Re: [PATCH igt] lib: Check and report if a subtest triggers a new kernel taint

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Chris Wilson (2017-11-29 12:30:23)
> +static const struct kernel_taint {
> +       const char *msg;
> +       unsigned int flags;
> +} taints[] = {
> +       { "Non-GPL module loaded" },
> +       { "Forced module load" },
> +       { "Unsafe SMP processor" },
> +       { "Forced module unload" },
> +       { "Machine Check Exception", TAINT_WARN },
> +       { "Bad page detected", TAINT_ERROR },
> +       { "Tainted by user request", TAINT_WARN },
> +       { "System is on fire", TAINT_ERROR },
> +       { "ACPI DSDT has been overridden by user" },
> +       { "OOPS", TAINT_ERROR },
> +       { "Staging driver loaded; are you mad?" },
> +       { "Severe firmware bug workaround active", TAINT_WARN },
> +       { "Out-of-tree module loaded" },
> +       { "Unsigned module loaded" },
> +       { "Soft-lockup detected", TAINT_WARN },
> +       { "Kernel has been live patched" },

There's now also TAINT_AUX, which is unused in the kernel.
	{ "Some other reason!" }

Maybe should also add
	const char *name;
for "AUX" etc.
-Chris
_______________________________________________
Intel-gfx mailing list
Intel-gfx@xxxxxxxxxxxxxxxxxxxxx
https://lists.freedesktop.org/mailman/listinfo/intel-gfx




[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux