Kernel

v1.0.0

Avoid common Linux kernel mistakes — atomic context violations, allocation failures, and locking traps.

2· 793·1 current·1 all-time
byIván@ivangdavila
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (kernel programming pitfalls) match the SKILL.md content (atomic context, allocations, locking, etc.). No unrelated env vars, binaries, or install steps are requested.
Instruction Scope
SKILL.md contains high-level kernel programming guidance only — no commands to run, no file reads, no outbound endpoints, and no instructions to access environment variables or system configuration. It is advisory rather than actionable.
Install Mechanism
No install spec or code files are present; nothing will be downloaded or written to disk by installing the skill.
Credentials
The skill requests no credentials, config paths, or environment variables; this is proportionate for a documentation/cheatsheet skill.
Persistence & Privilege
always is false and the skill does not request persistent agent modifications or elevated privileges. Autonomous invocation is allowed (platform default) but not excessive here.
Assessment
This skill is an instruction-only checklist for Linux kernel development and is coherent with its description. It does not request secrets or install code, so the install-time risk is low. However, the content is technical advice: do not let an agent automatically compile or load kernel modules or run root commands based solely on these tips. Kernel development is version-specific and risky — verify any code changes, test in a VM/container, consult upstream kernel docs for your target version, and avoid granting the agent elevated privileges or direct access to build/load kernels without manual review.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🐧 Clawdis
OSLinux
latestvk975d4bcnbzfsc8n0qcdp328y980w0f0
793downloads
2stars
1versions
Updated 1mo ago
v1.0.0
MIT-0
Linux

Atomic Context Traps

  • spin_lock held = cannot sleep — no kmalloc(GFP_KERNEL), no mutex_lock, no copy_from_user
  • Interrupt can take same spinlock — must use spin_lock_irqsave, not plain spin_lock
  • rcu_read_lock() section cannot sleep — no blocking calls inside RCU read-side
  • might_sleep() annotation — add to functions that may sleep, catches bugs with CONFIG_DEBUG_ATOMIC_SLEEP

Allocation Failures

  • GFP_ATOMIC can return NULL — always check, don't assume success
  • vmalloc memory not physically contiguous — cannot use for DMA
  • kzalloc over kmalloc — uninitialized memory leaks kernel info to userspace
  • Allocation in loop risks OOM — preallocate or use memory pool

User Pointer Handling

  • copy_from_user returns bytes NOT copied — 0 means success, not failure
  • Never use %s with user pointer in printk — kernel crash or info leak
  • User memory can change during syscall — copy to kernel buffer, validate the copy
  • __user annotation is documentation — doesn't enforce anything, you must use copy functions

Memory Ordering

  • READ_ONCE/WRITE_ONCE for lockless shared data — prevents compiler from caching/reordering
  • Spinlock release has implicit barrier — but check-then-act patterns still need care
  • smp_wmb() before publishing pointer — ensures data visible before pointer is

Module Error Paths

  • Init fails midway — must undo everything already done
  • Reverse order cleanup — unregister in opposite order of register
  • goto err_* pattern standard — cleaner than nested ifs
  • Check what's actually initialized — don't free/unregister what wasn't set up

Locking Mistakes

  • Same lock acquired twice = deadlock — even in different functions
  • Inconsistent lock ordering — document order, acquire in same sequence everywhere
  • mutex_trylock returns 1 on success — opposite of pthread_mutex_trylock
  • Reader-writer locks rarely worth it — contention overhead usually exceeds benefit

Comments

Loading comments...