Home
last modified time | relevance | path

Searched refs:tainted (Results 1 – 25 of 36) sorted by relevance

12

/linux/Documentation/admin-guide/
H A Dtainted-kernels.rst4 The kernel will mark itself as 'tainted' when something occurs that might be
6 most of the time it's not a problem to run a tainted kernel; the information is
8 cause might be the event that got the kernel tainted. That's why bug reports
9 from tainted kernels will often be ignored by developers, hence try to reproduce
12 Note the kernel will remain tainted even after you undo what caused the taint
14 trustworthy. That's also why the kernel will print the tainted state when it
18 check the tainted state at runtime through a file in ``/proc/``.
24 You find the tainted state near the top in a line starting with 'CPU:'; if or
25 why the kernel was tainted is shown after the Process ID ('PID:') and a shortened
35 You'll find a 'Not tainted: ' there if the kernel was not tainted at the
[all …]
/linux/Documentation/translations/zh_CN/admin-guide/
H A Dtainted-kernels.rst3 :Original: :doc:`../../../admin-guide/tainted-kernels`
13tainted)”的。不用太过担心,大多数情况下运行受污染的内核没有问题;这些信息
38 如果内核在事件发生时没有被污染,您将在那里看到“Not-tainted:”;如果被污染,那
51 在运行时,您可以通过读取 ``cat /proc/sys/kernel/tainted`` 来查询受污染状态。
64 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
65 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
75 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
H A Dindex.rst42 tainted-kernels
H A Dreporting-issues.rst42 之前没有被污染(tainted)。
379 在正在运行的系统上检查内核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``
387 如果你的内核被污染了,请阅读 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
/linux/Documentation/translations/zh_TW/admin-guide/
H A Dtainted-kernels.rst5 :Original: :doc:`../../../admin-guide/tainted-kernels`
16tainted)”的。不用太過擔心,大多數情況下運行受污染的內核沒有問題;這些信息
41 如果內核在事件發生時沒有被污染,您將在那裏看到“Not-tainted:”;如果被污染,那
54 在運行時,您可以通過讀取 ``cat /proc/sys/kernel/tainted`` 來查詢受污染狀態。
67 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
68 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
78 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
H A Dindex.rst45 tainted-kernels
H A Dreporting-issues.rst43 之前沒有被污染(tainted)。
380 在正在運行的系統上檢查內核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``
388 如果你的內核被污染了,請閱讀 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
/linux/tools/testing/selftests/net/netfilter/
H A Dbr_netfilter_queue.sh7 read t < /proc/sys/kernel/tainted
9 echo SKIP: kernel is tainted
76 read t < /proc/sys/kernel/tainted
78 echo PASS: kernel not tainted
80 echo ERROR: kernel is tainted
H A Dbr_netfilter.sh16 read t < /proc/sys/kernel/tainted
18 echo SKIP: kernel is tainted
169 read t < /proc/sys/kernel/tainted
171 echo PASS: kernel not tainted
173 echo ERROR: kernel is tainted
H A Dnft_queue.sh566 read tainted_then < /proc/sys/kernel/tainted
591 read tainted_now < /proc/sys/kernel/tainted
/linux/tools/debugging/
H A Dkernel-chktaint13 Call without parameters to decode /proc/sys/kernel/tainted.
16 retrieved from /proc/sys/kernel/tainted on another system.
/linux/drivers/gpu/drm/ci/xfails/
H A Dvkms-none-skips.txt7 # CPU: 0 PID: 2635 Comm: kworker/u8:13 Not tainted 6.9.0-rc7-g40935263a1fd #1
58 # CPU: 1 PID: 10 Comm: kworker/u8:0 Not tainted 6.9.0-rc7-g646381cde463 #1
109 # CPU: 1 PID: 1913 Comm: kworker/u8:6 Not tainted 6.10.0-rc5-g8a28e73ebead #1
160 # CPU: 0 PID: 1911 Comm: kworker/u8:3 Not tainted 6.10.0-rc5-g5e7a002eefe5 #1
211 # CPU: 0 UID: 0 PID: 27 Comm: kworker/u8:1 Not tainted 6.11.0-rc5-g5d3429a7e9aa #1
/linux/Documentation/fault-injection/
H A Dnvme-fault-injection.rst34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2
92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4
142 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.2.0-rc2+ #2
/linux/Documentation/translations/zh_CN/dev-tools/
H A Dkcsan.rst50 CPU: 6 PID: 488 Comm: access_thread Not tainted 5.12.0-rc2+ #1
72 CPU: 2 PID: 515 Comm: access_thread Not tainted 5.12.0-rc2+ #1
H A Dubsan.rst28 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
/linux/tools/testing/kunit/test_data/
H A Dtest_kernel_panic_interrupt.log22 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_config_printk_time.log28 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_pound_sign.log30 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_output_with_prefix_isolated_correctly.log29 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_pound_no_prefix.log30 CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_multiple_prefixes.log28 [ 0.060000][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_interrupted_tap_output.log34 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
H A Dtest_output_isolated_correctly.log13 CPU: 0 PID: 0 Comm: swapper Not tainted 5.1.0-rc7-00061-g04652f1cb4aa0 #163
/linux/Documentation/dev-tools/
H A Dubsan.rst24 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
/linux/kernel/trace/
H A Dtrace_osnoise.c358 bool tainted; /* infor users and developers about a problem */ member
428 if (osnoise_data.tainted) in print_osnoise_headers()
457 if (osnoise_data.tainted) in print_osnoise_headers()
493 osnoise_data.tainted = true; \

12