summaryrefslogtreecommitdiffstats
path: root/debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch')
-rw-r--r--debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch b/debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch
index 3021c7916..02aa72603 100644
--- a/debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch
+++ b/debian/patches-rt/0226-x86-stackprotector-Avoid-random-pool-on-rt.patch
@@ -1,7 +1,7 @@
From: Thomas Gleixner <tglx@linutronix.de>
Date: Thu, 16 Dec 2010 14:25:18 +0100
-Subject: [PATCH 226/342] x86: stackprotector: Avoid random pool on rt
-Origin: https://git.kernel.org/cgit/linux/kernel/git/rt/linux-stable-rt.git/commit?id=899dd6a87172ba4ef8839115bce7f4393a0274bc
+Subject: [PATCH 226/351] x86: stackprotector: Avoid random pool on rt
+Origin: https://git.kernel.org/cgit/linux/kernel/git/rt/linux-stable-rt.git/commit?id=816d0fb08c3857907dadc22cd2c4a1f28a111650
CPU bringup calls into the random pool to initialize the stack
canary. During boot that works nicely even on RT as the might sleep