Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp3818302ima; Tue, 23 Oct 2018 11:46:59 -0700 (PDT) X-Google-Smtp-Source: ACcGV63D1+YLMjrs4aSrNVi27XFiiFwvmoPkrmKFKOyHPSTisQN1E2AXOAMQ6H3K+93NMgM9s9uo X-Received: by 2002:a62:5d0c:: with SMTP id r12-v6mr51451171pfb.123.1540320419207; Tue, 23 Oct 2018 11:46:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540320419; cv=none; d=google.com; s=arc-20160816; b=k0l9LNp7diCmwMc9wyC/qdxFwazTugXhtgiO2a+7TAceb267w8xpxIeLoiFFn8B7n5 3awZThKtw0XahQpVqAZ/ExrxsPVJkb8OjgPldf3NnWqWu4yjSFXkIggDhI6fxUlRWjtV yGw87ajOlDsMyPcqzgHBLd+z3eQZ4S4FIj4uetdxNiJ3m9cgG3rBipiPS/4iSv6ksCPP nnQa2Os+G5GANYndY455Ok+RTA+m8SQ3PO4L+tmRytAhw9i7jPdM32FJqEDfcHLaVH/X BOCSc4gz+9Ml7c52TZo7DQspGUMTmWUJqD3d79uWr5kE9e68zz3Ah8LREiS+ouCWGv89 o/TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=v2q7PDeS8h7U0rz82EhQRCHqMlinFGrMfwfTtV73o9w=; b=RJWng6EHFYFimbjTM7EL5HJgLP2gq9Qh/KguOoqz/Aucj93c73eAJROiOB5W2ARCCN 099xeknJ4ccuU1hXaQpuL7l0OQ7nWtAgDf1XfJMabfvL9cohQJGk2VBO+uipJNlKMZPD OkU2AmpQARUwacJi9DINEPFMbe/GLfu8FJ+jBDhdMPIL2sW4ocy+qeKpNe8gXAfe2kEQ AIjrZuZ4GsB6ADZo6A6sSoqKM+wrC6Eqii2WEDfcRZ7DJsOuP/md5pbM5GcSkd5mj5Ca z1/k6wMdKcQvKoMXZb9+o/IrKzNyTpmfAzTEQOF2tD/JlBmZGvknZCp+GpDUmjpDdxzT Hlhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u14-v6si1945418plq.268.2018.10.23.11.46.44; Tue, 23 Oct 2018 11:46:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728833AbeJXDH7 (ORCPT + 99 others); Tue, 23 Oct 2018 23:07:59 -0400 Received: from mga05.intel.com ([192.55.52.43]:55078 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728817AbeJXDH7 (ORCPT ); Tue, 23 Oct 2018 23:07:59 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Oct 2018 11:43:25 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,417,1534834800"; d="scan'208";a="243726564" Received: from chang-linux-2.sc.intel.com ([10.3.52.139]) by orsmga004.jf.intel.com with ESMTP; 23 Oct 2018 11:43:24 -0700 From: "Chang S. Bae" To: Ingo Molnar , Thomas Gleixner , Andy Lutomirski , "H . Peter Anvin" Cc: Andi Kleen , Dave Hansen , Markus T Metzger , Ravi Shankar , "Chang S . Bae" , LKML Subject: [v3 01/12] taint: Introduce a new taint flag (insecure) Date: Tue, 23 Oct 2018 11:42:23 -0700 Message-Id: <20181023184234.14025-2-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181023184234.14025-1-chang.seok.bae@intel.com> References: <20181023184234.14025-1-chang.seok.bae@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For testing (or root-only) purposes, the new flag will serve to tag the kernel taint accurately. When adding a new feature support, patches need to be incrementally applied and tested with temporal parameters. Currently, there is no flag for this usage. Suggested-by: H. Peter Anvin Signed-off-by: Chang S. Bae Cc: Andy Lutomirski Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Andi Kleen Cc: Dave Hansen --- Documentation/sysctl/kernel.txt | 1 + include/linux/kernel.h | 3 ++- kernel/panic.c | 1 + 3 files changed, 4 insertions(+), 1 deletion(-) diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 37a679501ddc..d682a6551365 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -1017,6 +1017,7 @@ ORed together. The letters are seen in "Tainted" line of Oops reports. 32768 (K): The kernel has been live patched. 65536 (X): Auxiliary taint, defined and used by for distros. 131072 (T): The kernel was built with the struct randomization plugin. +262144 (Z): The kernel is running in a known insecure configuration. ============================================================== diff --git a/include/linux/kernel.h b/include/linux/kernel.h index d6aac75b51ba..38b2657d62d5 100644 --- a/include/linux/kernel.h +++ b/include/linux/kernel.h @@ -598,7 +598,8 @@ extern enum system_states { #define TAINT_LIVEPATCH 15 #define TAINT_AUX 16 #define TAINT_RANDSTRUCT 17 -#define TAINT_FLAGS_COUNT 18 +#define TAINT_INSECURE 18 +#define TAINT_FLAGS_COUNT 19 struct taint_flag { char c_true; /* character printed when tainted */ diff --git a/kernel/panic.c b/kernel/panic.c index 8b2e002d52eb..8db2ed9ec290 100644 --- a/kernel/panic.c +++ b/kernel/panic.c @@ -327,6 +327,7 @@ const struct taint_flag taint_flags[TAINT_FLAGS_COUNT] = { [ TAINT_LIVEPATCH ] = { 'K', ' ', true }, [ TAINT_AUX ] = { 'X', ' ', true }, [ TAINT_RANDSTRUCT ] = { 'T', ' ', true }, + [ TAINT_INSECURE ] = { 'Z', ' ', false }, }; /** -- 2.19.1