We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_read_unlock() around the for_each_online_cpu(cpu) loop. While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.
Reserved 2024-09-11 | Published 2024-09-13 | Updated 2024-11-05 | Assigner Linuxgit.kernel.org/...c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf
git.kernel.org/...c/979b581e4c69257acab1af415ddad6b2d78a2fa5
Support options