author | Andrey Ryabinin <aryabinin@virtuozzo.com> | |
Fri, 6 Nov 2015 02:51:26 +0000 (18:51 -0800) | ||
committer | Alex Shi <alex.shi@linaro.org> | |
Mon, 11 Apr 2016 08:10:32 +0000 (16:10 +0800) | ||
commit | 6545f4bcb4cb581c8dd922442e46781dc3348ddc | |
tree | b0e3870152168516e4e09fcfc7b8ad71f2ca2613 | tree | snapshot (tar.xz tar.gz zip) |
parent | 9060ab15af2fc9fda3e0eff7f322ceca62982109 | commit | diff |
kasan: always taint kernel on report
Currently we already taint the kernel in some cases. E.g. if we hit some
bug in slub memory we call object_err() which will taint the kernel with
TAINT_BAD_PAGE flag. But for other kind of bugs kernel left untainted.
Always taint with TAINT_BAD_PAGE if kasan found some bug. This is useful
for automated testing.
Signed-off-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
Cc: Alexander Potapenko <glider@google.com>
Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
(cherry picked from commit eb06f43f1c94d502b7867b0998e92cdabbc060bc)
Signed-off-by: Alex Shi <alex.shi@linaro.org>
Currently we already taint the kernel in some cases. E.g. if we hit some
bug in slub memory we call object_err() which will taint the kernel with
TAINT_BAD_PAGE flag. But for other kind of bugs kernel left untainted.
Always taint with TAINT_BAD_PAGE if kasan found some bug. This is useful
for automated testing.
Signed-off-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
Cc: Alexander Potapenko <glider@google.com>
Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
(cherry picked from commit eb06f43f1c94d502b7867b0998e92cdabbc060bc)
Signed-off-by: Alex Shi <alex.shi@linaro.org>
mm/kasan/report.c | diff | blob | history |