module: Taint the kernel when write-protecting ro_after_init fails#60
module: Taint the kernel when write-protecting ro_after_init fails#60modules-kpd-app[bot] wants to merge 2 commits intomodules-next_basefrom
Conversation
|
Upstream branch: afa9286 |
|
Upstream branch: afa9286 |
87c7db5 to
5519fcb
Compare
b5b7508 to
96f6e22
Compare
|
Upstream branch: 085c5e3 |
5519fcb to
0d5ca8f
Compare
96f6e22 to
7c2b408
Compare
7c2b408 to
2996654
Compare
|
Upstream branch: 897c0b4 |
0d5ca8f to
763fd3e
Compare
2996654 to
d4037eb
Compare
|
Upstream branch: b464e57 |
763fd3e to
cba9279
Compare
d4037eb to
39f16b8
Compare
39f16b8 to
d6fb02c
Compare
|
Upstream branch: a0b018a |
cba9279 to
6b3b34d
Compare
d6fb02c to
b788ac1
Compare
In the unlikely case that setting ro_after_init data to read-only fails, it is too late to cancel loading of the module. The loader then issues only a warning about the situation. Given that this reduces the kernel's protection, it was suggested to make the failure more visible by tainting the kernel. Allow TAINT_BAD_PAGE to be set per-module and use it in this case. The flag is set in similar situations and has the following description in Documentation/admin-guide/tainted-kernels.rst: "bad page referenced or some unexpected page flags". Adjust the warning that reports the failure to avoid references to internal functions and to add information about the kernel being tainted, both to match the style of other messages in the file. Additionally, merge the message on a single line because checkpatch.pl recommends that for the ability to grep for the string. Suggested-by: Kees Cook <kees@kernel.org> Signed-off-by: Petr Pavlu <petr.pavlu@suse.com> Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
|
Upstream branch: a0b018a |
6b3b34d to
784f0b9
Compare
b788ac1 to
e04c78d
Compare
cbdca0b to
6a1a12c
Compare
6a1a12c to
7c2b408
Compare
6381fa5 to
aaa7ece
Compare
b4d1c4e to
61dc34e
Compare
1df8185 to
9aab33d
Compare
9aab33d to
99d099e
Compare
99d099e to
3aed49d
Compare
3aed49d to
856647c
Compare
856647c to
e1b99f5
Compare
e1b99f5 to
856647c
Compare
0299e02 to
cdc6b9e
Compare
Pull request for series with
subject: module: Taint the kernel when write-protecting ro_after_init fails
version: 1
url: https://patchwork.kernel.org/project/linux-modules/list/?series=940956