diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2007-02-13 14:38:58 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@woody.linux-foundation.org> | 2007-02-13 16:07:36 -0800 |
commit | 7f1f86a0d04e79f8165e6f50d329a520b8cd11e5 (patch) | |
tree | b65a460c04a2086baf5c7970c4c4808a93f0c3bf /drivers/char/sysrq.c | |
parent | 552ce544edfbe9bce79952a8c0f8d65b7f2d16bb (diff) | |
download | kernel-crypto-7f1f86a0d04e79f8165e6f50d329a520b8cd11e5.tar.gz kernel-crypto-7f1f86a0d04e79f8165e6f50d329a520b8cd11e5.tar.xz kernel-crypto-7f1f86a0d04e79f8165e6f50d329a520b8cd11e5.zip |
[PATCH] Fix SAK_work workqueue initialization.
Somewhere in the rewrite of the work queues my cleanup of SAK handling
got broken. Maybe I didn't retest it properly or possibly the API
was changing so fast I missed something. Regardless currently
triggering a SAK now generates an ugly BUG_ON and kills the kernel.
Thanks to Alexey Dobriyan <adobriyan@openvz.org> for spotting this.
This modifies the use of SAK_work to initialize it when the data
structure it resides in is initialized, and to simply call
schedule_work when we need to generate a SAK. I update both
data structures that have a SAK_work member for consistency.
All of the old PREPARE_WORK calls that are now gone.
If we call schedule_work again before it has processed it
has generated the first SAK it will simply ignore the duplicate
schedule_work request.
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'drivers/char/sysrq.c')
-rw-r--r-- | drivers/char/sysrq.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/drivers/char/sysrq.c b/drivers/char/sysrq.c index 3757610b783..be73c80d699 100644 --- a/drivers/char/sysrq.c +++ b/drivers/char/sysrq.c @@ -89,7 +89,6 @@ static struct sysrq_key_op sysrq_loglevel_op = { static void sysrq_handle_SAK(int key, struct tty_struct *tty) { struct work_struct *SAK_work = &vc_cons[fg_console].SAK_work; - PREPARE_WORK(SAK_work, vc_SAK); schedule_work(SAK_work); } static struct sysrq_key_op sysrq_SAK_op = { |