-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 02/02/2012 01:42 PM, Juan Orti Alcaine wrote:
I have examined the kernel logs, but can't find why the kernel is
tainted. I haven't compiled any kernel module myself, all are
bundled in Fedora 16 default kernel.
One option is to issue a sysrq command that will print a backtrace (t,
w, l). I tend to use l (show-backtrace-all-active-cpus) as this
doesn't dump too much junk to dmesg. Above the backtraces you'll get a
modules linked in line which shows taint status for individual modules:
SysRq : Show backtrace of all active CPUs
sending NMI to all CPUs:
NMI backtrace for cpu 0
CPU 0
Modules linked in: dm_snapshot nfsd exportfs ebtable_nat ebtables
ipt_MASQUERADE iptable_nat nf_nat xt_CHECKSUM iptable_mangle bridge
stp llc vhost_net macvtap macvlan tun kvm_intel kvm cachefiles nfs
lockd fscache(T) nfs_acl auth_rpcgss autofs4 sunrpc ipt_REJECT
^^^^^^^^^^
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT
nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter
ip6_tables ipv6 ext3 jbd power_meter microcode dcdbas serio_raw
iTCO_wdt iTCO_vendor_support igb dca i7core_edac edac_core sg bnx2
ext4 mbcache jbd2 sd_mod crc_t10dif mpt2sas scsi_transport_sas
raid_class dm_mirror dm_region_hash dm_log dm_mod [last unloaded:
speedstep_lib]
Pid: 0, comm: swapper Tainted: G ---------------- T
2.6.32-216.el6.x86_64 #1 Dell Inc. PowerEdge R510/0DPRKF
If there are no tainting modules listed you might want to see if
there's a last unloaded that could match.
Regards,
Bryn.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla -
http://enigmail.mozdev.org/
iEYEARECAAYFAk8qpcwACgkQ6YSQoMYUY97h0QCcDxSNyyCYaH/PoeFOwLAtMEEG
l2MAoNG8nO0XeonlVixx+0AnggJvEIk8
=O6nG
-----END PGP SIGNATURE-----