[PATCH -mm] taint: fix kernel-doc
From: Randy Dunlap
Date: Wed Oct 08 2008 - 15:01:07 EST
From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
Move print_tainted() kernel-doc to avoid the following error:
Error(/var/linsrc/mmotm-2008-1002-1617//kernel/panic.c:155): cannot understand prototype: 'struct tnt '
Signed-off-by: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
cc: Andi Kleen <andi@xxxxxxxxxxxxxx>
---
kernel/panic.c | 30 +++++++++++++++---------------
1 file changed, 15 insertions(+), 15 deletions(-)
--- mmotm-2008-1002-1617.orig/kernel/panic.c
+++ mmotm-2008-1002-1617/kernel/panic.c
@@ -136,21 +136,6 @@ NORET_TYPE void panic(const char * fmt,
EXPORT_SYMBOL(panic);
-/**
- * print_tainted - return a string to represent the kernel taint state.
- *
- * 'P' - Proprietary module has been loaded.
- * 'F' - Module has been forcibly loaded.
- * 'S' - SMP with CPUs not designed for SMP.
- * 'R' - User forced a module unload.
- * 'M' - System experienced a machine check exception.
- * 'B' - System has hit bad_page.
- * 'U' - Userspace-defined naughtiness.
- * 'A' - ACPI table overridden.
- * 'W' - Taint on warning.
- *
- * The string is overwritten by the next call to print_taint().
- */
struct tnt {
u8 bit;
@@ -171,6 +156,21 @@ static const struct tnt tnts[] = {
{ TAINT_WARN, 'W', ' ' },
};
+/**
+ * print_tainted - return a string to represent the kernel taint state.
+ *
+ * 'P' - Proprietary module has been loaded.
+ * 'F' - Module has been forcibly loaded.
+ * 'S' - SMP with CPUs not designed for SMP.
+ * 'R' - User forced a module unload.
+ * 'M' - System experienced a machine check exception.
+ * 'B' - System has hit bad_page.
+ * 'U' - Userspace-defined naughtiness.
+ * 'A' - ACPI table overridden.
+ * 'W' - Taint on warning.
+ *
+ * The string is overwritten by the next call to print_taint().
+ */
const char *print_tainted(void)
{
static char buf[ARRAY_SIZE(tnts) + sizeof("Tainted: ") + 1];
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/