diff options
author | Dave Jones <davej@redhat.com> | 2011-11-15 15:04:00 -0800 |
---|---|---|
committer | Pekka Enberg <penberg@kernel.org> | 2011-11-16 21:14:40 +0200 |
commit | 265d47e7115023df9e2b7a864b207b4738d9e18c (patch) | |
tree | cb696cbbb7eceb99315a72e56abd9cd3ba2964a6 | |
parent | 3df1cccdfb3fab6aa9176beb655d802eb384eabc (diff) | |
download | lwn-265d47e7115023df9e2b7a864b207b4738d9e18c.tar.gz lwn-265d47e7115023df9e2b7a864b207b4738d9e18c.zip |
slub: add taint flag outputting to debug paths
When we get corruption reports, it's useful to see if the kernel was
tainted, to rule out problems we can't do anything about.
Signed-off-by: Dave Jones <davej@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Pekka Enberg <penberg@kernel.org>
-rw-r--r-- | mm/slub.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/mm/slub.c b/mm/slub.c index 7d2a996c307e..60552d52f847 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -570,7 +570,7 @@ static void slab_bug(struct kmem_cache *s, char *fmt, ...) va_end(args); printk(KERN_ERR "========================================" "=====================================\n"); - printk(KERN_ERR "BUG %s: %s\n", s->name, buf); + printk(KERN_ERR "BUG %s (%s): %s\n", s->name, print_tainted(), buf); printk(KERN_ERR "----------------------------------------" "-------------------------------------\n\n"); } |