New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

qubes-bugreport tool #901

Closed
marmarek opened this Issue Mar 8, 2015 · 12 comments

Comments

Projects
None yet
3 participants
@marmarek
Member

marmarek commented Mar 8, 2015

Reported by woju on 18 Sep 2014 15:28 UTC
On Thu, Sep 18, 2014 at 03:08:08PM +0000, Hakisho Nukama wrote:

Maybe we need some separate qubes-generate-report tool, that is
collecting all information useful for debugging
problems from appvms and dom0.

https://groups.google.com/forum/#!topic/qubes-users/KUwfPI7Ma1Q

Migrated-From: https://wiki.qubes-os.org/ticket/901

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Modified by marmarek on 10 Dec 2014 11:49 UTC

Member

marmarek commented Mar 8, 2015

Modified by marmarek on 10 Dec 2014 11:49 UTC

@marmarek marmarek added this to the Release 3 milestone Mar 8, 2015

@marmarek marmarek added enhancement and removed bug labels Mar 8, 2015

@marmarek marmarek modified the milestones: Release 3.1, Release 3.0 May 24, 2015

@rootkovska rootkovska modified the milestones: Release 3.2, Release 3.1 Feb 12, 2016

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 11, 2016

Is there any specification or description around how such a tool should look like? Should it just be a CLI (command line) tool which generates debug information in a text/xml file, which then can be send via email or how should it look like?

Is there any specification or description around how such a tool should look like? Should it just be a CLI (command line) tool which generates debug information in a text/xml file, which then can be send via email or how should it look like?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 11, 2016

Member

Yes, something like this. It should collect:

  • package versions:rpm -qa qubes-*
  • related VMs info (for network problems - all NetVMs and ProxyVMs): qvm-prefs VMNAME
  • package versions installed in those VMs: qvm-run -p VMNAME 'rpm -qa qubes-*' (or dpkg -l qubes-*)
  • related logs from /var/log/qubes

I think it should write the file in selected VM (similar to qubes-hcl-report tool) for being attached to an email, or github issue. Later we may integrate it into Qubes Manager. The file should be easily readable for normal user, to check if no private data is being leaked.

Member

marmarek commented May 11, 2016

Yes, something like this. It should collect:

  • package versions:rpm -qa qubes-*
  • related VMs info (for network problems - all NetVMs and ProxyVMs): qvm-prefs VMNAME
  • package versions installed in those VMs: qvm-run -p VMNAME 'rpm -qa qubes-*' (or dpkg -l qubes-*)
  • related logs from /var/log/qubes

I think it should write the file in selected VM (similar to qubes-hcl-report tool) for being attached to an email, or github issue. Later we may integrate it into Qubes Manager. The file should be easily readable for normal user, to check if no private data is being leaked.

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 11, 2016

The tool syntax could be something like: qubes-bug-report SRC-VMNAME REPORT-VMNAME --net
the --net to report network problems. SRC-VMNAME is the VM, which has issues. REPORT-VMNAME is the which the report should be send to.

The tool syntax could be something like: qubes-bug-report SRC-VMNAME REPORT-VMNAME --net
the --net to report network problems. SRC-VMNAME is the VM, which has issues. REPORT-VMNAME is the which the report should be send to.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 11, 2016

Member

I'd prefer to have --dest-vm REPORT-VMNAME (or some other option name), because later when integrating into Qubes Manager we may want to save the reportin initially in dom0, give it to the user for review and only then send to some VM.
Other than that, it's ok

Member

marmarek commented May 11, 2016

I'd prefer to have --dest-vm REPORT-VMNAME (or some other option name), because later when integrating into Qubes Manager we may want to save the reportin initially in dom0, give it to the user for review and only then send to some VM.
Other than that, it's ok

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 11, 2016

In which language and version would you write this tool? Python 2.7+, Python 3+, Bash?

In which language and version would you write this tool? Python 2.7+, Python 3+, Bash?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 11, 2016

Member

Preferably python, either version (in case of 3, it would be first qubes
tool in python3, but that isn't anything bad).

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented May 11, 2016

Preferably python, either version (in case of 3, it would be first qubes
tool in python3, but that isn't anything bad).

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 12, 2016

Each qube has the following logs:

  • guid.VMNAME
  • pacat.VMNAME
  • qubesdb.VMNAME
  • qrexec.VMNAME

which one would you like to see in the bug-report? Do you want to have all information from the logs or do you want to have specific parts?

Each qube has the following logs:

  • guid.VMNAME
  • pacat.VMNAME
  • qubesdb.VMNAME
  • qrexec.VMNAME

which one would you like to see in the bug-report? Do you want to have all information from the logs or do you want to have specific parts?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 12, 2016

Member

All of them should be a good default. Those logs are from the most recent
VM run, so should not be that big.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented May 12, 2016

All of them should be a good default. Those logs are from the most recent
VM run, so should not be that big.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 13, 2016

Okay, I created the script. The output format is Markdown.
In which repository shall a commit (upload) the script?

Okay, I created the script. The output format is Markdown.
In which repository shall a commit (upload) the script?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 14, 2016

Member

I think it can go to https://github.com/qubesos/qubes-core-admin, into qvm-tools directory.

Member

marmarek commented May 14, 2016

I think it can go to https://github.com/qubesos/qubes-core-admin, into qvm-tools directory.

@Jeeppler

This comment has been minimized.

Show comment
Hide comment
@Jeeppler

Jeeppler May 14, 2016

I created a pull request QubesOS/qubes-core-admin#30 . Please review the tool. The tool is written in python3.

If you want to test it, just use qubes-dom0-update python3 in Qubes 3.1 to install Python 3.3 in Dom0.

If you have any concerns or if there are any issues please let me know, I will change the script.
The script should work with Fedora, Debian and Archlinux scripts.

I added a -p option which only prints the report to the console.

Jeeppler commented May 14, 2016

I created a pull request QubesOS/qubes-core-admin#30 . Please review the tool. The tool is written in python3.

If you want to test it, just use qubes-dom0-update python3 in Qubes 3.1 to install Python 3.3 in Dom0.

If you have any concerns or if there are any issues please let me know, I will change the script.
The script should work with Fedora, Debian and Archlinux scripts.

I added a -p option which only prints the report to the console.

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue May 18, 2016

andrewdavidwong added a commit that referenced this issue Jun 9, 2016

marmarek added a commit to QubesOS/qubes-core-admin that referenced this issue Jun 25, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment