summaryrefslogtreecommitdiff
path: root/patches/x86-stackprot-no-random-on-rt.patch
diff options
context:
space:
mode:
Diffstat (limited to 'patches/x86-stackprot-no-random-on-rt.patch')
-rw-r--r--patches/x86-stackprot-no-random-on-rt.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/patches/x86-stackprot-no-random-on-rt.patch b/patches/x86-stackprot-no-random-on-rt.patch
index 66c2ecf596d2..32419846de56 100644
--- a/patches/x86-stackprot-no-random-on-rt.patch
+++ b/patches/x86-stackprot-no-random-on-rt.patch
@@ -37,7 +37,7 @@ Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
+ * due to locking constraints. We just leave canary
+ * uninitialized and use the TSC based randomness on top of it.
*/
-+#ifndef CONFIG_PREEMPT_RT_FULL
++#ifndef CONFIG_PREEMPT_RT
get_random_bytes(&canary, sizeof(canary));
+#endif
tsc = rdtsc();