diff options
author | James Bottomley <James.Bottomley@SteelEye.com> | 2005-08-10 11:29:15 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2005-08-10 11:55:19 -0700 |
commit | 606867443764edac5a2c542f2fa0a12ef7a7c7fd (patch) | |
tree | 61110afaef5e8be41be940815a8bd6065e32c5da /kernel | |
parent | 3462b925414a146d4c2252de97d20f89218d1ffb (diff) | |
download | kernel-crypto-606867443764edac5a2c542f2fa0a12ef7a7c7fd.tar.gz kernel-crypto-606867443764edac5a2c542f2fa0a12ef7a7c7fd.tar.xz kernel-crypto-606867443764edac5a2c542f2fa0a12ef7a7c7fd.zip |
[PATCH] remove name length check in a workqueue
We have a chek in there to make sure that the name won't overflow
task_struct.comm[], but it's triggering for scsi with lots of HBAs, only
scsi is using single-threaded workqueues which don't append the "/%d"
anyway.
All too hard. Just kill the BUG_ON.
Cc: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
[ kthread_create() uses vsnprintf() and limits the thing, so no
actual overflow can actually happen regardless ]
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/workqueue.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/kernel/workqueue.c b/kernel/workqueue.c index 259cf55da3c..c7e36d4a70c 100644 --- a/kernel/workqueue.c +++ b/kernel/workqueue.c @@ -308,8 +308,6 @@ struct workqueue_struct *__create_workqueue(const char *name, struct workqueue_struct *wq; struct task_struct *p; - BUG_ON(strlen(name) > 10); - wq = kmalloc(sizeof(*wq), GFP_KERNEL); if (!wq) return NULL; |