[Intel-gfx] [PATCH igt] lib: Check and report if a subtest triggers a new kernel taint
Chris Wilson
chris at chris-wilson.co.uk
Wed Nov 29 13:43:25 UTC 2017
Quoting Chris Wilson (2017-11-29 12:30:23)
> +static const struct kernel_taint {
> + const char *msg;
> + unsigned int flags;
> +} taints[] = {
> + { "Non-GPL module loaded" },
> + { "Forced module load" },
> + { "Unsafe SMP processor" },
> + { "Forced module unload" },
> + { "Machine Check Exception", TAINT_WARN },
> + { "Bad page detected", TAINT_ERROR },
> + { "Tainted by user request", TAINT_WARN },
> + { "System is on fire", TAINT_ERROR },
> + { "ACPI DSDT has been overridden by user" },
> + { "OOPS", TAINT_ERROR },
> + { "Staging driver loaded; are you mad?" },
> + { "Severe firmware bug workaround active", TAINT_WARN },
> + { "Out-of-tree module loaded" },
> + { "Unsigned module loaded" },
> + { "Soft-lockup detected", TAINT_WARN },
> + { "Kernel has been live patched" },
There's now also TAINT_AUX, which is unused in the kernel.
{ "Some other reason!" }
Maybe should also add
const char *name;
for "AUX" etc.
-Chris
More information about the Intel-gfx
mailing list