[Intel-gfx] [PATCH igt] lib: Check and report if a subtest triggers a new kernel taint

Chris Wilson chris at chris-wilson.co.uk
Wed Nov 29 13:43:25 UTC 2017


Quoting Chris Wilson (2017-11-29 12:30:23)
> +static const struct kernel_taint {
> +       const char *msg;
> +       unsigned int flags;
> +} taints[] = {
> +       { "Non-GPL module loaded" },
> +       { "Forced module load" },
> +       { "Unsafe SMP processor" },
> +       { "Forced module unload" },
> +       { "Machine Check Exception", TAINT_WARN },
> +       { "Bad page detected", TAINT_ERROR },
> +       { "Tainted by user request", TAINT_WARN },
> +       { "System is on fire", TAINT_ERROR },
> +       { "ACPI DSDT has been overridden by user" },
> +       { "OOPS", TAINT_ERROR },
> +       { "Staging driver loaded; are you mad?" },
> +       { "Severe firmware bug workaround active", TAINT_WARN },
> +       { "Out-of-tree module loaded" },
> +       { "Unsigned module loaded" },
> +       { "Soft-lockup detected", TAINT_WARN },
> +       { "Kernel has been live patched" },

There's now also TAINT_AUX, which is unused in the kernel.
	{ "Some other reason!" }

Maybe should also add
	const char *name;
for "AUX" etc.
-Chris


More information about the Intel-gfx mailing list