summaryrefslogtreecommitdiffstats
path: root/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-rt/x86-stackprot-no-random-on-rt.patch')
-rw-r--r--debian/patches-rt/x86-stackprot-no-random-on-rt.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
index 3b9acd256..6058e39bc 100644
--- a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
+++ b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
@@ -1,7 +1,7 @@
From: Thomas Gleixner <tglx@linutronix.de>
Date: Thu, 16 Dec 2010 14:25:18 +0100
Subject: x86: stackprotector: Avoid random pool on rt
-Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patches-5.10.17-rt32.tar.xz
+Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patches-5.10.21-rt34.tar.xz
CPU bringup calls into the random pool to initialize the stack
canary. During boot that works nicely even on RT as the might sleep