aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/panic.c
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@suse.de>2008-09-24 17:46:44 -0400
committerGreg Kroah-Hartman <gregkh@suse.de>2008-10-10 18:31:05 -0400
commit061b1bd394ca8628b7c24eb4658ba3535da4249a (patch)
tree5711de7ffa17f0f5d0084292707872d19e9b19ff /kernel/panic.c
parentb922df7383749a1c0b7ea64c50fa839263d3816b (diff)
Staging: add TAINT_CRAP for all drivers/staging code
We need to add a flag for all code that is in the drivers/staging/ directory to prevent all other kernel developers from worrying about issues here, and to notify users that the drivers might not be as good as they are normally used to. Based on code from Andreas Gruenbacher and Jeff Mahoney to provide a TAINT flag for the support level of a kernel module in the Novell enterprise kernel release. This is the kernel portion of this feature, the ability for the flag to be set needs to be done in the build process and will happen in a follow-up patch. Cc: Andreas Gruenbacher <agruen@suse.de> Cc: Jeff Mahoney <jeffm@suse.de> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'kernel/panic.c')
-rw-r--r--kernel/panic.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/kernel/panic.c b/kernel/panic.c
index 12c5a0a6c89b..98e2047f4db7 100644
--- a/kernel/panic.c
+++ b/kernel/panic.c
@@ -155,6 +155,7 @@ EXPORT_SYMBOL(panic);
155 * 'U' - Userspace-defined naughtiness. 155 * 'U' - Userspace-defined naughtiness.
156 * 'A' - ACPI table overridden. 156 * 'A' - ACPI table overridden.
157 * 'W' - Taint on warning. 157 * 'W' - Taint on warning.
158 * 'C' - modules from drivers/staging are loaded.
158 * 159 *
159 * The string is overwritten by the next call to print_taint(). 160 * The string is overwritten by the next call to print_taint().
160 */ 161 */
@@ -163,7 +164,7 @@ const char *print_tainted(void)
163{ 164{
164 static char buf[20]; 165 static char buf[20];
165 if (tainted) { 166 if (tainted) {
166 snprintf(buf, sizeof(buf), "Tainted: %c%c%c%c%c%c%c%c%c%c", 167 snprintf(buf, sizeof(buf), "Tainted: %c%c%c%c%c%c%c%c%c%c%c",
167 tainted & TAINT_PROPRIETARY_MODULE ? 'P' : 'G', 168 tainted & TAINT_PROPRIETARY_MODULE ? 'P' : 'G',
168 tainted & TAINT_FORCED_MODULE ? 'F' : ' ', 169 tainted & TAINT_FORCED_MODULE ? 'F' : ' ',
169 tainted & TAINT_UNSAFE_SMP ? 'S' : ' ', 170 tainted & TAINT_UNSAFE_SMP ? 'S' : ' ',
@@ -173,7 +174,8 @@ const char *print_tainted(void)
173 tainted & TAINT_USER ? 'U' : ' ', 174 tainted & TAINT_USER ? 'U' : ' ',
174 tainted & TAINT_DIE ? 'D' : ' ', 175 tainted & TAINT_DIE ? 'D' : ' ',
175 tainted & TAINT_OVERRIDDEN_ACPI_TABLE ? 'A' : ' ', 176 tainted & TAINT_OVERRIDDEN_ACPI_TABLE ? 'A' : ' ',
176 tainted & TAINT_WARN ? 'W' : ' '); 177 tainted & TAINT_WARN ? 'W' : ' ',
178 tainted & TAINT_CRAP ? 'C' : ' ');
177 } 179 }
178 else 180 else
179 snprintf(buf, sizeof(buf), "Not tainted"); 181 snprintf(buf, sizeof(buf), "Not tainted");