Re: kernel panic about kernel unaligned access

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



vinit dhatrak wrote:
>> my questions are:
>> 1. what does "Not tainted" mean?
>> 2. I grep the kernel and I find the above message comes from do_ade in
>> unaligned.c, If I guess correctly.
>>    but from the call trace I cannot find out who call it.
>>    who and how kernel pass the information to do_ade?
>> 3. as far as i know, inode is the data structure we used to record file.
>> From what information in the inode I can find out the file name the
>> writeback_inodes try to write?
>> appreciate your help,
>> miloody
>>
> 
> I can answer your first question. Loading a proprietary or
> non-GPL-compatible module will 'taint' the running kernel—meaning that
> any problems or bugs experienced will be less likely to be
> investigated by the maintainers. See this "Tainted Kernel" document
> from Novell.
> http://www.novell.com/support/viewContent.do?externalId=3582750&sliceId=1
> 
> In your case, it seems that your kernel is not tainted by any external code.
> Also, what you see as call trace is actually just stack dump, not
> exactly a backtrace.

Hi I also got similar panic in my board (ben nanonote). the process is "Process ksoftirqd/0"
Q: how to get the backtrace? 


--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux