On Apr 29 2007 10:30, Thomas Gleixner wrote: >> >> Unless you think we should also use the same "taint" flag on those >> accesses too, and if so, I have no objection. > >Right, this is just a hint, that something in user space is accessing >the hardware directly. Not a too bad idea, but pretty much useless when >we add X to the picture as it will be set always :)
Index: linux-2.6.21-mm_20040728/drivers/char/mem.c =================================================================== --- linux-2.6.21-mm_20040728.orig/drivers/char/mem.c +++ linux-2.6.21-mm_20040728/drivers/char/mem.c @@ -274,6 +274,9 @@ static int mmap_mem(struct file * file, if (!private_mapping_ok(vma)) return -ENOSYS; + if (strcmp(current->comm, "Xorg") != 0) + tainted |= TAINT_USER; + vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff, size, vma->vm_page_prot); #<EOF> Jan -- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/