Re: [PATCH] kasan: always taint kernel on report.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Look good to me.

Reviewed-by: Dmitry Vyukov <dvyukov@xxxxxxxxxx>


On Wed, Oct 21, 2015 at 6:28 PM, Andrey Ryabinin
<aryabinin@xxxxxxxxxxxxx> wrote:
> Currently we already taint the kernel in some cases.
> E.g. if we hit some bug in slub memory we call object_err()
> which will taint the kernel with TAINT_BAD_PAGE flag.
> But for other kind of bugs kernel left untainted.
>
> Always taint with TAINT_BAD_PAGE if kasan found some bug.
> This is useful for automated testing.
>
> Signed-off-by: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
> ---
>  mm/kasan/report.c | 1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/mm/kasan/report.c b/mm/kasan/report.c
> index f5e068a..12f222d 100644
> --- a/mm/kasan/report.c
> +++ b/mm/kasan/report.c
> @@ -238,6 +238,7 @@ static void kasan_report_error(struct kasan_access_info *info)
>         }
>         pr_err("================================="
>                 "=================================\n");
> +       add_taint(TAINT_BAD_PAGE, LOCKDEP_NOW_UNRELIABLE);
>         spin_unlock_irqrestore(&report_lock, flags);
>         kasan_enable_current();
>  }
> --
> 2.4.10
>

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>



[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]