ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: "Luis R. Rodriguez" <mcgrof@kernel.org>
To: Jiri Kosina <jikos@kernel.org>
Cc: ksummit <ksummit-discuss@lists.linuxfoundation.org>
Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Bug reporting feedback loop
Date: Tue, 27 Jun 2017 19:53:21 +0200	[thread overview]
Message-ID: <20170627175321.GS21846@wotan.suse.de> (raw)
In-Reply-To: <alpine.LSU.2.20.1706221422360.30709@cbobk.fhfr.pm>

On Thu, Jun 22, 2017 at 02:36:13PM +0200, Jiri Kosina wrote:
> On Wed, 21 Jun 2017, Laura Abbott wrote:
> 
> > Fedora tends to follow the most recent stable kernel very closely
> > (e.g. 4.11.6 is currently pending for Fedora 24, 25, and 26).
> > This works well enough, but there still seem to be some
> > disconnects in the bug reporting process. Examples I can think of:
> > 
> > - When users report bugs on the Fedora tracker that look like
> > actual upstream bugs, what's the best way to have those reported?
> > I typically end up having to summarize from the Fedora bugzilla
> > and send an e-mail which ends up being tedious. Can we make this
> > bug reporting easier for non-kernel developers?
> 
> Just as a data point -- we do a "Kernel of the day" build of a branch that 
> follows Linus' tree (with a few SUSE specific patches floating on top of 
> it) and provide it in an optional package repository.
> 
> That allows the reporter to easily check whether the issue has been fixed 
> in latest upstream without needing to have the skills required to compile 
> own kernel.
> 
> If the issue is confirmed to be present in latest upstream as well, our 
> internal person / maintainer responsible for that particular area usually 
> takes over (there are cases when the reporter prefers to report the bug 
> upstream by himself though).
> 
> I am not sure if there is a way how to improve this process even further 
> ... do you have any particular ideas?

The Kernel Of The Day (KOTD) helps *a lot*. On the XFS front I can say that 90%
of the time so far most bugs can simply be reverse bisected by testing an issue
with KOTD and if it works then doing a reverse bisect. So much so that I
actually *yearn* for the day we get an actual real valid upstream bug. The
other 10% BTW consist of "bad backports" so far.

But one day it comes that KOTD is not sufficient, and there is that pesky delta
on linux-next which *might* also have a fix for you. Problem is booting
linux-next can often fail. Based on personal experience with testing linux-next
more regularly on more machines over the years I can say we are getting much
better with this these days, but every now and then its just poop. That said,
we have a not-so-well known daily linux-next KOTD rpm type of tree as well.
So I recommend that as a next step.

Due to the possible failures possible with linux-next, or random regressions
with other subsystems you often only want to test *one* subsystem. To help
with this there are two options I'm aware of:

  o Subsystem maintiners also backport their -next tree for vanilla, in the
    the like of wireless-testing, which only carries 802.11 on Linus' tree.
    Not sure if other subsystems have similar type of trees, if not I encourage
    it.

  o Backports: backporting to random kernels can be a pain in the ass, but
    backporting to the KOTD should not take much effort if you have the
    right framework [0]. For instance I just created an XFS backport from
    linux-next to KOTD in one day's effort, I can use this to generate
    a tarball for modules for folks to try on top of KOTD. If this would 
    actually be maintained upstream then the amount of work needed is even less,
    and you can have daily snapshots generated. Although sometimes backports
    can be buggy, to my surprise using Coccinelle actually has improved
    correctness of backports, this is only visible once you replace a series
    of patches with the output form an SmPL grammar patch. Given Coccinelle
    is also used, once you backport one subsystem driver, adding more is
    drivers from the same subsystem becomes relatively easier.

HTH,

[0] https://backports.wiki.kernel.org/index.php/Documentation/backports/hacking#Adding_new_driver

  Luis

  reply	other threads:[~2017-06-27 17:53 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-06-21 22:34 Laura Abbott
2017-06-22 12:36 ` Jiri Kosina
2017-06-27 17:53   ` Luis R. Rodriguez [this message]
2017-06-27 18:26     ` Laurent Pinchart
2017-06-27 18:30     ` James Bottomley
2017-06-27 18:41       ` Daniel Vetter
2017-06-27 19:02       ` Luis R. Rodriguez
2017-06-27 19:46         ` Guenter Roeck
2017-06-28 10:19           ` Mark Brown
2017-06-27 22:35       ` Jiri Kosina
2017-06-28  6:59         ` Takashi Iwai
2017-06-27 18:31     ` Takashi Iwai
2017-06-27 19:04       ` Luis R. Rodriguez
2017-06-28  8:04         ` Daniel Vetter
2017-06-22 14:08 ` Takashi Iwai
2017-06-22 14:12   ` Jiri Kosina
2017-06-22 14:24     ` Takashi Iwai
2017-06-28 13:12       ` Jani Nikula
2017-06-28 13:13         ` Takashi Iwai
2017-06-22 15:34 ` James Bottomley
2017-06-23 14:52 ` Greg KH
2017-06-23 20:28   ` Jiri Kosina
2017-06-25 17:11   ` Laura Abbott

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170627175321.GS21846@wotan.suse.de \
    --to=mcgrof@kernel.org \
    --cc=jikos@kernel.org \
    --cc=ksummit-discuss@lists.linuxfoundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox