public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Chris Friesen <cfriesen@nortelnetworks.com>
To: ncunningham@linuxmail.org
Cc: Jurriaan <thunder7@xs4all.nl>, linux-kernel@vger.kernel.org
Subject: Re: What does tainting actually mean?
Date: Wed, 28 Apr 2004 01:19:32 -0400	[thread overview]
Message-ID: <408F3EE4.1080603@nortelnetworks.com> (raw)
In-Reply-To: <opr65f48sfshwjtr@laptop-linux.wpcb.org.au>

Nigel Cunningham wrote:

> Is that true? We can see where the oops occurs. If it's in the module,  
> nothing more needs to be said. If it's in the kernel itself, we can 
> check  our source. We could check all the calls the module makes to open 
> source  code and validate that the parameters are correct. We should be 
> able to  say with authority 'the module is doing the wrong thing'. We 
> might not be  able to say exactly what, but we could determine that it 
> is the module.

If only it were that easy.

There has already been a case mentioned of a binary module that messed up something that was only 
visible once that module was unloaded and another one loaded.  It all depends totally on usage patterns.

Generally speaking, if a user is technical enough to patch their kernel, they're aware of the 
possible problems and will submit bug reports with things like "kernel version blah, with the foo 
and bar patches applied".  The developers can then say "there's a known issue with foo/bar together".

Binary modules, on the other hand, are often loaded up by users that know just barely enough to 
download them and run an install script.  In this case, it can be helpful to know up front that 
there has been proprietary code running in kernel space, and aside from calls to kernel APIs, we 
have no clue what else it was doing, what memory was being trampled, what cpu registers were 
whacked, etc.

Chris

  reply	other threads:[~2004-04-28  5:20 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-04-28  4:00 What does tainting actually mean? Nigel Cunningham
2004-04-28  4:27 ` Jurriaan
2004-04-28  4:30   ` Nigel Cunningham
2004-04-28  5:19     ` Chris Friesen [this message]
2004-04-28  5:18       ` Nigel Cunningham
2004-04-28 12:10         ` Theodore Ts'o
2004-04-28 12:48           ` Måns Rullgård
2004-04-28 13:04             ` Muli Ben-Yehuda
2004-04-28 13:27               ` Måns Rullgård
2004-04-28 14:22                 ` Muli Ben-Yehuda
2004-04-28 15:56           ` Joseph Pingenot
2004-04-28 16:01         ` Valdis.Kletnieks
2004-05-03 12:45     ` Pavel Machek
2004-05-03 18:50       ` Stefan Smietanowski
2004-04-28  5:51 ` Karim Yaghmour
2004-04-28  6:51   ` Keith Duthie
2004-04-28 10:26   ` Ville Herva
2004-05-06 15:25 ` Anthony de Boer
     [not found] <04Apr28.020259edt.41801@gpu.utcc.utoronto.ca>
2004-04-28  6:18 ` Nigel Cunningham
2004-04-28 10:37   ` Bartlomiej Zolnierkiewicz

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=408F3EE4.1080603@nortelnetworks.com \
    --to=cfriesen@nortelnetworks.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=ncunningham@linuxmail.org \
    --cc=thunder7@xs4all.nl \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox