[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080715115117.GA3300@elte.hu>
Date: Tue, 15 Jul 2008 13:51:17 +0200
From: Ingo Molnar <mingo@...e.hu>
To: Neil Horman <nhorman@...driver.com>
Cc: Simon Arlott <simon@...e.lp0.eu>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Herbert Xu <herbert@...dor.apana.org.au>
Subject: Re: BUG: unable to handle kernel NULL pointer dereference at
000000000000000e (reset_prng_context)
* Ingo Molnar <mingo@...e.hu> wrote:
> i have just triggered this crash too. Please, when you know about
> bootup crashes in your code send a patch to the lkml thread so that
> people can apply it and have a working system.
here's the band-aid patch i'm using.
Ingo
-------------->
commit 3fdcd29e5c272c66424ac7616fcd4a9a725bc206
Author: Ingo Molnar <mingo@...e.hu>
Date: Tue Jul 15 13:34:15 2008 +0200
crypto: exclude broken CRYPTO_PRNG code
Signed-off-by: Ingo Molnar <mingo@...e.hu>
---
crypto/Kconfig | 2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/crypto/Kconfig b/crypto/Kconfig
index ea50357..2cf66ca 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -670,6 +670,8 @@ comment "Random Number Generation"
config CRYPTO_PRNG
tristate "Pseudo Random Number Generation for Cryptographic modules"
+ # causes bootup crashes with config-Tue_Jul_15_10_35_22_CEST_2008.bad
+ depends on 0
help
This option enables the generic pseudo random number generator
for cryptographic modules. Uses the Algorithm specified in
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists