10:17 we already are to a large degree 17:10:26 but that is somewhat off topic... 17:10:28 * spot is here 17:10:30 EFI booting has never quite worked right on macs 17:10:32 and considering windows 8 will only support efi, there will be a flood of efi enabled hardware 17:10:32 at least, not all macs 17:11:08 let's do the quick one: EFI is a new system firmware format, essentially a replacement for BIOS. Just about all systems that ship with an EFI firmware implement a 'BIOS compatibility mode' which effectively looks like a regular BIOS to the operating system. 17:11:21 you pick EFI or BIOS when you install, you can't install via EFI then boot via BIOS later - at least, AIUI. 17:12:30 EFI is getting increasingly more traction but it's still quite a minority pursuit at this time. we're generally agreed we want to ensure it works but the _practical_ impact of it not working on some systems isn't likely to be huge at this point. 17:12:36 common bugs post then? 17:12:42 i'm just trying to give background... 17:12:57 for the new arrivals: https://bugzilla.redhat.com/show_bug.cgi?id=748516 17:13:18 adamw: what about dual boot? lets say you have windows installed on efi ... can you just switch to bios mode without breaking windows? 17:13:19 adamw, nod. i've seen a lot of mac-hw users trying to install fedora and not having a good time of it. 17:13:56 some random laptoys too, but i do not have the hw specs on any of them handy. 17:13:59 drago01: i think it gets complex at that point. 17:14:11 mjg59 would probably be able to answer the q better. =) 17:14:15 so, this broke in 3.1-rc10? 17:14:18 yes 17:14:24 efi implies gpt from a standards point-of-view, and the hack to boot gpt via bios doesn't always work 17:14:25 it's an upstream commit 17:14:29 no 17:14:29 is there a known fix for rc10? 17:14:33 wait, no 17:14:41 srry 17:14:42 There is a simple fix 17:14:44 this was a patch added from an upstream EFI developer 17:14:48 cra: windows ignores that and uses mbr anyway 17:14:51 it's not in 3.1 at all 17:14:53 And we have no idea how large the impact of the bug is 17:15:04 i've read that windows requires gpt to boot from efi 17:15:06 mjg59, simple enough for an end-user to implement ? 17:15:10 fenrus02: No 17:15:19 fenrus02, how are they going to install it if it doesn't boot? 17:15:21 The fix is that we rebuild the kernel without the patch 17:15:27 mjg59, which i've done 17:15:34 And then respin the install media 17:15:44 mjg59: what is the difference between w/o patch and w/new-posted-in-bz patch? 17:15:54 if the bug is accepted as a blocker, then we do that. 17:15:57 notting: 32-bit EFI systems (which we don't support) work better 17:15:59 if it isn't, then we don't do that. 17:16:01 adamw: That's the fix 17:16:01 notting, 32-bit EFI might work with the patch 17:16:14 If you don't want to fix it, that's fine. But an unknown number of EFI systems, which we claim to support, won't work. 17:16:17 the patch is for 32-bit efi? ok, fine with dropping it 17:16:23 mjg59: yes, indeed. 17:16:27 jwb: we dont make the 32 bit media efi supported afaik 17:16:31 * drago01 has a hard time caring about 32bit efi 17:16:37 wait 17:16:42 signals getting crossed hre 17:16:42 drago01: well, as Fedora, we don't care at all. 17:16:44 yes. all of which is why i already dropped the patch and rebuilt 17:16:44 We don't support 32 bit EFI 17:16:49 pjones: good 17:16:51 mjg59: ASSumption: there are no 32-bit only EFI machiens? 17:16:51 Ignore 32 bit EFI 17:16:55 the bug is not that 32-bit EFI is broken 17:16:57 notting: There are. We don't support them 17:17:04 The bug the patch *fixed* is that 32-bit EFI was broken 17:17:06 the *broken patch* was for 32-bit EFI 17:17:19 so if we revert it, theoretically, 32-bit EFI support gets worse. but fedora does not care about 32-bit EFI. 17:17:20 notting: gateway and apple both produced some. we've never seen the former, we support the latter in BIOS (bootcamp) only. 17:17:31 adamw: yeah we get that ... just talking about the impact of dropping it 17:17:34 k. 17:17:45 i don't suppose we can detect 32bit EFI systems and toss a happy note? 17:17:48 The impact in dropping it is that some machines we don't support break, and some machines we do support start working 17:17:49 all the hw i've seen that has efi, also has 64bit. just document that. 17:17:55 let's forget about 32-bit EFI. 17:17:57 spot: We don't produce 32-bit EFI install media 17:18:09 That's a pretty significant indication that it's not supported 17:18:20 mjg59: understood, however, does the avg owner of a 32bit EFI box know that? 17:18:27 spot: They could never have installed 17:18:38 mjg59: could they have booted the installer? 17:18:40 No 17:18:44 spot: no - but their system will quietly install as a BIOS machine. 17:18:45 okay then. dont care. 17:18:50 spot: the 32-bit install images just don't have the EFI stuff on them. 17:18:55 which is fine, and how it has been and should be. 17:19:21 so, yeah, i'd be +1 blocker, +1 to drop the patch and respin 17:19:23 The only significant issue here is whether we're fine with breaking an unknown number of 64-bit EFI systems 17:19:28 so, again: fundamentally this bug is simply a judgment call: is breaking EFI boot on a certain unknown amount of machines a blocker bug? 17:19:35 notting: +1 17:19:46 And sorry about this, I should have caught it upstream 17:19:50 * pjones would also be +1 blocker and +1 to drop and respin 17:19:52 mjg59, but reverting the patch fixes the known quantity? 17:20:01 does smolt say something on the number of 64bit EFI systems? 17:20:13 fenrus02: The failure precisely matches the expected behaviour of the patch 17:20:15 smolt data doesn't indicate EFI support, i don't believe. 17:20:20 red_alert: smolt is, as usual, fairly useless in this regard. 17:20:25 fenrus02: there's a confirmation in the bug that the fix works. 17:20:40 red_alert: It's not all 64 bit EFI systems. It's 64 bit EFI systems that have EFI services code above the top of RAM. 17:20:53 The failure is well understood. Dropping the patch will avoid it. 17:21:05 we're going to have to live with the fact that we don't have any certain data on the amount of systems it affects. 17:21:09 adamw, no 17:21:13 what we have is about 8 data points. 17:21:22 adamw, oh, well yes i suppose 17:21:24 mjg59, when stated like that, it seems the risk of dropping the patch is nearly nil. 17:21:28 fenrus02: Yes 17:21:28 cos that's how many systems we have EFI install tests on that aren't affected by other bugs. 17:21:45 fenrus02: strictly, we should not consider such issues when deciding if a bug's a blocker 17:21:58 if it's a blocker then *it's a blocker*: no matter how hard it is to fix, we just keep working until we fix it. 17:22:00 adamw: this bug can even affect hardware that is yet to be produced 17:22:12 adamw, we have no means of measuring the end-user impact, but we have a known working fix. 17:22:21 drago01: yes, it can. it's more likely to than not, in fact. do bear in mind fedora releases' limited shelf lives, though. 17:22:23 fenrus02: yes. 17:22:49 adamw, what's the downside of rolling out the corrected version? i'm not seeing one. 17:23:00 AIUI, the downside is "we slip" 17:23:11 fenrus02: the downside is that we have to respin and re-test the entire release in the next 24 hours, and there is always a significant chance of something going wrong if we do that. 17:23:17 notting: not for certain, but it's possible. 17:23:48 fenrus02: In Theory reverting the patch itself is a perfectly safe operation, but it does entail a rebuild of our release images, which is a much bigger operation. 17:24:08 adamw, *nod* but seems highly beneficial in the long term. 17:24:16 adamw, even if that means we slip 17:24:31 okay 17:24:34 perhaps i'm missing something critical. 17:24:40 not at all 17:24:54 just trying to make sure all the info is here, i'm not trying to influence you toward one vote or the other 17:24:57 Well, we can declare EFI unsupported, which means we have a severe functional regression compared to F15 17:25:05 Or we can block 17:25:09 adamw, *nod* much appreciated 17:25:22 so, any more _new_ arguments or can we vote and get on? :) 17:25:23 i dont think anyone wants to say efi is unsupported 17:25:26 Now so far everyone who's expressed an opinion has said we should block 17:25:29 mjg59: in practice, if we didn't fix this, we'd probably document it and put up a special boot image with a fixed kernel for affected people to use, i expect 17:25:31 mjg59: no (yes we can) but that's not really worth it 17:25:46 mjg59: i dont want to block on this. 17:25:52 but yes, that would be worse than f15. (though it's not as if f15 worked on all efi systems.) 17:25:55 i agree its not ideal 17:26:01 and that it needs a fix 17:26:01 i think we have all the info, anyway 17:26:16 so we can probably just vote and see if we have enough of a consensus 17:26:18 dgilmore: how's that not a +1 to block on it? 17:26:36 pjones: im ok with saying if efi doesnt work for you sorry use bios mode 17:26:39 dgilmore: you mean s/block/slip/ ? 17:26:45 dgilmore: No, that is really not acceptable 17:26:47 adamw: how long could it take to have a special boot image for these guys? 17:26:55 dgilmore: We have explicitly said that EFI is supported 17:26:56 cripes 17:27:20 gtirloni: if we're going to that effort, i'd prefer to do it right and just fix it in the main image 17:27:26 gtirloni: bout an hour 17:27:26 dgilmore: no, and having people messing with efi vs bios mode just makes usability worse for the worst case of a one week slip 17:27:31 drago01: yeah 17:27:35 dgilmore: It's also impossible to migrate from EFI to BIOS boot 17:27:55 dgilmore: So anyone who upgrades from DVD will be left utterly screwed 17:28:36 yeah, that is a point, if you installed f15 EFI then upgraded you'd be in stew. 17:29:04 okay 17:29:07 can we please get votes? 17:29:12 adamw: that and the dual boot thing 17:29:16 dgilmore: also there is some (albeit small) chance that some hardware vendor will ship a non-BIOS-booting machine in the F16 timeframe. 17:29:23 anyone who's here is allowed to vote, the votes are tabulated by the highly scientific method of 'hey, looks like we have a consensus' 17:29:28 please vote +1 blocker or -1 blocker 17:29:35 +1 blocker 17:29:36 +1 blocker 17:29:37 +1 blocker 17:29:40 +1 blocker 17:29:41 +1 blocker 17:29:41 + blocker 17:29:42 +1blocker ;( 17:29:44 1 17:29:48 sounds like consensus to me 17:29:48 +1 blocker 17:29:50 +1 blocker 17:29:51 +1 blocker 17:29:53 +1 17:30:05 * rbergeron is +1 as well 17:30:33 dgilmore is -1, i believe 17:30:34 now that's a lot of votes and very clear :) 17:30:36 proposed #agreed - 748516 - AcceptedBlocker - Violates the beta release criterion "The installer must boot and run on systems using EFI other than Apple Macs" 17:30:42 so, yeah, that seems clear enough. 17:30:50 ack/nak/patch? 17:30:50 ack 17:30:58 ack 17:31:04 ack 17:31:05 #agreed - 748516 - AcceptedBlocker - Violates the beta release criterion "The installer must boot and run on systems using EFI other than Apple Macs" 17:31:29 alright 17:31:33 we have a few other proposed blockers too i think? 17:31:38 yep, 4 more 17:31:41 #topic (748272) The UEFI installation fails to install bootloader 17:31:41 #link http://bugzilla.redhat.com/show_bug.cgi?id=748272 17:31:41 #info Proposed Blocker, NEW 17:31:51 this one's been around for a bit 17:31:56 i've been trying to shepherd it 17:31:59 frankly the reporter is a bit of a pita 17:32:47 I'm not completely convinced there's an actual bug here. 17:32:57 and if there is, I'm not convinced it's not in his firmware, tbh. 17:33:12 yeah, me either. it's very difficult to get a handle on what the hell he's actually trying to tell us, in between all his attempts to use different images in different ways and stuff. 17:33:45 so i'm fine just rejecting this one atm for unclear impact and inability of anyone else to reproduce exactly what he's complaining about; i'm pretty sure none of the other efi bugs we've seen have exactly been whatever the hell he's doing wrong. 17:33:54 anyway, this appears to work for other people and on my test machines, so... 17:34:00 +1 17:34:10 * pjones wonders what cwickert is +1'ing. 17:34:20 us? 17:34:23 +1 for adamw's suggestion to reject it 17:34:26 okay 17:34:28 yeah, I'm thinking the same 17:34:31 so, -1 blocker 17:34:31 I can totally get behind that. 17:34:32 i would have said -1 blocker 17:34:40 -1 blocker 17:34:45 -1 17:34:51 -1 blocker (to make it more clear) 17:34:55 -1 17:34:58 -1 blocker 17:35:25 proposed #agreed - 748272 - RejectedBlocker - It isn't clear that there is a bug here and nobody other than the reporter has been able to reproduce the issue 17:35:30 ack/nak/patch? 17:35:44 -1 blocker 17:35:55 ack 17:36:10 ack 17:36:12 ack 17:36:19 #agreed - 748272 - RejectedBlocker - It isn't clear that there is a bug here and nobody other than the reporter has been able to reproduce the issue 17:36:24 #topic (750469) Fedora missing in Grub Legacy after F15->F16 DVD upgrade with Grub 2 option 17:36:28 #link http://bugzilla.redhat.com/show_bug.cgi?id=750469 17:36:30 #info Proposed Blocker, NEW 17:36:51 * red_alert is the culprit here :/ 17:37:10 yeah, we really can't evaluate this yet 17:37:16 i can try to reproduce though, i guess 17:37:27 what is the "grub2 option" ? 17:37:35 I reproduced it twice so far on the same hardware 17:38:02 red_alert: does not look like anything hardware specific 17:38:02 drago01: when you upgrade, you can choose to stay with your existing boot loader or install a new one...I thought of the latter as "grub 2 option" 17:38:09 red_alert: do you know if you were booting the f16 kernel or not? 17:38:16 red_alert: ah ok 17:38:31 tflink: I can't imagine that would make any difference 17:38:33 what it _does_ is just try to re-do the bootloader config from scratch, much like would happen on a fresh install 17:38:54 anyway, i'm cloning my windows-with-some-free-space vm right now, will test this. 17:38:59 tflink: sorry? there's no boot options for Fedora available 17:39:02 i think we can punt on it till we have a bit more data 17:39:06 pjones: I'm just remembering the preupgrade issues where the system ended up using the F15 grub installation and F15 kernel 17:39:24 nvm, I'm misreading 17:39:53 note, however, that the upgrade criterion is quite narrow 17:40:08 "The installer must be able to successfully complete an upgrade installation from a clean, fully updated default installation (from any official install medium) of the previous stable Fedora release, either via preupgrade or by booting to the installer manually. The upgraded system must meet all release criteria " 17:40:26 intentionally so, as we acknowledge that, well, upgrading is hard. and usually _is_ going to break in some cases. 17:40:32 adamw: which is clear enough 17:40:43 This really doesn't fit, then 17:40:53 adamw: no it shouldn't break 17:40:53 an upgrade performed strictly by the book does work, we have multiple tests of that 17:40:56 adamw: I didn't have the latest updates, so I can't say we block this right now 17:41:32 red_alert: don't see how this matters 17:41:32 so it sounds like punt or reject 17:41:47 drago01: it's a classic too-many-variables problem. upgrades can be broken by just about anything in the source system or the target system, and there's what, 10,000 packages in fedora? 17:42:03 only ~900 in a live isntall ;) 17:42:08 adamw: ~18000 binaries 17:42:16 adamw: well the result should not be an unbootable system 17:42:20 i'm probably punt on this for now 17:42:23 adamw: that's just not acceptable 17:42:25 drago01: yeah, that does suck. 17:42:26 but only two boot managers and one package that touches it's config 17:42:53 cwickert: and yet this bug happened to red_alert, yet doesn't happen if you just build a vm, install f15 into it, update f15, then upgrade 17:42:53 if we punt, I'll try to make a couple of additional tests (including whatever adamw calls 'by the book') tomorrow (CEST) 17:42:58 I'd say retest and just drop the "grub 2 option" 17:43:02 cwickert: i can tell you that for damn sure cos i've done it about 10 times 17:43:06 so upgrades stick to grub for now 17:43:10 drago01: no. 17:43:11 until we fix it (f17) 17:43:17 proposed #agreed - 750469 - We need more information and re-testing with a fully updated install before making a decision on blocker status 17:43:18 adamw: and you did upgrade to grub2? 17:43:21 cwickert: yes. 17:43:22 ack/nak/patch? 17:43:24 alright 17:43:26 cwickert: that's the supported and default option 17:43:45 to clarify: I hit the exact same with both options, grub1 and grub2 17:43:46 cwickert: 'skip bootloader configuration' is not a good choice, really. it's meant to be used if you have a third party bootloader and want anaconda not to touch anything. 17:43:58 it's not actually expected to result in a bootable system if you're _not_ using some kind of other bootloader. 17:44:10 adamw: isn't the bug about that option breaking? 17:44:28 drago01: yes. but dropping the grub2 migration is not a viable fix. 17:44:49 adamw: ah ok 17:44:50 adamw: agreed. 17:44:53 drago01: oh good lord, no, we're not supporting grub1 on bios installs in f16. 17:45:00 tflink: ack 17:45:06 tflink: ack 17:45:15 #agreed - 750469 - We need more information and re-testing with a fully updated install before making a decision on blocker status 17:45:22 pjones: the whole grub1 and grub2 at the same time is a mess really 17:45:22 #topic (746693) Can't login via gdm when `metacity` pkg is not installed 17:45:26 #link http://bugzilla.redhat.com/show_bug.cgi?id=746693 17:45:28 #info Proposed Blocker, NEW 17:45:34 adamw: have you tested both installing the boot loaded to mbr and to the first sectors of the /boot partition? 17:45:37 drago01: then why are you suggesting we do it? 17:45:44 cwickert: not on upgrade, no 17:45:52 pjones: because we have it anyway 17:45:57 o_O 17:46:14 pjones: I'd suggest dropping grub1 at all but we are one week before release 17:46:14 man, this is an annoying bug. 17:46:15 adamw: I think both locations should be supported, I will test it later 17:46:22 i should just have stuck the damn dependency in myself last week. 17:46:47 cwickert: breakage in first sector wouldn't result in an unbootable system, though, of course. 17:47:17 i'm -1 blocker +1 nth on this, we should fix it since we're doing an rc4 anyway 17:47:23 impact is that xfce is broken, basically. 17:47:36 do we have a fix? 17:47:43 adamw: well, I fixed it in the kickstart 17:47:48 yeah, I'm the same. I was just looking through the criteria to see if I was missing something 17:47:54 but the proper fix would be in gdm 17:47:55 -1 blocker, +1 NTH 17:48:15 the ks fix only will help the live media... 17:48:15 * fenrus02 still thinks we should just fix the Requires: in gdm 17:48:15 people using the DVD and doing a yum groupinstall will hit that bug 17:48:20 not yum groupinstall or dvd... 17:48:29 we could change comps if we respin anyway 17:48:47 but I would rather prefer a fix in gdm 17:49:08 proposed #agreed - 746693 - RejectedBlocker AcceptedNTH - hits the alpha release criterion "Following on from the previous criterion, after firstboot is completed and on subsequent boots, a system installed according to any of the above criteria (or the appropriate Beta or Final criteria, when applying this criterion to those releases) must boot to a working graphical environment without unintended user intervention. This includes correctly accessin 17:49:10 long story short: -1 blocker, +1 NTH 17:49:16 we can decide on the best fix lately 17:49:16 ack/nak/patch? 17:49:31 at this late point i am highly predisposed to changes which only affect comps/ks rather than rebuilding packages, but meh 17:49:32 ack 17:49:35 cwickert: changing comps makes for alot of extra work for me. so id rather not change comps unless we really have to 17:49:47 alright dgilmore 17:49:57 adamw, change gdm requires in -updates then? 17:49:59 changing gdm means retesting, but then we should anyhow? 17:50:12 did that proposal only got cut off at the end for me? :) 17:50:21 it's a long criterion... 17:50:23 red_alert, not just you 17:50:24 i know how it ends, though. =) 17:50:29 :) 17:50:33 tflink: can you hit the end of that for those of us playing along at home 17:50:40 :) 17:50:43 where did it get cut off? 17:50:46 rbergeron: teh end of the criterion is irrelevant to the bug 17:50:54 it ends with 'accessing encrypted partitions' 17:51:05 -1 blocker, +1 NTH, ack (if the proposal ends with the full criterion) 17:51:15 when the correct passphrase is supplied" for the XFCE spin 17:51:22 is the last part 17:51:42 tflink: so far ends with "correctly accessin" ;) 17:52:00 sigh 17:52:46 proposed #agreed - 746693 - RejectedBlocker AcceptedNTH - hits the alpha release criterion "Following on from the previous criterion, after firstboot is completed and on subsequent boots, a system installed according to any of the above criteria (or the appropriate Beta or Final criteria 17:53:01 when applying this criterion to those releases) must boot to a working graphical environment without unintended user intervention. This includes correctly accessing any encrypted partitions when the correct passphrase is supplied" for the XFCE spin 17:54:04 #agreed - 746693 - RejectedBlocker AcceptedNTH - hits the alpha release criterion "Following on from the previous criterion, after firstboot is completed and on subsequent boots, a system installed according to any of the above criteria (or the appropriate Beta or Final criteria, when applying this criterion to those releases) must boot to a working graphical environment without unintended user intervention. This includes correctly accessing any enc 17:54:17 #topic (702659) xcb_io.c:221: poll_for_event: Assertion `(((long) (event_sequence) - (long) (dpy->request)) <= 0) failed 17:54:20 #link http://bugzilla.redhat.com/show_bug.cgi?id=702659 17:54:22 #info Proposed Blocker, ASSIGNED 17:54:55 I'm not so sure about blocker on this one 17:55:27 workaround: don't press cancel on that dialog 17:55:37 that's an easy one everyone can do ;) 17:55:51 true, but it's really easy to hit 17:55:59 sounds like an easy workaround 17:56:09 change vc's create your user, restart gdm 17:56:13 does firstboot run again if it does crash? 17:56:21 does it block forever if it can't find the ntp servers? 17:56:35 tflink: should run on next reboot IIRC 17:56:36 (meaning the user *has* to press cancel) 17:57:01 gtirloni, should timout in ~90s or thereabouts. have you tried it? 17:57:12 if firstboot runs again on next boot, I think I'd be OK with NTH 17:57:16 not sure anyone would wait for the timeout vs. just hitting cancel, though 17:57:18 tflink: +1 17:57:37 well, let me revise that 17:57:42 fenrus02: not yet, i'll start a vm here. 17:57:43 i am not keen to take a gtk2 change that's not a blocker fix 17:57:44 but the other remaining question is whether or not we see the same behavior on 64 and 32 bit systems 17:57:52 yeah, a lot of people are impatient 17:57:53 i would be -1 blocker, just because it's an error path, not a normal path, and no fix in hand 17:58:34 if you definitely get firstboot again when you restart that makes me rather less worried 17:58:35 ok, so this would be worst on 32 bit systems 17:58:45 servers that don't exist will be detected even before you get to activate NTP, won't they? I think there's a nslookup first 17:58:49 on 64 bit, you end up at gdm 17:59:09 its only on 32 bit that you end up @ gdm with no non-root user 17:59:19 and then you can just reboot and you should get to try again. 17:59:30 document it then 17:59:32 and move on 17:59:44 hey, and we wonder why we get called unpolished... 17:59:52 votes? it sounds like -1 blocker for the most part 18:00:07 -1 blocker 18:00:15 and +1 nth for non-gtk fixes 18:00:16 adamw: i guess its just where we put the line in the polishing sand 18:00:16 -1 blocker, +1 NTH 18:00:33 -1 nth 18:00:36 -1 blocker, -1 NTH 18:00:37 if the fix is in gtk 18:01:15 yes, if it's really GTK, then -1 NTH, too 18:01:40 proposed #agreed - 702659 - RejectedBlocker AcceptedNTH - This is a polish issue that isn't difficult to hit. Note that the NTH status ONLY applies to fixes that DO NOT involve new gtk builds. 18:02:02 ack/nak/patch? 18:02:22 nak 18:02:26 ack 18:02:30 i'd want to go the safe way 18:02:38 rejectednth, re-propose if someoen comes up with a non-gtk2 fix 18:02:44 works for me 18:02:44 if it's not gtk, is it likely to be firstboot? 18:03:09 red_alert: which is also pretty key, so yeah, i'm feeling rejecty. 18:03:19 * adamw gets out the Big Pink NO stamp[ 18:03:23 adamw: if its nth im free to not include it 18:03:26 proposed #agreed - 702659 - RejectedBlocker - This is a polish issue that isn't difficult to hit but isn't a blocker. If there is a non-gtk fix for this, please re-propose as NTH. 18:03:32 right, I stick with -1 / -1 without any "if"s ;) 18:04:05 dgilmore: just tryin' to avoid any unfortunate accidents 18:04:11 ack 18:04:28 adamw: sure 18:04:29 ack 18:04:52 #agreed - 702659 - RejectedBlocker - This is a polish issue that isn't difficult to hit but isn't a blocker. If there is a non-gtk fix for this, please re-propose as NTH. 18:05:08 * rbergeron nods 18:05:35 crap, it sounds like we're going ot have a new proposed blocker in a few minutes 18:05:39 NOOOOOOO 18:05:57 but that's it for the proposed blockers at the moment 18:06:05 lets hit the accepted blockers 18:06:06 tflink: your dracut one? 18:06:13 yep 18:06:19 * adamw prepares the stamp 18:06:30 what's the bugid for reference? 18:06:33 * rbergeron provides the blood-red ink 18:06:36 from my /wrists 18:06:42 I'm also skipping 743135 for the moment since that'll be related 18:06:46 fenrus02: not filed yet 18:06:52 tflink, ah, ok 18:06:57 #topic (750228) F16 RC2 efidisk.img doesn't boot on ThinkPad T520, older one works 18:07:01 #link http://bugzilla.redhat.com/show_bug.cgi?id=750228 18:07:03 #info Accepted Blocker, NEW 18:07:34 ahh, the lottery bug 18:07:38 rc3 efidisk.img works, but do we know that it won't break when rc4 is built? 18:07:39 this is a fun one! 18:07:43 cra: hell, no. 18:07:48 red or black? 18:07:52 based on the pattern so far, rc4 should break and rc5 should work. ;) 18:07:59 rbergeron: yeah. 18:08:04 cra: so i think i can reprodcue good ones 18:08:08 efidisk.img generation sometimes fails and results in an image full of zeroes. 18:08:08 our build process is no consistent? 18:08:10 sometimes it works. 18:08:14 notting: hahahahaahaha. 18:08:16 ahahahaa. 18:08:16 copy from rc3 to later compose? 18:08:17 ahahahahahahaha. 18:08:28 notting: it seems to only show up when i compose x86_64 by itself 18:08:34 cra: that's not going to be ideal, given that the point of rc4 is to fix an efi blocker 18:08:46 notting: when i compose i686 and x86_64 at the same time on the box they are ok 18:08:49 so we presumably want efidisk.img to have the fix 18:09:00 yes. 18:09:05 notting: this is fedora. _nothing_ is consistent. i'm only moderately sure what day of the week it is. 18:09:22 reproducibility is an illusion 18:09:25 adamw: that's a clear sign you've been sleeping too much lately ;) 18:09:28 =) 18:09:32 im fairly confident i can make a good one 18:09:35 okay 18:09:42 so, we leave this one to dgilmore's good offices 18:09:43 either way, nothing to do from our end 18:10:04 we'll just make dgilmore roll new RCs until we have a valid one and only then start to test again? 18:10:19 #agreed - 750228 - Progress is being made, future issues with efidisk.img will be dealt with if they happen 18:10:29 * rbergeron nods 18:10:40 red_alert: we can do all the other images and then keep trying efidisk.imgs until one works, if worst comes to worst, i guess. 18:10:58 adamw: ah, if it;s done seperately, of course 18:11:12 not usually, but it _can_ be. 18:11:32 okay 18:11:33 still waiting on the dracut bug but I think that we can get part of this out of the way with the existing lorax bug 18:11:44 #topic (743135) The installer no longer has access to files in the initrd 18:11:47 #link http://bugzilla.redhat.com/show_bug.cgi?id=743135 18:11:50 #info Accepted Blocker, ASSIGNED 18:12:06 anyone eager to point out quickly what lorax is? 18:12:11 it builds installer images. 18:12:18 not super important to understanding the bug 18:12:18 okay, thanks 18:12:19 lorax builds the initramfs used in the installer 18:12:36 and efidisk.img 18:13:00 adamw's description is probably more accurate 18:13:00 so basically the bug means you can't deliver a kickstart or updates.img to the installer by stuffing it into the installer initramfs 18:13:09 oh hell no, i'm just guessing. 18:13:18 Description : 18:13:19 Lorax is a tool for creating the anaconda install images. 18:13:23 hey, i win the coconut. 18:13:37 it does most of the images, anyways 18:13:47 so anyway, it's something of a fringe feature, but one we've supported for a long time. 18:13:59 I think that it's used by virt-installer too 18:14:25 ah, an option of virt-install 18:14:48 currently, we have a criterion requiring all possible kickstart deployment methods to work. 18:14:51 so strictly it's a blocker. 18:15:04 i do find it really hard to care about this, but hey, someone probably has a reason to deploy their kickstarts this way. 18:15:20 but I think this will come down to a discussion of whether or not we want to block on this issue 18:15:34 yeah, it's certainly an arguable position that we shouldn't block on all ks delivery methods. 18:15:36 the actual bug is in dracut, a bug is currently being filed but no bzid yet 18:15:57 it already seems to be an AcceptedBlocker so we should only change this if something changed in the meanwhile...did it? 18:16:01 if we know what the fix is we should probably just damn fix it, it's freaking impossible to get hold of harald on anything approaching reasonable notice 18:16:14 red_alert: we could decide to change the criterion 18:16:44 bearing in mind that we need a fix for this within, like, the next few hours if we're not going to slip the release 18:16:50 at least for the other accepted blockers so far _we have fixes_ 18:17:04 according to bcl, the bug was introduced by fedpkg commit cfb1dbbaea0ce6fc47f7904db0dad84a40bbc1c2 18:17:19 making blockers go away just for the sake of it sorta sucks :/ 18:17:40 red_alert: not really just for the sake of it, i've been leery about the criterion since beta 18:17:51 red_alert: note the comment on the bug that it's an accepted blocker 'for now' but we might change the criterion 18:18:32 i do worry that there's some kind of actually-sensible use case for this that i didn't think of, though. did someone mention cloud deployments or some such thing? 18:18:50 related bug: https://bugzilla.redhat.com/show_bug.cgi?id=750603 18:19:11 there is an inject option to virt-install 18:19:37 bcl :) 18:19:45 * bcl waves hello 18:19:59 the commit which broke this was to fix a more important issue 18:20:01 (failure to boot) 18:20:03 bcl: I assume that you know more about the virt-install use case that's affected by the dracut issue? 18:20:06 so i'm not sure we could just revert i 18:20:07 t 18:20:42 I certainly don't see all the use cases for this but looks like the criterion matches very well and should stay. Depending on the impact I'd either vote +1 blocker or +1 NTH 18:20:46 tflink: yeah, virt-install uses the 'append to initrd' in order to inject kickstarts 18:21:11 is that the default or do you have to specify special options? 18:21:31 And I depend on that for my new livemedia project. Otherwise I'll have to fire up a local web server to get kickstarts into the install 18:21:55 bcl: do you reckon you can fix the dracut bug? 18:22:16 well, virt-install has tons of options :) if you want to use a kickstart you can: inject it into initrd, serve it from http or make a new iso with it 18:22:42 * adamw votes for #2! 18:23:00 adamw: I'm not sure if I can fix it or not. 18:23:06 sigh. we can take this, i guess. but then my slip estimation goes up to about 90% if we're waiting for harald to fix it, cos it's similar to waiting for godot. 18:23:20 I *do* have a good reproducer, running it on a f16 virt and looking at the generated initramfs 18:23:32 adamw: what was the cloud bit you mentioned? 18:23:40 rbergeron: i don't really remember 18:23:50 * rbergeron is jsut curious if it might be something that would break ec2 somehow, just poking around 18:23:53 was just trying to think of cases where you can't serve a kickstart off a web/nfs server like any normal damn person would 18:23:55 I think that he was referring to the virt-install part 18:24:01 rbergeron: id say not ec2 18:24:07 tflink: i think it was something else, but i can't recall details 18:24:32 adamw: in my specific case, I automate things for individual .iso builds so firing up a web server is a big deal. 18:24:36 rbergeron: but youcould use it to do automated installs into a cloud rather than have prebuilt images 18:24:58 It would also hit PXE users who have an initramfs with kickstart added. 18:25:25 wouldn't it be easier to use something like boxgrinder or oz for the cloud use cases? 18:25:46 I'm rather sure most PXE users can serve the ks by other means and normally also do so 18:25:46 oh, pxe, i think that's the case i was trying to remember. 18:25:59 bcl: true but I imagine that most PXE users would have access to some http server 18:26:19 red_alert: probably so. but this is something that *has* worked and it is broken for no good reason. 18:26:28 the first use case that comes to mind with PXE is pxeboot + http mirror 18:26:39 if you're installing on boot, anyways 18:26:41 I'm also not sure what other use cases dracut --include hit, which is really the core issue. 18:27:14 spot: rbergeron: so is there any vague chance of persuading harald to deign to bless us with an appearance? 18:29:05 I'm assuming not so much 18:29:47 ughhh. 18:30:07 I think that the big issue is time. Do we want to modify the release criteria to exclude this ks delivery method or do we risk slipping? 18:30:46 i've been more or less in favour of dropping the exotic ks methods for a bit, but just afraid that i'm missing real-world use cases of the kind that people don't tell you about until you take them away 18:31:08 I doubt he's available right this second. We might be able to tag him tonight, possibly 18:31:21 I can send one of "those mails" though 18:31:58 yeah, tonight is slip. 18:32:47 modifying release criteria to get the release out is really defying the purpose, though :/ even if it's a sane change, it feels like a very wrong move 18:33:03 spot: ping 18:33:13 red_alert: well, it's not just to get the release out. i'm more or less of the opinion this just isn't important enough to block for and the criteria are wrong. 18:33:26 red_alert: i've stuck my neck out for releases often enough in the past, but this just really does not feel like a major issue to me 18:33:28 well, it's 7:30 PM in harald's place...so he might well be out for the next 12h or so 18:33:53 red_alert: yeah 18:34:11 yeah, god forbid anyone else should have to freaking check their mail occasionally in an evening when it's release time or anything. 18:34:13 adamw: I can probably get spot to go talk to his boss's boss's boss 18:34:18 adamw: or while they're at linuxcon! 18:34:31 uhoh 18:34:59 who is harald's boss? 18:35:00 spot: are you within buttering distance of denise? :) 18:35:02 phil knirsch 18:35:13 rbergeron: indeed i am 18:35:19 * nokia3510 thinks an email could be dispatched, and hopefully he (HH) might check his mobile once in a while 18:35:24 oh 18:35:26 wait. 18:35:30 we have harald's gmail address, don't we 18:35:47 gmail, G!, twitter, facebook, ... ;) 18:35:53 really, we just need someone who can fix it. doesn't have to be harald. 18:35:57 but seems like he'd be the best shot. 18:36:02 bz? 18:36:14 spot: https://bugzilla.redhat.com/show_bug.cgi?id=750603 18:36:52 if no one fixes this, do we slip? 18:36:54 spot: if we declare it a blocker, yes. 18:36:57 we still didn't decide that. 18:37:11 i'm a weak -1, red_alert seems and bcl seem to be weak +1s, i dunno. 18:37:24 either way, I'm thinking that 743135 can be closed 18:37:36 which is the lorax related bug 18:37:39 adamw: im kinda a 0 18:37:49 spot or adamw: can you think of anyone stateside who might be an option 18:37:50 -1 blocker, +1 NTH - I think the criterion is valid and should stay as-is but it's enough of a corner case not to risk a slip 18:38:41 I'm a strong +1 18:39:03 my livemedia project (via virt-install) depends on this working. That's why I fixed it in the first place. 18:39:36 rbergeron: well, bcl. 18:39:42 tflink: okay, go ahead and close it. 18:40:03 and anyone else who cares to look at http://fpaste.org/p8Xw/ and figure out what he broke. 18:40:29 #agreed - 743135 - This can be closed again because it is not the root cause. The issue fixed in this bug is still fixed 18:40:52 I'm pretty much on the fence on the dracut issue, though 18:41:14 #topic (750603) dracut --install isn't copying script to the target 18:41:16 bcl: well, i'm not that concerned about your personal issue, frankly; you're smart enough to work around it. question is, how many other people might be doing something like that? hard one to answer, i guess. 18:41:21 #link https://bugzilla.redhat.com/show_bug.cgi?id=750603 18:41:26 adamw: understood. 18:41:33 #info Proposed Blocker, NEW 18:42:06 I'm just a bit peeved at things that *worked* then getting *broken* 18:42:08 and, as you pointed out, does the dracut breakage break anything else we didn't think of. 18:42:14 bcl: oh, sure. 18:42:30 granted, the dracut issue can be fixed post-release. but that doesn't help the installer. 18:42:55 would fixing it with an update fix the virt-install case or no? 18:43:11 not without building a new image, I don't think 18:43:51 since it's the initial boot of the installer's initrd that's the problem 18:43:54 virt-install items can be resolved in -updates though, no? 18:44:08 but the problem isn't with virt-install iteslf 18:44:14 virt-install does things properly 18:44:36 but dracut isn't constructing the initrd correctly and the appended ks doesn't make it into the installers fs post-boot 18:44:38 adamw: no, although maybe it could be fixed with another overlay, but I'm unsure. 18:44:44 tflink, right, just saying that anything revolving around virt-install can be non-blocking and fixed in -updates. unless it also affects discrete installs 18:45:07 fenrus02: it can if you install with ks files appended to the initramfs 18:45:07 apparently not... 18:45:30 this can't really be fixed with updates in the usual way 18:45:46 unless you spin up new installer images to use after the update is released 18:46:14 virt-installer usually uses released initrds for installation 18:47:03 so you could fix this with updates in the same way that you could fix an EFI issue by spinning up a new installer image post-release 18:47:13 i guess we should stop wasting time talking about it and start wasting time trying to fix it 18:47:21 yeah, 18:47:21 we have the -15 to -16 diff, we have a reproducer... 18:47:29 thoughts on blocker or not? 18:47:40 or do we wait for an hour or two and see what happens 18:47:43 if we fix it, +1 ;) 18:47:52 still: -1 blocker, +1 NTH 18:48:22 how about this: we accept as blocker and continue the ks conversation on test@ 18:48:34 or just continue the conversation 18:48:41 in all honesty i don't feel like i can make a great call on this because i'm so damn sick of this release i'd ship hello_world.sh with a shiny Fedora 16 sticker on it at this point. 18:48:48 ack. whatever. 18:48:59 i can 18:49:05 i cannot find anyone awake to work this 18:49:10 best hope is wwoods 18:49:12 but he's MIA 18:50:06 either way, it sounds like we're pretty much even on this 18:50:12 maybe slightly +1 18:50:20 * spot is taking a look personally 18:50:28 although i am entirely novice in dracut 18:50:36 hey, it's just shell scripts, how hard can it be. 18:50:59 bcl: it might help to have a log of it *succeeding* as well as one of it failing, perhaps? and you could bisect the 15-16 changes, since there's a lot of them 18:51:24 I do. I'm stepping through both right now. 18:51:31 cool 18:51:34 I'll add my working log to the bug 18:51:34 ok, I'm going to +1 adamw's "let's be done talking about it for now" 18:51:52 leave as proposed and vote async in the bug 18:51:53 bcl: does your shell script start with a shebang? 18:52:28 tflink: you can't _leave_ it as proposed as it's currently AcceptedBlocker ;) 18:52:43 red_alert: not it's not. I'm closing that one 18:52:51 we're talking about the dracut bug 18:53:16 ah, my bad....brain's hibernated, needs dinner :) 18:53:18 spot: yes 18:53:22 it is also executable 18:53:54 proposed #agreed - 750603 - We're still undecided on whether or not this should block release. Will make decision over the next couple of hours - please vote in bug. 18:53:58 ack/nak/patch? 18:54:10 ack 18:54:18 #agreed - 750603 - We're still undecided on whether or not this should block release. Will make decision over the next couple of hours - please vote in bug. 18:55:24 gah, we have one ... interesting NTH bug 18:55:44 oh, it starts making more sense as it goes on 18:55:51 #topic (749985) F16 RC1 Live-CD test - some errors to look at 18:55:51 #link http://bugzilla.redhat.com/show_bug.cgi?id=749985 18:55:51 #info Proposed NTH, MODIFIED 18:56:36 which has been closed since I generated my list 18:56:54 I assume that we still need to ack it as NTH since it made it into RC3? 18:57:07 yeah, retrospective justification ftw 18:57:12 +1 nth 18:57:21 what happens if we don't? ;D 18:57:44 * red_alert has his -1 NTH ready for the lulz ;) 18:57:51 proposed #agreed - 749985 - AcceptedNTH - Broken power management is a blocker issue for LXDE and therefore NTH 18:58:09 red_alert: world ends, i get to relax! 18:58:20 +1 NTH then :D 18:58:21 * tflink ignores red_alert, wants to be done with this 18:58:28 ack 18:58:30 the timing on that was awesome 18:58:37 #agreed - 749985 - AcceptedNTH - Broken power management is a blocker issue for LXDE and therefore NTH 18:58:40 bcl: your line numbers from the bug don't match the checkout i'm lookin at 18:58:49 unless more blockers have come in since we started, I think we're done 18:59:07 nope, I'm not showing anything new 18:59:11 #topic open floor 18:59:12 bcl: 013-17 is what i did fedpkg prep on. 18:59:23 adamw: are you playing secretary or should I? 18:59:28 well that's dumb 18:59:46 it exits inst_binary if the target directory exists. 19:00:11 bcl: ignore me, i'm being dumb 19:00:13 anything else? 19:00:31 * tflink sets fuse for 0 < x < 5 minutes 19:00:40 spot: the broken ones are from -16 which is what the TC3 DVD install installed 19:00:59 tflink: there is no need to act on 749985, this is fixed in rc3 19:01:04 LXDE spin is ready 19:01:22 cwickert: yeah but technically, we were supposed to take it as NTH before it made it into RC3 :) 19:01:29 ah, I see 19:01:39 +- [[ -e $initdir$_target ]] && return 0 19:01:39 ++ [[ -e $initdir/$_target ]] && return 0 19:01:50 but it was a clear cut NTH, so just dotting is and crossing ts 19:01:50 thats why it started failing. before it was never true. 19:02:09 * cwickert is afk 19:02:14 0096-dracut-functions-do-not-install-files-from-current-d.patch 19:02:25 spot: the key change seems to be calling inst_binary from inst_script instead of inst_simple 19:02:44 well, inst_binary shouldn't fail if the $target dir exists 19:02:47 ok, then. Thanks for coming everyone! 19:03:00 * tflink will probably send out minutes shortly 19:03:04 #endmeeting