Difference between revisions of "Kernel bugs"
Jump to navigation
Jump to search
| Line 23: | Line 23: | ||
|20161114 | |20161114 | ||
| [https://www.spinics.net/lists/netdev/msg404389.html linux-next: net->netns_ids is used after calling idr_destroy for it] | | [https://www.spinics.net/lists/netdev/msg404389.html linux-next: net->netns_ids is used after calling idr_destroy for it] | ||
| + | |- | ||
| + | |20170124 | ||
| + | | [https://lkml.org/lkml/2017/1/24/797 seccomp: dump core when using SECCOMP_RET_KILL] | ||
|- | |- | ||
|} | |} | ||
[[Category:Testing]] | [[Category:Testing]] | ||
Revision as of 16:49, 1 February 2017
We have the CRIU-linux-next job to check all kernel changes before they move into the upstream kernel.
Caught bugs
| Dozen of bugs before the next line | |
| 20150316 | tcp_metrics: fix wrong lockdep annotations |
| 20150928 | skbuff: Fix skb checksum partial check. |
| 20160512 | kernfs: kernfs_sop_show_path: don't return 0 after seq_dentry call |
| 20161024 | mm: Add a user_ns owner to mm_struct and fix ptrace_may_access |
| 20161114 | BUG: unable to handle kernel NULL pointer dereference in __sk_mem_raise_allocated() |
| 20161114 | linux-next: net->netns_ids is used after calling idr_destroy for it |
| 20170124 | seccomp: dump core when using SECCOMP_RET_KILL |