diff options
author | Kazuki Yamaguchi <k@rhe.jp> | 2021-04-07 10:55:46 +0900 |
---|---|---|
committer | Kazuki Yamaguchi <k@rhe.jp> | 2021-04-07 10:55:46 +0900 |
commit | e24b78c9bfae2cf628ec3c40f5543e04bb5e0406 (patch) | |
tree | 82f3d9b0fca522bf7d122c85756faaecc01f0f7c /debian/patches-rt/x86-stackprot-no-random-on-rt.patch | |
parent | fe407802669e4b4e336af87aec9e70e38d538e7c (diff) | |
parent | dd748cd0148acca6bb11005bef5751a4f20fa5f4 (diff) | |
download | linux-debian-e24b78c9bfae2cf628ec3c40f5543e04bb5e0406.tar.gz |
Merge remote-tracking branch 'upstream/buster-backports' into ky/pu-5.11-rhe0
* upstream/buster-backports: (68 commits)
Prepare to release linux (5.10.24-1~bpo10+1).
[x86] efi: Enable EFI_VARS as built-in for compatibility with buster's fwupdate
Prepare to release linux (5.10.24-1).
[armhf] net: dsa: b53: Support setting learning on port
ALSA: usb-audio: Don't avoid stopping the stream at disconnection
Revert "nfsd4: a client's own opens needn't prevent delegations"
Revert "nfsd4: remove check_conflicting_opens warning"
fuse: fix live lock in fuse_iget()
RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes
[x86] crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
[x86] crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg
Prefix changes with 'drivers/perf:'
[arm64] Enable ARM_SMMU_V3_PMU as module
[arm64] Enable ARM_CMN as module
bpf, selftests: Fix up some test_verifier cases for unprivileged
bpf: Add sanity check for upper ptr_limit
bpf: Simplify alu_limit masking for pointer arithmetic
bpf: Fix off-by-one for area size in creating mask to left (CVE-2020-27171)
bpf: Prohibit alu ops for pointer types not defining ptr_limit (CVE-2020-27170)
Refresh "Include package version along with kernel release in stack traces"
...
Diffstat (limited to 'debian/patches-rt/x86-stackprot-no-random-on-rt.patch')
-rw-r--r-- | debian/patches-rt/x86-stackprot-no-random-on-rt.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch index cb4b9e963..6058e39bc 100644 --- a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch +++ b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch @@ -1,7 +1,7 @@ From: Thomas Gleixner <tglx@linutronix.de> Date: Thu, 16 Dec 2010 14:25:18 +0100 Subject: x86: stackprotector: Avoid random pool on rt -Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patches-5.10.8-rt24.tar.xz +Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patches-5.10.21-rt34.tar.xz CPU bringup calls into the random pool to initialize the stack canary. During boot that works nicely even on RT as the might sleep |