Kernel tainted

Bryn M. Reeves bmr at redhat.com
Thu Feb 2 15:03:40 UTC 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/02/2012 01:42 PM, Juan Orti Alcaine wrote:
> I have examined the kernel logs, but can't find why the kernel is 
> tainted. I haven't compiled any kernel module myself, all are
> bundled in Fedora 16 default kernel.

One option is to issue a sysrq command that will print a backtrace (t,
w, l). I tend to use l (show-backtrace-all-active-cpus) as this
doesn't dump too much junk to dmesg. Above the backtraces you'll get a
modules linked in line which shows taint status for individual modules:

SysRq : Show backtrace of all active CPUs
sending NMI to all CPUs:
NMI backtrace for cpu 0
CPU 0
Modules linked in: dm_snapshot nfsd exportfs ebtable_nat ebtables
ipt_MASQUERADE iptable_nat nf_nat xt_CHECKSUM iptable_mangle bridge
stp llc vhost_net macvtap macvlan tun kvm_intel kvm cachefiles nfs
lockd fscache(T) nfs_acl auth_rpcgss autofs4 sunrpc ipt_REJECT
^^^^^^^^^^
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT
nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter
ip6_tables ipv6 ext3 jbd power_meter microcode dcdbas serio_raw
iTCO_wdt iTCO_vendor_support igb dca i7core_edac edac_core sg bnx2
ext4 mbcache jbd2 sd_mod crc_t10dif mpt2sas scsi_transport_sas
raid_class dm_mirror dm_region_hash dm_log dm_mod [last unloaded:
speedstep_lib]

Pid: 0, comm: swapper Tainted: G           ---------------- T
2.6.32-216.el6.x86_64 #1 Dell Inc. PowerEdge R510/0DPRKF

If there are no tainting modules listed you might want to see if
there's a last unloaded that could match.

Regards,
Bryn.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk8qpcwACgkQ6YSQoMYUY97h0QCcDxSNyyCYaH/PoeFOwLAtMEEG
l2MAoNG8nO0XeonlVixx+0AnggJvEIk8
=O6nG
-----END PGP SIGNATURE-----


More information about the users mailing list