Explicitly mark some patches as Forwarded: no or not-needed

This commit is contained in:
Ben Hutchings 2017-04-18 04:19:54 +01:00
parent cf75a4d22c
commit 22e8e7af28
5 changed files with 7 additions and 0 deletions

View File

@ -2,6 +2,7 @@ From: Ben Hutchings <ben@decadent.org.uk>
Date: Sat, 18 Mar 2017 20:47:58 +0000
Subject: fjes: Disable auto-loading
Bug-Debian: https://bugs.debian.org/853976
Forwarded: no
fjes matches a generic ACPI device ID, and relies on its probe
function to distinguish whether that really corresponds to a supported

View File

@ -1,6 +1,7 @@
From: Ben Hutchings <ben@decadent.org.uk>
Date: Tue, 14 Mar 2017 21:35:33 +0000
Subject: userns: Avoid ABI change for CVE-2017-6874 fix
Forwarded: not-needed
The type of ucounts::count changed from atomic_t to int. But they're
the same size, and it's only accessed within kernel/ucount.c, so hide

View File

@ -1,6 +1,8 @@
From: Linn Crosetto <linn@hpe.com>
Date: Tue, 30 Aug 2016 11:54:38 -0600
Subject: arm64: add kernel config option to set securelevel when in Secure Boot mode
Bug-Debian: https://bugs.debian.org/831827
Forwarded: no
Add a kernel configuration option to enable securelevel, to restrict
userspace's ability to modify the running kernel when UEFI Secure Boot is

View File

@ -1,6 +1,8 @@
From: Linn Crosetto <linn@hpe.com>
Date: Mon, 22 Feb 2016 12:54:37 -0700
Subject: arm64/efi: Disable secure boot if shim is in insecure mode
Bug-Debian: https://bugs.debian.org/831827
Forwarded: no
Port to arm64 a patch originally written by Josh Boyer for the x86 EFI
stub.

View File

@ -1,6 +1,7 @@
From: Ben Hutchings <ben@decadent.org.uk>
Date: Fri, 03 Jun 2016 00:48:39 +0100
Subject: mtd: Disable slram and phram when securelevel is enabled
Forwarded: no
The slram and phram drivers both allow mapping regions of physical
address space such that they can then be read and written by userland