diff options
author | Randy Dunlap <randy.dunlap@oracle.com> | 2008-10-16 01:02:00 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-10-16 14:21:32 -0400 |
commit | 6d5cd6effed5f8c958a6c0df56da336f5a4fdb8a (patch) | |
tree | 6db9fa3aa569a59e633ed4bf39ebb21328b097af /kernel/panic.c | |
parent | 2223c65103d2aa8d0e9c48a956035a1e0353233d (diff) |
taint: fix kernel-doc
Move print_tainted() kernel-doc to avoid the following error:
Error(/var/linsrc/mmotm-2008-1002-1617//kernel/panic.c:155): cannot understand prototype: 'struct tnt '
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Cc: Andi Kleen <andi@firstfloor.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'kernel/panic.c')
-rw-r--r-- | kernel/panic.c | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/kernel/panic.c b/kernel/panic.c index 028013f7afd4..f290e8e866f6 100644 --- a/kernel/panic.c +++ b/kernel/panic.c | |||
@@ -143,21 +143,6 @@ NORET_TYPE void panic(const char * fmt, ...) | |||
143 | 143 | ||
144 | EXPORT_SYMBOL(panic); | 144 | EXPORT_SYMBOL(panic); |
145 | 145 | ||
146 | /** | ||
147 | * print_tainted - return a string to represent the kernel taint state. | ||
148 | * | ||
149 | * 'P' - Proprietary module has been loaded. | ||
150 | * 'F' - Module has been forcibly loaded. | ||
151 | * 'S' - SMP with CPUs not designed for SMP. | ||
152 | * 'R' - User forced a module unload. | ||
153 | * 'M' - System experienced a machine check exception. | ||
154 | * 'B' - System has hit bad_page. | ||
155 | * 'U' - Userspace-defined naughtiness. | ||
156 | * 'A' - ACPI table overridden. | ||
157 | * 'W' - Taint on warning. | ||
158 | * | ||
159 | * The string is overwritten by the next call to print_taint(). | ||
160 | */ | ||
161 | 146 | ||
162 | struct tnt { | 147 | struct tnt { |
163 | u8 bit; | 148 | u8 bit; |
@@ -178,6 +163,21 @@ static const struct tnt tnts[] = { | |||
178 | { TAINT_WARN, 'W', ' ' }, | 163 | { TAINT_WARN, 'W', ' ' }, |
179 | }; | 164 | }; |
180 | 165 | ||
166 | /** | ||
167 | * print_tainted - return a string to represent the kernel taint state. | ||
168 | * | ||
169 | * 'P' - Proprietary module has been loaded. | ||
170 | * 'F' - Module has been forcibly loaded. | ||
171 | * 'S' - SMP with CPUs not designed for SMP. | ||
172 | * 'R' - User forced a module unload. | ||
173 | * 'M' - System experienced a machine check exception. | ||
174 | * 'B' - System has hit bad_page. | ||
175 | * 'U' - Userspace-defined naughtiness. | ||
176 | * 'A' - ACPI table overridden. | ||
177 | * 'W' - Taint on warning. | ||
178 | * | ||
179 | * The string is overwritten by the next call to print_taint(). | ||
180 | */ | ||
181 | const char *print_tainted(void) | 181 | const char *print_tainted(void) |
182 | { | 182 | { |
183 | static char buf[ARRAY_SIZE(tnts) + sizeof("Tainted: ") + 1]; | 183 | static char buf[ARRAY_SIZE(tnts) + sizeof("Tainted: ") + 1]; |