Home
last modified time | relevance | path

Searched refs:tainted (Results 1 – 25 of 38) sorted by relevance

12

/linux-6.1.9/tools/testing/selftests/powerpc/security/
Dmitigation-patching.sh37 tainted=$(cat /proc/sys/kernel/tainted)
38 if [[ "$tainted" -ne 0 ]]; then
71 tainted=$(cat /proc/sys/kernel/tainted)
72 if [[ "$tainted" -ne 0 ]]; then
/linux-6.1.9/Documentation/admin-guide/
Dtainted-kernels.rst4 The kernel will mark itself as 'tainted' when something occurs that might be
6 most of the time it's not a problem to run a tainted kernel; the information is
8 cause might be the event that got the kernel tainted. That's why bug reports
9 from tainted kernels will often be ignored by developers, hence try to reproduce
12 Note the kernel will remain tainted even after you undo what caused the taint
14 trustworthy. That's also why the kernel will print the tainted state when it
18 check the tainted state at runtime through a file in ``/proc/``.
24 You find the tainted state near the top in a line starting with 'CPU:'; if or
25 why the kernel was tainted is shown after the Process ID ('PID:') and a shortened
35 You'll find a 'Not tainted: ' there if the kernel was not tainted at the
[all …]
Dindex.rst42 tainted-kernels
Dbug-hunting.rst60 Modules that are tainted or are being loaded or unloaded are marked with
62 file:`Documentation/admin-guide/tainted-kernels.rst`, "being loaded" is
122 EIP: 0060:[<c021e50e>] Not tainted VLI
/linux-6.1.9/Documentation/translations/zh_CN/admin-guide/
Dtainted-kernels.rst3 :Original: :doc:`../../../admin-guide/tainted-kernels`
13tainted)”的。不用太过担心,大多数情况下运行受污染的内核没有问题;这些信息
38 如果内核在事件发生时没有被污染,您将在那里看到“Not-tainted:”;如果被污染,那
51 在运行时,您可以通过读取 ``cat /proc/sys/kernel/tainted`` 来查询受污染状态。
64 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
65 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
75 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
Dindex.rst43 tainted-kernels
Dreporting-issues.rst42 之前没有被污染(tainted)。
379 在正在运行的系统上检查内核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``
387 如果你的内核被污染了,请阅读 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
Dbug-hunting.rst67 `Documentation/admin-guide/tainted-kernels.rst` 文件中进行了描述,“正在被加
119 EIP: 0060:[<c021e50e>] Not tainted VLI
/linux-6.1.9/Documentation/translations/zh_TW/admin-guide/
Dtainted-kernels.rst5 :Original: :doc:`../../../admin-guide/tainted-kernels`
16tainted)」的。不用太過擔心,大多數情況下運行受汙染的內核沒有問題;這些信息
41 如果內核在事件發生時沒有被汙染,您將在那裡看到「Not-tainted:」;如果被汙染,那
54 在運行時,您可以通過讀取 ``cat /proc/sys/kernel/tainted`` 來查詢受汙染狀態。
67 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
68 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
78 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
Dindex.rst43 tainted-kernels
Dreporting-issues.rst48 之前沒有被汙染(tainted)。
386 在正在運行的系統上檢查內核是否汙染非常容易:如果 ``cat /proc/sys/kernel/tainted``
394 如果你的內核被汙染了,請閱讀「Documentation/translations/zh_TW/admin-guide/tainted-kernels.rst」
Dbug-hunting.rst70 `Documentation/admin-guide/tainted-kernels.rst` 文件中進行了描述,「正在被加
122 EIP: 0060:[<c021e50e>] Not tainted VLI
/linux-6.1.9/tools/debugging/
Dkernel-chktaint13 Call without parameters to decode /proc/sys/kernel/tainted.
16 retrieved from /proc/sys/kernel/tainted on another system.
/linux-6.1.9/Documentation/fault-injection/
Dnvme-fault-injection.rst34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2
92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4
142 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.2.0-rc2+ #2
/linux-6.1.9/tools/testing/kunit/test_data/
Dtest_kernel_panic_interrupt.log22 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_config_printk_time.log28 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_output_with_prefix_isolated_correctly.log29 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_pound_no_prefix.log30 CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_pound_sign.log30 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_multiple_prefixes.log28 [ 0.060000][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_interrupted_tap_output.log34 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_output_isolated_correctly.log13 CPU: 0 PID: 0 Comm: swapper Not tainted 5.1.0-rc7-00061-g04652f1cb4aa0 #163
/linux-6.1.9/Documentation/dev-tools/
Dubsan.rst22 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
/linux-6.1.9/kernel/trace/
Dtrace_osnoise.c328 bool tainted; /* infor users and developers about a problem */ member
398 if (osnoise_data.tainted) in print_osnoise_headers()
427 if (osnoise_data.tainted) in print_osnoise_headers()
463 osnoise_data.tainted = true; \
/linux-6.1.9/Documentation/RCU/
Dlockdep-splat.rst40 Pid: 1552, comm: scsi_scan_6 Not tainted 3.0.0-rc5 #17

12