On Wed, 21 Jul 2010 16:38:44 -0400 Steven Robertson <steven@xxxxxxxxx> wrote: > Enlarging the buffer size via the MON_IOCT_RING_SIZE ioctl causes > general protection faults. It appears the culprit is an incorrect > argument to mon_free_buff: instead of passing the size of the current > buffer being freed, the size of the new buffer is passed. Aww, I screwed up. Sorry. > Signed-off-by: Steven Robertson <steven@xxxxxxxxx> > - mon_free_buff(rp->b_vec, size/CHUNK_SIZE); > + mon_free_buff(rp->b_vec, rp->b_size/CHUNK_SIZE); > kfree(rp->b_vec); > rp->b_vec = vec; > rp->b_size = size; Acked-by: Pete Zaitcev <zaitcev@xxxxxxxxxx> -- Pete -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html