kernel tainted?
Paul Cartwright
pbcartwright at gmail.com
Thu Mar 13 15:37:00 UTC 2014
On 03/13/2014 10:44 AM, Robert P. J. Day wrote:
>> cat tainted
>> > 512
> that bitmask corresponds to a kernel warning having occurred. i
> would just grep thusly:
>
> $ dmesg | grep -i taint
>
> which might identify the module that tainted the kernel when it was
> loaded.
>
> rday
dmesg | grep -i taint
[ 1934.975594] CPU: 4 PID: 3489 Comm: umount Not tainted
3.13.6-200.fc20.x86_64 #1
[79967.867340] CPU: 1 PID: 8641 Comm: umount Tainted: G W
3.13.6-200.fc20.x86_64 #1
I added 2 partitions to be mounted in /etc/fstab, would that be it??
--
Paul Cartwright
Registered Linux User #367800 and new counter #561587
More information about the users
mailing list