summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/seccomp_64.h
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2010-12-16 14:25:18 +0100
committerClark Williams <williams@redhat.com>2012-04-04 09:14:52 -0500
commit656843d44fca53106e38211693c5b9db91433943 (patch)
treea96110a1c69be2f67d49e5d683836a928659b981 /arch/x86/include/asm/seccomp_64.h
parenteee1eb39947b4e4b5b89dcfb0cf749ccdc809f30 (diff)
x86: stackprotector: Avoid random pool on rt
CPU bringup calls into the random pool to initialize the stack canary. During boot that works nicely even on RT as the might sleep checks are disabled. During CPU hotplug the might sleep checks trigger. Making the locks in random raw is a major PITA, so avoid the call on RT is the only sensible solution. This is basically the same randomness which we get during boot where the random pool has no entropy and we rely on the TSC randomnness. Reported-by: Carsten Emde <carsten.emde@osadl.org> Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'arch/x86/include/asm/seccomp_64.h')
0 files changed, 0 insertions, 0 deletions