diff options
author | Thomas Gleixner <tglx@linutronix.de> | 2010-12-16 13:25:18 (GMT) |
---|---|---|
committer | Scott Wood <scottwood@freescale.com> | 2014-04-10 00:19:41 (GMT) |
commit | 85c416cd2bc39b9227692e73507e6aaefc450afe (patch) | |
tree | e8903325c599b6e9ba0803a5e047d37572b34ce3 /arch/x86/kernel/vm86_32.c | |
parent | e1e38268de0ea7a7ac27de362b155e944e411259 (diff) | |
download | linux-fsl-qoriq-85c416cd2bc39b9227692e73507e6aaefc450afe.tar.xz |
x86: stackprotector: Avoid random pool on rt
CPU bringup calls into the random pool to initialize the stack
canary. During boot that works nicely even on RT as the might sleep
checks are disabled. During CPU hotplug the might sleep checks
trigger. Making the locks in random raw is a major PITA, so avoid the
call on RT is the only sensible solution. This is basically the same
randomness which we get during boot where the random pool has no
entropy and we rely on the TSC randomnness.
Reported-by: Carsten Emde <carsten.emde@osadl.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'arch/x86/kernel/vm86_32.c')
0 files changed, 0 insertions, 0 deletions