Home
last modified time | relevance | path

Searched refs:tainted (Results 1 – 25 of 49) sorted by relevance

12

/linux-6.12.1/tools/testing/selftests/powerpc/security/
Dmitigation-patching.sh37 tainted=$(cat /proc/sys/kernel/tainted)
38 if [[ "$tainted" -ne 0 ]]; then
71 tainted=$(cat /proc/sys/kernel/tainted)
72 if [[ "$tainted" -ne 0 ]]; then
/linux-6.12.1/Documentation/admin-guide/
Dtainted-kernels.rst4 The kernel will mark itself as 'tainted' when something occurs that might be
6 most of the time it's not a problem to run a tainted kernel; the information is
8 cause might be the event that got the kernel tainted. That's why bug reports
9 from tainted kernels will often be ignored by developers, hence try to reproduce
12 Note the kernel will remain tainted even after you undo what caused the taint
14 trustworthy. That's also why the kernel will print the tainted state when it
18 check the tainted state at runtime through a file in ``/proc/``.
24 You find the tainted state near the top in a line starting with 'CPU:'; if or
25 why the kernel was tainted is shown after the Process ID ('PID:') and a shortened
35 You'll find a 'Not tainted: ' there if the kernel was not tainted at the
[all …]
/linux-6.12.1/Documentation/translations/zh_CN/admin-guide/
Dtainted-kernels.rst3 :Original: :doc:`../../../admin-guide/tainted-kernels`
13tainted)”的。不用太过担心,大多数情况下运行受污染的内核没有问题;这些信息
38 如果内核在事件发生时没有被污染,您将在那里看到“Not-tainted:”;如果被污染,那
51 在运行时,您可以通过读取 ``cat /proc/sys/kernel/tainted`` 来查询受污染状态。
64 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
65 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
75 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
Dindex.rst42 tainted-kernels
Dreporting-issues.rst42 之前没有被污染(tainted)。
379 在正在运行的系统上检查内核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``
387 如果你的内核被污染了,请阅读 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
Dbug-hunting.rst67 `Documentation/admin-guide/tainted-kernels.rst` 文件中进行了描述,“正在被加
119 EIP: 0060:[<c021e50e>] Not tainted VLI
/linux-6.12.1/Documentation/translations/zh_TW/admin-guide/
Dtainted-kernels.rst5 :Original: :doc:`../../../admin-guide/tainted-kernels`
16tainted)”的。不用太過擔心,大多數情況下運行受污染的內核沒有問題;這些信息
41 如果內核在事件發生時沒有被污染,您將在那裏看到“Not-tainted:”;如果被污染,那
54 在運行時,您可以通過讀取 ``cat /proc/sys/kernel/tainted`` 來查詢受污染狀態。
67 See Documentation/admin-guide/tainted-kernels.rst in the Linux kernel or
68 https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html for
78 $ for i in $(seq 18); do echo $(($i-1)) $(($(cat /proc/sys/kernel/tainted)>>($i-1)&1));done
Dindex.rst45 tainted-kernels
Dreporting-issues.rst43 之前沒有被污染(tainted)。
380 在正在運行的系統上檢查內核是否污染非常容易:如果 ``cat /proc/sys/kernel/tainted``
388 如果你的內核被污染了,請閱讀 Documentation/translations/zh_CN/admin-guide/tainted-kernels.rst
Dbug-hunting.rst70 `Documentation/admin-guide/tainted-kernels.rst` 文件中進行了描述,“正在被加
122 EIP: 0060:[<c021e50e>] Not tainted VLI
/linux-6.12.1/tools/testing/selftests/net/netfilter/
Dbr_netfilter_queue.sh70 read t < /proc/sys/kernel/tainted
72 echo PASS: kernel not tainted
74 echo ERROR: kernel is tainted
Dbr_netfilter.sh163 read t < /proc/sys/kernel/tainted
165 echo PASS: kernel not tainted
167 echo ERROR: kernel is tainted
/linux-6.12.1/tools/debugging/
Dkernel-chktaint13 Call without parameters to decode /proc/sys/kernel/tainted.
16 retrieved from /proc/sys/kernel/tainted on another system.
/linux-6.12.1/drivers/gpu/drm/ci/xfails/
Dvkms-none-skips.txt7 # CPU: 0 PID: 2635 Comm: kworker/u8:13 Not tainted 6.9.0-rc7-g40935263a1fd #1
58 # CPU: 1 PID: 10 Comm: kworker/u8:0 Not tainted 6.9.0-rc7-g646381cde463 #1
109 # CPU: 1 PID: 1913 Comm: kworker/u8:6 Not tainted 6.10.0-rc5-g8a28e73ebead #1
160 # CPU: 0 PID: 1911 Comm: kworker/u8:3 Not tainted 6.10.0-rc5-g5e7a002eefe5 #1
/linux-6.12.1/Documentation/fault-injection/
Dnvme-fault-injection.rst34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2
92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4
142 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.2.0-rc2+ #2
/linux-6.12.1/tools/testing/kunit/test_data/
Dtest_kernel_panic_interrupt.log22 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_config_printk_time.log28 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_output_with_prefix_isolated_correctly.log29 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_pound_no_prefix.log30 CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_pound_sign.log30 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_multiple_prefixes.log28 [ 0.060000][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
Dtest_interrupted_tap_output.log34 [ 0.060000] CPU: 0 PID: 1 Comm: swapper Not tainted 5.4.0-rc1-gea2dd7c0875e-dirty #2
/linux-6.12.1/Documentation/translations/zh_CN/dev-tools/
Dkcsan.rst50 CPU: 6 PID: 488 Comm: access_thread Not tainted 5.12.0-rc2+ #1
72 CPU: 2 PID: 515 Comm: access_thread Not tainted 5.12.0-rc2+ #1
Dubsan.rst28 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26
/linux-6.12.1/Documentation/dev-tools/
Dubsan.rst24 CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc1+ #26

12