← Back to team overview

kernel-packages team mailing list archive

[Bug 1359670] Re: Unsigned oot modules are wrongly tainted and trace events disabled

 

I have built test kernels with the above patch applied, could you test
those and confirm it differentiates the taint type and that tracing is
now possible.  Kernels are at the URL below:

    http://people.canonical.com/~apw/lp1359670-trusty/

Please report any testing back here.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359670

Title:
  Unsigned oot modules are wrongly tainted and trace events disabled

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  In Progress
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The issue is explained in detail at http://lwn.net/Articles/588799/

  I am trying to load a backported drm module using dkms.
  It is not signed so is listed as tainted and trace points are disabled.
  As explained in the above article this is because the TAINT_FORCED MODULE flag is incorrectly set for unsigned modules.

  The final patch to fix this and add a TAINT_UNSIGNED_MODULE that does
  not disable trace points can be found at
  http://lwn.net/Articles/588803/ (fixed in 3.15)

  Please consider shipping this patch.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-34-generic 3.13.0-34.60
  ProcVersionSignature: Ubuntu 3.13.0-34.60-generic 3.13.11.4
  Uname: Linux 3.13.0-34-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.3
  Architecture: amd64
  AudioDevicesInUse:
   USER        PID ACCESS COMMAND
   /dev/snd/controlC0:  badger     2013 F.... pulseaudio
  CurrentDesktop: Unity
  Date: Thu Aug 21 11:28:15 2014
  HibernationDevice: RESUME=UUID=21f8f6b4-495d-4bc6-8dec-1f78435d4b95
  InstallationDate: Installed on 2014-06-30 (51 days ago)
  InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
  MachineType: LENOVO 0301CTO
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-34-generic root=UUID=d56caf05-a203-436f-8497-b8a37294fe8a ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-34-generic N/A
   linux-backports-modules-3.13.0-34-generic  N/A
   linux-firmware                             1.127.5
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/14/2010
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 80ET42WW (1.19 )
  dmi.board.name: 0301CTO
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Available
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: dmi:bvnLENOVO:bvr80ET42WW(1.19):bd10/14/2010:svnLENOVO:pn0301CTO:pvrThinkPadEdge:rvnLENOVO:rn0301CTO:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 0301CTO
  dmi.product.version: ThinkPad Edge
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359670/+subscriptions


References