| To: | Vladimir Kondratiev <vkondra@xxxxxxx> |
|---|---|
| Subject: | Re: kernel bug at sched.c:564! + linux kernel 2.4.25 |
| From: | James Morris <jmorris@xxxxxxxxxx> |
| Date: | Tue, 27 Jul 2004 14:57:04 -0400 (EDT) |
| Cc: | Matt Mackall <mpm@xxxxxxxxxxx>, Niranjan <niranjan_cs2905@xxxxxxxxx>, <netdev@xxxxxxxxxxx> |
| In-reply-to: | <200407272150.50664.vkondra@xxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
On Tue, 27 Jul 2004, Vladimir Kondratiev wrote:
> > The crypto functions should be safe to use in softirq context.
> It should be, but:
> <crypto/api.c:121>
> struct crypto_tfm *crypto_alloc_tfm(const char *name, u32 flags)
> {
> struct crypto_tfm *tfm = NULL;
> struct crypto_alg *alg;
>
> alg = crypto_alg_mod_lookup(name);
> if (alg == NULL)
> goto out;
>
> tfm = kmalloc(sizeof(*tfm) + alg->cra_ctxsize, GFP_KERNEL);
>
By crypto functions I meant encrypt() decrypt() etc, not the allocation.
- James
--
James Morris
<jmorris@xxxxxxxxxx>
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: kernel bug at sched.c:564! + linux kernel 2.4.25, Vladimir Kondratiev |
|---|---|
| Next by Date: | netdev-2.6 queue updated, Jeff Garzik |
| Previous by Thread: | Re: kernel bug at sched.c:564! + linux kernel 2.4.25, Vladimir Kondratiev |
| Next by Thread: | Re: kernel bug at sched.c:564! + linux kernel 2.4.25, Niranjan |
| Indexes: | [Date] [Thread] [Top] [All Lists] |