commit | 3162f751d04086a9d006342de63ac8f44fe0f72a | [log] [tgz] |
---|---|---|
author | Arjan van de Ven <arjan@linux.intel.com> | Tue Sep 26 10:52:39 2006 +0200 |
committer | Andi Kleen <andi@basil.nowhere.org> | Tue Sep 26 10:52:39 2006 +0200 |
tree | be702f29e5604621898e394ef387c2617334bb65 | |
parent | 0a4254058037eb172758961d0a5b94f4320a1425 [diff] |
[PATCH] Add the __stack_chk_fail() function GCC emits a call to a __stack_chk_fail() function when the stack canary is not matching the expected value. Since this is a bad security issue; lets panic the kernel rather than limping along; the kernel really can't be trusted anymore when this happens. Signed-off-by: Arjan van de Ven <arjan@linux.intel.com> Signed-off-by: Ingo Molnar <mingo@elte.hu> Signed-off-by: Andi Kleen <ak@suse.de> CC: Andi Kleen <ak@suse.de>