Difference between revisions of "Kernel bugs"
Jump to navigation
Jump to search
Line 72: | Line 72: | ||
|[https://patchwork.kernel.org/patch/9933787/ tip:x86/apic x86/idt: Fix the X86_TRAP_BP gate] | |[https://patchwork.kernel.org/patch/9933787/ tip:x86/apic x86/idt: Fix the X86_TRAP_BP gate] | ||
|- | |- | ||
+ | | 20171008 | ||
+ | |[https://www.mail-archive.com/netdev@vger.kernel.org/msg192535.html net-next: WARNING: CPU: 0 PID: 1544 at net/ipv4/tcp_input.c:889] | ||
|} | |} | ||
Revision as of 05:21, 17 October 2017
We have implemented Continuous integration#Kernel testing to check if any recent kernel changes break CRIU, to catch those before they appear in the vanilla kernel. This article documents Linux kernel bugs found using this method.
Found bugs
Note that the list is probably incomplete; there were a few bugs found and fixed before we cared to document it here.