• Pekka Enberg's avatar
    x86: Use KERN_DEFAULT log-level in __show_regs() · d015a092
    Pekka Enberg authored
    Andrew Morton reported a strange looking kmemcheck warning:
    
      WARNING: kmemcheck: Caught 32-bit read from uninitialized memory (ffff88004fba6c20)
      0000000000000000310000000000000000000000000000002413000000c9ffff
       u u u u u u u u u u u u u u u u i i i i i i i i u u u u u u u u
    
       [<ffffffff810af3aa>] kmemleak_scan+0x25a/0x540
       [<ffffffff810afbcb>] kmemleak_scan_thread+0x5b/0xe0
       [<ffffffff8104d0fe>] kthread+0x9e/0xb0
       [<ffffffff81003074>] kernel_thread_helper+0x4/0x10
       [<ffffffffffffffff>] 0xffffffffffffffff
    
    The above printout is missing register dump completely. The
    problem here is that the output comes from syslog which doesn't
    show KERN_INFO log-level messages. We didn't see this before
    because both of us were testing on 32-bit kernels which use the
    _default_ log-level.
    
    Fix that up by explicitly using KERN_DEFAULT log-level for
    __show_regs() printks.
    Signed-off-by: default avatarPekka Enberg <penberg@cs.helsinki.fi>
    Cc: Vegard Nossum <vegard.nossum@gmail.com>
    Cc: Andrew Morton <akpm@linux-foundation.org>
    Cc: Arjan van de Ven <arjan@infradead.org>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    LKML-Reference: <1261988819.4641.2.camel@penberg-laptop>
    Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
    d015a092
process_64.c 15.7 KB