summaryrefslogtreecommitdiff
path: root/scripts/gcc-x86_32-has-stack-protector.sh
diff options
context:
space:
mode:
authorSeif Mazareeb <seif@marvell.com>2013-10-18 07:33:21 +0400
committerDavid S. Miller <davem@davemloft.net>2013-10-20 02:55:42 +0400
commitf2e5ddcc0d12f9c4c7b254358ad245c9dddce13b (patch)
treebd8dd49ab227109cf96093f3124f7753a5dc0ae3 /scripts/gcc-x86_32-has-stack-protector.sh
parent90c6bd34f884cd9cee21f1d152baf6c18bcac949 (diff)
downloadlinux-f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b.tar.xz
net: fix cipso packet validation when !NETLABEL
When CONFIG_NETLABEL is disabled, the cipso_v4_validate() function could loop forever in the main loop if opt[opt_iter +1] == 0, this will causing a kernel crash in an SMP system, since the CPU executing this function will stall /not respond to IPIs. This problem can be reproduced by running the IP Stack Integrity Checker (http://isic.sourceforge.net) using the following command on a Linux machine connected to DUT: "icmpsic -s rand -d <DUT IP address> -r 123456" wait (1-2 min) Signed-off-by: Seif Mazareeb <seif@marvell.com> Acked-by: Paul Moore <paul@paul-moore.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'scripts/gcc-x86_32-has-stack-protector.sh')
0 files changed, 0 insertions, 0 deletions