summaryrefslogtreecommitdiffstats
path: root/source/bugs.rst
diff options
Diffstat (limited to 'source/bugs.rst')
-rw-r--r--source/bugs.rst71
1 files changed, 71 insertions, 0 deletions
diff --git a/source/bugs.rst b/source/bugs.rst
new file mode 100644
index 0000000..c0bbb0c
--- /dev/null
+++ b/source/bugs.rst
@@ -0,0 +1,71 @@
+Bugs
+====
+
+Report **any bugs** you **think** you **may** have found because you are
+working with the **latest and greatest drivers**! If your bug is
+backport compatibility-related then we should still try to fix it within
+the compatibility layer. If you are not sure you can let us help you.
+**To date we have only have identified 2 backport related bugs**, all
+other reported bugs were **real bugs** in **actual upstream** code!
+
+We are working on a bugzilla entry for compat / compat-drivers, until
+then please report all bugs you think you my have found to the
+:doc:`backports mailing list <mailing_list>` and if you know what subsystem
+you think the bug belongs to Cc: the respective mailing list. Remember
+that chances are **high** that the bug is not a backport bug but instead
+a real upstream bug that **must** be fixed.
+
+What mailing lists to report bugs to
+------------------------------------
+
+Always use: **backports@vger.kernel.org** and then use one of the
+following mailing lists depending on the subsystem from where your
+driver belongs:
+
+- bluetooth: linux-bluetooth@vger.kernel.org
+- wireless: linux-wireless@vger.kernel.org
+- ethernet: netdev@vger.kernel.org
+
+Reporting security vulnerabilities
+----------------------------------
+
+If you have a security vulnerabilities issue to report and you know it
+is backports related you can report this directly to the maintainers:
+
+- hauke@hauke-m.de
+- mcgrof@kernel.org
+- johannes@sipsolutions.net
+
+The report will be handled in private, once the issue is fixed and
+propagated to users, the security fix will be disclosed and documented.
+As of date we have had no security vulnerabilities issues reported.
+Until then this page can be used to track updates on vulnerabilities
+related to Linux backports. The attack surface to Linux backports
+consists about 1-2% of code, this varies depending on what kernel you
+are on. The older kernel you are on the higher the security risk.
+Security issues on Linux should affect users of Linux backports if the
+code is carried over into backports, fixes for that are addressed
+through new release of backports with the corresponding upstream fixes.
+Security fixes for Linux belong upstream on Linux, not on Linux
+backports. To learn how to report Linux kernel security issues refer to
+`SecurityBugs documentation
+<https://www.kernel.org/doc/Documentation/SecurityBugs>`__.
+
+Bugzilla
+--------
+
+The Linux kernel bugzilla has an entry for backport bugs.
+
+Reporting new backport bugs
+~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To record a new bug:
+
+#. access the `Backports project <https://bugzilla.kernel.org/enter_bug.cgi?product=Backports%20project>`__ section of Bugzilla
+#. select the *backports* component (it is the only component available)
+
+Viewing bugs by status
+----------------------
+
+- [https://bugzilla.kernel.org/buglist.cgi?query_format=specific&order=relevance+desc&bug_status=__open__&product=Backports+project&content=. View open bugs]
+- [https://bugzilla.kernel.org/buglist.cgi?query_format=specific&order=relevance+desc&bug_status=__closed__&product=Backports+project&content=. View closed bugs]