netdev
[Top] [All Lists]

Re: kernel bug at sched.c:564! + linux kernel 2.4.25

To: Vladimir Kondratiev <vkondra@xxxxxxx>
Subject: Re: kernel bug at sched.c:564! + linux kernel 2.4.25
From: James Morris <jmorris@xxxxxxxxxx>
Date: Tue, 27 Jul 2004 14:57:04 -0400 (EDT)
Cc: Matt Mackall <mpm@xxxxxxxxxxx>, Niranjan <niranjan_cs2905@xxxxxxxxx>, <netdev@xxxxxxxxxxx>
In-reply-to: <200407272150.50664.vkondra@xxxxxxx>
Sender: netdev-bounce@xxxxxxxxxxx
On Tue, 27 Jul 2004, Vladimir Kondratiev wrote:

> > The crypto functions should be safe to use in softirq context.
> It should be, but:
> <crypto/api.c:121>
> struct crypto_tfm *crypto_alloc_tfm(const char *name, u32 flags)
> {
>         struct crypto_tfm *tfm = NULL;
>         struct crypto_alg *alg;
> 
>         alg = crypto_alg_mod_lookup(name);
>         if (alg == NULL)
>                 goto out;
> 
>         tfm = kmalloc(sizeof(*tfm) + alg->cra_ctxsize, GFP_KERNEL);
> 

By crypto functions I meant encrypt() decrypt() etc, not the allocation.


- James
-- 
James Morris
<jmorris@xxxxxxxxxx>



<Prev in Thread] Current Thread [Next in Thread>