diff options
author | Dave Jones <davej@redhat.com> | 2011-11-15 15:04:00 -0800 |
---|---|---|
committer | Pekka Enberg <penberg@kernel.org> | 2011-11-16 21:14:40 +0200 |
commit | 265d47e7115023df9e2b7a864b207b4738d9e18c (patch) | |
tree | cb696cbbb7eceb99315a72e56abd9cd3ba2964a6 /mm/slub.c | |
parent | 3df1cccdfb3fab6aa9176beb655d802eb384eabc (diff) | |
download | op-kernel-dev-265d47e7115023df9e2b7a864b207b4738d9e18c.zip op-kernel-dev-265d47e7115023df9e2b7a864b207b4738d9e18c.tar.gz |
slub: add taint flag outputting to debug paths
When we get corruption reports, it's useful to see if the kernel was
tainted, to rule out problems we can't do anything about.
Signed-off-by: Dave Jones <davej@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Pekka Enberg <penberg@kernel.org>
Diffstat (limited to 'mm/slub.c')
-rw-r--r-- | mm/slub.c | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -570,7 +570,7 @@ static void slab_bug(struct kmem_cache *s, char *fmt, ...) va_end(args); printk(KERN_ERR "========================================" "=====================================\n"); - printk(KERN_ERR "BUG %s: %s\n", s->name, buf); + printk(KERN_ERR "BUG %s (%s): %s\n", s->name, print_tainted(), buf); printk(KERN_ERR "----------------------------------------" "-------------------------------------\n\n"); } |