La ejecución cat /proc/sys/kernel/tainted
imprime el valor de contaminación del núcleo actual (en base 10). Tengo entendido que este valor es un campo de bits, donde cada bit indica la ausencia o presencia de un tipo particular de contaminación. Puedes extraer los bits usando
python3 -c 'from pprint import pprint; pprint(list(zip(range(50), reversed(bin(int(open("/proc/sys/kernel/tainted").read()))[2:]))))'
He buscado documentación, pero lo que he visto solo identifica el significado de los bits 0 a 10. Por ejemplo, http://www.kernel.org/doc/Documentation/sysctl/kernel.txt dice:
tainted:
Non-zero if the kernel has been tainted. Numeric values, which can be
ORed together. The letters are seen in "Tainted" line of Oops reports.
1 (P): A module with a non-GPL license has been loaded, this
includes modules with no license.
Set by modutils >= 2.4.9 and module-init-tools.
2 (F): A module was force loaded by insmod -f.
Set by modutils >= 2.4.9 and module-init-tools.
4 (S): Unsafe SMP processors: SMP with CPUs not designed for SMP.
8 (R): A module was forcibly unloaded from the system by rmmod -f.
16 (M): A hardware machine check error occurred on the system.
32 (B): A bad page was discovered on the system.
64 (U): The user has asked that the system be marked "tainted". This
could be because they are running software that directly modifies
the hardware, or for other reasons.
128 (D): The system has died.
256 (A): The ACPI DSDT has been overridden with one supplied by the user
instead of using the one provided by the hardware.
512 (W): A kernel warning has occurred.
1024 (C): A module from drivers/staging was loaded.
2048 (I): The system is working around a severe firmware bug.
4096 (O): An out-of-tree module has been loaded.
8192 (E): An unsigned module has been loaded in a kernel supporting module
signature.
16384 (L): A soft lockup has previously occurred on the system.
32768 (K): The kernel has been live patched.
65536 (X): Auxiliary taint, defined and used by for distros.
131072 (T): The kernel was built with the struct randomization plugin.
También intenté ver la documentación para el kernel de Ubuntu instalando el linux-doc
paquete y abriéndolo zless /usr/share/doc/linux-doc/sysctl/kernel.txt.gz
, pero eso solo muestra hasta 1024.
En mi caso, estoy ejecutando el núcleo PAE predeterminado (3.2.0-36-generic-pae) en Precise. También estoy viendo bit 12 set.
¿Dónde está la documentación completa de lo que significan los bits contaminados en los núcleos de Ubuntu?
fuente
kernel.txt
ahora documenta estas dos últimas banderas.