Difference between revisions of "Kernel bugs"
Jump to navigation
Jump to search
Line 37: | Line 37: | ||
| 20170310 | | 20170310 | ||
|[http://marc.info/?l=linux-raid&m=148917926532636&w=2 linux-next: WARNING: CPU: 0 PID: 1 at lib/refcount.c:114 refcount_inc+0x37/0x40] | |[http://marc.info/?l=linux-raid&m=148917926532636&w=2 linux-next: WARNING: CPU: 0 PID: 1 at lib/refcount.c:114 refcount_inc+0x37/0x40] | ||
+ | |- | ||
+ | |20170321 | ||
+ | |[https://lkml.org/lkml/2017/3/21/602 x86/mm: set x32 syscall bit in SET_PERSONALITY()] | ||
|} | |} | ||
[[Category:Testing]] | [[Category:Testing]] |
Revision as of 22:12, 21 March 2017
We have the CRIU-linux-next job to check all kernel changes before they move into the upstream kernel.
Found bugs
This table lists the linux-next kernel bugs found using CI.
Note that the list is incomplete; there were about a dozen bugs found and fixed before we started documenting it here.
Date | Bug description |
---|---|
20150316 | tcp_metrics: fix wrong lockdep annotations |
20150928 | skbuff: Fix skb checksum partial check. |
20160512 | kernfs: kernfs_sop_show_path: don't return 0 after seq_dentry call |
20161024 | mm: Add a user_ns owner to mm_struct and fix ptrace_may_access |
20161114 | BUG: unable to handle kernel NULL pointer dereference in __sk_mem_raise_allocated() |
20161114 | linux-next: net->netns_ids is used after calling idr_destroy for it |
20170124 | seccomp: dump core when using SECCOMP_RET_KILL |
20170310 | linux-next: WARNING: CPU: 1 PID: 24110 at fs/dcache.c:1445 umount_check+0x81/0x90 |
20170310 | linux-next: WARNING: CPU: 0 PID: 1 at lib/refcount.c:114 refcount_inc+0x37/0x40 |
20170321 | x86/mm: set x32 syscall bit in SET_PERSONALITY() |