The patch titled Subject: kasan: always taint kernel on report has been added to the -mm tree. Its filename is kasan-always-taint-kernel-on-report.patch This patch should soon appear at http://ozlabs.org/~akpm/mmots/broken-out/kasan-always-taint-kernel-on-report.patch and later at http://ozlabs.org/~akpm/mmotm/broken-out/kasan-always-taint-kernel-on-report.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/SubmitChecklist when testing your code *** The -mm tree is included into linux-next and is updated there every 3-4 working days ------------------------------------------------------ From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx> Subject: kasan: always taint kernel on report Currently we already taint the kernel in some cases. E.g. if we hit some bug in slub memory we call object_err() which will taint the kernel with TAINT_BAD_PAGE flag. But for other kind of bugs kernel left untainted. Always taint with TAINT_BAD_PAGE if kasan found some bug. This is useful for automated testing. Signed-off-by: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx> Cc: Alexander Potapenko <glider@xxxxxxxxxx> Cc: Dmitriy Vyukov <dvyukov@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/kasan/report.c | 1 + 1 file changed, 1 insertion(+) diff -puN mm/kasan/report.c~kasan-always-taint-kernel-on-report mm/kasan/report.c --- a/mm/kasan/report.c~kasan-always-taint-kernel-on-report +++ a/mm/kasan/report.c @@ -238,6 +238,7 @@ static void kasan_report_error(struct ka } pr_err("=================================" "=================================\n"); + add_taint(TAINT_BAD_PAGE, LOCKDEP_NOW_UNRELIABLE); spin_unlock_irqrestore(&report_lock, flags); kasan_enable_current(); } _ Patches currently in -mm which might be from aryabinin@xxxxxxxxxxxxx are disable-wframe-larger-than-warnings-with-kasan=y.patch mm-slub-kasan-enable-user-tracking-by-default-with-kasan=y.patch kasan-always-taint-kernel-on-report.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html