On Tue, 23 Nov 2021 16:51:27 +0000
Ferruh Yigit <[email protected]> wrote:

> >>>
> >>> diff --git a/kernel/linux/kni/kni_net.c b/kernel/linux/kni/kni_net.c
> >>> index 611719b5ee27..d47fc6133cbe 100644
> >>> --- a/kernel/linux/kni/kni_net.c
> >>> +++ b/kernel/linux/kni/kni_net.c
> >>> @@ -838,6 +838,14 @@ kni_net_init(struct net_device *dev)
> >>>           dev->header_ops      = &kni_net_header_ops;
> >>>           dev->ethtool_ops     = &kni_net_ethtool_ops;
> >>>           dev->watchdog_timeo = WD_TIMEOUT;
> >>> +
> >>> + /*
> >>> +  * KNI is unsafe since it requires calling userspace to do
> >>> +  * control operations. And the overall quality according to
> >>> +  * kernel standards is the same as devices in staging.
> >>> +  */
> >>> + add_taint(TAINT_CRAP, LOCKDEP_STILL_OK);
> >>> + netdev_warn(dev, "Adding kernel taint for KNI because it is not 
> >>> safe\n");  
> >>
> >> I am for discussing above separate from this patch, since this patch
> >> restores the behavior that exist since KNI module exists.  
> > 
> > Any user of KNI will already get tainted because KNI is out of tree driver.
> >   
> 
> I mean the note and explicit 'add_taint()' you mentioned above, can we 
> separate
> it from this bug fix.

I changed my mind, the existing taint that happens from out of tree is enough.
Especially since KNI is now deprecated.

Reply via email to