Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp103519pxb; Wed, 11 Nov 2020 21:41:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJxTd+i8TDAMv8tTX6zYko1t0afhTfh6t1lUCKwCzpeDhUHFCNNnArqTIzgYg7TVajTKuNFp X-Received: by 2002:aa7:c546:: with SMTP id s6mr3351469edr.114.1605159672114; Wed, 11 Nov 2020 21:41:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605159672; cv=none; d=google.com; s=arc-20160816; b=z9ph2HBHevELbsOPf4kG13Upc37Bpj4s6xgpAzQNkTdhwvc6gmg5pvNP8AK+KHvCvB UxU+141OPbKwMRE+GL7VyOFtWs6zR6kIOZhL0MW14bccM6zkd5AlKZ98uXwj4quNDtUE dOX91PDTSRmnW/v7V4EiiTZqZ4Uc1ZBHfEEmAS6fJEcmiMz4/nt72CvsMPAXxVyONTf/ FwP5W30Z5C5gFcM4fDHty3unlbFnb23I5tr8fFA5n/oneMnY8KzuBIW+1bbFdQlbzJId eaw+63UNN0d2ZHHrZIwjMxKK/isWVYUbzf0aYF6cv7r+g4QeIOAND7UnjahEm6C6aDkR 9JTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=XIhp0Uwlzb3YaCRytxWxc3sb62zL2iQtCEUkdSPaNS0=; b=SvnuFw0AYzS/VQaIWQtqPRSi2u7F2H/eT8gqsNGsAQqtlg22krhZSAL7+GHAEOXAPZ /MiGJgVe962HgPlLVlCvi8AfmeB1LC+ZziTJ5pG1r879z8B7B1vSo3JP+d+isAfG1Ft/ keIUaxAP+F7dYGYLJDCj+JyDeyI34sVk44PGPxUjKWfc3NWE6oHpPGTGU8FC/GzgwHGJ L2yrc6Q94M3a3oDStQT0Z4/qzD03gYe07VRsRK7rqDxQnW5E/Prn5TCUyXN5k15fzd0B tJNS0Bboq6+muBCJqZ2sSHUdxmfhwjy4JpwncKA9GP4fGpUhOx/BkpXitwwrf2n2MvVJ FH7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=mQRgPrvW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y12si3160554eds.22.2020.11.11.21.40.48; Wed, 11 Nov 2020 21:41:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=mQRgPrvW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729254AbgKLFg4 (ORCPT + 99 others); Thu, 12 Nov 2020 00:36:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43882 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728361AbgKLDmw (ORCPT ); Wed, 11 Nov 2020 22:42:52 -0500 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 439E0C0613D1; Wed, 11 Nov 2020 19:42:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description; bh=XIhp0Uwlzb3YaCRytxWxc3sb62zL2iQtCEUkdSPaNS0=; b=mQRgPrvWkalYG4F47CCF4i84Se IULwE0slctczJm1158Q8WNlbtnpIzGYM53Dl5TjmmmPQ8cDY3dIK6LT7QNK+CNYlA083yeJl1+36H dqX9Zwb3tBOURae2Ck8vU7/wwReMAlMWgZGDxVLuMWVpb8DnnIaK1HWSRSGj7rHzOL+vkOkrXf7pP 7dg2XNnGLmYzbkDlcyoiIz9KNAxOIyLhqFDK0RD+z5g+Ssd8QRKn5igHp6sv5/5xefGPLTgSqba1d 90bHSauOv2sd04PtqrnH6HMjJAPBdVwxa6PhhR5iepPsYflowW0/MLZnrKYRVF5A3NmQRXhRRCPtS PWai3IZA==; Received: from [2601:1c0:6280:3f0::662d] by casper.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1kd3Va-0003X5-1P; Thu, 12 Nov 2020 03:42:50 +0000 Subject: Re: [RFC PATCH v1 15/26] docs: reporting-bugs: make readers test mainline, but leave a loophole To: Thorsten Leemhuis , Jonathan Corbet Cc: linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org References: <275187e0-92b5-d0a6-0bf7-76c827e2c808@infradead.org> <873abf9c-5651-8dc3-70ea-b14e498661a7@leemhuis.info> From: Randy Dunlap Message-ID: <8c3bd254-4989-ea6f-1a73-84f68d0ac75e@infradead.org> Date: Wed, 11 Nov 2020 19:42:46 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <873abf9c-5651-8dc3-70ea-b14e498661a7@leemhuis.info> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/11/20 7:36 AM, Thorsten Leemhuis wrote: > Am 03.10.20 um 12:11 schrieb Thorsten Leemhuis: >> Am 02.10.20 um 19:51 schrieb Randy Dunlap: >>> On 10/1/20 1:39 AM, Thorsten Leemhuis wrote: >>>> = RFC = >>>> >>>> Am I asking for too much from users by telling them to test mainline? But most >>>> will likely have an outdated and heavily patched vendor kernel anyway, so they >>>> have to install a vanilla kernel if they want to report something upstream; >>>> that's why I thought "well, then let's go all in and make them test mainline. >>> That is appropriate IMO. > > I'm preparing to send v2 and was a bit unhappy with this and another section when seeing it again after weeks. In the end I reshuffled and rewrote significant parts of it, see below. > > Randy, would be great if you could take another look, but no pressure: just ignore it, if you lack the time or energy. > > ``` > Install a fresh kernel for testing > ---------------------------------- > >     *Install the latest Linux mainline kernel: that's where all issues get fixed first, because it's the version line the kernel developers mainly care about. Testing and reporting with the latest Linux stable kernel can be an acceptable alternative in some situations, for example during the merge window; but during that period you might want to suspend your efforts till its end anyway.* > > Reporting an issue to the Linux kernel developers they fixed weeks or months ago is annoying for them and wasting their and your time. That's why it's in everybody's interest to check if the issue occurs with the latest codebase before reporting it. > > In the scope of the Linux kernel the term 'latest' means: a kernel version recently created from the main line of development, as this 'mainline' tree is where developer first apply fixes; only after that they are allowed to get backported to older, still developers only after that are they supported version lines called 'stable' and 'longterm' kernels. That's why you should check a recent mainline kernel, even if you deal with an issue you only want to see fixed in an older version line. Another reason: some fixes are only applied to mainline or recent version lines, as it's too hard or risky to backport them to older versions. If that the case, reporting the issue again is unlikely to change anything. > > Longterm kernels (sometimes called "LTS kernels") are therefore unsuitable for testing, they simply are too distant from current testing; they or testing. They development. Even the latest Linux 'stable' kernel is a significant bit behind and thus better avoided. But sometimes it's even the right choice, but in those cases you might want to wait a few days before trying to reproduce an issue with the latest codebase: Try to remove one "But/but" in the sentence above. > > Choosing between mainline, stable and waiting > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > Head over to `kernel.org `_ to decide which version to use. Ignore the big yellow button that says 'Latest release' and look a little lower for a table. At its top you'll see a line starting with 'mainline', which most of the time will point to a pre-release with a version number like '5.8-rc2'. If that's the case, you'll want to use this mainline kernel for testing. Do not let that 'rc' scare you, these 'development kernels' are pretty reliable — and you made a backup, as you were instructed above, don't s/don't/didn't/ you? > > In about two out of every nine to ten weeks, 'mainline' might point you to a proper release with a version number like '5.7'. If that happens, consider suspending the reporting process until the first pre-release of the next version  (5.8-rc1) shows up on only one space ^^ kernel.org. That's because the Linux development cycle then is in its two-week long 'merge window'. The bulk of the changes and all intrusive ones get merged for the next release during this time. It's a bit more risky to use mainline during this period. Kernel developers are also often quite busy then and might have no spare time to deal with issue reports. It's also quite possible that one of the many changes applied during the merge window fixes the issue you face; that's why you soon would have to retest with a newer kernel version anyway, as outlined below in the section 'Duties after the report when out'. Should that be after the report went out'. ? > > That's why it might make sense to wait till the merge window is over. But don't to that if you're dealing with something that shouldn't wait. In that case consider obtaining the latest mainline kernel via git (see below) or use the latest stable version offered on kernel.org. Using that is also acceptable in case mainline for some reason does currently not work for you. An in general: using it for reproducing the issue is also better than not reporting it issue at all. > > How to obtain a fresh Linux kernel > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > You can use pre-build or self-compiled kernel for testing; if you chose the latter approach, you can either obtain the source-code pre-built choose source code using git or download it as tar archive. > > Using a pre-compiled kernel for testing is often the quickest, easiest, and safest way – especially is you are unfamiliar with the Linux kernel. But it needs to be a vanilla kernel, which can be hard to come buy. You are in luck if you are using a popular Linux distribution: for quite a few of them you'll find repositories on the net that contain packages with the latest mainline or stable kernels in vanilla fashion. It's totally okay to use these, just make sure from the repository's documentation they are really vanilla. And ensure the packages contain the latest versions as offered on kernel.org; they are likely unsuitable if the package is older than a week, as new mainline and stable kernels typically bet released at least once a week. And be aware that you might need to get build your own kernel later anyway when it comes helping to test fixes, as described later in this document. when it comes to helping test fixes, > > Developers and experienced Linux users familiar with git are often best served by obtaining the latest Linux kernel sources straight from the `official development repository on kernel.org `_. Those are likely a bit ahead of the latest mainline pre-release. Don't worry about it: they are as reliable as a proper pre-release, unless the kernel's development cycle is currently in the middle of a merge window. But even then they are quite reliable. > > People unfamiliar with git are often best served by downloading the sources as tarball from `kernel.org `_. > > How to actually build a kernel not described here, as many websites explain the necessary steps already. If you are new to it, kernel is not consider following one of those how-to's that suggest to use ``make localmodconfig``, as that tries to pick up the configuration of your current kernel and then tries to adjust it somewhat for your system. That does not make the resulting kernel any better, but quicker to compile. > ``` LGTM. Thanks. -- ~Randy