/linux/Documentation/admin-guide/ |
H A D | tainted-kernels.rst | 4 The kernel will mark itself as 'tainted' when something occurs that might be 6 most of the time it's not a problem to run a tainted kernel; the information is 8 cause might be the event that got the kernel tainted. That's why bug reports 9 from tainted kernels will often be ignored by developers, hence try to reproduce 12 Note the kernel will remain tainted even after you undo what caused the taint 14 trustworthy. That's also why the kernel will print the tainted state when it 18 check the tainted state at runtime through a file in ``/proc/``. 24 You find the tainted state near the top in a line starting with 'CPU:'; if or 25 why the kernel was tainted is shown after the Process ID ('PID:') and a shortened 35 You'll find a 'Not tainted: ' there if the kernel was not tainted at the [all …]
|
/linux/Documentation/translations/zh_CN/admin-guide/ |
H A D | tainted-kernels.rst | 3 :Original: :doc:`../../../admin-guide/tainted-kernels` 13 (tainted)”的。不用太过担心,大多数情况下运行受污染的内核没有问题;这些信息 38 如果内核在事件发生时没有被污染,您将在那里看到“Not-tainted:”;如果被污染,那 51 在运行时,您可以通过读取 ``cat /proc/sys/kernel/tainted`` 来查询受污染状态。 64 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or 65 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for 75 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
|
H A D | index.rst | 42 tainted-kernels
|
H A D | reporting-issues.rst | 42 之前没有被污染(tainted)。 379 在正在运行的系统上检查内核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted`` 387 如果你的内核被污染了,请阅读 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
|
/linux/Documentation/translations/zh_TW/admin-guide/ |
H A D | tainted-kernels.rst | 5 :Original: :doc:`../../../admin-guide/tainted-kernels` 16 (tainted)”的。不用太過擔心,大多數情況下運行受污染的內核沒有問題;這些信息 41 如果內核在事件發生時沒有被污染,您將在那裏看到“Not-tainted:”;如果被污染,那 54 在運行時,您可以通過讀取 ``cat /proc/sys/kernel/tainted`` 來查詢受污染狀態。 67 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or 68 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for 78 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
|
H A D | index.rst | 45 tainted-kernels
|
H A D | reporting-issues.rst | 43 之前沒有被污染(tainted)。 380 在正在運行的系統上檢查內核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted`` 388 如果你的內核被污染了,請閱讀 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | br_netfilter_queue.sh | 7 read t < /proc/sys/kernel/tainted 9 echo SKIP: kernel is tainted 76 read t < /proc/sys/kernel/tainted 78 echo PASS: kernel not tainted 80 echo ERROR: kernel is tainted
|
H A D | br_netfilter.sh | 16 read t < /proc/sys/kernel/tainted 18 echo SKIP: kernel is tainted 169 read t < /proc/sys/kernel/tainted 171 echo PASS: kernel not tainted 173 echo ERROR: kernel is tainted
|
H A D | nft_queue.sh | 566 read tainted_then < /proc/sys/kernel/tainted 591 read tainted_now < /proc/sys/kernel/tainted
|
/linux/tools/debugging/ |
H A D | kernel-chktaint | 13 Call without parameters to decode /proc/sys/kernel/tainted. 16 retrieved from /proc/sys/kernel/tainted on another system.
|
/linux/drivers/gpu/drm/ci/xfails/ |
H A D | vkms-none-skips.txt | 7 # CPU: 0 PID: 2635 Comm: kworker/u8:13 Not tainted 6.9.0-rc7-g40935263a1fd #1 58 # CPU: 1 PID: 10 Comm: kworker/u8:0 Not tainted 6.9.0-rc7-g646381cde463 #1 109 # CPU: 1 PID: 1913 Comm: kworker/u8:6 Not tainted 6.10.0-rc5-g8a28e73ebead #1 160 # CPU: 0 PID: 1911 Comm: kworker/u8:3 Not tainted 6.10.0-rc5-g5e7a002eefe5 #1 211 # CPU: 0 UID: 0 PID: 27 Comm: kworker/u8:1 Not tainted 6.11.0-rc5-g5d3429a7e9aa #1
|
/linux/Documentation/fault-injection/ |
H A D | nvme-fault-injection.rst | 34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2 92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4 142 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.2.0-rc2+ #2
|
/linux/Documentation/translations/zh_CN/dev-tools/ |
H A D | kcsan.rst | 50 CPU: 6 PID: 488 Comm: access_thread Not tainted 5.12.0-rc2+ #1 72 CPU: 2 PID: 515 Comm: access_thread Not tainted 5.12.0-rc2+ #1
|
H A D | ubsan.rst | 28 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
|
/linux/tools/testing/kunit/test_data/ |
H A D | test_kernel_panic_interrupt.log | 22 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_config_printk_time.log | 28 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_pound_sign.log | 30 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_output_with_prefix_isolated_correctly.log | 29 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_pound_no_prefix.log | 30 CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_multiple_prefixes.log | 28 [ 0.060000][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_interrupted_tap_output.log | 34 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
|
H A D | test_output_isolated_correctly.log | 13 CPU: 0 PID: 0 Comm: swapper Not tainted 5.1.0-rc7-00061-g04652f1cb4aa0 #163
|
/linux/Documentation/dev-tools/ |
H A D | ubsan.rst | 24 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
|
/linux/kernel/trace/ |
H A D | trace_osnoise.c | 358 bool tainted; /* infor users and developers about a problem */ member 428 if (osnoise_data.tainted) in print_osnoise_headers() 457 if (osnoise_data.tainted) in print_osnoise_headers() 493 osnoise_data.tainted = true; \
|