Explicitly mark some patches as Forwarded: no or not-needed
This commit is contained in:
parent
cf75a4d22c
commit
22e8e7af28
|
@ -2,6 +2,7 @@ From: Ben Hutchings <ben@decadent.org.uk>
|
||||||
Date: Sat, 18 Mar 2017 20:47:58 +0000
|
Date: Sat, 18 Mar 2017 20:47:58 +0000
|
||||||
Subject: fjes: Disable auto-loading
|
Subject: fjes: Disable auto-loading
|
||||||
Bug-Debian: https://bugs.debian.org/853976
|
Bug-Debian: https://bugs.debian.org/853976
|
||||||
|
Forwarded: no
|
||||||
|
|
||||||
fjes matches a generic ACPI device ID, and relies on its probe
|
fjes matches a generic ACPI device ID, and relies on its probe
|
||||||
function to distinguish whether that really corresponds to a supported
|
function to distinguish whether that really corresponds to a supported
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
From: Ben Hutchings <ben@decadent.org.uk>
|
From: Ben Hutchings <ben@decadent.org.uk>
|
||||||
Date: Tue, 14 Mar 2017 21:35:33 +0000
|
Date: Tue, 14 Mar 2017 21:35:33 +0000
|
||||||
Subject: userns: Avoid ABI change for CVE-2017-6874 fix
|
Subject: userns: Avoid ABI change for CVE-2017-6874 fix
|
||||||
|
Forwarded: not-needed
|
||||||
|
|
||||||
The type of ucounts::count changed from atomic_t to int. But they're
|
The type of ucounts::count changed from atomic_t to int. But they're
|
||||||
the same size, and it's only accessed within kernel/ucount.c, so hide
|
the same size, and it's only accessed within kernel/ucount.c, so hide
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
From: Linn Crosetto <linn@hpe.com>
|
From: Linn Crosetto <linn@hpe.com>
|
||||||
Date: Tue, 30 Aug 2016 11:54:38 -0600
|
Date: Tue, 30 Aug 2016 11:54:38 -0600
|
||||||
Subject: arm64: add kernel config option to set securelevel when in Secure Boot mode
|
Subject: arm64: add kernel config option to set securelevel when in Secure Boot mode
|
||||||
|
Bug-Debian: https://bugs.debian.org/831827
|
||||||
|
Forwarded: no
|
||||||
|
|
||||||
Add a kernel configuration option to enable securelevel, to restrict
|
Add a kernel configuration option to enable securelevel, to restrict
|
||||||
userspace's ability to modify the running kernel when UEFI Secure Boot is
|
userspace's ability to modify the running kernel when UEFI Secure Boot is
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
From: Linn Crosetto <linn@hpe.com>
|
From: Linn Crosetto <linn@hpe.com>
|
||||||
Date: Mon, 22 Feb 2016 12:54:37 -0700
|
Date: Mon, 22 Feb 2016 12:54:37 -0700
|
||||||
Subject: arm64/efi: Disable secure boot if shim is in insecure mode
|
Subject: arm64/efi: Disable secure boot if shim is in insecure mode
|
||||||
|
Bug-Debian: https://bugs.debian.org/831827
|
||||||
|
Forwarded: no
|
||||||
|
|
||||||
Port to arm64 a patch originally written by Josh Boyer for the x86 EFI
|
Port to arm64 a patch originally written by Josh Boyer for the x86 EFI
|
||||||
stub.
|
stub.
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
From: Ben Hutchings <ben@decadent.org.uk>
|
From: Ben Hutchings <ben@decadent.org.uk>
|
||||||
Date: Fri, 03 Jun 2016 00:48:39 +0100
|
Date: Fri, 03 Jun 2016 00:48:39 +0100
|
||||||
Subject: mtd: Disable slram and phram when securelevel is enabled
|
Subject: mtd: Disable slram and phram when securelevel is enabled
|
||||||
|
Forwarded: no
|
||||||
|
|
||||||
The slram and phram drivers both allow mapping regions of physical
|
The slram and phram drivers both allow mapping regions of physical
|
||||||
address space such that they can then be read and written by userland
|
address space such that they can then be read and written by userland
|
||||||
|
|
Loading…
Reference in New Issue