* [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel
@ 2014-05-11 4:14 Jason Cooper
2014-05-11 15:57 ` Sarah A Sharp
0 siblings, 1 reply; 75+ messages in thread
From: Jason Cooper @ 2014-05-11 4:14 UTC (permalink / raw)
To: Levente Kurusa, Teodora Băluţă, Konstantin Ryabitsev
Cc: ksummit-discuss
All,
I recently came across a patch series attempting to implement encoding
kernel oops into a QR code [1]. The QR code is then dumped to the
framebuffer. The QR code is a URL of the form:
https://oops.kernel.org/?qr=<base64 compressed oops>
This proposal is interesting because it fundamentally changes the way
users report bugs to the kernel community. First and foremost, it makes
it much easier.
1) oops occurs
2) user pulls out phone, scans QR code
- at this point, the oops is recorded on the server. Nothing more
is required of the user.
optionally:
3) user fills out a minimal web form
- Name
- email address (do you want to receive emails re this oops?)
- what were you doing when it occurred?
- is it repeatable?
I recall discussing this with some RedHat devs at the 2012 KS, so I know
there is some interest in this capability.
I'd be interested in having this as a tech topic for several reasons.
First, to raise awareness of the project among the kernel community
(where did all these oops reports start coming from?). Second, to
solicit opinions on how to feed those oops reports into the community.
And last, to sit down with the maintainer of oops.kernel.org and scope
out what work needs to be done to support this on the server side.
Of course, all of this assumes the patches get accepted. There's been
no rejections so far, though. :)
If accepted, I would expect the authors to be the ones leading the
discussion (Levente, Teodora).
Nominations:
Levente Kurusa <levex@linux.com>
Teodora Băluţă <teobaluta@gmail.com>
Relevant folks:
Konstantin Ryabitsev <mricon@kernel.org>
Jason Cooper <jason@lakedaemon.net> (auto-nominated)
...
thx,
Jason.
[1] https://lkml.org/lkml/2014/3/17/525
^ permalink raw reply [flat|nested] 75+ messages in thread* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 4:14 [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel Jason Cooper @ 2014-05-11 15:57 ` Sarah A Sharp 2014-05-11 16:29 ` Levente Kurusa ` (2 more replies) 0 siblings, 3 replies; 75+ messages in thread From: Sarah A Sharp @ 2014-05-11 15:57 UTC (permalink / raw) To: Jason Cooper; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov On Sat, May 10, 2014 at 9:14 PM, Jason Cooper <jason@lakedaemon.net> wrote: > All, > > I recently came across a patch series attempting to implement encoding > kernel oops into a QR code [1]. The QR code is then dumped to the > framebuffer. The QR code is a URL of the form: > > https://oops.kernel.org/?qr=<base64 compressed oops> > > This proposal is interesting because it fundamentally changes the way > users report bugs to the kernel community. First and foremost, it makes > it much easier. > > 1) oops occurs > 2) user pulls out phone, scans QR code > - at this point, the oops is recorded on the server. Nothing more > is required of the user. > > optionally: > > 3) user fills out a minimal web form > - Name > - email address (do you want to receive emails re this oops?) > - what were you doing when it occurred? > - is it repeatable? By "web form", do you mean a new form or something that's part of kerneloops.org? It would be great if we could allow users to open a new bugzilla.kernel.org entry for the oops. I believe Teodora is working on an Android app that could do this. Hopefully it could store information about the person's system, and pre-propagate the bugzilla entry with this information. > I recall discussing this with some RedHat devs at the 2012 KS, so I know > there is some interest in this capability. > > I'd be interested in having this as a tech topic for several reasons. > First, to raise awareness of the project among the kernel community > (where did all these oops reports start coming from?). Second, to > solicit opinions on how to feed those oops reports into the community. > And last, to sit down with the maintainer of oops.kernel.org and scope > out what work needs to be done to support this on the server side. > > Of course, all of this assumes the patches get accepted. There's been > no rejections so far, though. :) > > If accepted, I would expect the authors to be the ones leading the > discussion (Levente, Teodora). I would recommend that Teodora lead the discussion, since this is her project. Levente has been provided helpful commentary and additional patches, and should definitely participate in the discussion as well. > Nominations: > > Levente Kurusa <levex@linux.com> > Teodora Băluţă <teobaluta@gmail.com> > > Relevant folks: > > Konstantin Ryabitsev <mricon@kernel.org> > Jason Cooper <jason@lakedaemon.net> (auto-nominated) Another relevant person to include would be PJ Waskiewicz. Teo worked on the QR code generator during her internship with the FOSS Outreach Program for Women (OPW) and PJ was her mentor for the project. You mentioned the kerneloops.org maintainer, but didn't list him here? Anton Arapov looks to be the maintainer, since he's the only contributor to the kerneloops.org github repo. The idea for the oops QR code generator came from Peter Anvin and Dirk Hohndel, so they may want to participate in the discussion as well. Sarah Sharp ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 15:57 ` Sarah A Sharp @ 2014-05-11 16:29 ` Levente Kurusa 2014-05-11 16:37 ` Laurent Pinchart 2014-05-12 10:13 ` Masami Hiramatsu 2014-05-12 2:38 ` H. Peter Anvin 2014-05-12 15:46 ` Jason Cooper 2 siblings, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-11 16:29 UTC (permalink / raw) To: Sarah A Sharp Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 4111 bytes --] Hi, On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper <jason@lakedaemon.net> wrote: > > All, > > > > I recently came across a patch series attempting to implement encoding > > kernel oops into a QR code [1]. The QR code is then dumped to the > > framebuffer. The QR code is a URL of the form: > > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > > > This proposal is interesting because it fundamentally changes the way > > users report bugs to the kernel community. First and foremost, it makes > > it much easier. > > > > 1) oops occurs > > 2) user pulls out phone, scans QR code > > - at this point, the oops is recorded on the server. Nothing more > > is required of the user. > > To be precise, most scanners don't automatically open the links found in QR codes and hence a tap/click from the user is required. :-) > > optionally: > > > > 3) user fills out a minimal web form > > - Name > > - email address (do you want to receive emails re this oops?) > > - what were you doing when it occurred? > > - is it repeatable? > > By "web form", do you mean a new form or something that's part of > kerneloops.org? > > It would be great if we could allow users to open a new > bugzilla.kernel.org entry for the oops. I believe Teodora is working > on an Android app that could do this. Hopefully it could store > information about the person's system, and pre-propagate the bugzilla > entry with this information. > Yes, opening a bugzilla entry might be a good idea if the user fills out the form. To be honest, I think for that to work we would need to clean up bugzilla a bit. I try to do some work there every now and then, but nobody is closing the bugs I have fixed... Not sure about how would we create the bugzilla entry? I mean, which section, urgency, etc. how would we decide on those solely based on the OOPS? Or should we ask the user to fill it out? > > I recall discussing this with some RedHat devs at the 2012 KS, so I know > > there is some interest in this capability. > > > > I'd be interested in having this as a tech topic for several reasons. > > First, to raise awareness of the project among the kernel community > > (where did all these oops reports start coming from?). Second, to > > solicit opinions on how to feed those oops reports into the community. > > And last, to sit down with the maintainer of oops.kernel.org and scope > > out what work needs to be done to support this on the server side. > > > > Of course, all of this assumes the patches get accepted. There's been > > no rejections so far, though. :) > > > > If accepted, I would expect the authors to be the ones leading the > > discussion (Levente, Teodora). > > I would recommend that Teodora lead the discussion, since this is her > project. Levente has been provided helpful commentary and additional > patches, and should definitely participate in the discussion as well. > I was just about to say that the order might not be the most correct. :-) However, I am more than happy to help Teodora lead the discussion if she decides so. > > Nominations: > > > > Levente Kurusa <levex@linux.com> > > Teodora Băluţă <teobaluta@gmail.com> > > > > Relevant folks: > > > > Konstantin Ryabitsev <mricon@kernel.org> > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) > > Another relevant person to include would be PJ Waskiewicz. Teo worked > on the QR code generator during her internship with the FOSS Outreach > Program for Women (OPW) and PJ was her mentor for the project. > > You mentioned the kerneloops.org maintainer, but didn't list him here? > Anton Arapov looks to be the maintainer, since he's the only > contributor to the kerneloops.org github repo. > > The idea for the oops QR code generator came from Peter Anvin and Dirk > Hohndel, so they may want to participate in the discussion as well. > > Sarah Sharp Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 16:29 ` Levente Kurusa @ 2014-05-11 16:37 ` Laurent Pinchart 2014-05-11 17:18 ` Levente Kurusa 2014-05-11 17:49 ` Sarah A Sharp 2014-05-12 10:13 ` Masami Hiramatsu 1 sibling, 2 replies; 75+ messages in thread From: Laurent Pinchart @ 2014-05-11 16:37 UTC (permalink / raw) To: ksummit-discuss; +Cc: PJ Waskiewicz, Dirk Hohndel, Anton Arapov, Jason Cooper On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > > > All, > > > > > > I recently came across a patch series attempting to implement encoding > > > kernel oops into a QR code [1]. The QR code is then dumped to the > > > > > > framebuffer. The QR code is a URL of the form: > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > > > > > This proposal is interesting because it fundamentally changes the way > > > users report bugs to the kernel community. First and foremost, it makes > > > it much easier. > > > > > > 1) oops occurs > > > 2) user pulls out phone, scans QR code > > > - at this point, the oops is recorded on the server. Nothing more > > > is required of the user. > > To be precise, most scanners don't automatically open the links > found in QR codes and hence a tap/click from the user is required. :-) > > > > optionally: > > > > > > 3) user fills out a minimal web form > > > - Name > > > - email address (do you want to receive emails re this oops?) > > > - what were you doing when it occurred? > > > - is it repeatable? > > > > By "web form", do you mean a new form or something that's part of > > kerneloops.org? > > > > It would be great if we could allow users to open a new > > bugzilla.kernel.org entry for the oops. I believe Teodora is working > > on an Android app that could do this. Hopefully it could store > > information about the person's system, and pre-propagate the bugzilla > > entry with this information. > > Yes, opening a bugzilla entry might be a good idea if the user fills > out the form. To be honest, I think for that to work we would need to > clean up bugzilla a bit. I try to do some work there every now and > then, but nobody is closing the bugs I have fixed... > > Not sure about how would we create the bugzilla entry? I mean, which > section, urgency, etc. how would we decide on those solely based on > the OOPS? Or should we ask the user to fill it out? Filling a complex form on a handheld device can be pretty tedious. A two steps procedure that would allow entering long text on a real computer could be an interesting option. > > > I recall discussing this with some RedHat devs at the 2012 KS, so I know > > > there is some interest in this capability. > > > > > > I'd be interested in having this as a tech topic for several reasons. > > > First, to raise awareness of the project among the kernel community > > > (where did all these oops reports start coming from?). Second, to > > > solicit opinions on how to feed those oops reports into the community. > > > And last, to sit down with the maintainer of oops.kernel.org and scope > > > out what work needs to be done to support this on the server side. > > > > > > Of course, all of this assumes the patches get accepted. There's been > > > no rejections so far, though. :) > > > > > > If accepted, I would expect the authors to be the ones leading the > > > discussion (Levente, Teodora). > > > > I would recommend that Teodora lead the discussion, since this is her > > project. Levente has been provided helpful commentary and additional > > patches, and should definitely participate in the discussion as well. > > I was just about to say that the order might not be the most correct. :-) > > However, I am more than happy to help Teodora lead the discussion if > she decides so. > > > > Nominations: > > > > > > Levente Kurusa <levex@linux.com> > > > Teodora Băluţă <teobaluta@gmail.com> > > > > > > Relevant folks: > > > > > > Konstantin Ryabitsev <mricon@kernel.org> > > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) > > > > Another relevant person to include would be PJ Waskiewicz. Teo worked > > on the QR code generator during her internship with the FOSS Outreach > > Program for Women (OPW) and PJ was her mentor for the project. > > > > You mentioned the kerneloops.org maintainer, but didn't list him here? > > > > Anton Arapov looks to be the maintainer, since he's the only > > > > contributor to the kerneloops.org github repo. > > > > The idea for the oops QR code generator came from Peter Anvin and Dirk > > Hohndel, so they may want to participate in the discussion as well. -- Regards, Laurent Pinchart ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 16:37 ` Laurent Pinchart @ 2014-05-11 17:18 ` Levente Kurusa 2014-05-11 17:52 ` Teodora Băluţă 2014-05-12 15:53 ` Jason Cooper 2014-05-11 17:49 ` Sarah A Sharp 1 sibling, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-11 17:18 UTC (permalink / raw) To: Laurent Pinchart Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 5524 bytes --] Hi, On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > > > > All, > > > > > > > > I recently came across a patch series attempting to implement encoding > > > > kernel oops into a QR code [1]. The QR code is then dumped to the > > > > > > > > framebuffer. The QR code is a URL of the form: > > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > > > > > > > This proposal is interesting because it fundamentally changes the way > > > > users report bugs to the kernel community. First and foremost, it makes > > > > it much easier. > > > > > > > > 1) oops occurs > > > > 2) user pulls out phone, scans QR code > > > > - at this point, the oops is recorded on the server. Nothing more > > > > is required of the user. > > > > To be precise, most scanners don't automatically open the links > > found in QR codes and hence a tap/click from the user is required. :-) > > > > > > optionally: > > > > > > > > 3) user fills out a minimal web form > > > > - Name > > > > - email address (do you want to receive emails re this oops?) > > > > - what were you doing when it occurred? > > > > - is it repeatable? > > > > > > By "web form", do you mean a new form or something that's part of > > > kerneloops.org? > > > > > > It would be great if we could allow users to open a new > > > bugzilla.kernel.org entry for the oops. I believe Teodora is working > > > on an Android app that could do this. Hopefully it could store > > > information about the person's system, and pre-propagate the bugzilla > > > entry with this information. > > > > Yes, opening a bugzilla entry might be a good idea if the user fills > > out the form. To be honest, I think for that to work we would need to > > clean up bugzilla a bit. I try to do some work there every now and > > then, but nobody is closing the bugs I have fixed... > > > > Not sure about how would we create the bugzilla entry? I mean, which > > section, urgency, etc. how would we decide on those solely based on > > the OOPS? Or should we ask the user to fill it out? > > Filling a complex form on a handheld device can be pretty tedious. A two steps > procedure that would allow entering long text on a real computer could be an > interesting option. > Makes sense. What about only asking for an email address and then sending them an automated message with a link where they can continue to add more information to the report? (i.e. fill out the bugzilla) I guess we should also be careful with the bugzilla. We really don't want propertiary driver crashes added to the bugzilla automatically. Nor do we want the same oops added twice, right? How would we differentiate between the two - essentially the same - oopses? Obviously, if we find two 'same' oopses then we can add the new info to the old bug. Maybe add filter based on 'P' taint to solve the propertiary issue. Oh and of course the email address thing would be optional. > > > > I recall discussing this with some RedHat devs at the 2012 KS, so I know > > > > there is some interest in this capability. > > > > > > > > I'd be interested in having this as a tech topic for several reasons. > > > > First, to raise awareness of the project among the kernel community > > > > (where did all these oops reports start coming from?). Second, to > > > > solicit opinions on how to feed those oops reports into the community. > > > > And last, to sit down with the maintainer of oops.kernel.org and scope > > > > out what work needs to be done to support this on the server side. > > > > > > > > Of course, all of this assumes the patches get accepted. There's been > > > > no rejections so far, though. :) > > > > > > > > If accepted, I would expect the authors to be the ones leading the > > > > discussion (Levente, Teodora). > > > > > > I would recommend that Teodora lead the discussion, since this is her > > > project. Levente has been provided helpful commentary and additional > > > patches, and should definitely participate in the discussion as well. > > > > I was just about to say that the order might not be the most correct. :-) > > > > However, I am more than happy to help Teodora lead the discussion if > > she decides so. > > > > > > Nominations: > > > > > > > > Levente Kurusa <levex@linux.com> > > > > Teodora Băluţă <teobaluta@gmail.com> > > > > > > > > Relevant folks: > > > > > > > > Konstantin Ryabitsev <mricon@kernel.org> > > > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) > > > > > > Another relevant person to include would be PJ Waskiewicz. Teo worked > > > on the QR code generator during her internship with the FOSS Outreach > > > Program for Women (OPW) and PJ was her mentor for the project. > > > > > > You mentioned the kerneloops.org maintainer, but didn't list him here? > > > > > > Anton Arapov looks to be the maintainer, since he's the only > > > > > > contributor to the kerneloops.org github repo. > > > > > > The idea for the oops QR code generator came from Peter Anvin and Dirk > > > Hohndel, so they may want to participate in the discussion as well. > > -- > Regards, > > Laurent Pinchart Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 17:18 ` Levente Kurusa @ 2014-05-11 17:52 ` Teodora Băluţă 2014-05-11 21:49 ` Laurent Pinchart 2014-05-12 16:15 ` Jason Cooper 2014-05-12 15:53 ` Jason Cooper 1 sibling, 2 replies; 75+ messages in thread From: Teodora Băluţă @ 2014-05-11 17:52 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper Hi, On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: > Hi, > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: >> > > > All, >> > > > >> > > > I recently came across a patch series attempting to implement encoding >> > > > kernel oops into a QR code [1]. The QR code is then dumped to the >> > > > >> > > > framebuffer. The QR code is a URL of the form: >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> >> > > > >> > > > This proposal is interesting because it fundamentally changes the way >> > > > users report bugs to the kernel community. First and foremost, it makes >> > > > it much easier. >> > > > >> > > > 1) oops occurs >> > > > 2) user pulls out phone, scans QR code >> > > > - at this point, the oops is recorded on the server. Nothing more >> > > > is required of the user. >> > >> > To be precise, most scanners don't automatically open the links >> > found in QR codes and hence a tap/click from the user is required. :-) That's correct, you still need a click, so maybe a special Android app could do the work so you don't need to turn the compressed oops into base64. >> > >> > > > optionally: >> > > > >> > > > 3) user fills out a minimal web form >> > > > - Name >> > > > - email address (do you want to receive emails re this oops?) >> > > > - what were you doing when it occurred? >> > > > - is it repeatable? >> > > >> > > By "web form", do you mean a new form or something that's part of >> > > kerneloops.org? >> > > >> > > It would be great if we could allow users to open a new >> > > bugzilla.kernel.org entry for the oops. I believe Teodora is working >> > > on an Android app that could do this. Hopefully it could store >> > > information about the person's system, and pre-propagate the bugzilla >> > > entry with this information. I am and I've got the part of scanning and decompressing the QR oops into text done. The way I see it, you may want to simply read the oops on the phone or tablet so you should be able to keep a local history of Oops that you've scanned. You can add your profile information for bugzilla.kernel.org and then set an option to automatically send Oops messages you scanned or save them and send them later. I've sent an email to Konstantin, the maintainer of bugzilla.kernel.org, asking for more details on the actual sending of the Oops message. >> > >> > Yes, opening a bugzilla entry might be a good idea if the user fills >> > out the form. To be honest, I think for that to work we would need to >> > clean up bugzilla a bit. I try to do some work there every now and >> > then, but nobody is closing the bugs I have fixed... >> > >> > Not sure about how would we create the bugzilla entry? I mean, which >> > section, urgency, etc. how would we decide on those solely based on >> > the OOPS? Or should we ask the user to fill it out? >> >> Filling a complex form on a handheld device can be pretty tedious. A two steps >> procedure that would allow entering long text on a real computer could be an >> interesting option. I think you could receive an email with a link to a partially completed bug report (which you sent when scanning the QR code) and follow that link on you computer to add stuff to your report. That'd be nice, wouldn't it? >> > > Makes sense. > > What about only asking for an email address and then sending them > an automated message with a link where they can continue to add more > information to the report? (i.e. fill out the bugzilla) Indeed, if you have too much to fill in on your smartphone it could be inefficient. > > I guess we should also be careful with the bugzilla. We really don't > want propertiary driver crashes added to the bugzilla automatically. > Nor do we want the same oops added twice, right? How would we > differentiate between the two - essentially the same - oopses? > Obviously, if we find two 'same' oopses then we can add the new > info to the old bug. > > Maybe add filter based on 'P' taint to solve the propertiary issue. > > Oh and of course the email address thing would be optional. > >> > > > I recall discussing this with some RedHat devs at the 2012 KS, so I know >> > > > there is some interest in this capability. >> > > > >> > > > I'd be interested in having this as a tech topic for several reasons. >> > > > First, to raise awareness of the project among the kernel community >> > > > (where did all these oops reports start coming from?). Second, to >> > > > solicit opinions on how to feed those oops reports into the community. >> > > > And last, to sit down with the maintainer of oops.kernel.org and scope >> > > > out what work needs to be done to support this on the server side. >> > > > >> > > > Of course, all of this assumes the patches get accepted. There's been >> > > > no rejections so far, though. :) >> > > > >> > > > If accepted, I would expect the authors to be the ones leading the >> > > > discussion (Levente, Teodora). >> > > >> > > I would recommend that Teodora lead the discussion, since this is her >> > > project. Levente has been provided helpful commentary and additional >> > > patches, and should definitely participate in the discussion as well. I think it'd be a great experience if I could hold a presentation! :) The feedback was really great especially since this is a first for me! >> > >> > I was just about to say that the order might not be the most correct. :-) >> > >> > However, I am more than happy to help Teodora lead the discussion if >> > she decides so. >> > >> > > > Nominations: >> > > > >> > > > Levente Kurusa <levex@linux.com> >> > > > Teodora Băluţă <teobaluta@gmail.com> >> > > > >> > > > Relevant folks: >> > > > >> > > > Konstantin Ryabitsev <mricon@kernel.org> >> > > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) >> > > >> > > Another relevant person to include would be PJ Waskiewicz. Teo worked >> > > on the QR code generator during her internship with the FOSS Outreach >> > > Program for Women (OPW) and PJ was her mentor for the project. >> > > >> > > You mentioned the kerneloops.org maintainer, but didn't list him here? >> > > >> > > Anton Arapov looks to be the maintainer, since he's the only >> > > >> > > contributor to the kerneloops.org github repo. >> > > >> > > The idea for the oops QR code generator came from Peter Anvin and Dirk >> > > Hohndel, so they may want to participate in the discussion as well. >> Thanks, Teodora ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 17:52 ` Teodora Băluţă @ 2014-05-11 21:49 ` Laurent Pinchart 2014-05-12 16:15 ` Jason Cooper 1 sibling, 0 replies; 75+ messages in thread From: Laurent Pinchart @ 2014-05-11 21:49 UTC (permalink / raw) To: Teodora Băluţă Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper Hi, On Sunday 11 May 2014 20:52:12 Teodora Băluţă wrote: > On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > >> > > > All, > >> > > > > >> > > > I recently came across a patch series attempting to implement > >> > > > encoding kernel oops into a QR code [1]. The QR code is then > >> > > > dumped to the > >> > > > > >> > > > framebuffer. The QR code is a URL of the form: > >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> > >> > > > > >> > > > This proposal is interesting because it fundamentally changes the > >> > > > way users report bugs to the kernel community. First and foremost, > >> > > > it makes it much easier. > >> > > > > >> > > > 1) oops occurs > >> > > > 2) user pulls out phone, scans QR code > >> > > > - at this point, the oops is recorded on the server. Nothing > >> > > > more is required of the user. > >> > > >> > To be precise, most scanners don't automatically open the links > >> > found in QR codes and hence a tap/click from the user is required. :-) > > That's correct, you still need a click, so maybe a special Android app > could do the work so you don't need to turn the compressed oops into > base64. > > >> > > > optionally: > >> > > > > >> > > > 3) user fills out a minimal web form > >> > > > - Name > >> > > > - email address (do you want to receive emails re this oops?) > >> > > > - what were you doing when it occurred? > >> > > > - is it repeatable? > >> > > > >> > > By "web form", do you mean a new form or something that's part of > >> > > kerneloops.org? > >> > > > >> > > It would be great if we could allow users to open a new > >> > > bugzilla.kernel.org entry for the oops. I believe Teodora is working > >> > > on an Android app that could do this. Hopefully it could store > >> > > information about the person's system, and pre-propagate the bugzilla > >> > > entry with this information. > > I am and I've got the part of scanning and decompressing the QR oops > into text done. The way I see it, you may want to simply read the oops > on the phone or tablet so you should be able to keep a local history > of Oops that you've scanned. You can add your profile information for > bugzilla.kernel.org and then set an option to automatically send Oops > messages you scanned or save them and send them later. I've sent an > email to Konstantin, the maintainer of bugzilla.kernel.org, asking for > more details on the actual sending of the Oops message. > > >> > Yes, opening a bugzilla entry might be a good idea if the user fills > >> > out the form. To be honest, I think for that to work we would need to > >> > clean up bugzilla a bit. I try to do some work there every now and > >> > then, but nobody is closing the bugs I have fixed... > >> > > >> > Not sure about how would we create the bugzilla entry? I mean, which > >> > section, urgency, etc. how would we decide on those solely based on > >> > the OOPS? Or should we ask the user to fill it out? > >> > >> Filling a complex form on a handheld device can be pretty tedious. A two > >> steps procedure that would allow entering long text on a real computer > >> could be an interesting option. > > I think you could receive an email with a link to a partially > completed bug report (which you sent when scanning the QR code) and > follow that link on you computer to add stuff to your report. That'd > be nice, wouldn't it? Yes, that would do it I believe. It would also allow easier spam filtering, as oops submissions would need to be followed up by a user action before the bugzilla bug gets created. > > Makes sense. > > > > What about only asking for an email address and then sending them > > an automated message with a link where they can continue to add more > > information to the report? (i.e. fill out the bugzilla) > > Indeed, if you have too much to fill in on your smartphone it could be > inefficient. > > > I guess we should also be careful with the bugzilla. We really don't > > want propertiary driver crashes added to the bugzilla automatically. > > Nor do we want the same oops added twice, right? How would we > > differentiate between the two - essentially the same - oopses? > > Obviously, if we find two 'same' oopses then we can add the new > > info to the old bug. > > > > Maybe add filter based on 'P' taint to solve the propertiary issue. > > > > Oh and of course the email address thing would be optional. > > > >> > > > I recall discussing this with some RedHat devs at the 2012 KS, so I > >> > > > know there is some interest in this capability. > >> > > > > >> > > > I'd be interested in having this as a tech topic for several > >> > > > reasons. First, to raise awareness of the project among the kernel > >> > > > community (where did all these oops reports start coming from?). > >> > > > Second, to solicit opinions on how to feed those oops reports into > >> > > > the community. And last, to sit down with the maintainer of > >> > > > oops.kernel.org and scope out what work needs to be done to support > >> > > > this on the server side. > >> > > > > >> > > > Of course, all of this assumes the patches get accepted. There's > >> > > > been no rejections so far, though. :) > >> > > > > >> > > > If accepted, I would expect the authors to be the ones leading the > >> > > > discussion (Levente, Teodora). > >> > > > >> > > I would recommend that Teodora lead the discussion, since this is her > >> > > project. Levente has been provided helpful commentary and additional > >> > > patches, and should definitely participate in the discussion as well. > > I think it'd be a great experience if I could hold a presentation! :) > The feedback was really great especially since this is a first for me! > > >> > I was just about to say that the order might not be the most correct. > >> > :-) > >> > > >> > However, I am more than happy to help Teodora lead the discussion if > >> > she decides so. > >> > > >> > > > Nominations: > >> > > > > >> > > > Levente Kurusa <levex@linux.com> > >> > > > Teodora Băluţă <teobaluta@gmail.com> > >> > > > > >> > > > Relevant folks: > >> > > > > >> > > > Konstantin Ryabitsev <mricon@kernel.org> > >> > > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) > >> > > > >> > > Another relevant person to include would be PJ Waskiewicz. Teo > >> > > worked on the QR code generator during her internship with the FOSS > >> > > Outreach Program for Women (OPW) and PJ was her mentor for the > >> > > project. > >> > > > >> > > You mentioned the kerneloops.org maintainer, but didn't list him > >> > > here? > >> > > > >> > > Anton Arapov looks to be the maintainer, since he's the only > >> > > > >> > > contributor to the kerneloops.org github repo. > >> > > > >> > > The idea for the oops QR code generator came from Peter Anvin and > >> > > Dirk Hohndel, so they may want to participate in the discussion as > >> > > well. -- Regards, Laurent Pinchart ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 17:52 ` Teodora Băluţă 2014-05-11 21:49 ` Laurent Pinchart @ 2014-05-12 16:15 ` Jason Cooper 2014-05-12 16:36 ` Levente Kurusa ` (2 more replies) 1 sibling, 3 replies; 75+ messages in thread From: Jason Cooper @ 2014-05-12 16:15 UTC (permalink / raw) To: Teodora Băluţă Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov On Sun, May 11, 2014 at 08:52:12PM +0300, Teodora Băluţă wrote: > On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > >> > > > All, > >> > > > > >> > > > I recently came across a patch series attempting to implement encoding > >> > > > kernel oops into a QR code [1]. The QR code is then dumped to the > >> > > > > >> > > > framebuffer. The QR code is a URL of the form: > >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> > >> > > > > >> > > > This proposal is interesting because it fundamentally changes the way > >> > > > users report bugs to the kernel community. First and foremost, it makes > >> > > > it much easier. > >> > > > > >> > > > 1) oops occurs > >> > > > 2) user pulls out phone, scans QR code > >> > > > - at this point, the oops is recorded on the server. Nothing more > >> > > > is required of the user. > >> > > >> > To be precise, most scanners don't automatically open the links > >> > found in QR codes and hence a tap/click from the user is required. :-) > > That's correct, you still need a click, so maybe a special Android app > could do the work so you don't need to turn the compressed oops into > base64. I'd like the URL to be valid (meaning base64 the compressed data) so that we can get the data to the kernel.org server as easily as possible. Making the app a requirement for reporting is too onerous for non-developers. I see no reason we can't link to (Open in/Install) it on the webform though. I see your app as a great tool for people developing the kernel or curious about what happened, but there will be a significant number of users who don't develop (possibly anything) who won't go to the effort to install an app just to help us out. Knowing how many of those folks are affected by the bug is, imho, a very important data point when triaging bugs. Even though these 'users' don't talk on lkml, they *do* exist. And they say mean things like "Linux crashes on my $LAPTOP, it sucks." I'd rather not have to get a facebook account to learn that. :) thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:15 ` Jason Cooper @ 2014-05-12 16:36 ` Levente Kurusa 2014-05-12 16:53 ` H. Peter Anvin 2014-05-12 17:00 ` Johannes Berg [not found] ` <CACV2jQCV=rRFg-+x1B3H1=GM5rB_YWp1UU1p7xXkozHKv1Ewvg@mail.gmail.com> 2014-05-13 14:45 ` [Ksummit-discuss] " David Woodhouse 2 siblings, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-12 16:36 UTC (permalink / raw) To: Jason Cooper; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov [-- Attachment #1: Type: text/plain, Size: 3260 bytes --] Hi, On Mon, May 12, 2014 at 12:15:39PM -0400, Jason Cooper wrote: > On Sun, May 11, 2014 at 08:52:12PM +0300, Teodora Băluţă wrote: > > On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: > > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > > >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > > >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > > >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > > >> > > > All, > > >> > > > > > >> > > > I recently came across a patch series attempting to implement encoding > > >> > > > kernel oops into a QR code [1]. The QR code is then dumped to the > > >> > > > > > >> > > > framebuffer. The QR code is a URL of the form: > > >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > >> > > > > > >> > > > This proposal is interesting because it fundamentally changes the way > > >> > > > users report bugs to the kernel community. First and foremost, it makes > > >> > > > it much easier. > > >> > > > > > >> > > > 1) oops occurs > > >> > > > 2) user pulls out phone, scans QR code > > >> > > > - at this point, the oops is recorded on the server. Nothing more > > >> > > > is required of the user. > > >> > > > >> > To be precise, most scanners don't automatically open the links > > >> > found in QR codes and hence a tap/click from the user is required. :-) > > > > That's correct, you still need a click, so maybe a special Android app > > could do the work so you don't need to turn the compressed oops into > > base64. > > I'd like the URL to be valid (meaning base64 the compressed data) so > that we can get the data to the kernel.org server as easily as possible. > Making the app a requirement for reporting is too onerous for > non-developers. I see no reason we can't link to (Open in/Install) it > on the webform though. +1, the app is a good idea but shouldn't at all be mandatory. If we add that as a requirement people might just get lazy and don't download the app at which point we lose the report. Of course, adding the app as a plus is a great idea, since then the geeky people can take a look at what really happenned if the QR code has messed up their stack traces or whatever they see on their screen. > > I see your app as a great tool for people developing the kernel or > curious about what happened, but there will be a significant number of > users who don't develop (possibly anything) who won't go to the effort > to install an app just to help us out. Knowing how many of those folks > are affected by the bug is, imho, a very important data point when > triaging bugs. Yup, I think it's almost the same as with requiring the user to fill out a long seemingly endless form. Let's be as small as we can, while having the possibility of adding more and more data. > > Even though these 'users' don't talk on lkml, they *do* exist. And they > say mean things like "Linux crashes on my $LAPTOP, it sucks." I'd rather > not have to get a facebook account to learn that. :) If only, I had counted how many bad quality photos of people's screens did I get so far. :-) Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:36 ` Levente Kurusa @ 2014-05-12 16:53 ` H. Peter Anvin 2014-05-30 18:55 ` Steven Rostedt 2014-05-12 17:00 ` Johannes Berg 1 sibling, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-12 16:53 UTC (permalink / raw) To: Levente Kurusa, Jason Cooper Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss On 05/12/2014 09:36 AM, Levente Kurusa wrote: > > If only, I had counted how many bad quality photos of people's > screens did I get so far. :-) > This is not at all surprising. Keep in mind that the QR code stuff is only going to be helpful if it contains more information and/or decodes better than text screen photos. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:53 ` H. Peter Anvin @ 2014-05-30 18:55 ` Steven Rostedt 0 siblings, 0 replies; 75+ messages in thread From: Steven Rostedt @ 2014-05-30 18:55 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper On Mon, 12 May 2014 09:53:40 -0700 "H. Peter Anvin" <hpa@zytor.com> wrote: > On 05/12/2014 09:36 AM, Levente Kurusa wrote: > > > > If only, I had counted how many bad quality photos of people's > > screens did I get so far. :-) > > > > This is not at all surprising. > > Keep in mind that the QR code stuff is only going to be helpful if it > contains more information and/or decodes better than text screen photos. What would be nice is if it recorded the first part of a bug oops, and ignored the later part of the dmesg. You know, the important stuff that scrolls off the console. I hate it when people send me the last oops message that was caused by three oops messages that happened before it. Pretty much every screen shot that I received was of an oops that was caused by a prior oops and was deemed useless. -- Steve ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:36 ` Levente Kurusa 2014-05-12 16:53 ` H. Peter Anvin @ 2014-05-12 17:00 ` Johannes Berg 2014-05-12 17:46 ` Teodora Băluţă 1 sibling, 1 reply; 75+ messages in thread From: Johannes Berg @ 2014-05-12 17:00 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Anton Arapov, Jason Cooper, ksummit-discuss, Dirk Hohndel On Mon, 2014-05-12 at 18:36 +0200, Levente Kurusa wrote: > > I'd like the URL to be valid (meaning base64 the compressed data) so > > that we can get the data to the kernel.org server as easily as possible. > > Making the app a requirement for reporting is too onerous for > > non-developers. I see no reason we can't link to (Open in/Install) it > > on the webform though. > > +1, the app is a good idea but shouldn't at all be mandatory. If we > add that as a requirement people might just get lazy and don't > download the app at which point we lose the report. Of course, > adding the app as a plus is a great idea, since then the geeky people > can take a look at what really happenned if the QR code has messed up > their stack traces or whatever they see on their screen. If you have a well-known URL prefix then as far as I know you can (at least on Android) still have a URL and invoke an app if it's installed, via the intents system. You could thus still have a URL that displays the information, or a local app that does it and can do more. johannes ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 17:00 ` Johannes Berg @ 2014-05-12 17:46 ` Teodora Băluţă 0 siblings, 0 replies; 75+ messages in thread From: Teodora Băluţă @ 2014-05-12 17:46 UTC (permalink / raw) To: Johannes Berg Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper On Mon, May 12, 2014 at 8:00 PM, Johannes Berg <johannes@sipsolutions.net> wrote: > On Mon, 2014-05-12 at 18:36 +0200, Levente Kurusa wrote: > >> > I'd like the URL to be valid (meaning base64 the compressed data) so >> > that we can get the data to the kernel.org server as easily as possible. >> > Making the app a requirement for reporting is too onerous for >> > non-developers. I see no reason we can't link to (Open in/Install) it >> > on the webform though. >> >> +1, the app is a good idea but shouldn't at all be mandatory. If we >> add that as a requirement people might just get lazy and don't >> download the app at which point we lose the report. Of course, >> adding the app as a plus is a great idea, since then the geeky people >> can take a look at what really happenned if the QR code has messed up >> their stack traces or whatever they see on their screen. > > If you have a well-known URL prefix then as far as I know you can (at > least on Android) still have a URL and invoke an app if it's installed, > via the intents system. You could thus still have a URL that displays > the information, or a local app that does it and can do more. That's right.You can select to see the text of the Oops or just send it to a predefined server. :) > > johannes > > _______________________________________________ > Ksummit-discuss mailing list > Ksummit-discuss@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/ksummit-discuss ^ permalink raw reply [flat|nested] 75+ messages in thread
[parent not found: <CACV2jQCV=rRFg-+x1B3H1=GM5rB_YWp1UU1p7xXkozHKv1Ewvg@mail.gmail.com>]
* [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel [not found] ` <CACV2jQCV=rRFg-+x1B3H1=GM5rB_YWp1UU1p7xXkozHKv1Ewvg@mail.gmail.com> @ 2014-05-13 6:44 ` Teodora Băluţă 2014-05-13 7:08 ` Josh Triplett 0 siblings, 1 reply; 75+ messages in thread From: Teodora Băluţă @ 2014-05-13 6:44 UTC (permalink / raw) To: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp + everyone else On Mon, May 12, 2014 at 7:15 PM, Jason Cooper <jason@lakedaemon.net> wrote: > On Sun, May 11, 2014 at 08:52:12PM +0300, Teodora Băluţă wrote: >> On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: >> > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: >> >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: >> >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: >> >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: >> >> > > > All, >> >> > > > >> >> > > > I recently came across a patch series attempting to implement encoding >> >> > > > kernel oops into a QR code [1]. The QR code is then dumped to the >> >> > > > >> >> > > > framebuffer. The QR code is a URL of the form: >> >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> >> >> > > > >> >> > > > This proposal is interesting because it fundamentally changes the way >> >> > > > users report bugs to the kernel community. First and foremost, it makes >> >> > > > it much easier. >> >> > > > >> >> > > > 1) oops occurs >> >> > > > 2) user pulls out phone, scans QR code >> >> > > > - at this point, the oops is recorded on the server. Nothing more >> >> > > > is required of the user. >> >> > >> >> > To be precise, most scanners don't automatically open the links >> >> > found in QR codes and hence a tap/click from the user is required. :-) >> >> That's correct, you still need a click, so maybe a special Android app >> could do the work so you don't need to turn the compressed oops into >> base64. > > I'd like the URL to be valid (meaning base64 the compressed data) so > that we can get the data to the kernel.org server as easily as possible. > Making the app a requirement for reporting is too onerous for > non-developers. I see no reason we can't link to (Open in/Install) it > on the webform though. So from what I can understand, the QR code has an URL that has the base64 of the compressed Oops message. Right? I see three problems with this approach: - base64 adds about 33% overhead (it's turning 3 octets into 4 encoded characters + padding). One issue with QR codes is that they have a limited amount of characters they can hold so that's why I do the compression in the first place - besides doing compression in a kernel that's had issues, you add the base64 encoding inside the kernel - you would still use a device with a camera (smartphone, tablet) to scan the QR from the framebuffer, so basically that means an app, right? What is the point of doing the URL validation inside the kernel when an app can do that? It doesn't add to the difficulty of sending the Oops to kernel.org (just one button away) > > I see your app as a great tool for people developing the kernel or > curious about what happened, but there will be a significant number of > users who don't develop (possibly anything) who won't go to the effort > to install an app just to help us out. Knowing how many of those folks > are affected by the bug is, imho, a very important data point when > triaging bugs. Am I missing something here? You still have to scan the QR, right?... A significant number of users won't have access to the framebuffer to scan it - the Oops is dumped to the console or inside the /var/log/dmesg, so the main target is geeky developer people. > > Even though these 'users' don't talk on lkml, they *do* exist. And they > say mean things like "Linux crashes on my $LAPTOP, it sucks." I'd rather > not have to get a facebook account to learn that. :) > > thx, > > Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 6:44 ` [Ksummit-discuss] Fwd: " Teodora Băluţă @ 2014-05-13 7:08 ` Josh Triplett 2014-05-13 15:52 ` Levente Kurusa 2014-05-14 16:00 ` H. Peter Anvin 0 siblings, 2 replies; 75+ messages in thread From: Josh Triplett @ 2014-05-13 7:08 UTC (permalink / raw) To: Teodora Băluţă Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss, Sarah A Sharp On Tue, May 13, 2014 at 09:44:26AM +0300, Teodora Băluţă wrote: > On Mon, May 12, 2014 at 7:15 PM, Jason Cooper <jason@lakedaemon.net> wrote: > > I'd like the URL to be valid (meaning base64 the compressed data) so > > that we can get the data to the kernel.org server as easily as possible. > > Making the app a requirement for reporting is too onerous for > > non-developers. I see no reason we can't link to (Open in/Install) it > > on the webform though. > > So from what I can understand, the QR code has an URL that has the > base64 of the compressed Oops message. Right? I see three problems > with this approach: > > - base64 adds about 33% overhead (it's turning 3 octets into 4 encoded > characters + padding). One issue with QR codes is that they have a > limited amount of characters they can hold so that's why I do the > compression in the first place Putting base64-encoded data in a URL in a binary-format QR code with 8 bits per character does indeed waste quite a bit of space. However, you could put base32-encoded data into an alphanumeric-formatted QR code with 5.5 bits per character, which would waste very little space. (Or, more efficiently but less conveniently, base40 or so.) > - besides doing compression in a kernel that's had issues, you add the > base64 encoding inside the kernel > - you would still use a device with a camera (smartphone, tablet) to > scan the QR from the framebuffer, so basically that means an app, > right? What is the point of doing the URL validation inside the kernel > when an app can do that? It doesn't add to the difficulty of sending > the Oops to kernel.org (just one button away) Many users will already have a QR-code scanning app installed, and such apps always support loading URLs in a browser. Another possibility to consider: current mobile browsers support the HTML Media Capture API, which allows capturing an image from the camera from within a file upload control. Together with a bit of Javascript, that would allow app-less oops capturing just by visiting a page and using that page to capture the oops image. - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 7:08 ` Josh Triplett @ 2014-05-13 15:52 ` Levente Kurusa 2014-05-13 18:42 ` Andy Lutomirski 2014-05-13 20:18 ` josh 2014-05-14 16:00 ` H. Peter Anvin 1 sibling, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-13 15:52 UTC (permalink / raw) To: Josh Triplett, Teodora Băluţă Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss, Sarah A Sharp [-- Attachment #1: Type: text/plain, Size: 2781 bytes --] Hi, On Tue, May 13, 2014 at 12:08:51AM -0700, Josh Triplett wrote: > On Tue, May 13, 2014 at 09:44:26AM +0300, Teodora Băluţă wrote: > > On Mon, May 12, 2014 at 7:15 PM, Jason Cooper <jason@lakedaemon.net> wrote: > > > I'd like the URL to be valid (meaning base64 the compressed data) so > > > that we can get the data to the kernel.org server as easily as possible. > > > Making the app a requirement for reporting is too onerous for > > > non-developers. I see no reason we can't link to (Open in/Install) it > > > on the webform though. > > > > So from what I can understand, the QR code has an URL that has the > > base64 of the compressed Oops message. Right? I see three problems > > with this approach: > > > > - base64 adds about 33% overhead (it's turning 3 octets into 4 encoded > > characters + padding). One issue with QR codes is that they have a > > limited amount of characters they can hold so that's why I do the > > compression in the first place > > Putting base64-encoded data in a URL in a binary-format QR code with 8 > bits per character does indeed waste quite a bit of space. However, you > could put base32-encoded data into an alphanumeric-formatted QR code > with 5.5 bits per character, which would waste very little space. (Or, > more efficiently but less conveniently, base40 or so.) > Base32 does sound good until you realize that it requires roughly 20% more space than Base64 does. We would need some calculations to decide if we were to go down this path. > > - besides doing compression in a kernel that's had issues, you add the > > base64 encoding inside the kernel > > - you would still use a device with a camera (smartphone, tablet) to > > scan the QR from the framebuffer, so basically that means an app, > > right? What is the point of doing the URL validation inside the kernel > > when an app can do that? It doesn't add to the difficulty of sending > > the Oops to kernel.org (just one button away) > > Many users will already have a QR-code scanning app installed, and such > apps always support loading URLs in a browser. > Yes, and having them the requirement of installing an app might make people turn their heads away from reporting the bug. > Another possibility to consider: current mobile browsers support the > HTML Media Capture API, which allows capturing an image from the camera > from within a file upload control. Together with a bit of Javascript, > that would allow app-less oops capturing just by visiting a page and > using that page to capture the oops image. I guess this is another way to go provided that devices really do support it. As far as my device goes it's totally not working. :-) (Android 2.3.7) Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:52 ` Levente Kurusa @ 2014-05-13 18:42 ` Andy Lutomirski 2014-05-13 20:18 ` josh 1 sibling, 0 replies; 75+ messages in thread From: Andy Lutomirski @ 2014-05-13 18:42 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Tue, May 13, 2014 at 8:52 AM, Levente Kurusa <levex@linux.com> wrote: > Hi, > > On Tue, May 13, 2014 at 12:08:51AM -0700, Josh Triplett wrote: >> On Tue, May 13, 2014 at 09:44:26AM +0300, Teodora Băluţă wrote: >> > On Mon, May 12, 2014 at 7:15 PM, Jason Cooper <jason@lakedaemon.net> wrote: >> > > I'd like the URL to be valid (meaning base64 the compressed data) so >> > > that we can get the data to the kernel.org server as easily as possible. >> > > Making the app a requirement for reporting is too onerous for >> > > non-developers. I see no reason we can't link to (Open in/Install) it >> > > on the webform though. >> > >> > So from what I can understand, the QR code has an URL that has the >> > base64 of the compressed Oops message. Right? I see three problems >> > with this approach: >> > >> > - base64 adds about 33% overhead (it's turning 3 octets into 4 encoded >> > characters + padding). One issue with QR codes is that they have a >> > limited amount of characters they can hold so that's why I do the >> > compression in the first place >> >> Putting base64-encoded data in a URL in a binary-format QR code with 8 >> bits per character does indeed waste quite a bit of space. However, you >> could put base32-encoded data into an alphanumeric-formatted QR code >> with 5.5 bits per character, which would waste very little space. (Or, >> more efficiently but less conveniently, base40 or so.) >> > > Base32 does sound good until you realize that it requires roughly 20% > more space than Base64 does. We would need some calculations to > decide if we were to go down this path. I think the idea is that base32 requires 20% more *characters* than base64, but it also enables the use of alphanumeric QR codes, which can store more characters for the same number of pixels. --Andy ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:52 ` Levente Kurusa 2014-05-13 18:42 ` Andy Lutomirski @ 2014-05-13 20:18 ` josh 2014-05-14 8:20 ` Johannes Berg 1 sibling, 1 reply; 75+ messages in thread From: josh @ 2014-05-13 20:18 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Tue, May 13, 2014 at 05:52:07PM +0200, Levente Kurusa wrote: > Hi, > > On Tue, May 13, 2014 at 12:08:51AM -0700, Josh Triplett wrote: > > On Tue, May 13, 2014 at 09:44:26AM +0300, Teodora Băluţă wrote: > > > On Mon, May 12, 2014 at 7:15 PM, Jason Cooper <jason@lakedaemon.net> wrote: > > > > I'd like the URL to be valid (meaning base64 the compressed data) so > > > > that we can get the data to the kernel.org server as easily as possible. > > > > Making the app a requirement for reporting is too onerous for > > > > non-developers. I see no reason we can't link to (Open in/Install) it > > > > on the webform though. > > > > > > So from what I can understand, the QR code has an URL that has the > > > base64 of the compressed Oops message. Right? I see three problems > > > with this approach: > > > > > > - base64 adds about 33% overhead (it's turning 3 octets into 4 encoded > > > characters + padding). One issue with QR codes is that they have a > > > limited amount of characters they can hold so that's why I do the > > > compression in the first place > > > > Putting base64-encoded data in a URL in a binary-format QR code with 8 > > bits per character does indeed waste quite a bit of space. However, you > > could put base32-encoded data into an alphanumeric-formatted QR code > > with 5.5 bits per character, which would waste very little space. (Or, > > more efficiently but less conveniently, base40 or so.) > > Base32 does sound good until you realize that it requires roughly 20% > more space than Base64 does. We would need some calculations to > decide if we were to go down this path. QR has several encoding modes; it doesn't matter that base32 uses more space in terms of characters, because QR itself has an alphanumeric encoding mode that only uses 5.5 bits per character to encode 45 possible alphanumeric/symbol characters. base64 wastes far more relative to bytes (6 versus 8 bits) than base32 wastes relative to QR alphanumeric (5 versus 5.5 bits). - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 20:18 ` josh @ 2014-05-14 8:20 ` Johannes Berg 2014-05-14 15:52 ` Josh Triplett 0 siblings, 1 reply; 75+ messages in thread From: Johannes Berg @ 2014-05-14 8:20 UTC (permalink / raw) To: josh Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, 2014-05-13 at 13:18 -0700, josh@joshtriplett.org wrote: > > Base32 does sound good until you realize that it requires roughly 20% > > more space than Base64 does. We would need some calculations to > > decide if we were to go down this path. > > QR has several encoding modes; it doesn't matter that base32 uses more > space in terms of characters, because QR itself has an alphanumeric > encoding mode that only uses 5.5 bits per character to encode 45 > possible alphanumeric/symbol characters. base64 wastes far more > relative to bytes (6 versus 8 bits) than base32 wastes relative to QR > alphanumeric (5 versus 5.5 bits). This subthread is kinda going on a tangent now, but ... The valid characters seem to be 0-9A-Z $%*+-./: so you'll need to be careful to not use a ? for URL parameters [1], otherwise the QR encoder will likely have to pick binary/byte encoding. Since you really wouldn't want to use % due to URL-encoding difficulties, and $ and space also seem a bit questionable, you could still extend the encoding alphabet to at least base36 (0-9A-Z) and even add +-./: without much difficulty to get to base41. johannes [1] i.e. the previously suggested https://oops.kernel.org/?qr=... will not work ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 8:20 ` Johannes Berg @ 2014-05-14 15:52 ` Josh Triplett 0 siblings, 0 replies; 75+ messages in thread From: Josh Triplett @ 2014-05-14 15:52 UTC (permalink / raw) To: Johannes Berg Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel On Wed, May 14, 2014 at 10:20:52AM +0200, Johannes Berg wrote: > On Tue, 2014-05-13 at 13:18 -0700, josh@joshtriplett.org wrote: > > > > Base32 does sound good until you realize that it requires roughly 20% > > > more space than Base64 does. We would need some calculations to > > > decide if we were to go down this path. > > > > QR has several encoding modes; it doesn't matter that base32 uses more > > space in terms of characters, because QR itself has an alphanumeric > > encoding mode that only uses 5.5 bits per character to encode 45 > > possible alphanumeric/symbol characters. base64 wastes far more > > relative to bytes (6 versus 8 bits) than base32 wastes relative to QR > > alphanumeric (5 versus 5.5 bits). > > This subthread is kinda going on a tangent now, but ... > > The valid characters seem to be > > 0-9A-Z $%*+-./: > > so you'll need to be careful to not use a ? for URL parameters [1], > [1] i.e. the previously suggested https://oops.kernel.org/?qr=... will > not work https://oops.kernel.org/qr/... Or: https://qr.kernel.org/... > Since you really wouldn't want to use % due to URL-encoding > difficulties, and $ and space also seem a bit questionable, you could > still extend the encoding alphabet to at least base36 (0-9A-Z) and even > add +-./: without much difficulty to get to base41. space and % seem like the only ones that need avoiding, both because of URL-encoding issues; you could use all six of $*+-./: , giving 43 of 45 possible characters. On the other hand, is it worth the complexity of using base43 encoding rather than base32? - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 7:08 ` Josh Triplett 2014-05-13 15:52 ` Levente Kurusa @ 2014-05-14 16:00 ` H. Peter Anvin 2014-05-14 16:09 ` Andy Lutomirski 2014-05-14 18:54 ` Josh Triplett 1 sibling, 2 replies; 75+ messages in thread From: H. Peter Anvin @ 2014-05-14 16:00 UTC (permalink / raw) To: Josh Triplett, Teodora Băluţă Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss, Sarah A Sharp On 05/13/2014 12:08 AM, Josh Triplett wrote: > > Many users will already have a QR-code scanning app installed, and such > apps always support loading URLs in a browser. > Let me disavow you of the notion that stock scanning apps handle large QR symbols. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 16:00 ` H. Peter Anvin @ 2014-05-14 16:09 ` Andy Lutomirski 2014-05-14 18:54 ` Josh Triplett 1 sibling, 0 replies; 75+ messages in thread From: Andy Lutomirski @ 2014-05-14 16:09 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Wed, May 14, 2014 at 9:00 AM, H. Peter Anvin <hpa@zytor.com> wrote: > On 05/13/2014 12:08 AM, Josh Triplett wrote: >> >> Many users will already have a QR-code scanning app installed, and such >> apps always support loading URLs in a browser. >> > > Let me disavow you of the notion that stock scanning apps handle large > QR symbols. zxing can handle the bloody enormous QR code here: http://en.wikipedia.org/wiki/File:Qr-code-ver-40.png I'll admit that it took a while to find exactly the right camera position to get it to focus well enough :) Anyway, point taken: it probably pays to keep the total size of this thing under control. --Andy ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 16:00 ` H. Peter Anvin 2014-05-14 16:09 ` Andy Lutomirski @ 2014-05-14 18:54 ` Josh Triplett 2014-05-14 20:00 ` Levente Kurusa 2014-05-15 19:18 ` H. Peter Anvin 1 sibling, 2 replies; 75+ messages in thread From: Josh Triplett @ 2014-05-14 18:54 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Wed, May 14, 2014 at 09:00:51AM -0700, H. Peter Anvin wrote: > On 05/13/2014 12:08 AM, Josh Triplett wrote: > > > > Many users will already have a QR-code scanning app installed, and such > > apps always support loading URLs in a browser. > > > > Let me disavow you of the notion that stock scanning apps handle large > QR symbols. That's certainly true. On the other hand, I'd really like to see a version of the oops-as-QR-code bits that uses VGA block characters to work in non-graphics, non-framebuffer mode, which would require fitting in at most 80x50 (using the half-block characters). That wouldn't allow nearly as much data, but likely enough for a somewhat useful crash report, especially in aggregate. - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 18:54 ` Josh Triplett @ 2014-05-14 20:00 ` Levente Kurusa 2014-05-14 20:24 ` Daniel Vetter 2014-05-14 22:55 ` Josh Triplett 2014-05-15 19:18 ` H. Peter Anvin 1 sibling, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-14 20:00 UTC (permalink / raw) To: Josh Triplett Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 1778 bytes --] On Wed, May 14, 2014 at 11:54:49AM -0700, Josh Triplett wrote: > On Wed, May 14, 2014 at 09:00:51AM -0700, H. Peter Anvin wrote: > > On 05/13/2014 12:08 AM, Josh Triplett wrote: > > > > > > Many users will already have a QR-code scanning app installed, and such > > > apps always support loading URLs in a browser. > > > > > > > Let me disavow you of the notion that stock scanning apps handle large > > QR symbols. > > That's certainly true. On the other hand, I'd really like to see a > version of the oops-as-QR-code bits that uses VGA block characters to > work in non-graphics, non-framebuffer mode, which would require fitting > in at most 80x50 (using the half-block characters). That wouldn't allow > nearly as much data, but likely enough for a somewhat useful crash > report, especially in aggregate. Not really possible, from my experiences the QR code that results from a random oops is ranging from 100x100 to 150x150 depending on the size of stack trace and stuff like that. Of course, we can decrease the error recovery region and that might make it smaller. I'll take a look at this a bit later. If that doesn't work, then that means that we can't shuffle that into the textmode's 80x25. Not to mention that the block characters in the ASCII table (I think you meant that, if not please correct me) are not neccessarily square, which is needed for maximum scannability. One thing that we currently support and can be a solution is Micro QR code. It removes two of the three coordinators and does some more compression AFAIK. It might be possible to shuffle that into textmode. I as well would love to support QR codes in textmode, but I think that it's really not possible at the moment. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 20:00 ` Levente Kurusa @ 2014-05-14 20:24 ` Daniel Vetter 2014-05-19 11:59 ` David Herrmann 2014-05-14 22:55 ` Josh Triplett 1 sibling, 1 reply; 75+ messages in thread From: Daniel Vetter @ 2014-05-14 20:24 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, David Herrmann, Sarah A Sharp On Wed, May 14, 2014 at 10:00 PM, Levente Kurusa <levex@linux.com> wrote: > On Wed, May 14, 2014 at 11:54:49AM -0700, Josh Triplett wrote: >> On Wed, May 14, 2014 at 09:00:51AM -0700, H. Peter Anvin wrote: >> > On 05/13/2014 12:08 AM, Josh Triplett wrote: >> > > >> > > Many users will already have a QR-code scanning app installed, and such >> > > apps always support loading URLs in a browser. >> > > >> > >> > Let me disavow you of the notion that stock scanning apps handle large >> > QR symbols. >> >> That's certainly true. On the other hand, I'd really like to see a >> version of the oops-as-QR-code bits that uses VGA block characters to >> work in non-graphics, non-framebuffer mode, which would require fitting >> in at most 80x50 (using the half-block characters). That wouldn't allow >> nearly as much data, but likely enough for a somewhat useful crash >> report, especially in aggregate. > > Not really possible, from my experiences the QR code that results from > a random oops is ranging from 100x100 to 150x150 depending on the size > of stack trace and stuff like that. Of course, we can decrease the > error recovery region and that might make it smaller. I'll take a look > at this a bit later. If that doesn't work, then that means that we can't > shuffle that into the textmode's 80x25. Not to mention that the block > characters in the ASCII table (I think you meant that, if not please > correct me) are not neccessarily square, which is needed for maximum > scannability. > > One thing that we currently support and can be a solution is Micro QR > code. It removes two of the three coordinators and does some more > compression AFAIK. It might be possible to shuffle that into textmode. > > I as well would love to support QR codes in textmode, but I think that > it's really not possible at the moment. David Herrman is working on some new infrastructure for emergency log services on top of drm/kms drivers since we really, really want to move away from the horrors called fbcon. His design is fairly neat and there shouldn't be that big an issue with replacing the current character-painting code he has with some oops-painting code. Adding him to the discussion so he can point at some of the patches. -Daniel -- Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 20:24 ` Daniel Vetter @ 2014-05-19 11:59 ` David Herrmann 0 siblings, 0 replies; 75+ messages in thread From: David Herrmann @ 2014-05-19 11:59 UTC (permalink / raw) To: Daniel Vetter Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel Hi On Wed, May 14, 2014 at 10:24 PM, Daniel Vetter <daniel.vetter@ffwll.ch> wrote: > On Wed, May 14, 2014 at 10:00 PM, Levente Kurusa <levex@linux.com> wrote: >> I as well would love to support QR codes in textmode, but I think that >> it's really not possible at the moment. > > David Herrman is working on some new infrastructure for emergency log > services on top of drm/kms drivers since we really, really want to > move away from the horrors called fbcon. His design is fairly neat and > there shouldn't be that big an issue with replacing the current > character-painting code he has with some oops-painting code. Adding > him to the discussion so he can point at some of the patches. Still working on that, but I have no public tree for it right now. The design basically asks all registered graphics driver for a kernel-mapped framebuffer and the current mode/format. In case the current FB is not / cannot be mapped, we try to flip to a fallback buffer with the same mode/format. If even that fails, we try to do a full modeset and DPMS stuff and more (this is all the responsibility of the driver). To avoid expensive call-paths, we do this step-by-step: first all drivers are asked for the current FB and we render on all successfull mappings. Then we continue with the remaining drivers and the remaining options, and so on.. Note that setting a modern DRM driver into text-mode is far more expensive than asking for the current FB. This is even mostly true for any VESA-compatible card (through SimpleDRM). So I don't see why anyone should bother using textmode for QR codes (but if you think that's fun, I won't stop you). The kernel-core will see one function, drm_render_oops() (or something similar), which will try to do its best to render on all screens. Default mode is rendering the kernel-log (through drm_log), but any other stuff like QR is possible. There's a helper called drm_draw_pixel() that can draw pixels in _any_ RGB format (maybe even YUV and stuff), so the renderers don't even have to deal with DRM formats. I will show a prototype at LPC14, if anyone is interested. David ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 20:00 ` Levente Kurusa 2014-05-14 20:24 ` Daniel Vetter @ 2014-05-14 22:55 ` Josh Triplett 2014-05-15 12:44 ` Levente Kurusa 1 sibling, 1 reply; 75+ messages in thread From: Josh Triplett @ 2014-05-14 22:55 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel On Wed, May 14, 2014 at 10:00:43PM +0200, Levente Kurusa wrote: > On Wed, May 14, 2014 at 11:54:49AM -0700, Josh Triplett wrote: > > On Wed, May 14, 2014 at 09:00:51AM -0700, H. Peter Anvin wrote: > > > On 05/13/2014 12:08 AM, Josh Triplett wrote: > > > > > > > > Many users will already have a QR-code scanning app installed, and such > > > > apps always support loading URLs in a browser. > > > > > > > > > > Let me disavow you of the notion that stock scanning apps handle large > > > QR symbols. > > > > That's certainly true. On the other hand, I'd really like to see a > > version of the oops-as-QR-code bits that uses VGA block characters to > > work in non-graphics, non-framebuffer mode, which would require fitting > > in at most 80x50 (using the half-block characters). That wouldn't allow > > nearly as much data, but likely enough for a somewhat useful crash > > report, especially in aggregate. > > Not really possible, from my experiences the QR code that results from > a random oops is ranging from 100x100 to 150x150 depending on the size > of stack trace and stuff like that. Of course, we can decrease the > error recovery region and that might make it smaller. I'll take a look > at this a bit later. If that doesn't work, then that means that we can't > shuffle that into the textmode's 80x25. Not to mention that the block > characters in the ASCII table (I think you meant that, if not please > correct me) are not neccessarily square, which is needed for maximum > scannability. In the standard EGA/VGA/DOS character font, see characters DB (solid block), DC (lower half block), and DF (upper half block). Those allow drawing 80x50 on an 80x25 console. Unicode has those as well, and also supports a full set of quarter-character blocks which would allow 160x50; see U+2580 through U+259F. I've also seen discussions about removing less useful information from the oops backtrace (simplifying it to just the backtrace itself, and less of the guessed-at information). > One thing that we currently support and can be a solution is Micro QR > code. It removes two of the three coordinators and does some more > compression AFAIK. It might be possible to shuffle that into textmode. How widely do stock barcode reader apps support that? - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 22:55 ` Josh Triplett @ 2014-05-15 12:44 ` Levente Kurusa 2014-05-15 19:19 ` H. Peter Anvin 0 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-15 12:44 UTC (permalink / raw) To: Josh Triplett Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 2941 bytes --] Hi, On Wed, May 14, 2014 at 03:55:23PM -0700, Josh Triplett wrote: > On Wed, May 14, 2014 at 10:00:43PM +0200, Levente Kurusa wrote: > > On Wed, May 14, 2014 at 11:54:49AM -0700, Josh Triplett wrote: > > > On Wed, May 14, 2014 at 09:00:51AM -0700, H. Peter Anvin wrote: > > > > On 05/13/2014 12:08 AM, Josh Triplett wrote: > > > > > > > > > > Many users will already have a QR-code scanning app installed, and such > > > > > apps always support loading URLs in a browser. > > > > > > > > > > > > > Let me disavow you of the notion that stock scanning apps handle large > > > > QR symbols. > > > > > > That's certainly true. On the other hand, I'd really like to see a > > > version of the oops-as-QR-code bits that uses VGA block characters to > > > work in non-graphics, non-framebuffer mode, which would require fitting > > > in at most 80x50 (using the half-block characters). That wouldn't allow > > > nearly as much data, but likely enough for a somewhat useful crash > > > report, especially in aggregate. > > > > Not really possible, from my experiences the QR code that results from > > a random oops is ranging from 100x100 to 150x150 depending on the size > > of stack trace and stuff like that. Of course, we can decrease the > > error recovery region and that might make it smaller. I'll take a look > > at this a bit later. If that doesn't work, then that means that we can't > > shuffle that into the textmode's 80x25. Not to mention that the block > > characters in the ASCII table (I think you meant that, if not please > > correct me) are not neccessarily square, which is needed for maximum > > scannability. > > In the standard EGA/VGA/DOS character font, see characters DB (solid > block), DC (lower half block), and DF (upper half block). Those allow > drawing 80x50 on an 80x25 console. Unicode has those as well, and also > supports a full set of quarter-character blocks which would allow > 160x50; see U+2580 through U+259F. > Hm, I see. I'll find some time soon to check on this. > I've also seen discussions about removing less useful information from > the oops backtrace (simplifying it to just the backtrace itself, and > less of the guessed-at information). Indeed, that might as well make the QR code smaller. I was thinking about what really is the point in having the registers in the QR code as well. I guess that is something we could leave out, right? > > > One thing that we currently support and can be a solution is Micro QR > > code. It removes two of the three coordinators and does some more > > compression AFAIK. It might be possible to shuffle that into textmode. > > How widely do stock barcode reader apps support that? No idea, but, sadly, mine does not support MicroQR. (At least it was not able to read the MicroQR example found on Wikipedia). I have NeoReader as a stock scanner. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 12:44 ` Levente Kurusa @ 2014-05-15 19:19 ` H. Peter Anvin 0 siblings, 0 replies; 75+ messages in thread From: H. Peter Anvin @ 2014-05-15 19:19 UTC (permalink / raw) To: Levente Kurusa, Josh Triplett Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss, Sarah A Sharp On 05/15/2014 05:44 AM, Levente Kurusa wrote: > > Indeed, that might as well make the QR code smaller. I was > thinking about what really is the point in having the registers in > the QR code as well. I guess that is something we could leave out, > right? > HELL NO. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 18:54 ` Josh Triplett 2014-05-14 20:00 ` Levente Kurusa @ 2014-05-15 19:18 ` H. Peter Anvin 2014-05-15 20:41 ` Levente Kurusa 1 sibling, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-15 19:18 UTC (permalink / raw) To: Josh Triplett Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On 05/14/2014 11:54 AM, Josh Triplett wrote: > > That's certainly true. On the other hand, I'd really like to see a > version of the oops-as-QR-code bits that uses VGA block characters to > work in non-graphics, non-framebuffer mode, which would require fitting > in at most 80x50 (using the half-block characters). That wouldn't allow > nearly as much data, but likely enough for a somewhat useful crash > report, especially in aggregate. > Now we're getting into a funny area, which is "what is the lowest common denominator". If the lowest common denominator is VGA, a simple VGA driver could force the screen to 640x480 graphics mode, or reprogram the font to allow for an 160x100 pixel pseudographic mode (more if we allow the font size to be adjusted). It is not at all clear that using IBM pseudographics with no other programming is a useful point on that spectrum. Either way, this is *way* past turning into a technical conversation, and belongs on LKML and not ksummit-discuss. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] Fwd: [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 19:18 ` H. Peter Anvin @ 2014-05-15 20:41 ` Levente Kurusa 0 siblings, 0 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-15 20:41 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 1312 bytes --] Hi, On Thu, May 15, 2014 at 12:18:27PM -0700, H. Peter Anvin wrote: > On 05/14/2014 11:54 AM, Josh Triplett wrote: > > > > That's certainly true. On the other hand, I'd really like to see a > > version of the oops-as-QR-code bits that uses VGA block characters to > > work in non-graphics, non-framebuffer mode, which would require fitting > > in at most 80x50 (using the half-block characters). That wouldn't allow > > nearly as much data, but likely enough for a somewhat useful crash > > report, especially in aggregate. > > > > Now we're getting into a funny area, which is "what is the lowest common > denominator". If the lowest common denominator is VGA, a simple VGA > driver could force the screen to 640x480 graphics mode, or reprogram the > font to allow for an 160x100 pixel pseudographic mode (more if we allow > the font size to be adjusted). It is not at all clear that using IBM > pseudographics with no other programming is a useful point on that spectrum. > > Either way, this is *way* past turning into a technical conversation, > and belongs on LKML and not ksummit-discuss. > Right, I'll write up what technical stuff we discussed here and post it on LKML in the RFC thread so we can get rid of the tech discussions here. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:15 ` Jason Cooper 2014-05-12 16:36 ` Levente Kurusa [not found] ` <CACV2jQCV=rRFg-+x1B3H1=GM5rB_YWp1UU1p7xXkozHKv1Ewvg@mail.gmail.com> @ 2014-05-13 14:45 ` David Woodhouse 2014-05-15 19:21 ` H. Peter Anvin 2 siblings, 1 reply; 75+ messages in thread From: David Woodhouse @ 2014-05-13 14:45 UTC (permalink / raw) To: Jason Cooper; +Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss [-- Attachment #1: Type: text/plain, Size: 2471 bytes --] On Mon, 2014-05-12 at 12:15 -0400, Jason Cooper wrote: > On Sun, May 11, 2014 at 08:52:12PM +0300, Teodora Băluţă wrote: > > On Sun, May 11, 2014 at 8:18 PM, Levente Kurusa <levex@linux.com> wrote: > > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > > >> On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > > >> > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > > >> > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > > >> > > > All, > > >> > > > > > >> > > > I recently came across a patch series attempting to implement encoding > > >> > > > kernel oops into a QR code [1]. The QR code is then dumped to the > > >> > > > > > >> > > > framebuffer. The QR code is a URL of the form: > > >> > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > >> > > > > > >> > > > This proposal is interesting because it fundamentally changes the way > > >> > > > users report bugs to the kernel community. First and foremost, it makes > > >> > > > it much easier. > > >> > > > > > >> > > > 1) oops occurs > > >> > > > 2) user pulls out phone, scans QR code > > >> > > > - at this point, the oops is recorded on the server. Nothing more > > >> > > > is required of the user. > > >> > > > >> > To be precise, most scanners don't automatically open the links > > >> > found in QR codes and hence a tap/click from the user is required. :-) > > > > That's correct, you still need a click, so maybe a special Android app > > could do the work so you don't need to turn the compressed oops into > > base64. > > I'd like the URL to be valid (meaning base64 the compressed data) so > that we can get the data to the kernel.org server as easily as possible. > Making the app a requirement for reporting is too onerous for > non-developers. I see no reason we can't link to (Open in/Install) it > on the webform though. > > I see your app as a great tool for people developing the kernel or > curious about what happened, but there will be a significant number of > users who don't develop (possibly anything) who won't go to the effort > to install an app just to help us out. Knowing how many of those folks > are affected by the bug is, imho, a very important data point when > triaging bugs. With smart Internet-connected TVs and monitors, can't we embed the app in the monitor itself, and have it upload the oops? Why use a camera...? :) -- dwmw2 [-- Attachment #2: smime.p7s --] [-- Type: application/x-pkcs7-signature, Size: 5745 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 14:45 ` [Ksummit-discuss] " David Woodhouse @ 2014-05-15 19:21 ` H. Peter Anvin 2014-05-15 19:53 ` Jiri Kosina 0 siblings, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-15 19:21 UTC (permalink / raw) To: David Woodhouse, Jason Cooper Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss On 05/13/2014 07:45 AM, David Woodhouse wrote: > > With smart Internet-connected TVs and monitors, can't we embed the app > in the monitor itself, and have it upload the oops? Why use a > camera...? :) > The whole point of doing this is for dealing with devices which don't have any kind of reasonable path to the Internet. If you have a device that can take a perfect screenshot, there are *way* better ways to use that than making a QR code, and if there is another path to the outside world, it is probably a lot better. -hpa (who is suddenly thinking extremely evil thoughts about modem tones and sound cards.) ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 19:21 ` H. Peter Anvin @ 2014-05-15 19:53 ` Jiri Kosina 0 siblings, 0 replies; 75+ messages in thread From: Jiri Kosina @ 2014-05-15 19:53 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Thu, 15 May 2014, H. Peter Anvin wrote: > -hpa (who is suddenly thinking extremely evil thoughts about > modem tones and sound cards.) I recall a patchset flying by years ago, which could use either keyboard LEDs or pc speaker to provide the oops to in morse code. It's now more difficult with USB keyboards, because you need a lot of stuff to happen (including scheduling a workqueue) to blink the LEDs, but the pc speaker part should work. Then you just run an app on your smartphone which decodes the morse back to the actual oops message, and you are done :) -- Jiri Kosina SUSE Labs ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 17:18 ` Levente Kurusa 2014-05-11 17:52 ` Teodora Băluţă @ 2014-05-12 15:53 ` Jason Cooper 2014-05-12 16:49 ` Levente Kurusa 1 sibling, 1 reply; 75+ messages in thread From: Jason Cooper @ 2014-05-12 15:53 UTC (permalink / raw) To: Levente Kurusa; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov On Sun, May 11, 2014 at 07:18:24PM +0200, Levente Kurusa wrote: > Hi, > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > > On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: ... > > > Not sure about how would we create the bugzilla entry? I mean, which > > > section, urgency, etc. how would we decide on those solely based on > > > the OOPS? Or should we ask the user to fill it out? > > > > Filling a complex form on a handheld device can be pretty tedious. A two steps > > procedure that would allow entering long text on a real computer could be an > > interesting option. > > > > Makes sense. > > What about only asking for an email address and then sending them > an automated message with a link where they can continue to add more > information to the report? (i.e. fill out the bugzilla) Agree. > I guess we should also be careful with the bugzilla. We really don't > want propertiary driver crashes added to the bugzilla automatically. Correct, but the data is still worth recording. > Nor do we want the same oops added twice, right? We don't want two bugzilla entries, but we do want to know how many times this event has happened. > How would we differentiate between the two - essentially the same - > oopses? Hmm, oops cookie? hex string of 32/64 bits read off of the entropy pool? This would give us an accurate number of events even if a user scans multiple times. thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 15:53 ` Jason Cooper @ 2014-05-12 16:49 ` Levente Kurusa 2014-05-12 17:09 ` H. Peter Anvin 2014-05-12 17:24 ` Jason Cooper 0 siblings, 2 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-12 16:49 UTC (permalink / raw) To: Jason Cooper; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov [-- Attachment #1: Type: text/plain, Size: 2179 bytes --] Hi, On Mon, May 12, 2014 at 11:53:20AM -0400, Jason Cooper wrote: > On Sun, May 11, 2014 at 07:18:24PM +0200, Levente Kurusa wrote: > > Hi, > > > > On Sun, May 11, 2014 at 06:37:47PM +0200, Laurent Pinchart wrote: > > > On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > ... > > > > Not sure about how would we create the bugzilla entry? I mean, which > > > > section, urgency, etc. how would we decide on those solely based on > > > > the OOPS? Or should we ask the user to fill it out? > > > > > > Filling a complex form on a handheld device can be pretty tedious. A two steps > > > procedure that would allow entering long text on a real computer could be an > > > interesting option. > > > > > > > Makes sense. > > > > What about only asking for an email address and then sending them > > an automated message with a link where they can continue to add more > > information to the report? (i.e. fill out the bugzilla) > > Agree. > > > I guess we should also be careful with the bugzilla. We really don't > > want propertiary driver crashes added to the bugzilla automatically. > > Correct, but the data is still worth recording. > > > Nor do we want the same oops added twice, right? > > We don't want two bugzilla entries, but we do want to know how many > times this event has happened. > > > How would we differentiate between the two - essentially the same - > > oopses? > > Hmm, oops cookie? hex string of 32/64 bits read off of the entropy > pool? This would give us an accurate number of events even if a user > scans multiple times. Hmm, I've been wondering about this too. I guess 32 bits are enough to differentiate between oopses, and adding this to the QR code is relatively easy as well. What I wonder is how could we get the server back-end to not allow the same oopses from bad users. Having a link like: oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA would mean that malicious users could edit the $ENTROPY part and hence effectively report the same oops twice. Maybe some checksum? Or will it be too much for an already damaged kernel? Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:49 ` Levente Kurusa @ 2014-05-12 17:09 ` H. Peter Anvin 2014-05-12 17:50 ` Teodora Băluţă 2014-05-12 17:24 ` Jason Cooper 1 sibling, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-12 17:09 UTC (permalink / raw) To: Levente Kurusa, Jason Cooper Cc: PJ Waskiewicz, Anton Arapov, Dirk Hohndel, ksummit-discuss On 05/12/2014 09:49 AM, Levente Kurusa wrote: > > What I wonder is how could we get the server back-end to not allow > the same oopses from bad users. > > Having a link like: > > oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA > > would mean that malicious users could edit the $ENTROPY part and > hence effectively report the same oops twice. Maybe some checksum? > Or will it be too much for an already damaged kernel? > What did the old kerneloops system do for these kinds of things? Again, I'm concerned that a KS session for this will turn into an implementation discussion, which is better done by email. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 17:09 ` H. Peter Anvin @ 2014-05-12 17:50 ` Teodora Băluţă 2014-05-13 11:25 ` Greg KH 0 siblings, 1 reply; 75+ messages in thread From: Teodora Băluţă @ 2014-05-12 17:50 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: > On 05/12/2014 09:49 AM, Levente Kurusa wrote: >> >> What I wonder is how could we get the server back-end to not allow >> the same oopses from bad users. >> >> Having a link like: >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA >> >> would mean that malicious users could edit the $ENTROPY part and >> hence effectively report the same oops twice. Maybe some checksum? >> Or will it be too much for an already damaged kernel? >> > > What did the old kerneloops system do for these kinds of things? > > Again, I'm concerned that a KS session for this will turn into an > implementation discussion, which is better done by email. Well, the discussion got a bit technical, but as Josh said, I see no point in doing that sort of talk (for technical discussion there's always the RFC thread [0]). I think what would be of interest is the way the workflow changes and the infrastructure you need to maintain. For example, at the moment, can you actually send an Oops directly to kernel.org by posting it in a query? Thanks, Teodora [0] https://lkml.org/lkml/2014/3/17/525 ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 17:50 ` Teodora Băluţă @ 2014-05-13 11:25 ` Greg KH 2014-05-13 14:41 ` Sarah A Sharp 0 siblings, 1 reply; 75+ messages in thread From: Greg KH @ 2014-05-13 11:25 UTC (permalink / raw) To: Teodora Băluţă Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: > On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: > > On 05/12/2014 09:49 AM, Levente Kurusa wrote: > >> > >> What I wonder is how could we get the server back-end to not allow > >> the same oopses from bad users. > >> > >> Having a link like: > >> > >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA > >> > >> would mean that malicious users could edit the $ENTROPY part and > >> hence effectively report the same oops twice. Maybe some checksum? > >> Or will it be too much for an already damaged kernel? > >> > > > > What did the old kerneloops system do for these kinds of things? > > > > Again, I'm concerned that a KS session for this will turn into an > > implementation discussion, which is better done by email. > > Well, the discussion got a bit technical, but as Josh said, I see no > point in doing that sort of talk (for technical discussion there's > always the RFC thread [0]). I think what would be of interest is the > way the workflow changes and the infrastructure you need to maintain. > For example, at the moment, can you actually send an Oops directly to > kernel.org by posting it in a query? That is what the kerneloops.org site is for, please use that for stuff like "automated oops reports", not bugzilla.kernel.org, as that is not going to work at all. thanks, greg k-h ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 11:25 ` Greg KH @ 2014-05-13 14:41 ` Sarah A Sharp 2014-05-13 15:05 ` Greg KH 0 siblings, 1 reply; 75+ messages in thread From: Sarah A Sharp @ 2014-05-13 14:41 UTC (permalink / raw) To: Greg KH Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, May 13, 2014 at 4:25 AM, Greg KH <greg@kroah.com> wrote: > On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: >> On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: >> > On 05/12/2014 09:49 AM, Levente Kurusa wrote: >> >> >> >> What I wonder is how could we get the server back-end to not allow >> >> the same oopses from bad users. >> >> >> >> Having a link like: >> >> >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA >> >> >> >> would mean that malicious users could edit the $ENTROPY part and >> >> hence effectively report the same oops twice. Maybe some checksum? >> >> Or will it be too much for an already damaged kernel? >> >> >> > >> > What did the old kerneloops system do for these kinds of things? >> > >> > Again, I'm concerned that a KS session for this will turn into an >> > implementation discussion, which is better done by email. >> >> Well, the discussion got a bit technical, but as Josh said, I see no >> point in doing that sort of talk (for technical discussion there's >> always the RFC thread [0]). I think what would be of interest is the >> way the workflow changes and the infrastructure you need to maintain. >> For example, at the moment, can you actually send an Oops directly to >> kernel.org by posting it in a query? > > That is what the kerneloops.org site is for, please use that for stuff > like "automated oops reports", not bugzilla.kernel.org, as that is not > going to work at all. It's clear that by default, any oops reported through the QR code generator should be reported to kerneloops.org. Do you think there's additional value in *optionally* allowing someone to file a bugzilla report against that oops, or do you think there's no value in using bugzilla.kernel.org at all for this project? Sarah Sharp ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 14:41 ` Sarah A Sharp @ 2014-05-13 15:05 ` Greg KH 2014-05-13 15:51 ` Sarah A Sharp 0 siblings, 1 reply; 75+ messages in thread From: Greg KH @ 2014-05-13 15:05 UTC (permalink / raw) To: Sarah A Sharp Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, May 13, 2014 at 07:41:15AM -0700, Sarah A Sharp wrote: > On Tue, May 13, 2014 at 4:25 AM, Greg KH <greg@kroah.com> wrote: > > On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: > >> On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: > >> > On 05/12/2014 09:49 AM, Levente Kurusa wrote: > >> >> > >> >> What I wonder is how could we get the server back-end to not allow > >> >> the same oopses from bad users. > >> >> > >> >> Having a link like: > >> >> > >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA > >> >> > >> >> would mean that malicious users could edit the $ENTROPY part and > >> >> hence effectively report the same oops twice. Maybe some checksum? > >> >> Or will it be too much for an already damaged kernel? > >> >> > >> > > >> > What did the old kerneloops system do for these kinds of things? > >> > > >> > Again, I'm concerned that a KS session for this will turn into an > >> > implementation discussion, which is better done by email. > >> > >> Well, the discussion got a bit technical, but as Josh said, I see no > >> point in doing that sort of talk (for technical discussion there's > >> always the RFC thread [0]). I think what would be of interest is the > >> way the workflow changes and the infrastructure you need to maintain. > >> For example, at the moment, can you actually send an Oops directly to > >> kernel.org by posting it in a query? > > > > That is what the kerneloops.org site is for, please use that for stuff > > like "automated oops reports", not bugzilla.kernel.org, as that is not > > going to work at all. > > It's clear that by default, any oops reported through the QR code > generator should be reported to kerneloops.org. Do you think there's > additional value in *optionally* allowing someone to file a bugzilla > report against that oops, or do you think there's no value in using > bugzilla.kernel.org at all for this project? As I don't use bugzilla for kernel stuff, I really don't recommend it. Espcially if it would give a false sense of "I reported it to the developers" feeling to users that someone would actually now look at the issue. greg k-h ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:05 ` Greg KH @ 2014-05-13 15:51 ` Sarah A Sharp 2014-05-13 15:59 ` Josh Boyer 2014-05-13 16:03 ` Greg KH 0 siblings, 2 replies; 75+ messages in thread From: Sarah A Sharp @ 2014-05-13 15:51 UTC (permalink / raw) To: Greg KH Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, May 13, 2014 at 8:05 AM, Greg KH <greg@kroah.com> wrote: > On Tue, May 13, 2014 at 07:41:15AM -0700, Sarah A Sharp wrote: >> On Tue, May 13, 2014 at 4:25 AM, Greg KH <greg@kroah.com> wrote: >> > On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: >> >> On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: >> >> > On 05/12/2014 09:49 AM, Levente Kurusa wrote: >> >> >> >> >> >> What I wonder is how could we get the server back-end to not allow >> >> >> the same oopses from bad users. >> >> >> >> >> >> Having a link like: >> >> >> >> >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA >> >> >> >> >> >> would mean that malicious users could edit the $ENTROPY part and >> >> >> hence effectively report the same oops twice. Maybe some checksum? >> >> >> Or will it be too much for an already damaged kernel? >> >> >> >> >> > >> >> > What did the old kerneloops system do for these kinds of things? >> >> > >> >> > Again, I'm concerned that a KS session for this will turn into an >> >> > implementation discussion, which is better done by email. >> >> >> >> Well, the discussion got a bit technical, but as Josh said, I see no >> >> point in doing that sort of talk (for technical discussion there's >> >> always the RFC thread [0]). I think what would be of interest is the >> >> way the workflow changes and the infrastructure you need to maintain. >> >> For example, at the moment, can you actually send an Oops directly to >> >> kernel.org by posting it in a query? >> > >> > That is what the kerneloops.org site is for, please use that for stuff >> > like "automated oops reports", not bugzilla.kernel.org, as that is not >> > going to work at all. >> >> It's clear that by default, any oops reported through the QR code >> generator should be reported to kerneloops.org. Do you think there's >> additional value in *optionally* allowing someone to file a bugzilla >> report against that oops, or do you think there's no value in using >> bugzilla.kernel.org at all for this project? > > As I don't use bugzilla for kernel stuff, I really don't recommend it. > Espcially if it would give a false sense of "I reported it to the > developers" feeling to users that someone would actually now look at the > issue. And everyone will look at kerneloops.org instead? There are some maintainers (like Bjorn in PCI) that do use bugzilla. Other maintainers want people to report bugs to the mailing list. It's confusing to bug reporters to figure out where to report bugs. If MAINTAINERS listed either a bugzilla URL or a mailing list email where bugs should be reported to, that might be helpful to users. The phone app could use that file from a recent kernel to figure out whether to allow the user to report the oops to bugzilla.kernel.org or to create an email to send to the right mailing list (and make sure it's a plain text email). It's these kinds of social aspects of the project that I'd like to see get discussed at kernel summit. Sarah Sharp ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:51 ` Sarah A Sharp @ 2014-05-13 15:59 ` Josh Boyer 2014-05-13 16:07 ` Theodore Ts'o 2014-05-13 16:03 ` Greg KH 1 sibling, 1 reply; 75+ messages in thread From: Josh Boyer @ 2014-05-13 15:59 UTC (permalink / raw) To: Sarah A Sharp Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, May 13, 2014 at 11:51 AM, Sarah A Sharp <sarah@thesharps.us> wrote: > On Tue, May 13, 2014 at 8:05 AM, Greg KH <greg@kroah.com> wrote: >> On Tue, May 13, 2014 at 07:41:15AM -0700, Sarah A Sharp wrote: >>> On Tue, May 13, 2014 at 4:25 AM, Greg KH <greg@kroah.com> wrote: >>> > On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: >>> >> On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: >>> >> > On 05/12/2014 09:49 AM, Levente Kurusa wrote: >>> >> >> >>> >> >> What I wonder is how could we get the server back-end to not allow >>> >> >> the same oopses from bad users. >>> >> >> >>> >> >> Having a link like: >>> >> >> >>> >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA >>> >> >> >>> >> >> would mean that malicious users could edit the $ENTROPY part and >>> >> >> hence effectively report the same oops twice. Maybe some checksum? >>> >> >> Or will it be too much for an already damaged kernel? >>> >> >> >>> >> > >>> >> > What did the old kerneloops system do for these kinds of things? >>> >> > >>> >> > Again, I'm concerned that a KS session for this will turn into an >>> >> > implementation discussion, which is better done by email. >>> >> >>> >> Well, the discussion got a bit technical, but as Josh said, I see no >>> >> point in doing that sort of talk (for technical discussion there's >>> >> always the RFC thread [0]). I think what would be of interest is the >>> >> way the workflow changes and the infrastructure you need to maintain. >>> >> For example, at the moment, can you actually send an Oops directly to >>> >> kernel.org by posting it in a query? >>> > >>> > That is what the kerneloops.org site is for, please use that for stuff >>> > like "automated oops reports", not bugzilla.kernel.org, as that is not >>> > going to work at all. >>> >>> It's clear that by default, any oops reported through the QR code >>> generator should be reported to kerneloops.org. Do you think there's >>> additional value in *optionally* allowing someone to file a bugzilla >>> report against that oops, or do you think there's no value in using >>> bugzilla.kernel.org at all for this project? >> >> As I don't use bugzilla for kernel stuff, I really don't recommend it. >> Espcially if it would give a false sense of "I reported it to the >> developers" feeling to users that someone would actually now look at the >> issue. > > And everyone will look at kerneloops.org instead? > > There are some maintainers (like Bjorn in PCI) that do use bugzilla. > Other maintainers want people to report bugs to the mailing list. > It's confusing to bug reporters to figure out where to report bugs. > > If MAINTAINERS listed either a bugzilla URL or a mailing list email > where bugs should be reported to, that might be helpful to users. The > phone app could use that file from a recent kernel to figure out > whether to allow the user to report the oops to bugzilla.kernel.org or > to create an email to send to the right mailing list (and make sure > it's a plain text email). > > It's these kinds of social aspects of the project that I'd like to see > get discussed at kernel summit. We have similar dilemmas in Fedora as well. Our users report bugs in Red Hat bugzilla, which nobody wants to look at. So we wind up trying to forward relevant information upstream, and the individual preferences of the maintainers is hard to keep track of. Reducing the problem to the absurd, we could just screen scrape RHBZ reports and dump them on LKML, but I really doubt that is going to help anyone. I'd be interested in discussing the "how/where to report issues" problem. josh ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:59 ` Josh Boyer @ 2014-05-13 16:07 ` Theodore Ts'o 2014-05-13 17:43 ` Levente Kurusa ` (3 more replies) 0 siblings, 4 replies; 75+ messages in thread From: Theodore Ts'o @ 2014-05-13 16:07 UTC (permalink / raw) To: Josh Boyer Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper, Sarah A Sharp I'll note this discussion has started mutating to a more general "how do we get more useful bug reports in front of developers", which I think is a good thing. However, I'm still not sure how useful it would be to have a tech topic (or a core topic) dedicated to the matter, because we've had discussions about and at the end of the day, what's probably really necessary is to have someone, or a small team, dedicated all or most of their time to: a) improving kerneloops.org b) finding interesting patterns in the bulk reported data, and then forwarding that on to developers c) finding ways of automating (b) QR encoded oops might be a means towards that end, but there might be other things that could be done as well. If someone were to *do* all of this work, then reporting on it and then asking for suggestions about how this service could be improved, might make a great tech topic. But in the absence of that, can folks suggest ways that this doesn't turn into a "I know, let's put a bell on the cat!" sort of discussion that doesn't lead to anything useful? - Ted ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 16:07 ` Theodore Ts'o @ 2014-05-13 17:43 ` Levente Kurusa 2014-05-13 18:14 ` Teodora Baluta 2014-05-14 1:14 ` Josh Boyer ` (2 subsequent siblings) 3 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-13 17:43 UTC (permalink / raw) To: Theodore Ts'o Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, ksummit-discuss, Sarah A Sharp, Jason Cooper [-- Attachment #1: Type: text/plain, Size: 3844 bytes --] Hi, On Tue, May 13, 2014 at 12:07:43PM -0400, Theodore Ts'o wrote: > I'll note this discussion has started mutating to a more general "how > do we get more useful bug reports in front of developers", which I > think is a good thing. > > However, I'm still not sure how useful it would be to have a tech > topic (or a core topic) dedicated to the matter, because we've had > discussions about and at the end of the day, what's probably really > necessary is to have someone, or a small team, dedicated all or most > of their time to: > > a) improving kerneloops.org > b) finding interesting patterns in the bulk reported data, and then > forwarding that on to developers > c) finding ways of automating (b) * One possible way of improving kerneloops is that once an oops happens more than X times then it would be automatically sent to the maintainer. * Adding some more stats specifically for the RCs, so we can get more information during the RC phase of a release. We have essentially the same for Stable and Longterm kernels. (By the way, am I the only receiving frequent 503 Service Unavailable errors from the oops.kernel.org site?) > > QR encoded oops might be a means towards that end, but there might be > other things that could be done as well. > > If someone were to *do* all of this work, then reporting on it and > then asking for suggestions about how this service could be improved, > might make a great tech topic. > > But in the absence of that, can folks suggest ways that this doesn't > turn into a "I know, let's put a bell on the cat!" sort of discussion > that doesn't lead to anything useful? > Here are a few topics I think are worth discussing at the summit with regards to this topic: * How to disseminate bug reports? Have comaintainers looking at bugzilla and oops.kernel.org? For some time now, I have been trying to do some cleanup, i.e. fix some bugs there, but since I lack the capabilities to close bugs it still remains to others. I would, though, be very pleased to clean up bugzilla, if I got the capabilities. * QR code in general. Is it actually worth it? I mean as it currently stands the QR code takes quite a bit of the screen and takes place over some (possibly valuable) information. This is because it is currently in the topleft corner. There was a suggestion to move it to the center, but I think that would as well take some information away from someone who wants to find out the information themselves. If we accept the QR encoding stuff to the kernel, then that will most likely mean that kerneloops will receive more (probably valuable) information. I think that this is a good thing, since as Greg mentioned we will better now which subsystems struggle. Maybe adding a bugzilla entry as well seems reasonable and maybe if we do clean up bugzilla, maintainers will eventually look at it and the bugzilla thing will become viable. Automatically adding a bugzilla might make sense as well once a certain oops hits the 'X-times-happenned' level. That way maintainers wouldn't be overflown with new bugs by mail. * Should maintainers be sent digests of the oopses from oops.kernel.org and the bugs from bugzilla? Okay, I know that most maintainers get mails from the bugzilla each time a new bug is filed, but I guess a digest would be better. It wouldn't overflow a maintainer's mailbox nor it would be automatically added to the maintainer's spam folder. A feature like this already exists in bugzilla, in the 'Reports' menu, but it does not send any mails, so I guess that could be automatized. After all, if the commitee decides that this topic is viable, I would be happy to participate. Thanks, Levente Kurusa. [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 17:43 ` Levente Kurusa @ 2014-05-13 18:14 ` Teodora Baluta 2014-05-15 14:24 ` Levente Kurusa 0 siblings, 1 reply; 75+ messages in thread From: Teodora Baluta @ 2014-05-13 18:14 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, ksummit-discuss, Sarah A Sharp, Jason Cooper On May 13, 2014, at 20:43, Levente Kurusa <levex@linux.com> wrote: Hi, > On Tue, May 13, 2014 at 12:07:43PM -0400, Theodore Ts'o wrote: > I'll note this discussion has started mutating to a more general "how > do we get more useful bug reports in front of developers", which I > think is a good thing. > > However, I'm still not sure how useful it would be to have a tech > topic (or a core topic) dedicated to the matter, because we've had > discussions about and at the end of the day, what's probably really > necessary is to have someone, or a small team, dedicated all or most > of their time to: > > a) improving kerneloops.org > b) finding interesting patterns in the bulk reported data, and then > forwarding that on to developers > c) finding ways of automating (b) * One possible way of improving kerneloops is that once an oops happens more than X times then it would be automatically sent to the maintainer. * Adding some more stats specifically for the RCs, so we can get more information during the RC phase of a release. We have essentially the same for Stable and Longterm kernels. (By the way, am I the only receiving frequent 503 Service Unavailable errors from the oops.kernel.org site?) I also have the same error code. So another possible subject is adding the infrastructure/web service for sending oops messages. As I understood for Konstantin, the current API is a bit tricky to use so maybe adding a simple REST API could simplify the pushing process. Maybe one of the problems is not having where to send these bugs easily with an automated process. I am doing an app now so how can I make it worth the time? Should I just forget about bugzilla and just implement a server that collects these reports? If it helps I can just post the link to the repository to the Android app to get an idea how it looks (still in development). > > QR encoded oops might be a means towards that end, but there might be > other things that could be done as well. > > If someone were to *do* all of this work, then reporting on it and > then asking for suggestions about how this service could be improved, > might make a great tech topic. > > But in the absence of that, can folks suggest ways that this doesn't > turn into a "I know, let's put a bell on the cat!" sort of discussion > that doesn't lead to anything useful? Here are a few topics I think are worth discussing at the summit with regards to this topic: * How to disseminate bug reports? Have comaintainers looking at bugzilla and oops.kernel.org? For some time now, I have been trying to do some cleanup, i.e. fix some bugs there, but since I lack the capabilities to close bugs it still remains to others. I would, though, be very pleased to clean up bugzilla, if I got the capabilities. * QR code in general. Is it actually worth it? I mean as it currently stands the QR code takes quite a bit of the screen and takes place over some (possibly valuable) information. This is because it is currently in the topleft corner. There was a suggestion to move it to the center, but I think that would as well take some information away from someone who wants to find out the information themselves. If we accept the QR encoding stuff to the kernel, then that will most likely mean that kerneloops will receive more (probably valuable) information. I think that this is a good thing, since as Greg mentioned we will better now which subsystems struggle. Maybe adding a bugzilla entry as well seems reasonable and maybe if we do clean up bugzilla, maintainers will eventually look at it and the bugzilla thing will become viable. Automatically adding a bugzilla might make sense as well once a certain oops hits the 'X-times-happenned' level. That way maintainers wouldn't be overflown with new bugs by mail. * Should maintainers be sent digests of the oopses from oops.kernel.org and the bugs from bugzilla? Okay, I know that most maintainers get mails from the bugzilla each time a new bug is filed, but I guess a digest would be better. It wouldn't overflow a maintainer's mailbox nor it would be automatically added to the maintainer's spam folder. A feature like this already exists in bugzilla, in the 'Reports' menu, but it does not send any mails, so I guess that could be automatized. Another suggestion is to add the possibility of analyzing bugs on the server side: like it was said previously on this thread, keeping an eye on the feeds that repeat more than X times. Or see which subsystem have most issues. After all, if the commitee decides that this topic is viable, I would be happy to participate. I would be happy to continue working on this and leading the discussion if there is enough interest in discussing use of QR code in this process as we *do* have the prototype and the people (Levente and me) if there is support (infrastructure, feedback, etc. ) in adding this upstream. Thanks, Teodora ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 18:14 ` Teodora Baluta @ 2014-05-15 14:24 ` Levente Kurusa 2014-05-15 16:02 ` Teodora Băluţă 0 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-15 14:24 UTC (permalink / raw) To: Teodora Baluta Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, Kernel Summit Discussion List, Sarah A Sharp, Jason Cooper [-- Attachment #1: Type: text/plain, Size: 6579 bytes --] Hi, (woo, your mail user agent messed up! :( ) On Tue, May 13, 2014 at 09:14:21PM +0300, Teodora Baluta wrote: > > On May 13, 2014, at 20:43, Levente Kurusa <levex@linux.com> wrote: > > Hi, > > > On Tue, May 13, 2014 at 12:07:43PM -0400, Theodore Ts'o wrote: > > I'll note this discussion has started mutating to a more general "how > > do we get more useful bug reports in front of developers", which I > > think is a good thing. > > > > However, I'm still not sure how useful it would be to have a tech > > topic (or a core topic) dedicated to the matter, because we've had > > discussions about and at the end of the day, what's probably really > > necessary is to have someone, or a small team, dedicated all or most > > of their time to: > > > > a) improving kerneloops.org > > b) finding interesting patterns in the bulk reported data, and then > > forwarding that on to developers > > c) finding ways of automating (b) > > * One possible way of improving kerneloops is that once an oops happens > more than X times then it would be automatically sent to the > maintainer. > > * Adding some more stats specifically for the RCs, so we can get more > information during the RC phase of a release. > We have essentially the same for Stable and Longterm kernels. > > (By the way, am I the only receiving frequent 503 Service Unavailable > errors from the oops.kernel.org site?) > > I also have the same error code. So another possible subject is adding the infrastructure/web service for sending oops messages. As I understood for Konstantin, the current API is a bit tricky to use so maybe adding a simple REST API could simplify the pushing process. I have no idea how the oops.kernel.org API works, sadly. Can you please give some insight (for instance, where the oops is parsed. in ABRT and such or in the server?) > > Maybe one of the problems is not having where to send these bugs easily with an automated process. > > I am doing an app now so how can I make it worth the time? Should I just forget about bugzilla and just implement a server that collects these reports? > > If it helps I can just post the link to the repository to the Android app to get an idea how it looks (still in development). > > > > QR encoded oops might be a means towards that end, but there might be > > other things that could be done as well. > > > > If someone were to *do* all of this work, then reporting on it and > > then asking for suggestions about how this service could be improved, > > might make a great tech topic. > > > > But in the absence of that, can folks suggest ways that this doesn't > > turn into a "I know, let's put a bell on the cat!" sort of discussion > > that doesn't lead to anything useful? > > > Here are a few topics I think are worth discussing at the summit with > regards to this topic: > > * How to disseminate bug reports? > Have comaintainers looking at bugzilla and oops.kernel.org? > For some time now, I have been trying to do some cleanup, i.e. > fix some bugs there, but since I lack the capabilities to close bugs > it still remains to others. I would, though, be very pleased to > clean up bugzilla, if I got the capabilities. > > * QR code in general. > Is it actually worth it? I mean as it currently stands the QR code > takes quite a bit of the screen and takes place over some (possibly > valuable) information. This is because it is currently in the > topleft corner. There was a suggestion to move it to the center, but > I think that would as well take some information away from someone > who wants to find out the information themselves. > > If we accept the QR encoding stuff to the kernel, then that will > most likely mean that kerneloops will receive more (probably > valuable) information. I think that this is a good thing, since as > Greg mentioned we will better now which subsystems struggle. Maybe > adding a bugzilla entry as well seems reasonable and maybe if we do > clean up bugzilla, maintainers will eventually look at it and the > bugzilla thing will become viable. > > Automatically adding a bugzilla might make sense as well once a > certain oops hits the 'X-times-happenned' level. That way > maintainers wouldn't be overflown with new bugs by mail. > > * Should maintainers be sent digests of the oopses from > oops.kernel.org and the bugs from bugzilla? > Okay, I know that most maintainers get mails from the bugzilla each > time a new bug is filed, but I guess a digest would be better. It > wouldn't overflow a maintainer's mailbox nor it would be > automatically added to the maintainer's spam folder. > A feature like this already exists in bugzilla, in the 'Reports' > menu, but it does not send any mails, so I guess that could be > automatized. > > Another suggestion is to add the possibility of analyzing bugs on the server side: like it was said previously on this thread, keeping an eye on the feeds that repeat more than X times. Or see which subsystem have most issues. I am not sure what you mean by 'analyze'. Can you please elaborate? The current oops.kernel.org does display some information on the top guilty drivers and modules. It's right on the front page. > > After all, if the commitee decides that this topic is viable, I would > be happy to participate. > > I would be happy to continue working on this and leading the discussion if there is enough interest in discussing use of QR code in this process as we *do* have the prototype and the people (Levente and me) if there is support (infrastructure, feedback, etc. ) in adding this upstream. I guess the discussion at the KS won't be mostly about QR codes, but rather how could we get more information on the OOPSes and how to disseminate them. Obviously, QR codes can play a huge part in this if we manage to make them as least demanding as possible. Again, I'd like to express my opinion on forcing the user to download an app just to parse an oops is less than ideal. I still strongly support going for a URL and a baseXX encoded approach. Obviously, there are problems with this way as well, but this is the way where we lose the least amount of users IMHO. :-) Regarding your comment that base64 adds 33% overhead. If we manage to shrink the size of the OOPS, i.e. remove registers, and some other stuff, then that may compensate for the overhead b64 adds. There is a subthread that discusses this. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 14:24 ` Levente Kurusa @ 2014-05-15 16:02 ` Teodora Băluţă 0 siblings, 0 replies; 75+ messages in thread From: Teodora Băluţă @ 2014-05-15 16:02 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, Kernel Summit Discussion List, Sarah A Sharp, Jason Cooper Hi, > (woo, your mail user agent messed up! :( ) Yes, I didn't send it from my laptop, but from mobile. I'm sorry, I noticed that too late. :( > On Tue, May 13, 2014 at 09:14:21PM +0300, Teodora Baluta wrote: >> >> On May 13, 2014, at 20:43, Levente Kurusa <levex@linux.com> wrote: >> >> Hi, >> >> > On Tue, May 13, 2014 at 12:07:43PM -0400, Theodore Ts'o wrote: >> > I'll note this discussion has started mutating to a more general "how >> > do we get more useful bug reports in front of developers", which I >> > think is a good thing. >> > >> > However, I'm still not sure how useful it would be to have a tech >> > topic (or a core topic) dedicated to the matter, because we've had >> > discussions about and at the end of the day, what's probably really >> > necessary is to have someone, or a small team, dedicated all or most >> > of their time to: >> > >> > a) improving kerneloops.org >> > b) finding interesting patterns in the bulk reported data, and then >> > forwarding that on to developers >> > c) finding ways of automating (b) >> >> * One possible way of improving kerneloops is that once an oops happens >> more than X times then it would be automatically sent to the >> maintainer. >> >> * Adding some more stats specifically for the RCs, so we can get more >> information during the RC phase of a release. >> We have essentially the same for Stable and Longterm kernels. >> >> (By the way, am I the only receiving frequent 503 Service Unavailable >> errors from the oops.kernel.org site?) >> >> I also have the same error code. So another possible subject is adding the infrastructure/web service for sending oops messages. As I understood for Konstantin, the current API is a bit tricky to use so maybe adding a simple REST API could simplify the pushing process. > > I have no idea how the oops.kernel.org API works, sadly. Can you please give > some insight (for instance, where the oops is parsed. in ABRT and such > or in the server?) I don't know how oops.kernel.org API works either, but I talked to Konstantin about bugzilla and the problem is authentication (the app could use an account 'qruploader' or each user to have each account). Either way, it is not a very good option for easily sending an oops. The implementation is a xml-rpc interface (for more check out [0]) but you could add a layer like REST if you want to use the browser (an interesting article here [1]). [0] http://www.bugzilla.org/docs/4.4/en/html/api/Bugzilla/WebService/Server/XMLRPC.html [1] http://www.etherealbits.com/2012/12/debunking-the-myths-of-rpc-rest/ > >> >> Maybe one of the problems is not having where to send these bugs easily with an automated process. >> >> I am doing an app now so how can I make it worth the time? Should I just forget about bugzilla and just implement a server that collects these reports? >> >> If it helps I can just post the link to the repository to the Android app to get an idea how it looks (still in development). >> > >> > QR encoded oops might be a means towards that end, but there might be >> > other things that could be done as well. >> > >> > If someone were to *do* all of this work, then reporting on it and >> > then asking for suggestions about how this service could be improved, >> > might make a great tech topic. >> > >> > But in the absence of that, can folks suggest ways that this doesn't >> > turn into a "I know, let's put a bell on the cat!" sort of discussion >> > that doesn't lead to anything useful? >> >> >> Here are a few topics I think are worth discussing at the summit with >> regards to this topic: >> >> * How to disseminate bug reports? >> Have comaintainers looking at bugzilla and oops.kernel.org? >> For some time now, I have been trying to do some cleanup, i.e. >> fix some bugs there, but since I lack the capabilities to close bugs >> it still remains to others. I would, though, be very pleased to >> clean up bugzilla, if I got the capabilities. >> >> * QR code in general. >> Is it actually worth it? I mean as it currently stands the QR code >> takes quite a bit of the screen and takes place over some (possibly >> valuable) information. This is because it is currently in the >> topleft corner. There was a suggestion to move it to the center, but >> I think that would as well take some information away from someone >> who wants to find out the information themselves. >> >> If we accept the QR encoding stuff to the kernel, then that will >> most likely mean that kerneloops will receive more (probably >> valuable) information. I think that this is a good thing, since as >> Greg mentioned we will better now which subsystems struggle. Maybe >> adding a bugzilla entry as well seems reasonable and maybe if we do >> clean up bugzilla, maintainers will eventually look at it and the >> bugzilla thing will become viable. >> >> Automatically adding a bugzilla might make sense as well once a >> certain oops hits the 'X-times-happenned' level. That way >> maintainers wouldn't be overflown with new bugs by mail. >> >> * Should maintainers be sent digests of the oopses from >> oops.kernel.org and the bugs from bugzilla? >> Okay, I know that most maintainers get mails from the bugzilla each >> time a new bug is filed, but I guess a digest would be better. It >> wouldn't overflow a maintainer's mailbox nor it would be >> automatically added to the maintainer's spam folder. >> A feature like this already exists in bugzilla, in the 'Reports' >> menu, but it does not send any mails, so I guess that could be >> automatized. >> >> Another suggestion is to add the possibility of analyzing bugs on the server side: like it was said previously on this thread, keeping an eye on the feeds that repeat more than X times. Or see which subsystem have most issues. > > I am not sure what you mean by 'analyze'. Can you please elaborate? > The current oops.kernel.org does display some information on the top > guilty drivers and modules. It's right on the front page. > I was referring to the ones on oops.kernel.org but I don't know it the site oops.kernel.org can be used in any way... I have the same question, what is the API for it? >> >> After all, if the commitee decides that this topic is viable, I would >> be happy to participate. >> >> I would be happy to continue working on this and leading the discussion if there is enough interest in discussing use of QR code in this process as we *do* have the prototype and the people (Levente and me) if there is support (infrastructure, feedback, etc. ) in adding this upstream. > > I guess the discussion at the KS won't be mostly about QR codes, but > rather how could we get more information on the OOPSes and how to > disseminate them. Obviously, QR codes can play a huge part in this if > we manage to make them as least demanding as possible. Again, I'd like > to express my opinion on forcing the user to download an app just to > parse an oops is less than ideal. I still strongly support going for > a URL and a baseXX encoded approach. Obviously, there are problems > with this way as well, but this is the way where we lose the least > amount of users IMHO. :-) > > Regarding your comment that base64 adds 33% overhead. If we manage to > shrink the size of the OOPS, i.e. remove registers, and some other > stuff, then that may compensate for the overhead b64 adds. There > is a subthread that discusses this. Thanks, Teodora ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 16:07 ` Theodore Ts'o 2014-05-13 17:43 ` Levente Kurusa @ 2014-05-14 1:14 ` Josh Boyer 2014-05-15 17:01 ` Levente Kurusa 2014-05-15 5:41 ` PJ Waskiewicz 2014-05-15 19:24 ` H. Peter Anvin 3 siblings, 1 reply; 75+ messages in thread From: Josh Boyer @ 2014-05-14 1:14 UTC (permalink / raw) To: Theodore Ts'o Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper, Sarah A Sharp On Tue, May 13, 2014 at 12:07 PM, Theodore Ts'o <tytso@mit.edu> wrote: > I'll note this discussion has started mutating to a more general "how > do we get more useful bug reports in front of developers", which I > think is a good thing. Yes, agreed. > However, I'm still not sure how useful it would be to have a tech > topic (or a core topic) dedicated to the matter, because we've had > discussions about and at the end of the day, what's probably really > necessary is to have someone, or a small team, dedicated all or most > of their time to: > > a) improving kerneloops.org > b) finding interesting patterns in the bulk reported data, and then > forwarding that on to developers > c) finding ways of automating (b) I think that's not really the full answer. Having that setup would certainly be beneficial, but it ignores the time delay required to both 1) actually get kernel releases to large numbers of users, and 2) find said interesting patterns. The number of users testing the latest kernel release is certainly more today than ever, but the bulk of users are still using distro kernels. Even with Fedora, Arch, and other distros rebasing rather quickly, we are still looking at that kernel release hitting the user base after the merge window is closed for the next version already (N+1). That means the upstream kernel developers are off developing for the release after (N+2). So if a large number of users starts hitting bugs in version N, and the upstream developers are already working on changes for N+2, waiting for interesting patterns to develop is actually increasing the "cost" to the developers to go back and look at code they did 2 releases ago. The typical response is "does this recreate on Linus' latest tree or some subsystem git tree", which is N+1 in this case. It's a fair request from a developer's perspective, but it's not as simple for an end user or distro. Often times they'll try N+1 and hit a different bug on their system, making it even more confusing to try and work the original report to conclusion. (That appears to be Dave Jones' life in a nutshell with trinity reports at the moment, so it's not just Aunt Tillie either.) Often times the bugs are still in N+1 as well, so it's certainly helpful to report either way. The areas where we tend to see this problem aren't in core MM or VFS code, but more in things like backlights, GPU drivers, wireless drivers, etc. These aren't trivial areas to debug or git bisect (which is a nightmare to work and end user through). They are also the same areas where we depend on end-user testing and reporting because of the huge amount of variability in the hardware itself. E.g. a change to fix something in i915 on one machine/chipset seems to inevitably break a different machine/chipset. I realize QR codes, kerneloops.org, and things of that nature aren't going to solve this problem. That's kind of why I'd like to see it discussed more broadly, and not assume that it can be automated away. I'm just concerned that the rate of development today is outpacing our ability to get the releases into user's hands and get valid and useful bug reports from them. josh ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-14 1:14 ` Josh Boyer @ 2014-05-15 17:01 ` Levente Kurusa 2014-05-15 17:11 ` Josh Boyer 0 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-15 17:01 UTC (permalink / raw) To: Josh Boyer Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp, Jason Cooper [-- Attachment #1: Type: text/plain, Size: 4829 bytes --] Hi, On Tue, May 13, 2014 at 09:14:48PM -0400, Josh Boyer wrote: > On Tue, May 13, 2014 at 12:07 PM, Theodore Ts'o <tytso@mit.edu> wrote: > > I'll note this discussion has started mutating to a more general "how > > do we get more useful bug reports in front of developers", which I > > think is a good thing. > > Yes, agreed. > > > However, I'm still not sure how useful it would be to have a tech > > topic (or a core topic) dedicated to the matter, because we've had > > discussions about and at the end of the day, what's probably really > > necessary is to have someone, or a small team, dedicated all or most > > of their time to: > > > > a) improving kerneloops.org > > b) finding interesting patterns in the bulk reported data, and then > > forwarding that on to developers > > c) finding ways of automating (b) > > I think that's not really the full answer. Having that setup would > certainly be beneficial, but it ignores the time delay required to > both 1) actually get kernel releases to large numbers of users, and 2) > find said interesting patterns. > > The number of users testing the latest kernel release is certainly > more today than ever, but the bulk of users are still using distro > kernels. Even with Fedora, Arch, and other distros rebasing rather > quickly, we are still looking at that kernel release hitting the user > base after the merge window is closed for the next version already > (N+1). That means the upstream kernel developers are off developing > for the release after (N+2). > > So if a large number of users starts hitting bugs in version N, and > the upstream developers are already working on changes for N+2, > waiting for interesting patterns to develop is actually increasing the > "cost" to the developers to go back and look at code they did 2 > releases ago. The typical response is "does this recreate on Linus' > latest tree or some subsystem git tree", which is N+1 in this case. > It's a fair request from a developer's perspective, but it's not as > simple for an end user or distro. Often times they'll try N+1 and hit > a different bug on their system, making it even more confusing to try > and work the original report to conclusion. (That appears to be Dave > Jones' life in a nutshell with trinity reports at the moment, so it's > not just Aunt Tillie either.) > > Often times the bugs are still in N+1 as well, so it's certainly > helpful to report either way. The areas where we tend to see this > problem aren't in core MM or VFS code, but more in things like > backlights, GPU drivers, wireless drivers, etc. These aren't trivial > areas to debug or git bisect (which is a nightmare to work and end > user through). They are also the same areas where we depend on > end-user testing and reporting because of the huge amount of > variability in the hardware itself. E.g. a change to fix something in > i915 on one machine/chipset seems to inevitably break a different > machine/chipset. One thing I would add is if a user actually reports a bug on Bugzilla often times they are able to do a git bisect. What I have observed is that less tech-savvy people don't even bother with trying to report the bug nor they would try to do anything to fix it if the bug isn't that fatal. Of course, ABRT and the like has improved the number of quality bug reports, but there still exists a number of fatal bugs that with which we remain less informed. Naturally a question arises. How could get technically not-so-capable people to report bugs? I guess QR codes have become so mainstream nowadays, that they can provide a solution. What I see nowadays is that when people see a QR code, they almost automatically try to scan it. Not to mention when they have nothing else to do as with a kernel crash. :-) > > I realize QR codes, kerneloops.org, and things of that nature aren't > going to solve this problem. That's kind of why I'd like to see it > discussed more broadly, and not assume that it can be automated away. > I'm just concerned that the rate of development today is outpacing our > ability to get the releases into user's hands and get valid and useful > bug reports from them. Indeed, by the time the people's favourite distro rebases, we are already working on a new release. This mostly does not tend to be a very bad delay with bleeding-edge distros like Arch and Fedora, but what I am concerned of is what happens with the conservative distros like Debian. AFAIK, the latest version of Debian is still shipping the 3.2 stable kernel. If we start receiving reports from the 3.2 kernel, which is N-13 at the moment, then chances are the reports are less useless, since the subsystems have evolved so much since 3.2. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 17:01 ` Levente Kurusa @ 2014-05-15 17:11 ` Josh Boyer 2014-05-17 15:02 ` Levente Kurusa 0 siblings, 1 reply; 75+ messages in thread From: Josh Boyer @ 2014-05-15 17:11 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Sarah A Sharp, Dirk Hohndel On Thu, May 15, 2014 at 1:01 PM, Levente Kurusa <levex@linux.com> wrote: > Hi, > > On Tue, May 13, 2014 at 09:14:48PM -0400, Josh Boyer wrote: >> On Tue, May 13, 2014 at 12:07 PM, Theodore Ts'o <tytso@mit.edu> wrote: >> > I'll note this discussion has started mutating to a more general "how >> > do we get more useful bug reports in front of developers", which I >> > think is a good thing. >> >> Yes, agreed. >> >> > However, I'm still not sure how useful it would be to have a tech >> > topic (or a core topic) dedicated to the matter, because we've had >> > discussions about and at the end of the day, what's probably really >> > necessary is to have someone, or a small team, dedicated all or most >> > of their time to: >> > >> > a) improving kerneloops.org >> > b) finding interesting patterns in the bulk reported data, and then >> > forwarding that on to developers >> > c) finding ways of automating (b) >> >> I think that's not really the full answer. Having that setup would >> certainly be beneficial, but it ignores the time delay required to >> both 1) actually get kernel releases to large numbers of users, and 2) >> find said interesting patterns. >> >> The number of users testing the latest kernel release is certainly >> more today than ever, but the bulk of users are still using distro >> kernels. Even with Fedora, Arch, and other distros rebasing rather >> quickly, we are still looking at that kernel release hitting the user >> base after the merge window is closed for the next version already >> (N+1). That means the upstream kernel developers are off developing >> for the release after (N+2). >> >> So if a large number of users starts hitting bugs in version N, and >> the upstream developers are already working on changes for N+2, >> waiting for interesting patterns to develop is actually increasing the >> "cost" to the developers to go back and look at code they did 2 >> releases ago. The typical response is "does this recreate on Linus' >> latest tree or some subsystem git tree", which is N+1 in this case. >> It's a fair request from a developer's perspective, but it's not as >> simple for an end user or distro. Often times they'll try N+1 and hit >> a different bug on their system, making it even more confusing to try >> and work the original report to conclusion. (That appears to be Dave >> Jones' life in a nutshell with trinity reports at the moment, so it's >> not just Aunt Tillie either.) >> >> Often times the bugs are still in N+1 as well, so it's certainly >> helpful to report either way. The areas where we tend to see this >> problem aren't in core MM or VFS code, but more in things like >> backlights, GPU drivers, wireless drivers, etc. These aren't trivial >> areas to debug or git bisect (which is a nightmare to work and end >> user through). They are also the same areas where we depend on >> end-user testing and reporting because of the huge amount of >> variability in the hardware itself. E.g. a change to fix something in >> i915 on one machine/chipset seems to inevitably break a different >> machine/chipset. > > One thing I would add is if a user actually reports a bug on Bugzilla > often times they are able to do a git bisect. What I have observed is > that less tech-savvy people don't even bother with trying to report > the bug nor they would try to do anything to fix it if the bug isn't > that fatal. Of course, ABRT and the like has improved the number of > quality bug reports, but there still exists a number of fatal bugs > that with which we remain less informed. Working daily in Fedora bugzilla would lead me to politely disagree with you. Or perhaps note that ABRT is leading to more bug reports, but less technically inclined users that find bisect confusing. Even some of the more technically inclined users tend to ask for pre-built RPMs for bisect purposes, which isn't particularly easy. > Naturally a question arises. How could get technically not-so-capable > people to report bugs? I guess QR codes have become so mainstream > nowadays, that they can provide a solution. What I see nowadays is Maybe. I've yet to see people actually use QR codes for anything, but the technology certainly exists. > that when people see a QR code, they almost automatically try to scan > it. Not to mention when they have nothing else to do as with a kernel > crash. :-) We live in amazingly different worlds. Anyway, my side discussion was not intended to discourage the QR code progress. By all means, those interested should pursue that because anything helps. >> I realize QR codes, kerneloops.org, and things of that nature aren't >> going to solve this problem. That's kind of why I'd like to see it >> discussed more broadly, and not assume that it can be automated away. >> I'm just concerned that the rate of development today is outpacing our >> ability to get the releases into user's hands and get valid and useful >> bug reports from them. > > Indeed, by the time the people's favourite distro rebases, we are > already working on a new release. This mostly does not tend to be > a very bad delay with bleeding-edge distros like Arch and Fedora, > but what I am concerned of is what happens with the conservative > distros like Debian. AFAIK, the latest version of Debian is still > shipping the 3.2 stable kernel. If we start receiving reports from the > 3.2 kernel, which is N-13 at the moment, then chances are the reports > are less useless, since the subsystems have evolved so much since 3.2. Right. Debian is probably the "worst" case scenario here, because they use a very old kernel but aren't in the same position as the other users of old kernels, which are the big Enterprise vendors. The EL kernels have lots of staff to deal with this problem, so I'm kind of excluding them from this aspect of the conversation, but Debian is certainly impacted. josh ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 17:11 ` Josh Boyer @ 2014-05-17 15:02 ` Levente Kurusa 0 siblings, 0 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-17 15:02 UTC (permalink / raw) To: Josh Boyer Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Sarah A Sharp, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 7129 bytes --] Hi, On 05/15/2014 07:11 PM, Josh Boyer wrote: > On Thu, May 15, 2014 at 1:01 PM, Levente Kurusa <levex@linux.com> wrote: >> Hi, >> >> On Tue, May 13, 2014 at 09:14:48PM -0400, Josh Boyer wrote: >>> On Tue, May 13, 2014 at 12:07 PM, Theodore Ts'o <tytso@mit.edu> wrote: >>>> I'll note this discussion has started mutating to a more general "how >>>> do we get more useful bug reports in front of developers", which I >>>> think is a good thing. >>> >>> Yes, agreed. >>> >>>> However, I'm still not sure how useful it would be to have a tech >>>> topic (or a core topic) dedicated to the matter, because we've had >>>> discussions about and at the end of the day, what's probably really >>>> necessary is to have someone, or a small team, dedicated all or most >>>> of their time to: >>>> >>>> a) improving kerneloops.org >>>> b) finding interesting patterns in the bulk reported data, and then >>>> forwarding that on to developers >>>> c) finding ways of automating (b) >>> >>> I think that's not really the full answer. Having that setup would >>> certainly be beneficial, but it ignores the time delay required to >>> both 1) actually get kernel releases to large numbers of users, and 2) >>> find said interesting patterns. >>> >>> The number of users testing the latest kernel release is certainly >>> more today than ever, but the bulk of users are still using distro >>> kernels. Even with Fedora, Arch, and other distros rebasing rather >>> quickly, we are still looking at that kernel release hitting the user >>> base after the merge window is closed for the next version already >>> (N+1). That means the upstream kernel developers are off developing >>> for the release after (N+2). >>> >>> So if a large number of users starts hitting bugs in version N, and >>> the upstream developers are already working on changes for N+2, >>> waiting for interesting patterns to develop is actually increasing the >>> "cost" to the developers to go back and look at code they did 2 >>> releases ago. The typical response is "does this recreate on Linus' >>> latest tree or some subsystem git tree", which is N+1 in this case. >>> It's a fair request from a developer's perspective, but it's not as >>> simple for an end user or distro. Often times they'll try N+1 and hit >>> a different bug on their system, making it even more confusing to try >>> and work the original report to conclusion. (That appears to be Dave >>> Jones' life in a nutshell with trinity reports at the moment, so it's >>> not just Aunt Tillie either.) >>> >>> Often times the bugs are still in N+1 as well, so it's certainly >>> helpful to report either way. The areas where we tend to see this >>> problem aren't in core MM or VFS code, but more in things like >>> backlights, GPU drivers, wireless drivers, etc. These aren't trivial >>> areas to debug or git bisect (which is a nightmare to work and end >>> user through). They are also the same areas where we depend on >>> end-user testing and reporting because of the huge amount of >>> variability in the hardware itself. E.g. a change to fix something in >>> i915 on one machine/chipset seems to inevitably break a different >>> machine/chipset. >> >> One thing I would add is if a user actually reports a bug on Bugzilla >> often times they are able to do a git bisect. What I have observed is >> that less tech-savvy people don't even bother with trying to report >> the bug nor they would try to do anything to fix it if the bug isn't >> that fatal. Of course, ABRT and the like has improved the number of >> quality bug reports, but there still exists a number of fatal bugs >> that with which we remain less informed. > > Working daily in Fedora bugzilla would lead me to politely disagree > with you. Or perhaps note that ABRT is leading to more bug reports, > but less technically inclined users that find bisect confusing. Even > some of the more technically inclined users tend to ask for pre-built > RPMs for bisect purposes, which isn't particularly easy. I guess that more critical issues are reported by more people and chances are there is at least one who is capable enough to do a bisect. Less critical issues might go un-bisected, but I guess that is what people call 'collateral damage'. > >> Naturally a question arises. How could get technically not-so-capable >> people to report bugs? I guess QR codes have become so mainstream >> nowadays, that they can provide a solution. What I see nowadays is > > Maybe. I've yet to see people actually use QR codes for anything, but > the technology certainly exists. Well, here in Hungary, these QR codes started to in quite a few places. Today, I saw it on a restaurant's menu, and it forwarded me to a link where I could see the particular food from any viewpoint. It also appeared on the back of vehicles, on TV commercials and a lot of other places. > >> that when people see a QR code, they almost automatically try to scan >> it. Not to mention when they have nothing else to do as with a kernel >> crash. :-) > > We live in amazingly different worlds. It could be that I am surrounded by tech-savvy people, but it's certainly getting mainstream. > > Anyway, my side discussion was not intended to discourage the QR code > progress. By all means, those interested should pursue that because > anything helps. Right. > >>> I realize QR codes, kerneloops.org, and things of that nature aren't >>> going to solve this problem. That's kind of why I'd like to see it >>> discussed more broadly, and not assume that it can be automated away. >>> I'm just concerned that the rate of development today is outpacing our >>> ability to get the releases into user's hands and get valid and useful >>> bug reports from them. >> >> Indeed, by the time the people's favourite distro rebases, we are >> already working on a new release. This mostly does not tend to be >> a very bad delay with bleeding-edge distros like Arch and Fedora, >> but what I am concerned of is what happens with the conservative >> distros like Debian. AFAIK, the latest version of Debian is still >> shipping the 3.2 stable kernel. If we start receiving reports from the >> 3.2 kernel, which is N-13 at the moment, then chances are the reports >> are less useless, since the subsystems have evolved so much since 3.2. > > Right. Debian is probably the "worst" case scenario here, because > they use a very old kernel but aren't in the same position as the > other users of old kernels, which are the big Enterprise vendors. The > EL kernels have lots of staff to deal with this problem, so I'm kind > of excluding them from this aspect of the conversation, but Debian is > certainly impacted. ... and this won't be fixed by QR codes or anything that reports bugs I guess, since those reports might be only useful to the stable maintainers. Other maintainers can not be made to remember their code in a way that allows triaging bugs in version N-13 or so... Thanks, Levente Kurusa [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 555 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 16:07 ` Theodore Ts'o 2014-05-13 17:43 ` Levente Kurusa 2014-05-14 1:14 ` Josh Boyer @ 2014-05-15 5:41 ` PJ Waskiewicz 2014-05-15 15:41 ` Theodore Ts'o 2014-05-15 19:24 ` H. Peter Anvin 3 siblings, 1 reply; 75+ messages in thread From: PJ Waskiewicz @ 2014-05-15 5:41 UTC (permalink / raw) To: Theodore Ts'o Cc: Josh Boyer, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper, Sarah A Sharp Hi Ted, On Tue, May 13, 2014 at 9:07 AM, Theodore Ts'o <tytso@mit.edu> wrote: > I'll note this discussion has started mutating to a more general "how > do we get more useful bug reports in front of developers", which I > think is a good thing. > > However, I'm still not sure how useful it would be to have a tech > topic (or a core topic) dedicated to the matter, because we've had > discussions about and at the end of the day, what's probably really > necessary is to have someone, or a small team, dedicated all or most > of their time to: > > a) improving kerneloops.org > b) finding interesting patterns in the bulk reported data, and then > forwarding that on to developers > c) finding ways of automating (b) > > QR encoded oops might be a means towards that end, but there might be > other things that could be done as well. > > If someone were to *do* all of this work, then reporting on it and > then asking for suggestions about how this service could be improved, > might make a great tech topic. This is where I disagree. Looking at this thread alone (outside of the technical discussion itself), many people have different views of how b) and c) above should be done. Having a person or team of folks go off and build this, or rather their view and interpretation of how to build this, will undoubtedly get pulled to pieces at KS because of the differing views. A better use of everyone's time, core kernel dev's and people working on a) - c), would be to hash out the details of *what* this should look like, what kernel dev's *want* and *don't want.* Also, a big part of the original thought to having this topic at KS is to get all the right players in one spot, from kernel dev, kernel.org infrastructure, etc. The *how* in building this reporting framework isn't hard, it's the *what* that needs to be hammered out. And for something like the QR encoded oops project, it seems to be a missed opportunity to put it in the kernel, but have no usable framework to make full use of it. That's the point of the discussion we're asking for, is to make sure it *will* be useful and give all the people who want to see this have a say in how it should be built. I really don't think that type of discussion would be terribly effective or efficient via email. And let's be fair, I've seen a number of tech topics at previous KS's that were more proposals of ideas, looking for design direction and the like. I don't see how this is any different. However, I completely agree that the implementation discussion of how to do the QR encoding, etc., should be kept to the mailing lists. And if this topic is included at KS, then I see no reason that the participants and leader of the discussion couldn't keep the discussion on-topic. Is it really that hard? Based on the pretty large interest in putting this framework together (based on this thread alone), I really think this would be a very useful topic to include at KS this year. Cheers, -PJ Waskiewicz ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 5:41 ` PJ Waskiewicz @ 2014-05-15 15:41 ` Theodore Ts'o 2014-05-17 16:36 ` Levente Kurusa 0 siblings, 1 reply; 75+ messages in thread From: Theodore Ts'o @ 2014-05-15 15:41 UTC (permalink / raw) To: PJ Waskiewicz Cc: Josh Boyer, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper, Sarah A Sharp On Wed, May 14, 2014 at 10:41:10PM -0700, PJ Waskiewicz wrote: > Also, a big part of the original thought to having this topic at KS is > to get all the right players in one spot, from kernel dev, kernel.org > infrastructure, etc. The *how* in building this reporting framework > isn't hard, it's the *what* that needs to be hammered out. And for > something like the QR encoded oops project, it seems to be a missed > opportunity to put it in the kernel, but have no usable framework to > make full use of it. That's the point of the discussion we're asking > for, is to make sure it *will* be useful and give all the people who > want to see this have a say in how it should be built. I really don't > think that type of discussion would be terribly effective or efficient > via email. I guess I didn't make myself clear. I agree that the *how* things should be built is better done via e-mail, or better yet, by the person actually doing the work. What I'm trying to push on is whether we've identified *who* will do all of this work. Not just the QR encoding patches, but all of the associated work that is being proposed in this thread. - Ted ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 15:41 ` Theodore Ts'o @ 2014-05-17 16:36 ` Levente Kurusa 2014-05-20 14:47 ` Theodore Ts'o 0 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-17 16:36 UTC (permalink / raw) To: Theodore Ts'o, PJ Waskiewicz Cc: Josh Boyer, Sarah A Sharp, ksummit-discuss, Anton Arapov, Jason Cooper, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 2160 bytes --] Hi Ted, On 05/15/2014 05:41 PM, Theodore Ts'o wrote: > On Wed, May 14, 2014 at 10:41:10PM -0700, PJ Waskiewicz wrote: >> Also, a big part of the original thought to having this topic at KS is >> to get all the right players in one spot, from kernel dev, kernel.org >> infrastructure, etc. The *how* in building this reporting framework >> isn't hard, it's the *what* that needs to be hammered out. And for >> something like the QR encoded oops project, it seems to be a missed >> opportunity to put it in the kernel, but have no usable framework to >> make full use of it. That's the point of the discussion we're asking >> for, is to make sure it *will* be useful and give all the people who >> want to see this have a say in how it should be built. I really don't >> think that type of discussion would be terribly effective or efficient >> via email. > > I guess I didn't make myself clear. I agree that the *how* things > should be built is better done via e-mail, or better yet, by the > person actually doing the work. What I'm trying to push on is whether > we've identified *who* will do all of this work. Not just the QR > encoding patches, but all of the associated work that is being > proposed in this thread. Of course we did identify the team. It's me and Teodora. For this QR encoding work we need a lot of framework work and while at it we could also tie up some loose ends in the error reporting workflow. I, for myself, would love to clean up Bugzilla a bit. It has a lot of open bugs that have been fixed for ages, just for example. And, as PJ pointed out, we need to discuss what to do, the how in this question is pretty much optional and can be later discussed in emails, but I think that discussing what to do by emails when we have a great opportunity to discuss this at the summit would sound like a waste of time. The topic wouldn't be just about QR codes, but more widely about the error reporting workflow and how it could reach more users, and how could it provide more information that can help triaging even very old bugs, as in Debian's case. Thanks, Levente Kurusa. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 555 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-17 16:36 ` Levente Kurusa @ 2014-05-20 14:47 ` Theodore Ts'o 2014-05-21 18:03 ` Levente Kurusa 0 siblings, 1 reply; 75+ messages in thread From: Theodore Ts'o @ 2014-05-20 14:47 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp, Jason Cooper On Sat, May 17, 2014 at 06:36:50PM +0200, Levente Kurusa wrote: > > Of course we did identify the team. It's me and Teodora. For this QR > encoding work we need a lot of framework work and while at it we could > also tie up some loose ends in the error reporting workflow. I, for > myself, would love to clean up Bugzilla a bit. It has a lot of open bugs > that have been fixed for ages, just for example. Just to be clear, since my understanding is that you are university students --- your primary goal is to clean up the QR encoding work, yes? Do you anticipate having time to talk about working on some of the larger, grander suggestions that some people have raised on this thread? That is, some kind of web backend to for which these QR's could be submitted and then analyzed? Or is what you plan to be focusing on is more tightly focused on the the actual generation of the QR barcode? What help would you need in order to bring the use of the QR barcode to its fullest potential? Regards, - Ted ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-20 14:47 ` Theodore Ts'o @ 2014-05-21 18:03 ` Levente Kurusa 2014-05-25 19:49 ` Teodora Băluţă 0 siblings, 1 reply; 75+ messages in thread From: Levente Kurusa @ 2014-05-21 18:03 UTC (permalink / raw) To: Theodore Ts'o Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, Kernel Summit Discussion List, Anton Arapov, Sarah A Sharp, Jason Cooper Hi Ted, 2014-05-20 16:47 GMT+02:00 Theodore Ts'o <tytso@mit.edu>: > On Sat, May 17, 2014 at 06:36:50PM +0200, Levente Kurusa wrote: >> >> Of course we did identify the team. It's me and Teodora. For this QR >> encoding work we need a lot of framework work and while at it we could >> also tie up some loose ends in the error reporting workflow. I, for >> myself, would love to clean up Bugzilla a bit. It has a lot of open bugs >> that have been fixed for ages, just for example. > > Just to be clear, since my understanding is that you are university > students --- your primary goal is to clean up the QR encoding work, > yes? Do you anticipate having time to talk about working on some of > the larger, grander suggestions that some people have raised on this > thread? That is, some kind of web backend to for which these QR's > could be submitted and then analyzed? At first, yes, my primary goal is to clean up the library that we currently use. We still need to remove a lot of unused crap from the library and make it behave nicer as in resource usage as well... Regarding the web-backend. I think Teodora has already started working on something like that, but she might be working on the Android app she proposed earlier. Yes I realize that encoding the oops as a QR code is just a part of what we really need in order to bring it to its fullest. And I for sure can say I'll have time to work on the suggestions. I talked with Teodora about this and she is having her finals, but after that I guess she will join me on this journey. > Or is what you plan to be focusing on is more tightly focused on the > the actual generation of the QR barcode? What help would you need in > order to bring the use of the QR barcode to its fullest potential? No not just the generation. I as a user don't at all find reporting kernel bugs a pleasure. My goal (and I think Teodora's as well) is to make it better. In the process we would need to clean up stuff that has gotten rusty over the years. What we ask for is a discussion, so that we know what work is needed to be done and what suggestions people have for us. Thanks, Levente Kurusa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-21 18:03 ` Levente Kurusa @ 2014-05-25 19:49 ` Teodora Băluţă 0 siblings, 0 replies; 75+ messages in thread From: Teodora Băluţă @ 2014-05-25 19:49 UTC (permalink / raw) To: Levente Kurusa Cc: PJ Waskiewicz, Josh Boyer, Dirk Hohndel, Kernel Summit Discussion List, Anton Arapov, Dragos Foianu, Sarah A Sharp, Jason Cooper Hi, > 2014-05-20 16:47 GMT+02:00 Theodore Ts'o <tytso@mit.edu>: >> On Sat, May 17, 2014 at 06:36:50PM +0200, Levente Kurusa wrote: >>> >>> Of course we did identify the team. It's me and Teodora. For this QR >>> encoding work we need a lot of framework work and while at it we could >>> also tie up some loose ends in the error reporting workflow. I, for >>> myself, would love to clean up Bugzilla a bit. It has a lot of open bugs >>> that have been fixed for ages, just for example. >> >> Just to be clear, since my understanding is that you are university >> students --- your primary goal is to clean up the QR encoding work, >> yes? Do you anticipate having time to talk about working on some of >> the larger, grander suggestions that some people have raised on this >> thread? That is, some kind of web backend to for which these QR's >> could be submitted and then analyzed? > > At first, yes, my primary goal is to clean up the library that we currently > use. We still need to remove a lot of unused crap from the library and > make it behave nicer as in resource usage as well... Regarding the > web-backend. I think Teodora has already started working on something > like that, but she might be working on the Android app she proposed earlier. As a final project for one of my courses we had to implement an Android app of and since it was open-source and free of choice I chose to work on something related to the QR/reporting bugs (killing two birds with one stone). It was a two-person team project (added friend I worked with at cc) It is a prototype that includes a simple Android app and a web server. Basically scan the QR and then send it to the web server or email it. You may checkout the code at https://github.com/PDSD-2014/baluta-foianu. I will migrate the project to my repository soon (now it's it our course's repo). > > Yes I realize that encoding the oops as a QR code is just a part of what > we really need in order to bring it to its fullest. And I for sure can say I'll > have time to work on the suggestions. I talked with Teodora about this and > she is having her finals, but after that I guess she will join me on this > journey. Yes, finals are fun!... part of the reason I didn't reply for so long... I have my last exam next Tuesday. I will be working on my graduation project up to the end of June so I can't work full-time on this, but I can surely make time and would love to get this up and running. > >> Or is what you plan to be focusing on is more tightly focused on the >> the actual generation of the QR barcode? What help would you need in >> order to bring the use of the QR barcode to its fullest potential? > > No not just the generation. I as a user don't at all find reporting kernel bugs > a pleasure. My goal (and I think Teodora's as well) is to make it better. In the > process we would need to clean up stuff that has gotten rusty over the years. > > What we ask for is a discussion, so that we know what work is needed to > be done and what suggestions people have for us. > I agree. It is always important to know what you want to improve from different people/perspectives, prioritize and then implement them. When discussing via email implementation details may become predominant but actually a discussion on what is our main focus and compromising is better done in person imho. Thanks, Teodora ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 16:07 ` Theodore Ts'o ` (2 preceding siblings ...) 2014-05-15 5:41 ` PJ Waskiewicz @ 2014-05-15 19:24 ` H. Peter Anvin 2014-05-15 21:13 ` Levente Kurusa 3 siblings, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-15 19:24 UTC (permalink / raw) To: Theodore Ts'o, Josh Boyer Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Jason Cooper, Dirk Hohndel On 05/13/2014 09:07 AM, Theodore Ts'o wrote: > I'll note this discussion has started mutating to a more general "how > do we get more useful bug reports in front of developers", which I > think is a good thing. > > However, I'm still not sure how useful it would be to have a tech > topic (or a core topic) dedicated to the matter, because we've had > discussions about and at the end of the day, what's probably really > necessary is to have someone, or a small team, dedicated all or most > of their time to: > > a) improving kerneloops.org > b) finding interesting patterns in the bulk reported data, and then > forwarding that on to developers > c) finding ways of automating (b) > > QR encoded oops might be a means towards that end, but there might be > other things that could be done as well. > > If someone were to *do* all of this work, then reporting on it and > then asking for suggestions about how this service could be improved, > might make a great tech topic. > > But in the absence of that, can folks suggest ways that this doesn't > turn into a "I know, let's put a bell on the cat!" sort of discussion > that doesn't lead to anything useful? > A workflow discussion for gathering fault information in general *might* be useful, but I'm not sure we have the right people for it. As far as I understand, kerneloops.org pretty much lost its usefulness when Fedora (and other distros?) stopped participating and redirected to their own internal sites. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-15 19:24 ` H. Peter Anvin @ 2014-05-15 21:13 ` Levente Kurusa 0 siblings, 0 replies; 75+ messages in thread From: Levente Kurusa @ 2014-05-15 21:13 UTC (permalink / raw) To: H. Peter Anvin, Josh Boyer Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel, Jason Cooper [-- Attachment #1: Type: text/plain, Size: 2403 bytes --] Hi, On Thu, May 15, 2014 at 12:24:22PM -0700, H. Peter Anvin wrote: > On 05/13/2014 09:07 AM, Theodore Ts'o wrote: > > I'll note this discussion has started mutating to a more general "how > > do we get more useful bug reports in front of developers", which I > > think is a good thing. > > > > However, I'm still not sure how useful it would be to have a tech > > topic (or a core topic) dedicated to the matter, because we've had > > discussions about and at the end of the day, what's probably really > > necessary is to have someone, or a small team, dedicated all or most > > of their time to: > > > > a) improving kerneloops.org > > b) finding interesting patterns in the bulk reported data, and then > > forwarding that on to developers > > c) finding ways of automating (b) > > > > QR encoded oops might be a means towards that end, but there might be > > other things that could be done as well. > > > > If someone were to *do* all of this work, then reporting on it and > > then asking for suggestions about how this service could be improved, > > might make a great tech topic. > > > > But in the absence of that, can folks suggest ways that this doesn't > > turn into a "I know, let's put a bell on the cat!" sort of discussion > > that doesn't lead to anything useful? > > > > A workflow discussion for gathering fault information in general *might* > be useful, but I'm not sure we have the right people for it. As far as > I understand, kerneloops.org pretty much lost its usefulness when Fedora > (and other distros?) stopped participating and redirected to their own > internal sites. Looking at oops.kernel.org, one of the top guilties is Fedora. Also, looking at the ABRT FAQ it still seems to send the OOPSes to the site. So, I guess Fedora didn't stop sending them. But maybe, Josh knows better? I am not sure if the site has lost any of its usefulness. It still has a DB of ~4K oopses in May already. What I think is the problem, is that maintainers barely look at it. I think there are numerous reasons behind that, and I see a lot of improvements could be made there. Regarding the wrong people. While we could not be the best people to discuss this with, we are the ones, at least I am, who are *willing* to do some work on the core error reporting and gathering parts of the kernel. Thanks, Levente Kurusa [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-13 15:51 ` Sarah A Sharp 2014-05-13 15:59 ` Josh Boyer @ 2014-05-13 16:03 ` Greg KH 1 sibling, 0 replies; 75+ messages in thread From: Greg KH @ 2014-05-13 16:03 UTC (permalink / raw) To: Sarah A Sharp Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Dirk Hohndel On Tue, May 13, 2014 at 08:51:36AM -0700, Sarah A Sharp wrote: > On Tue, May 13, 2014 at 8:05 AM, Greg KH <greg@kroah.com> wrote: > > On Tue, May 13, 2014 at 07:41:15AM -0700, Sarah A Sharp wrote: > >> On Tue, May 13, 2014 at 4:25 AM, Greg KH <greg@kroah.com> wrote: > >> > On Mon, May 12, 2014 at 08:50:27PM +0300, Teodora Băluţă wrote: > >> >> On Mon, May 12, 2014 at 8:09 PM, H. Peter Anvin <hpa@zytor.com> wrote: > >> >> > On 05/12/2014 09:49 AM, Levente Kurusa wrote: > >> >> >> > >> >> >> What I wonder is how could we get the server back-end to not allow > >> >> >> the same oopses from bad users. > >> >> >> > >> >> >> Having a link like: > >> >> >> > >> >> >> oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA > >> >> >> > >> >> >> would mean that malicious users could edit the $ENTROPY part and > >> >> >> hence effectively report the same oops twice. Maybe some checksum? > >> >> >> Or will it be too much for an already damaged kernel? > >> >> >> > >> >> > > >> >> > What did the old kerneloops system do for these kinds of things? > >> >> > > >> >> > Again, I'm concerned that a KS session for this will turn into an > >> >> > implementation discussion, which is better done by email. > >> >> > >> >> Well, the discussion got a bit technical, but as Josh said, I see no > >> >> point in doing that sort of talk (for technical discussion there's > >> >> always the RFC thread [0]). I think what would be of interest is the > >> >> way the workflow changes and the infrastructure you need to maintain. > >> >> For example, at the moment, can you actually send an Oops directly to > >> >> kernel.org by posting it in a query? > >> > > >> > That is what the kerneloops.org site is for, please use that for stuff > >> > like "automated oops reports", not bugzilla.kernel.org, as that is not > >> > going to work at all. > >> > >> It's clear that by default, any oops reported through the QR code > >> generator should be reported to kerneloops.org. Do you think there's > >> additional value in *optionally* allowing someone to file a bugzilla > >> report against that oops, or do you think there's no value in using > >> bugzilla.kernel.org at all for this project? > > > > As I don't use bugzilla for kernel stuff, I really don't recommend it. > > Espcially if it would give a false sense of "I reported it to the > > developers" feeling to users that someone would actually now look at the > > issue. > > And everyone will look at kerneloops.org instead? I did before, yes, because it makes it easy to see what subsystem is having issues, and how many people are hitting the same oops. bugzilla can't do "merges" of reports, so someone is going to have to sit there and manually mark bugs as duplicates. We can't find people do just do basic bugzilla triage today, who is going to do all of that de-duplication? > There are some maintainers (like Bjorn in PCI) that do use bugzilla. > Other maintainers want people to report bugs to the mailing list. > It's confusing to bug reporters to figure out where to report bugs. > > If MAINTAINERS listed either a bugzilla URL or a mailing list email > where bugs should be reported to, that might be helpful to users. Sounds reasonable, add another MAINTAINERS entry field :) > The phone app could use that file from a recent kernel to figure out > whether to allow the user to report the oops to bugzilla.kernel.org or > to create an email to send to the right mailing list (and make sure > it's a plain text email). > > It's these kinds of social aspects of the project that I'd like to see > get discussed at kernel summit. Again, as hpa stated, that will devolved to a technical discussion at KS and not really be productive. Stick to email, we do technical things really well there. thanks, greg k-h ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:49 ` Levente Kurusa 2014-05-12 17:09 ` H. Peter Anvin @ 2014-05-12 17:24 ` Jason Cooper 1 sibling, 0 replies; 75+ messages in thread From: Jason Cooper @ 2014-05-12 17:24 UTC (permalink / raw) To: Levente Kurusa; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov On Mon, May 12, 2014 at 06:49:21PM +0200, Levente Kurusa wrote: > On Mon, May 12, 2014 at 11:53:20AM -0400, Jason Cooper wrote: > > On Sun, May 11, 2014 at 07:18:24PM +0200, Levente Kurusa wrote: ... > > > I guess we should also be careful with the bugzilla. We really don't > > > want propertiary driver crashes added to the bugzilla automatically. > > > > Correct, but the data is still worth recording. > > > > > Nor do we want the same oops added twice, right? > > > > We don't want two bugzilla entries, but we do want to know how many > > times this event has happened. > > > > > How would we differentiate between the two - essentially the same - > > > oopses? > > > > Hmm, oops cookie? hex string of 32/64 bits read off of the entropy > > pool? This would give us an accurate number of events even if a user > > scans multiple times. > > Hmm, I've been wondering about this too. I guess 32 bits are enough to > differentiate between oopses, and adding this to the QR code is > relatively easy as well. I was thinking directly in the oops. Never underestimate the tenacity of a user. You'll get the qr-code scan, _and_ a bug report filed with a grainy picture. > What I wonder is how could we get the server back-end to not > allow the same oopses from bad users. > > Having a link like: > > oops.kernel.org/submit_oops.php?qr=$ENTROPY$BASE64DATA > > would mean that malicious users could edit the $ENTROPY part and > hence effectively report the same oops twice. Maybe some checksum? > Or will it be too much for an already damaged kernel? encoding it in the oops text makes this a lot more difficult. Plus, what is the goal of the attacker in this scenario? thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 16:37 ` Laurent Pinchart 2014-05-11 17:18 ` Levente Kurusa @ 2014-05-11 17:49 ` Sarah A Sharp 1 sibling, 0 replies; 75+ messages in thread From: Sarah A Sharp @ 2014-05-11 17:49 UTC (permalink / raw) To: Laurent Pinchart Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper [-- Attachment #1: Type: text/plain, Size: 2923 bytes --] On May 11, 2014 9:37 AM, "Laurent Pinchart" < laurent.pinchart@ideasonboard.com> wrote: > > On Sunday 11 May 2014 18:29:18 Levente Kurusa wrote: > > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > > > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper wrote: > > > > All, > > > > > > > > I recently came across a patch series attempting to implement encoding > > > > kernel oops into a QR code [1]. The QR code is then dumped to the > > > > > > > > framebuffer. The QR code is a URL of the form: > > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > > > > > > > This proposal is interesting because it fundamentally changes the way > > > > users report bugs to the kernel community. First and foremost, it makes > > > > it much easier. > > > > > > > > 1) oops occurs > > > > 2) user pulls out phone, scans QR code > > > > - at this point, the oops is recorded on the server. Nothing more > > > > is required of the user. > > > > To be precise, most scanners don't automatically open the links > > found in QR codes and hence a tap/click from the user is required. :-) > > > > > > optionally: > > > > > > > > 3) user fills out a minimal web form > > > > - Name > > > > - email address (do you want to receive emails re this oops?) > > > > - what were you doing when it occurred? > > > > - is it repeatable? > > > > > > By "web form", do you mean a new form or something that's part of > > > kerneloops.org? > > > > > > It would be great if we could allow users to open a new > > > bugzilla.kernel.org entry for the oops. I believe Teodora is working > > > on an Android app that could do this. Hopefully it could store > > > information about the person's system, and pre-propagate the bugzilla > > > entry with this information. > > > > Yes, opening a bugzilla entry might be a good idea if the user fills > > out the form. To be honest, I think for that to work we would need to > > clean up bugzilla a bit. I try to do some work there every now and > > then, but nobody is closing the bugs I have fixed... > > > > Not sure about how would we create the bugzilla entry? I mean, which > > section, urgency, etc. how would we decide on those solely based on > > the OOPS? Or should we ask the user to fill it out? > > Filling a complex form on a handheld device can be pretty tedious. A two steps > procedure that would allow entering long text on a real computer could be an > interesting option. It would be interesting to see if the app could use Google voice recognition to fill in the text fields. Even just partially filling out the bugzilla form and allowing it to be edited later would be useful. To be clear: I'm suggesting the bugzilla entry be an *optional* part of the Android app. I suspect that if we automatically uploaded every oops, maintainers would shortly make a mail filter to ignore the reports from bugzilla. Sarah Sharp [-- Attachment #2: Type: text/html, Size: 3981 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 16:29 ` Levente Kurusa 2014-05-11 16:37 ` Laurent Pinchart @ 2014-05-12 10:13 ` Masami Hiramatsu 1 sibling, 0 replies; 75+ messages in thread From: Masami Hiramatsu @ 2014-05-12 10:13 UTC (permalink / raw) To: ksummit-discuss (2014/05/12 1:29), Levente Kurusa wrote: > Hi, > > On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: >> On Sat, May 10, 2014 at 9:14 PM, Jason Cooper <jason@lakedaemon.net> wrote: >>> All, >>> >>> I recently came across a patch series attempting to implement encoding >>> kernel oops into a QR code [1]. The QR code is then dumped to the >>> framebuffer. The QR code is a URL of the form: >>> >>> https://oops.kernel.org/?qr=<base64 compressed oops> >>> >>> This proposal is interesting because it fundamentally changes the way >>> users report bugs to the kernel community. First and foremost, it makes >>> it much easier. >>> >>> 1) oops occurs >>> 2) user pulls out phone, scans QR code >>> - at this point, the oops is recorded on the server. Nothing more >>> is required of the user. >>> > > To be precise, most scanners don't automatically open the links > found in QR codes and hence a tap/click from the user is required. :-) I guess we might need a smartphone application for sending oops to correct server. So, I'd like to suggest following; at step 0, user downloads oops-report application and he/she might sign-up the server with his mail via the application(optional). And at step2, run the app to scan the QR code. The app decodes it and reports to server via user's account (anonymous is ok). :) Thus, they don't need to fill the additional forms. Thank you, -- Masami HIRAMATSU Software Platform Research Dept. Linux Technology Research Center Hitachi, Ltd., Yokohama Research Laboratory E-mail: masami.hiramatsu.pt@hitachi.com ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 15:57 ` Sarah A Sharp 2014-05-11 16:29 ` Levente Kurusa @ 2014-05-12 2:38 ` H. Peter Anvin 2014-05-12 6:13 ` Josh Triplett 2014-05-12 15:46 ` Jason Cooper 2 siblings, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-12 2:38 UTC (permalink / raw) To: Sarah A Sharp, Jason Cooper Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov As valuable as I obviously believe this project is, is there actually anything that warrants discussion at the Kernel Summit? It seems like something to Just Do[TM]. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 2:38 ` H. Peter Anvin @ 2014-05-12 6:13 ` Josh Triplett 2014-05-12 9:23 ` David Woodhouse 0 siblings, 1 reply; 75+ messages in thread From: Josh Triplett @ 2014-05-12 6:13 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Jason Cooper, Sarah A Sharp On Sun, May 11, 2014 at 07:38:14PM -0700, H. Peter Anvin wrote: > As valuable as I obviously believe this project is, is there actually > anything that warrants discussion at the Kernel Summit? It seems like > something to Just Do[TM]. I believe there is actually a key part of this discussion to have at Kernel Summit. We don't need to discuss the technical details of the implementation; we do need to discuss the implications of enabling mass oops-reporting, the infrastructure and information we want to include in codes valid for the next decade or so, the tradeoffs between ease of reporting and value of the reports, some potential approaches to aggregate the date, and similar. - Josh Triplett ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 6:13 ` Josh Triplett @ 2014-05-12 9:23 ` David Woodhouse 2014-05-12 13:48 ` Lukáš Czerner 2014-05-12 16:22 ` Jason Cooper 0 siblings, 2 replies; 75+ messages in thread From: David Woodhouse @ 2014-05-12 9:23 UTC (permalink / raw) To: Josh Triplett Cc: PJ Waskiewicz, Jason Cooper, ksummit-discuss, Anton Arapov, Sarah A Sharp, Dirk Hohndel [-- Attachment #1: Type: text/plain, Size: 1115 bytes --] On Sun, 2014-05-11 at 23:13 -0700, Josh Triplett wrote: > On Sun, May 11, 2014 at 07:38:14PM -0700, H. Peter Anvin wrote: > > As valuable as I obviously believe this project is, is there actually > > anything that warrants discussion at the Kernel Summit? It seems like > > something to Just Do[TM]. > > I believe there is actually a key part of this discussion to have at > Kernel Summit. We don't need to discuss the technical details of the > implementation; we do need to discuss the implications of enabling mass > oops-reporting, the infrastructure and information we want to include in > codes valid for the next decade or so, the tradeoffs between ease of > reporting and value of the reports, some potential approaches to > aggregate the date, and similar. In particular, can we avoid the silly trap of the ---[cut here]--- which comes between a kernel oops, and the potentially useful messages that were printed right before it. -- David Woodhouse Open Source Technology Centre David.Woodhouse@intel.com Intel Corporation [-- Attachment #2: smime.p7s --] [-- Type: application/x-pkcs7-signature, Size: 5745 bytes --] ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 9:23 ` David Woodhouse @ 2014-05-12 13:48 ` Lukáš Czerner 2014-05-12 16:24 ` Jason Cooper 2014-05-12 16:22 ` Jason Cooper 1 sibling, 1 reply; 75+ messages in thread From: Lukáš Czerner @ 2014-05-12 13:48 UTC (permalink / raw) To: David Woodhouse Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel, Jason Cooper On Mon, 12 May 2014, David Woodhouse wrote: > Date: Mon, 12 May 2014 10:23:05 +0100 > From: David Woodhouse <dwmw2@infradead.org> > To: Josh Triplett <josh@joshtriplett.org> > Cc: PJ Waskiewicz <pjwaskiewicz@gmail.com>, > Jason Cooper <jason@lakedaemon.net>, > ksummit-discuss@lists.linuxfoundation.org, > Anton Arapov <arapov@gmail.com>, Sarah A Sharp <sarah@minilop.net>, > Dirk Hohndel <hohndel@infradead.org> > Subject: Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel > > On Sun, 2014-05-11 at 23:13 -0700, Josh Triplett wrote: > > On Sun, May 11, 2014 at 07:38:14PM -0700, H. Peter Anvin wrote: > > > As valuable as I obviously believe this project is, is there actually > > > anything that warrants discussion at the Kernel Summit? It seems like > > > something to Just Do[TM]. > > > > I believe there is actually a key part of this discussion to have at > > Kernel Summit. We don't need to discuss the technical details of the > > implementation; we do need to discuss the implications of enabling mass > > oops-reporting, the infrastructure and information we want to include in > > codes valid for the next decade or so, the tradeoffs between ease of > > reporting and value of the reports, some potential approaches to > > aggregate the date, and similar. > > In particular, can we avoid the silly trap of the ---[cut here]--- which > comes between a kernel oops, and the potentially useful messages that > were printed right before it. I'd like people to include the lines before the oops as well, it's often quite useful. The question is how to communicate this information to the users through the kernel oops ? Also how to communicate that we usually need the first oops ? Maybe instead of "cut here" line we can have the one or two sentences about this ? -Lukas ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 13:48 ` Lukáš Czerner @ 2014-05-12 16:24 ` Jason Cooper 2014-05-12 16:45 ` H. Peter Anvin 0 siblings, 1 reply; 75+ messages in thread From: Jason Cooper @ 2014-05-12 16:24 UTC (permalink / raw) To: Lukáš Czerner Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel On Mon, May 12, 2014 at 03:48:32PM +0200, Lukáš Czerner wrote: > On Mon, 12 May 2014, David Woodhouse wrote: > > > Date: Mon, 12 May 2014 10:23:05 +0100 > > From: David Woodhouse <dwmw2@infradead.org> > > To: Josh Triplett <josh@joshtriplett.org> > > Cc: PJ Waskiewicz <pjwaskiewicz@gmail.com>, > > Jason Cooper <jason@lakedaemon.net>, > > ksummit-discuss@lists.linuxfoundation.org, > > Anton Arapov <arapov@gmail.com>, Sarah A Sharp <sarah@minilop.net>, > > Dirk Hohndel <hohndel@infradead.org> > > Subject: Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel > > > > On Sun, 2014-05-11 at 23:13 -0700, Josh Triplett wrote: > > > On Sun, May 11, 2014 at 07:38:14PM -0700, H. Peter Anvin wrote: > > > > As valuable as I obviously believe this project is, is there actually > > > > anything that warrants discussion at the Kernel Summit? It seems like > > > > something to Just Do[TM]. > > > > > > I believe there is actually a key part of this discussion to have at > > > Kernel Summit. We don't need to discuss the technical details of the > > > implementation; we do need to discuss the implications of enabling mass > > > oops-reporting, the infrastructure and information we want to include in > > > codes valid for the next decade or so, the tradeoffs between ease of > > > reporting and value of the reports, some potential approaches to > > > aggregate the date, and similar. > > > > In particular, can we avoid the silly trap of the ---[cut here]--- which > > comes between a kernel oops, and the potentially useful messages that > > were printed right before it. > > Also how to communicate that we usually need the first oops ? Well, the QR code can only hold one oops anyway. Printing the code for the first should be pretty simple to implement. thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:24 ` Jason Cooper @ 2014-05-12 16:45 ` H. Peter Anvin 0 siblings, 0 replies; 75+ messages in thread From: H. Peter Anvin @ 2014-05-12 16:45 UTC (permalink / raw) To: Jason Cooper, Lukáš Czerner Cc: PJ Waskiewicz, Anton Arapov, Sarah A Sharp, ksummit-discuss, Dirk Hohndel On 05/12/2014 09:24 AM, Jason Cooper wrote: > > Well, the QR code can only hold one oops anyway. Printing the code for > the first should be pretty simple to implement. > A QR code can hold a certain amount of data, which may or may not be more than one Oops and/or kernel log messages before it. Compressing the data would allow for more information, although it involves more code running on a dodgy kernel. -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 9:23 ` David Woodhouse 2014-05-12 13:48 ` Lukáš Czerner @ 2014-05-12 16:22 ` Jason Cooper 2014-05-12 16:46 ` H. Peter Anvin 1 sibling, 1 reply; 75+ messages in thread From: Jason Cooper @ 2014-05-12 16:22 UTC (permalink / raw) To: David Woodhouse Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Mon, May 12, 2014 at 10:23:05AM +0100, David Woodhouse wrote: > On Sun, 2014-05-11 at 23:13 -0700, Josh Triplett wrote: > > On Sun, May 11, 2014 at 07:38:14PM -0700, H. Peter Anvin wrote: > > > As valuable as I obviously believe this project is, is there actually > > > anything that warrants discussion at the Kernel Summit? It seems like > > > something to Just Do[TM]. > > > > I believe there is actually a key part of this discussion to have at > > Kernel Summit. We don't need to discuss the technical details of the > > implementation; we do need to discuss the implications of enabling mass > > oops-reporting, the infrastructure and information we want to include in > > codes valid for the next decade or so, the tradeoffs between ease of > > reporting and value of the reports, some potential approaches to > > aggregate the date, and similar. > > In particular, can we avoid the silly trap of the ---[cut here]--- which > comes between a kernel oops, and the potentially useful messages that > were printed right before it. Something like this? thx, Jason. ------------>8----------------- diff --git a/kernel/panic.c b/kernel/panic.c index d02fa9fef46a..797251d87c60 100644 --- a/kernel/panic.c +++ b/kernel/panic.c @@ -407,7 +407,7 @@ static void warn_slowpath_common(const char *file, int line, void *caller, { disable_trace_on_warning(); - pr_warn("------------[ cut here ]------------\n"); + pr_warn("------------[ cut 10 lines above here ]------------\n"); pr_warn("WARNING: CPU: %d PID: %d at %s:%d %pS()\n", raw_smp_processor_id(), current->pid, file, line, caller); diff --git a/lib/bug.c b/lib/bug.c index 168603477f02..ece8c759d454 100644 --- a/lib/bug.c +++ b/lib/bug.c @@ -153,7 +153,7 @@ enum bug_trap_type report_bug(unsigned long bugaddr, struct pt_regs *regs) if (warning) { /* this is a WARN_ON rather than BUG/BUG_ON */ - printk(KERN_WARNING "------------[ cut here ]------------\n"); + printk(KERN_WARNING "------------[ cut 10 lines above here ]------------\n"); if (file) printk(KERN_WARNING "WARNING: at %s:%u\n", @@ -171,7 +171,7 @@ enum bug_trap_type report_bug(unsigned long bugaddr, struct pt_regs *regs) return BUG_TRAP_TYPE_WARN; } - printk(KERN_DEFAULT "------------[ cut here ]------------\n"); + printk(KERN_DEFAULT "------------[ cut 10 lines above here ]------------\n"); if (file) printk(KERN_CRIT "kernel BUG at %s:%u!\n", ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:22 ` Jason Cooper @ 2014-05-12 16:46 ` H. Peter Anvin 2014-05-12 17:32 ` Jason Cooper 0 siblings, 1 reply; 75+ messages in thread From: H. Peter Anvin @ 2014-05-12 16:46 UTC (permalink / raw) To: Jason Cooper, David Woodhouse Cc: PJ Waskiewicz, Sarah A Sharp, ksummit-discuss, Anton Arapov, Dirk Hohndel On 05/12/2014 09:22 AM, Jason Cooper wrote: > > Something like this? > > > - pr_warn("------------[ cut here ]------------\n"); > + pr_warn("------------[ cut 10 lines above here ]------------\n"); > pr_warn("WARNING: CPU: %d PID: %d at %s:%d %pS()\n", > raw_smp_processor_id(), current->pid, file, line, caller); > Why not just drop it? -hpa ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 16:46 ` H. Peter Anvin @ 2014-05-12 17:32 ` Jason Cooper 2014-05-12 17:42 ` Sarah A Sharp 0 siblings, 1 reply; 75+ messages in thread From: Jason Cooper @ 2014-05-12 17:32 UTC (permalink / raw) To: H. Peter Anvin Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Mon, May 12, 2014 at 09:46:48AM -0700, H. Peter Anvin wrote: > On 05/12/2014 09:22 AM, Jason Cooper wrote: > > > > Something like this? > > > > > > - pr_warn("------------[ cut here ]------------\n"); > > + pr_warn("------------[ cut 10 lines above here ]------------\n"); > > pr_warn("WARNING: CPU: %d PID: %d at %s:%d %pS()\n", > > raw_smp_processor_id(), current->pid, file, line, caller); > > > > Why not just drop it? I think there's value in being specific. First time reporters tend to quote too little when left to their own devices. When I was more active in the Gentoo community, I recall many times getting only the "make[1]:..." lines or the "emerge" bits. By the time you ask for more, the data was lost. thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-12 17:32 ` Jason Cooper @ 2014-05-12 17:42 ` Sarah A Sharp 0 siblings, 0 replies; 75+ messages in thread From: Sarah A Sharp @ 2014-05-12 17:42 UTC (permalink / raw) To: Jason Cooper Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov, Sarah A Sharp On Mon, May 12, 2014 at 10:32 AM, Jason Cooper <jason@lakedaemon.net> wrote: > On Mon, May 12, 2014 at 09:46:48AM -0700, H. Peter Anvin wrote: >> On 05/12/2014 09:22 AM, Jason Cooper wrote: >> > >> > Something like this? >> > >> > >> > - pr_warn("------------[ cut here ]------------\n"); >> > + pr_warn("------------[ cut 10 lines above here ]------------\n"); >> > pr_warn("WARNING: CPU: %d PID: %d at %s:%d %pS()\n", >> > raw_smp_processor_id(), current->pid, file, line, caller); >> > >> >> Why not just drop it? > > I think there's value in being specific. First time reporters tend to > quote too little when left to their own devices. When I was more active > in the Gentoo community, I recall many times getting only the > "make[1]:..." lines or the "emerge" bits. By the time you ask for more, > the data was lost. Wasn't the "cut here" line put in for people to know which chunk of log to feed to scripts/markup_oops.pl? Or is it smarter these days? Sarah Sharp ^ permalink raw reply [flat|nested] 75+ messages in thread
* Re: [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel 2014-05-11 15:57 ` Sarah A Sharp 2014-05-11 16:29 ` Levente Kurusa 2014-05-12 2:38 ` H. Peter Anvin @ 2014-05-12 15:46 ` Jason Cooper 2 siblings, 0 replies; 75+ messages in thread From: Jason Cooper @ 2014-05-12 15:46 UTC (permalink / raw) To: Sarah A Sharp; +Cc: PJ Waskiewicz, Dirk Hohndel, ksummit-discuss, Anton Arapov On Sun, May 11, 2014 at 08:57:01AM -0700, Sarah A Sharp wrote: > On Sat, May 10, 2014 at 9:14 PM, Jason Cooper <jason@lakedaemon.net> wrote: > > All, > > > > I recently came across a patch series attempting to implement encoding > > kernel oops into a QR code [1]. The QR code is then dumped to the > > framebuffer. The QR code is a URL of the form: > > > > https://oops.kernel.org/?qr=<base64 compressed oops> > > > > This proposal is interesting because it fundamentally changes the way > > users report bugs to the kernel community. First and foremost, it makes > > it much easier. > > > > 1) oops occurs > > 2) user pulls out phone, scans QR code > > - at this point, the oops is recorded on the server. Nothing more > > is required of the user. > > > > optionally: > > > > 3) user fills out a minimal web form > > - Name > > - email address (do you want to receive emails re this oops?) > > - what were you doing when it occurred? > > - is it repeatable? > > By "web form", do you mean a new form or something that's part of > kerneloops.org? New form designed for mobile devices. Based on current conversations, I'm thinking a box for the email address, and a check-block for receiving emails regarding the oops/bug. Nothing more. Well, maybe a page title and a simple stat, "You're the XX person to report this oops" An auto-generated email would contain a 'beginner' link, and a link to the normal bugzilla login/form for those comfortable with that. > It would be great if we could allow users to open a new > bugzilla.kernel.org entry for the oops. While I agree with the value of a bugzilla entry, I think we need to keep in mind that we would be opening up oops reporting to a new class of users. iow, non-technical folks. The workflow of an oops reporting should bear that in mind, as well as any user interfaces along the way. > I believe Teodora is working on an Android app that could do this. > Hopefully it could store information about the person's system, and > pre-propagate the bugzilla entry with this information. The app is a nice option, but I'd like to keep it optional. To me, the first and foremost goal is to get the oops recorded on a kernel.org system. Dupes and all. Anything that raises the barrier for accomplishing that goal must be carefully considered and justified. There's value in seeing the same oops has >100 reports, while another oops has but one. Once we have that raw data, what we do with it is the topic worth discussing at KS. > > I recall discussing this with some RedHat devs at the 2012 KS, so I know > > there is some interest in this capability. > > > > I'd be interested in having this as a tech topic for several reasons. > > First, to raise awareness of the project among the kernel community > > (where did all these oops reports start coming from?). Second, to > > solicit opinions on how to feed those oops reports into the community. > > And last, to sit down with the maintainer of oops.kernel.org and scope > > out what work needs to be done to support this on the server side. > > > > Of course, all of this assumes the patches get accepted. There's been > > no rejections so far, though. :) > > > > If accepted, I would expect the authors to be the ones leading the > > discussion (Levente, Teodora). > > I would recommend that Teodora lead the discussion, since this is her > project. Levente has been provided helpful commentary and additional > patches, and should definitely participate in the discussion as well. My mistake, I thought they were working together. Of course Teodora would have the lead. > > Nominations: > > > > Levente Kurusa <levex@linux.com> > > Teodora Băluţă <teobaluta@gmail.com> > > > > Relevant folks: > > > > Konstantin Ryabitsev <mricon@kernel.org> > > Jason Cooper <jason@lakedaemon.net> (auto-nominated) > > Another relevant person to include would be PJ Waskiewicz. Teo worked > on the QR code generator during her internship with the FOSS Outreach > Program for Women (OPW) and PJ was her mentor for the project. Ack. thx, Jason. ^ permalink raw reply [flat|nested] 75+ messages in thread
end of thread, other threads:[~2014-05-30 18:55 UTC | newest]
Thread overview: 75+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-05-11 4:14 [Ksummit-discuss] [TECH TOPIC] QR encoded oops for the kernel Jason Cooper
2014-05-11 15:57 ` Sarah A Sharp
2014-05-11 16:29 ` Levente Kurusa
2014-05-11 16:37 ` Laurent Pinchart
2014-05-11 17:18 ` Levente Kurusa
2014-05-11 17:52 ` Teodora Băluţă
2014-05-11 21:49 ` Laurent Pinchart
2014-05-12 16:15 ` Jason Cooper
2014-05-12 16:36 ` Levente Kurusa
2014-05-12 16:53 ` H. Peter Anvin
2014-05-30 18:55 ` Steven Rostedt
2014-05-12 17:00 ` Johannes Berg
2014-05-12 17:46 ` Teodora Băluţă
[not found] ` <CACV2jQCV=rRFg-+x1B3H1=GM5rB_YWp1UU1p7xXkozHKv1Ewvg@mail.gmail.com>
2014-05-13 6:44 ` [Ksummit-discuss] Fwd: " Teodora Băluţă
2014-05-13 7:08 ` Josh Triplett
2014-05-13 15:52 ` Levente Kurusa
2014-05-13 18:42 ` Andy Lutomirski
2014-05-13 20:18 ` josh
2014-05-14 8:20 ` Johannes Berg
2014-05-14 15:52 ` Josh Triplett
2014-05-14 16:00 ` H. Peter Anvin
2014-05-14 16:09 ` Andy Lutomirski
2014-05-14 18:54 ` Josh Triplett
2014-05-14 20:00 ` Levente Kurusa
2014-05-14 20:24 ` Daniel Vetter
2014-05-19 11:59 ` David Herrmann
2014-05-14 22:55 ` Josh Triplett
2014-05-15 12:44 ` Levente Kurusa
2014-05-15 19:19 ` H. Peter Anvin
2014-05-15 19:18 ` H. Peter Anvin
2014-05-15 20:41 ` Levente Kurusa
2014-05-13 14:45 ` [Ksummit-discuss] " David Woodhouse
2014-05-15 19:21 ` H. Peter Anvin
2014-05-15 19:53 ` Jiri Kosina
2014-05-12 15:53 ` Jason Cooper
2014-05-12 16:49 ` Levente Kurusa
2014-05-12 17:09 ` H. Peter Anvin
2014-05-12 17:50 ` Teodora Băluţă
2014-05-13 11:25 ` Greg KH
2014-05-13 14:41 ` Sarah A Sharp
2014-05-13 15:05 ` Greg KH
2014-05-13 15:51 ` Sarah A Sharp
2014-05-13 15:59 ` Josh Boyer
2014-05-13 16:07 ` Theodore Ts'o
2014-05-13 17:43 ` Levente Kurusa
2014-05-13 18:14 ` Teodora Baluta
2014-05-15 14:24 ` Levente Kurusa
2014-05-15 16:02 ` Teodora Băluţă
2014-05-14 1:14 ` Josh Boyer
2014-05-15 17:01 ` Levente Kurusa
2014-05-15 17:11 ` Josh Boyer
2014-05-17 15:02 ` Levente Kurusa
2014-05-15 5:41 ` PJ Waskiewicz
2014-05-15 15:41 ` Theodore Ts'o
2014-05-17 16:36 ` Levente Kurusa
2014-05-20 14:47 ` Theodore Ts'o
2014-05-21 18:03 ` Levente Kurusa
2014-05-25 19:49 ` Teodora Băluţă
2014-05-15 19:24 ` H. Peter Anvin
2014-05-15 21:13 ` Levente Kurusa
2014-05-13 16:03 ` Greg KH
2014-05-12 17:24 ` Jason Cooper
2014-05-11 17:49 ` Sarah A Sharp
2014-05-12 10:13 ` Masami Hiramatsu
2014-05-12 2:38 ` H. Peter Anvin
2014-05-12 6:13 ` Josh Triplett
2014-05-12 9:23 ` David Woodhouse
2014-05-12 13:48 ` Lukáš Czerner
2014-05-12 16:24 ` Jason Cooper
2014-05-12 16:45 ` H. Peter Anvin
2014-05-12 16:22 ` Jason Cooper
2014-05-12 16:46 ` H. Peter Anvin
2014-05-12 17:32 ` Jason Cooper
2014-05-12 17:42 ` Sarah A Sharp
2014-05-12 15:46 ` Jason Cooper
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox