diff options
author | Seif Mazareeb <seif@marvell.com> | 2013-10-18 07:33:21 +0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-10-20 02:55:42 +0400 |
commit | f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b (patch) | |
tree | bd8dd49ab227109cf96093f3124f7753a5dc0ae3 /scripts/gcc-x86_32-has-stack-protector.sh | |
parent | 90c6bd34f884cd9cee21f1d152baf6c18bcac949 (diff) | |
download | linux-f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b.tar.xz |
net: fix cipso packet validation when !NETLABEL
When CONFIG_NETLABEL is disabled, the cipso_v4_validate() function could loop
forever in the main loop if opt[opt_iter +1] == 0, this will causing a kernel
crash in an SMP system, since the CPU executing this function will
stall /not respond to IPIs.
This problem can be reproduced by running the IP Stack Integrity Checker
(http://isic.sourceforge.net) using the following command on a Linux machine
connected to DUT:
"icmpsic -s rand -d <DUT IP address> -r 123456"
wait (1-2 min)
Signed-off-by: Seif Mazareeb <seif@marvell.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'scripts/gcc-x86_32-has-stack-protector.sh')
0 files changed, 0 insertions, 0 deletions