Kernel bugs

From CRIU
Revision as of 15:45, 17 May 2017 by Kir (talk | contribs) (fix intro and last link)
Jump to navigation Jump to search

We have implemented Continuous integration#Kernel testing to check if any recent kernel changes break CRIU, to catch those before they appear in the vanilla kernel. This article documents Linux kernel bugs found using this method.

Found bugs

Note that the list is probably incomplete; there were a few bugs found and fixed before we cared to document it here.

Date Bug description
20140924 linux-next: cgroup_mount() falls asleep forever
20150316 tcp_metrics: fix wrong lockdep annotations
20150928 skbuff: Fix skb checksum partial check
20160512 kernfs: kernfs_sop_show_path: don't return 0 after seq_dentry call
20160531 autofs: don't stuck in a loop if vfs_write returns an error
20161024 mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
20161114 BUG: unable to handle kernel NULL pointer dereference in __sk_mem_raise_allocated()
20161114 linux-next: net->netns_ids is used after calling idr_destroy for it
20170124 seccomp: dump core when using SECCOMP_RET_KILL
20170310 linux-next: WARNING: CPU: 1 PID: 24110 at fs/dcache.c:1445 umount_check+0x81/0x90
20170310 linux-next: WARNING: CPU: 0 PID: 1 at lib/refcount.c:114 refcount_inc+0x37/0x40
20170321 linux-next: x86: Unable to run x32 processes on the x86_64 kernel
20170417 Re: cgroup: avoid attaching a cgroup root to two different superblocks
20170419 Re: irq/affinity: Fix extra vecs calculation
20170516 Re: [net-next,v2,1/3] net/sock: factor out dequeue/peek with offset code

See also