kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #76617
[Bug 1359670] Re: Unsigned oot modules are wrongly tainted and trace events disabled
I have built test kernels with the above patch applied, could you test
those and confirm it differentiates the taint type and that tracing is
now possible. Kernels are at the URL below:
http://people.canonical.com/~apw/lp1359670-trusty/
Please report any testing back here.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359670
Title:
Unsigned oot modules are wrongly tainted and trace events disabled
Status in “linux” package in Ubuntu:
Fix Released
Status in “linux” source package in Trusty:
In Progress
Status in “linux” source package in Utopic:
Fix Released
Bug description:
The issue is explained in detail at http://lwn.net/Articles/588799/
I am trying to load a backported drm module using dkms.
It is not signed so is listed as tainted and trace points are disabled.
As explained in the above article this is because the TAINT_FORCED MODULE flag is incorrectly set for unsigned modules.
The final patch to fix this and add a TAINT_UNSIGNED_MODULE that does
not disable trace points can be found at
http://lwn.net/Articles/588803/ (fixed in 3.15)
Please consider shipping this patch.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-34-generic 3.13.0-34.60
ProcVersionSignature: Ubuntu 3.13.0-34.60-generic 3.13.11.4
Uname: Linux 3.13.0-34-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.3
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/controlC0: badger 2013 F.... pulseaudio
CurrentDesktop: Unity
Date: Thu Aug 21 11:28:15 2014
HibernationDevice: RESUME=UUID=21f8f6b4-495d-4bc6-8dec-1f78435d4b95
InstallationDate: Installed on 2014-06-30 (51 days ago)
InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
MachineType: LENOVO 0301CTO
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-34-generic root=UUID=d56caf05-a203-436f-8497-b8a37294fe8a ro quiet splash vt.handoff=7
RelatedPackageVersions:
linux-restricted-modules-3.13.0-34-generic N/A
linux-backports-modules-3.13.0-34-generic N/A
linux-firmware 1.127.5
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 10/14/2010
dmi.bios.vendor: LENOVO
dmi.bios.version: 80ET42WW (1.19 )
dmi.board.name: 0301CTO
dmi.board.vendor: LENOVO
dmi.board.version: Not Available
dmi.chassis.asset.tag: No Asset Information
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: Not Available
dmi.modalias: dmi:bvnLENOVO:bvr80ET42WW(1.19):bd10/14/2010:svnLENOVO:pn0301CTO:pvrThinkPadEdge:rvnLENOVO:rn0301CTO:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
dmi.product.name: 0301CTO
dmi.product.version: ThinkPad Edge
dmi.sys.vendor: LENOVO
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1359670/+subscriptions
References