[Bug 111918] Kernel tainted even when given option is unsupported, with an incorrect taint flag
bugzilla-daemon at freedesktop.org
bugzilla-daemon at freedesktop.org
Wed Oct 9 10:06:04 UTC 2019
https://bugs.freedesktop.org/show_bug.cgi?id=111918
--- Comment #6 from Eero Tamminen <eero.t.tamminen at intel.com> ---
(In reply to Joonas Lahtinen from comment #5)
> The solution for the user is simply not to set unsafe kernel options.
> When updating the kernel, the cmdline is kept intact, so when updating
> the kernel the currently inactive unsafe option might become active.
> Taint is supposed to highlight that.
AFAIK taint is mostly supposed to tell upstream kernel maintainers (i.e. other
people than i915 devs & users) whether kernel being run in reported upstream
bugs was trustworthy (is the bug worth debugging etc). Setting taint flag when
that's not the case, defeats this.
(In reply to Daniele Ceraolo Spurio from comment #4)
> add_taint(TAINT_USER, LOCKDEP_STILL_OK);
What about this? TAINT_USER flag is AFAIK intended for the specific use-case of
user-space writing to /proc/sys/kernel/tainted.
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the QA Contact for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.freedesktop.org/archives/intel-gfx-bugs/attachments/20191009/5b1b2fcc/attachment.html>
More information about the intel-gfx-bugs
mailing list