<html>
<head>
<base href="https://bugs.freedesktop.org/">
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW - Kernel tainted even when given option is unsupported, with an incorrect taint flag"
href="https://bugs.freedesktop.org/show_bug.cgi?id=111918#c4">Comment # 4</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW - Kernel tainted even when given option is unsupported, with an incorrect taint flag"
href="https://bugs.freedesktop.org/show_bug.cgi?id=111918">bug 111918</a>
from <span class="vcard"><a class="email" href="mailto:daniele.ceraolospurio@intel.com" title="Daniele Ceraolo Spurio <daniele.ceraolospurio@intel.com>"> <span class="fn">Daniele Ceraolo Spurio</span></a>
</span></b>
<pre>Cc: i915 maintainers
The tainting flag for the unsafe parameter is implicitly selected by the params
handler (kernel/params.c), so we have no control over it from i915:
static void param_check_unsafe(const struct kernel_param *kp)
{
if (kp->flags & KERNEL_PARAM_FL_UNSAFE) {
pr_notice("Setting dangerous option %s - tainting kernel\n",
kp->name);
add_taint(TAINT_USER, LOCKDEP_STILL_OK);
}
}
What we could do to avoid tainting if the feature is not supported by the HW is
define all the parameters as safe and then explicitly taint if the feature is
supported in HW. I'm not sure how this fits with the general usage of
safe/unsafe parameters in the kernel though, so I'd like an ack/nak/suggestion
from the maintainers first.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are on the CC list for the bug.</li>
<li>You are the QA Contact for the bug.</li>
</ul>
</body>
</html>