linux/debian/patches-rt/0225-panic-skip-get_random_...

38 lines
1.1 KiB
Diff

From 7ee811cf4553273a0516143009ef16bec5ebef68 Mon Sep 17 00:00:00 2001
Message-Id: <7ee811cf4553273a0516143009ef16bec5ebef68.1599166691.git.zanussi@kernel.org>
In-Reply-To: <56457dc415803c8abc5acb513ada877a79596f05.1599166690.git.zanussi@kernel.org>
References: <56457dc415803c8abc5acb513ada877a79596f05.1599166690.git.zanussi@kernel.org>
From: Thomas Gleixner <tglx@linutronix.de>
Date: Tue, 14 Jul 2015 14:26:34 +0200
Subject: [PATCH 225/333] panic: skip get_random_bytes for RT_FULL in
init_oops_id
Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patches-4.19.142-rt63.tar.xz
Disable on -RT. If this is invoked from irq-context we will have problems
to acquire the sleeping lock.
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
---
kernel/panic.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/kernel/panic.c b/kernel/panic.c
index 8138a676fb7d..fa114be5c30f 100644
--- a/kernel/panic.c
+++ b/kernel/panic.c
@@ -480,9 +480,11 @@ static u64 oops_id;
static int init_oops_id(void)
{
+#ifndef CONFIG_PREEMPT_RT_FULL
if (!oops_id)
get_random_bytes(&oops_id, sizeof(oops_id));
else
+#endif
oops_id++;
return 0;
--
2.17.1