summaryrefslogtreecommitdiffstats
path: root/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-rt/x86-stackprot-no-random-on-rt.patch')
-rw-r--r--debian/patches-rt/x86-stackprot-no-random-on-rt.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
index 2efd764d7..c902fdb75 100644
--- a/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
+++ b/debian/patches-rt/x86-stackprot-no-random-on-rt.patch
@@ -1,7 +1,7 @@
From: Thomas Gleixner <tglx@linutronix.de>
Date: Thu, 16 Dec 2010 14:25:18 +0100
Subject: x86: stackprotector: Avoid random pool on rt
-Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.2/older/patches-5.2.9-rt3.tar.xz
+Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/5.2/older/patches-5.2.10-rt5.tar.xz
CPU bringup calls into the random pool to initialize the stack
canary. During boot that works nicely even on RT as the might sleep