Blame view

REPORTING-BUGS 3 KB
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
  [Some of this is taken from Frohwalt Egerer's original linux-kernel FAQ]
  
       What follows is a suggested procedure for reporting Linux bugs. You
  aren't obliged to use the bug reporting format, it is provided as a guide
  to the kind of information that can be useful to developers - no more.
  
       If the failure includes an "OOPS:" type message in your log or on
  screen please read "Documentation/oops-tracing.txt" before posting your
  bug report. This explains what you should do with the "Oops" information
  to make it useful to the recipient.
  
        Send the output the maintainer of the kernel area that seems to
  be involved with the problem. Don't worry too much about getting the
  wrong person. If you are unsure send it to the person responsible for the
  code relevant to what you were doing. If it occurs repeatably try and
  describe how to recreate it. That is worth even more than the oops itself.
  The list of maintainers is in the MAINTAINERS file in this directory.
  
        If it is a security bug, please copy the Security Contact listed
  in the MAINTAINERS file.  They can help coordinate bugfix and disclosure.
  See Documentation/SecurityBugs for more infomation.
  
        If you are totally stumped as to whom to send the report, send it to
  linux-kernel@vger.kernel.org. (For more information on the linux-kernel
  mailing list see http://www.tux.org/lkml/).
  
  This is a suggested format for a bug report sent to the Linux kernel mailing 
  list. Having a standardized bug report form makes it easier  for you not to 
  overlook things, and easier for the developers to find the pieces of 
  information they're really interested in. Don't feel you have to follow it.
  
        First run the ver_linux script included as scripts/ver_linux, which
  reports the version of some important subsystems.  Run this script with
  the command "sh scripts/ver_linux".
  
  Use that information to fill in all fields of the bug report form, and
  post it to the mailing list with a subject of "PROBLEM: <one line
  summary from [1.]>" for easy identification by the developers    
  
  [1.] One line summary of the problem:    
  [2.] Full description of the problem/report:
  [3.] Keywords (i.e., modules, networking, kernel):
  [4.] Kernel version (from /proc/version):
30e835e36   Andrew Morton   [PATCH] REPORTING...
44
45
  [5.] Most recent kernel version which did not have the bug:
  [6.] Output of Oops.. message (if applicable) with symbolic information
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
46
       resolved (see Documentation/oops-tracing.txt)
30e835e36   Andrew Morton   [PATCH] REPORTING...
47
  [7.] A small shell script or example program which triggers the
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
48
       problem (if possible)
30e835e36   Andrew Morton   [PATCH] REPORTING...
49
50
51
52
53
54
55
56
  [8.] Environment
  [8.1.] Software (add the output of the ver_linux script here)
  [8.2.] Processor information (from /proc/cpuinfo):
  [8.3.] Module information (from /proc/modules):
  [8.4.] Loaded driver and hardware information (/proc/ioports, /proc/iomem)
  [8.5.] PCI information ('lspci -vvv' as root)
  [8.6.] SCSI information (from /proc/scsi/scsi)
  [8.7.] Other information that might be relevant to the problem
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
57
58
59
60
61
62
         (please look in /proc and include all information that you
         think to be relevant):
  [X.] Other notes, patches, fixes, workarounds:
  
  
  Thank you