Explicitly mark some patches as Forwarded: no or not-needed
This commit is contained in:
parent
cf75a4d22c
commit
22e8e7af28
|
@ -2,6 +2,7 @@ From: Ben Hutchings <ben@decadent.org.uk>
|
|||
Date: Sat, 18 Mar 2017 20:47:58 +0000
|
||||
Subject: fjes: Disable auto-loading
|
||||
Bug-Debian: https://bugs.debian.org/853976
|
||||
Forwarded: no
|
||||
|
||||
fjes matches a generic ACPI device ID, and relies on its probe
|
||||
function to distinguish whether that really corresponds to a supported
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
From: Ben Hutchings <ben@decadent.org.uk>
|
||||
Date: Tue, 14 Mar 2017 21:35:33 +0000
|
||||
Subject: userns: Avoid ABI change for CVE-2017-6874 fix
|
||||
Forwarded: not-needed
|
||||
|
||||
The type of ucounts::count changed from atomic_t to int. But they're
|
||||
the same size, and it's only accessed within kernel/ucount.c, so hide
|
||||
|
|
|
@ -1,6 +1,8 @@
|
|||
From: Linn Crosetto <linn@hpe.com>
|
||||
Date: Tue, 30 Aug 2016 11:54:38 -0600
|
||||
Subject: arm64: add kernel config option to set securelevel when in Secure Boot mode
|
||||
Bug-Debian: https://bugs.debian.org/831827
|
||||
Forwarded: no
|
||||
|
||||
Add a kernel configuration option to enable securelevel, to restrict
|
||||
userspace's ability to modify the running kernel when UEFI Secure Boot is
|
||||
|
|
|
@ -1,6 +1,8 @@
|
|||
From: Linn Crosetto <linn@hpe.com>
|
||||
Date: Mon, 22 Feb 2016 12:54:37 -0700
|
||||
Subject: arm64/efi: Disable secure boot if shim is in insecure mode
|
||||
Bug-Debian: https://bugs.debian.org/831827
|
||||
Forwarded: no
|
||||
|
||||
Port to arm64 a patch originally written by Josh Boyer for the x86 EFI
|
||||
stub.
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
From: Ben Hutchings <ben@decadent.org.uk>
|
||||
Date: Fri, 03 Jun 2016 00:48:39 +0100
|
||||
Subject: mtd: Disable slram and phram when securelevel is enabled
|
||||
Forwarded: no
|
||||
|
||||
The slram and phram drivers both allow mapping regions of physical
|
||||
address space such that they can then be read and written by userland
|
||||
|
|
Loading…
Reference in New Issue