summaryrefslogtreecommitdiffstats
path: root/src/kernel/tests/include/tst_taint.h
blob: bd8076c1c29e8051fe26e0851f2c0229d497ec2e (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Copyright (c) 2018 Michael Moese <mmoese@suse.de>
 */

/* Usage example
 *
 * ...
 * #include "tst_test.h"
 * ..
 * static struct tst_test test = {
 *	...
 *	.taint_check = TST_TAINT_W | TST_TAINT_D,
 *	...
 * };
 *
 * void run(void)
 * {
 *	...
 *	. test code here
 *	...
 *	if (tst_taint_check() != 0)
 *		tst_res(TFAIL, "kernel has issues");
 *	else
 *		tst_res(TPASS, "kernel seems to be fine");
 * }
 *
 *
 *
 * The above code checks whether the kernel issued a warning (TST_TAINT_W)
 * or even died (TST_TAINT_D) during test execution.
 * If these are set after running a test case, we most likely
 * triggered a kernel bug.
 *
 * You do not need to use tst_taint_check() explicitly because it'll be called
 * automatically at the end of testing by the LTP library if
 * tst_test.taint_check in non-zero.
 */

#ifndef TST_TAINTED_H__
#define TST_TAINTED_H__

/*
 * This are all 17 flags that are present in kernel 4.15
 * see kernel/panic.c in kernel sources
 *
 * Not all of them are valid in all kernel versions.
 */
#define TST_TAINT_G     (1 <<  0) /* a module with non-GPL license loaded */
#define TST_TAINT_F     (1 <<  1) /* a module was force-loaded */
#define TST_TAINT_S     (1 <<  2) /* SMP with Non-SMP kernel */
#define TST_TAINT_R     (1 <<  3) /* module force unloaded */
#define TST_TAINT_M     (1 <<  4) /* machine check error occurred */
#define TST_TAINT_B     (1 <<  5) /* page-release function found bad page */
#define TST_TAINT_U     (1 <<  6) /* user requested taint flag */
#define TST_TAINT_D     (1 <<  7) /* kernel died recently - OOPS or BUG */
#define TST_TAINT_A     (1 <<  8) /* ACPI table has been overwritten */
#define TST_TAINT_W     (1 <<  9) /* a warning has been issued by kernel */
#define TST_TAINT_C     (1 << 10) /* driver from drivers/staging was loaded */
#define TST_TAINT_I     (1 << 11) /* working around BIOS/Firmware bug */
#define TST_TAINT_O     (1 << 12) /* out of tree module loaded */
#define TST_TAINT_E     (1 << 13) /* unsigned module was loaded */
#define TST_TAINT_L     (1 << 14) /* A soft lock-up has previously occurred */
#define TST_TAINT_K     (1 << 15) /* kernel has been live-patched */
#define TST_TAINT_X     (1 << 16) /* auxiliary taint, for distro's use */
#define TST_TAINT_T     (1 << 17) /* kernel was built with the struct randomization plugin */

/*
 * Initialize and prepare support for checking tainted kernel. Called
 * automatically by LTP library during test setup if tst_test.taint_check
 * is non-zero. The value of tst_test.taint_check will be passed as the mask
 * argument.
 *
 * supply the mask of TAINT-flags you want to check, for example
 * (TST_TAINT_W | TST_TAINT_D) when you want to check if the kernel issued
 * a warning or even reported it died.
 *
 * This function tests if the requested flags are supported on the
 * locally running kernel. In case the tainted-flags are already set by
 * the kernel, there is no reason to continue and TBROK is generated.
 *
 * The mask must not be zero.
 */
void tst_taint_init(unsigned int mask);


/*
 * check if the tainted flags handed to tst_taint_init() are still not set
 * during or after running the test.
 * Calling this function is only allowed after tst_taint_init() was called,
 * otherwise TBROK will be generated.
 *
 * returns 0 or a bitmask of the flags that currently tainted the kernel.
 */
unsigned int tst_taint_check(void);


#endif /* TST_TAINTED_H__ */