Searched refs:tainted (Results 1 – 25 of 37) sorted by relevance
12
37 tainted=$(cat /proc/sys/kernel/tainted)38 if [[ "$tainted" -ne 0 ]]; then71 tainted=$(cat /proc/sys/kernel/tainted)72 if [[ "$tainted" -ne 0 ]]; then
4 The kernel will mark itself as 'tainted' when something occurs that might be6 most of the time it's not a problem to run a tainted kernel; the information is8 cause might be the event that got the kernel tainted. That's why bug reports9 from tainted kernels will often be ignored by developers, hence try to reproduce12 Note the kernel will remain tainted even after you undo what caused the taint14 trustworthy. That's also why the kernel will print the tainted state when it18 check the tainted state at runtime through a file in ``/proc/``.24 You find the tainted state near the top in a line starting with 'CPU:'; if or25 why the kernel was tainted is shown after the Process ID ('PID:') and a shortened35 You'll find a 'Not tainted: ' there if the kernel was not tainted at the[all …]
42 tainted-kernels
60 Modules that are tainted or are being loaded or unloaded are marked with62 file:`Documentation/admin-guide/tainted-kernels.rst`, "being loaded" is122 EIP: 0060:[<c021e50e>] Not tainted VLI
3 :Original: :doc:`../../../admin-guide/tainted-kernels`13 (tainted)”的。不用太过担心,大多数情况下运行受污染的内核没有问题;这些信息38 如果内核在事件发生时没有被污染,您将在那里看到“Not-tainted:”;如果被污染,那51 在运行时,您可以通过读取 ``cat /proc/sys/kernel/tainted`` 来查询受污染状态。64 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or65 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for75 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
47 之前没有被污染(tainted)。385 在正在运行的系统上检查内核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``393 如果你的内核被污染了,请阅读“Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst”
67 `Documentation/admin-guide/tainted-kernels.rst` 文件中进行了描述,“正在被加119 EIP: 0060:[<c021e50e>] Not tainted VLI
5 :Original: :doc:`../../../admin-guide/tainted-kernels`16 (tainted)」的。不用太過擔心,大多數情況下運行受汙染的內核沒有問題;這些信息41 如果內核在事件發生時沒有被汙染,您將在那裡看到「Not-tainted:」;如果被汙染,那54 在運行時,您可以通過讀取 ``cat /proc/sys/kernel/tainted`` 來查詢受汙染狀態。67 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or68 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for78 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
43 tainted-kernels
48 之前沒有被汙染(tainted)。386 在正在運行的系統上檢查內核是否汙染非常容易:如果 ``cat /proc/sys/kernel/tainted``394 如果你的內核被汙染了,請閱讀「Documentation/translations/zh_TW/admin-guide/tainted-kernels.rst」
70 `Documentation/admin-guide/tainted-kernels.rst` 文件中進行了描述,「正在被加122 EIP: 0060:[<c021e50e>] Not tainted VLI
13 Call without parameters to decode /proc/sys/kernel/tainted.16 retrieved from /proc/sys/kernel/tainted on another system.
34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #292 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4142 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.2.0-rc2+ #2
22 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
28 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
29 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
30 CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
30 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
28 [ 0.060000][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
34 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
13 CPU: 0 PID: 0 Comm: swapper Not tainted 5.1.0-rc7-00061-g04652f1cb4aa0 #163
22 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
329 bool tainted; /* infor users and developers about a problem */ member399 if (osnoise_data.tainted) in print_osnoise_headers()428 if (osnoise_data.tainted) in print_osnoise_headers()464 osnoise_data.tainted = true; \
40 Pid: 1552, comm: scsi_scan_6 Not tainted 3.0.0-rc5 #17