lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20251015221626.1126156-1-rdunlap@infradead.org>
Date: Wed, 15 Oct 2025 15:16:26 -0700
From: Randy Dunlap <rdunlap@...radead.org>
To: linux-kernel@...r.kernel.org
Cc: Randy Dunlap <rdunlap@...radead.org>,
	Jason Gunthorpe <jgg@...dia.com>,
	Andrew Morton <akpm@...ux-foundation.org>,
	David Gow <davidgow@...gle.com>,
	Jonathan Corbet <corbet@....net>,
	linux-doc@...r.kernel.org
Subject: [PATCH] taint: add reminder about updating docs and scripts

Sometimes people update taint-related pieces of the kernel without
updating the supporting documentation or scripts. Add a reminder
to do this.

Suggested-by: Jason Gunthorpe <jgg@...dia.com>
Signed-off-by: Randy Dunlap <rdunlap@...radead.org>
---
Cc: Andrew Morton <akpm@...ux-foundation.org>
Cc: David Gow <davidgow@...gle.com>
Cc: Jonathan Corbet <corbet@....net>
Cc: linux-doc@...r.kernel.org
---
 kernel/panic.c |    6 ++++++
 1 file changed, 6 insertions(+)

--- linux-next-20251014.orig/kernel/panic.c
+++ linux-next-20251014/kernel/panic.c
@@ -638,6 +638,12 @@ EXPORT_SYMBOL(panic);
 /*
  * TAINT_FORCED_RMMOD could be a per-module flag but the module
  * is being removed anyway.
+ *
+ * NOTE: if you modify the taint_flags or TAINT_FLAGS_COUNT,
+ * please also modify tools/debugging/kernel-chktaint and
+ * Documentation/admin-guide/tainted-kernels.rst, including its
+ * small shell script that prints the TAINT_FLAGS_COUNT bits of
+ * /proc/sys/kernel/tainted.
  */
 const struct taint_flag taint_flags[TAINT_FLAGS_COUNT] = {
 	TAINT_FLAG(PROPRIETARY_MODULE,		'P', 'G', true),

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ