mirror of https://github.com/dynup/kpatch
readme: taint clarifications
This commit is contained in:
parent
c85467db04
commit
d76ba0b9a7
15
README.md
15
README.md
|
@ -205,11 +205,18 @@ ability to arbitrarily modify the kernel, with or without kpatch.
|
||||||
|
|
||||||
**Q. How can I detect if somebody has patched the kernel?**
|
**Q. How can I detect if somebody has patched the kernel?**
|
||||||
|
|
||||||
We hope to create a new kernel TAINT flag which will get set whenever a patch
|
When a patch module is loaded, the `TAINT_USER` flag is set. To test for it,
|
||||||
module is loaded. We are currently using the `TAINT_USER` flag.
|
`cat /proc/sys/kernel/tainted` and check to see if the value of 64 has been
|
||||||
|
OR'ed in.
|
||||||
|
|
||||||
Also, many distros ship with cryptographically signed kernel modules, and will
|
Eventually we hope to have a dedicated `TAINT_KPATCH` flag instead.
|
||||||
taint the kernel anyway if you load an unsigned module.
|
|
||||||
|
Note that the `TAINT_OOT_MODULE` flag (64) will also be set, since the patch
|
||||||
|
module is built outside the Linux kernel source tree.
|
||||||
|
|
||||||
|
If your patch module is unsigned, the `TAINT_FORCED_MODULE` flag (2) will also
|
||||||
|
be set. Starting with Linux 3.15, this will be changed to the more specific
|
||||||
|
`TAINT_UNSIGNED_MODULE` (8192).
|
||||||
|
|
||||||
**Q. Will it destabilize my system?**
|
**Q. Will it destabilize my system?**
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue