lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1201654094.2271.105.camel@perihelion>
Date:	Tue, 29 Jan 2008 19:48:14 -0500
From:	Jon Masters <jonathan@...masters.org>
To:	Jan Engelhardt <jengelh@...putergmbh.de>
Cc:	Pavel Roskin <proski@....org>, linux-kernel@...r.kernel.org,
	Rusty Russell <rusty@...tcorp.com.au>,
	Giridhar Pemmasani <pgiri@...oo.com>
Subject: Re: ndiswrapper and GPL-only symbols redux


On Wed, 2008-01-30 at 01:35 +0100, Jan Engelhardt wrote:
> On Jan 29 2008 19:20, Jon Masters wrote:

> >Another fix would be for ndiswrapper to explicitly set the taint when it
> >loads a tainted driver? Or do we just want to go back to globally
> >"tainting" the kernel without assigning the blame to any module?
> 
> I think the global taint flag is always needed because you never know
> what the proprietary module actually did to our memory. Unloading
> the driver and ndiswrapper should retain some sort of taintedness
> should it oops much later.

It will. The module taint variant also sets the global taint. But it
helps to know why you set that if you oops now and get a list of
modules. Yeah, we know about ndiswrapper, I just mean in general.

Man, that'll teach me to send one-liners without checking the entire
history of LWN stories beforehand. I'm going to the gym to escape :)

Jon.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ