kernel tainted?

Paul Cartwright pbcartwright at gmail.com
Thu Mar 13 15:37:00 UTC 2014


On 03/13/2014 10:44 AM, Robert P. J. Day wrote:
>>  cat tainted
>> > 512
>   that bitmask corresponds to a kernel warning having occurred. i
> would just grep thusly:
>
> $ dmesg | grep -i taint
>
> which might identify the module that tainted the kernel when it was
> loaded.
>
> rday
dmesg | grep -i taint
[ 1934.975594] CPU: 4 PID: 3489 Comm: umount Not tainted
3.13.6-200.fc20.x86_64 #1
[79967.867340] CPU: 1 PID: 8641 Comm: umount Tainted: G        W   
3.13.6-200.fc20.x86_64 #1

I added 2 partitions to be mounted in /etc/fstab, would that be it??

-- 
Paul Cartwright
Registered Linux User #367800 and new counter #561587



More information about the users mailing list