1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
// SPDX-License-Identifier: MIT
/*
* Copyright © 2021 Intel Corporation
*/
#include <stdio.h>
#include "igt_taints.h"
/* see Linux's include/linux/kernel.h */
static const struct {
int bit;
int bad;
const char *explanation;
} abort_taints[] = {
{ 4, 1, "TAINT_MACHINE_CHECK: Processor reported a Machine Check Exception."},
{ 5, 1, "TAINT_BAD_PAGE: Bad page reference or an unexpected page flags." },
{ 7, 1, "TAINT_DIE: Kernel has died - BUG/OOPS." },
{ 9, 1, "TAINT_WARN: WARN_ON has happened." },
{ -1 }
};
/**
* igt_explain_taints:
* @taints: mask of taints requiring an explanation [inout]
*
* Inspects the mask and looks up the first reason corresponding to a set
* bit in the mask. It returns the reason as a string constant, and removes
* the bit from the mask. If the mask is empty, or we have no known reason
* matching the mask, NULL is returned.
*
* This may be used in a loop to extract all known reasons for why the
* kernel is tainted:
*
* while (reason = igt_explain_taints(&taints))
* igt_info("%s", reason);
*
* Returns the first reason corresponding to a taint bit.
*/
const char *igt_explain_taints(unsigned long *taints)
{
for (typeof(*abort_taints) *taint = abort_taints;
taint->bit >= 0;
taint++) {
if (*taints & (1ul << taint->bit)) {
*taints &= ~(1ul << taint->bit);
return taint->explanation;
}
}
return NULL;
}
/**
* igt_bad_taints:
*
* Returns the mask of kernel taints that IGT considers fatal.
* Such as TAINT_WARN set when the kernel oopses.
*/
unsigned long igt_bad_taints(void)
{
static unsigned long bad_taints;
if (!bad_taints) {
for (typeof(*abort_taints) *taint = abort_taints;
taint->bit >= 0;
taint++) {
if (taint->bad)
bad_taints |= 1ul << taint->bit;
}
}
return bad_taints;
}
/**
* igt_kernel_tainted:
* @taints: bitmask of kernel taints [out]
*
* Reads the bitmask of kernel taints from "/proc/sys/kernel/tainted",
* see linux/kernel.h for the full set of flags. These are set whenever
* the kernel encounters an exceptional condition that may impair functionality.
* The kernel only sets the taint once, and so once a "fatal" condition has
* been encountered, it is generally not advisable to continue testing, as at
* least all future taint reporting will be lost.
*
* igt_kernel_tainted() returns the set of _all_ taints reported via @taints,
* and also the set of _fatal_ taints as its return value.
*
* Returns a mask of fatal taints; 0 if untainted.
*/
unsigned long igt_kernel_tainted(unsigned long *taints)
{
FILE *f;
*taints = 0;
f = fopen("/proc/sys/kernel/tainted", "r");
if (f) {
fscanf(f, "%lu", taints);
fclose(f);
}
return is_tainted(*taints);
}
|