mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-22 06:51:26 +02:00
sys-kernel/coreos-sources: bump to 4.13.3
This commit is contained in:
parent
0c74d67698
commit
b518334ede
@ -1,2 +1,2 @@
|
||||
DIST linux-4.13.tar.xz 100579888 SHA256 2db3d6066c3ad93eb25b973a3d2951e022a7e975ee2fa7cbe5bddf84d9a49a2c SHA512 a557c2f0303ae618910b7106ff63d9978afddf470f03cb72aa748213e099a0ecd5f3119aea6cbd7b61df30ca6ef3ec57044d524b7babbaabddf8b08b8bafa7d2 WHIRLPOOL d3d332e02cd3c5056c76c28cf1f81504c6f7b8f2caed7238e7dd7866747fb03154b88d8d7aec4d0eddf5760624bc7d6c5485fb52a3e32d098a2742eba96c0d05
|
||||
DIST patch-4.13.2.xz 26876 SHA256 dfb5753b89580494a54d1021d14f1fa91b54d4ab9bf6175fc8cf8cb8c41d8e3f SHA512 2b9cc6f24c2792b619189c81d8960d6f5dd622f767d6645208c59f3f38c00db5bdfb0d1fbbfa717bea7fd86067921cf07109c9a7a1001ce7a915bfa2a6a2c03e WHIRLPOOL a10675d621b8c92f0961dc32f95a9aad41b3448c7d3485d228772344fe1fc0ac296055c5a74d47c2fff1d798c323d11744d9880c4ac70d71f51e408c3eb4cefe
|
||||
DIST patch-4.13.3.xz 50968 SHA256 bfebd5121512f76ed835223679fc11fc7826aabc31233cefb522e0e1b515d3fe SHA512 7c0675386c0906178661313d2dbaf644df9b43af31c4b8c8cc840c59b952c04c5768089782d79d84fd363e26b1824e05d1516a80b8cae663225fcb9b252d848a WHIRLPOOL 078448665a20aaaa8a251f82356e9d81dd902477da3e303ed942046dd86b3e2166f2c06975ed6a0ac485535ccbfb0128daf7d5f7e756d32470a6dc9d42c1e57f
|
||||
|
@ -1,4 +1,4 @@
|
||||
From d82d62c57793b671f1d8210608429a8f958af27b Mon Sep 17 00:00:00 2001
|
||||
From 24ac5fe9afc189ba0488ad4e2cc0599695927c94 Mon Sep 17 00:00:00 2001
|
||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||
Date: Mon, 21 Nov 2016 23:55:55 +0000
|
||||
Subject: [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 7cf1e97d8455eb2c26235fd9e59474c1ffa4da82 Mon Sep 17 00:00:00 2001
|
||||
From e294d94b1ae46e18f86fdd85bd8082d63de67f51 Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Mon, 21 Nov 2016 23:36:17 +0000
|
||||
Subject: [PATCH 02/24] Add the ability to lock down access to the running
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 769555e79f87db54f7f368446e9ac52c1e0bcda7 Mon Sep 17 00:00:00 2001
|
||||
From eec55ac2d53ae41b5b37a5d377083a691227467f Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Mon, 21 Nov 2016 23:55:55 +0000
|
||||
Subject: [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
|
||||
|
@ -1,4 +1,4 @@
|
||||
From a1130ef9c754f1e254877b957dcb5fabf5586b7b Mon Sep 17 00:00:00 2001
|
||||
From 7594a2244c02195356042096c1dd3ea5f1accc8e Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Wed, 23 Nov 2016 13:22:22 +0000
|
||||
Subject: [PATCH 04/24] Enforce module signatures if the kernel is locked down
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 788740ea3955f557eda64bd2feaab0d0c6a42024 Mon Sep 17 00:00:00 2001
|
||||
From a894549647270203ea88874614c9f6448ac71e5a Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:16 +0000
|
||||
Subject: [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 53ea67f10f3c4627c68387340537db43177e4e62 Mon Sep 17 00:00:00 2001
|
||||
From 2c45e9276090de762bdf1fdfa2075f664d4952fb Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:15 +0000
|
||||
Subject: [PATCH 06/24] kexec: Disable at runtime if the kernel is locked down
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 939cb34ce9fcabab1032cd8967f5b131e56d96ed Mon Sep 17 00:00:00 2001
|
||||
From c1f02b6ef93af49992ea0fcd5a9032e60a6051dc Mon Sep 17 00:00:00 2001
|
||||
From: Dave Young <dyoung@redhat.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:15 +0000
|
||||
Subject: [PATCH 07/24] Copy secure_boot flag in boot params across kexec
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 1524adb975287b91eb0e08773390847b4cfa8df8 Mon Sep 17 00:00:00 2001
|
||||
From 1b3967a9aef85898b7bf0ba16f724522d81c86f0 Mon Sep 17 00:00:00 2001
|
||||
From: "Lee, Chun-Yi" <joeyli.kernel@gmail.com>
|
||||
Date: Wed, 23 Nov 2016 13:49:19 +0000
|
||||
Subject: [PATCH 08/24] kexec_file: Disable at runtime if securelevel has been
|
||||
|
@ -1,4 +1,4 @@
|
||||
From f36424a6ada984decf3eaca67c96f05d3f6e450e Mon Sep 17 00:00:00 2001
|
||||
From 0dcdb925193cdf62471a8eceae7a8d33f064d5fb Mon Sep 17 00:00:00 2001
|
||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||
Date: Tue, 22 Nov 2016 08:46:15 +0000
|
||||
Subject: [PATCH 09/24] hibernate: Disable when the kernel is locked down
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 0a2a46476ffc9db8c678267579e0bd24480d3ded Mon Sep 17 00:00:00 2001
|
||||
From 8caca6fe945e6f67526b45ad1ef401e36bb34f73 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <mjg59@srcf.ucam.org>
|
||||
Date: Wed, 23 Nov 2016 13:28:17 +0000
|
||||
Subject: [PATCH 10/24] uswsusp: Disable when the kernel is locked down
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 4eee045437a0a0f1d4dc81d671ee2133ddd0e6f4 Mon Sep 17 00:00:00 2001
|
||||
From 36512d31a0a50c9be471f719ef91f9f0788d2b4f Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:15 +0000
|
||||
Subject: [PATCH 11/24] PCI: Lock down BAR access when the kernel is locked
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 8f52ffe76881854ba543e83f86bd6abd0307654f Mon Sep 17 00:00:00 2001
|
||||
From 08d7db127c47a2f5563db63894c533f2826195ac Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:16 +0000
|
||||
Subject: [PATCH 12/24] x86: Lock down IO port access when the kernel is locked
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 93b6e11309eaccd2181488156f00ff139cf999f7 Mon Sep 17 00:00:00 2001
|
||||
From b9860ec9018c67336aab681e18b0ebdd20a7ba32 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:17 +0000
|
||||
Subject: [PATCH 13/24] x86: Restrict MSR access when the kernel is locked down
|
||||
|
@ -1,4 +1,4 @@
|
||||
From bc2bb65e83f8fedbd1084d15b20af9226202ebc6 Mon Sep 17 00:00:00 2001
|
||||
From f25d9d9652b00f37f7b92642cc48b268b683ac9e Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:16 +0000
|
||||
Subject: [PATCH 14/24] asus-wmi: Restrict debugfs interface when the kernel is
|
||||
|
@ -1,4 +1,4 @@
|
||||
From fec4bbc75315b8840d9d27e2a57ea60b63776cf5 Mon Sep 17 00:00:00 2001
|
||||
From 23845c3c7ae804a97934d32381db5c564de27ce9 Mon Sep 17 00:00:00 2001
|
||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:16 +0000
|
||||
Subject: [PATCH 15/24] ACPI: Limit access to custom_method when the kernel is
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 8243e0b28a0ee146dea13bab151f371c983be9aa Mon Sep 17 00:00:00 2001
|
||||
From d6c8e80e0e35ed883094e60cdeaf63cbecc8cfff Mon Sep 17 00:00:00 2001
|
||||
From: Josh Boyer <jwboyer@redhat.com>
|
||||
Date: Tue, 22 Nov 2016 08:46:16 +0000
|
||||
Subject: [PATCH 16/24] acpi: Ignore acpi_rsdp kernel param when the kernel has
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 0d957a43d11b257add4d876a131622458773eca4 Mon Sep 17 00:00:00 2001
|
||||
From ab3d740ef513f539d373f7dcbe7578f562380092 Mon Sep 17 00:00:00 2001
|
||||
From: Linn Crosetto <linn@hpe.com>
|
||||
Date: Wed, 23 Nov 2016 13:32:27 +0000
|
||||
Subject: [PATCH 17/24] acpi: Disable ACPI table override if the kernel is
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 9d7395b15977a74fb1abf7c9481ffed623d86266 Mon Sep 17 00:00:00 2001
|
||||
From a567ee9cbbd0748d4e5cd15d8f9d8b683929adc8 Mon Sep 17 00:00:00 2001
|
||||
From: Linn Crosetto <linn@hpe.com>
|
||||
Date: Wed, 23 Nov 2016 13:39:41 +0000
|
||||
Subject: [PATCH 18/24] acpi: Disable APEI error injection if the kernel is
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 3fdffbfff1cafa684d5c7889dddef2a12d0706e4 Mon Sep 17 00:00:00 2001
|
||||
From b35ffb0b950ab4bf184ba257e9595c7ef3a10a05 Mon Sep 17 00:00:00 2001
|
||||
From: "Lee, Chun-Yi" <jlee@suse.com>
|
||||
Date: Wed, 23 Nov 2016 13:52:16 +0000
|
||||
Subject: [PATCH 19/24] bpf: Restrict kernel image access functions when the
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 19e16d4656a76b8250d92dbb5aaf271b5179716d Mon Sep 17 00:00:00 2001
|
||||
From c0ea02ed8cea11aece036c99d09272f93b1d07e0 Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Tue, 22 Nov 2016 10:10:34 +0000
|
||||
Subject: [PATCH 20/24] scsi: Lock down the eata driver
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 1bc8fb8a3563685c064e67f5c76c1e502460eb2a Mon Sep 17 00:00:00 2001
|
||||
From 07ed21cac5d6e65ae0ba686455007c7dd43942c4 Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Fri, 25 Nov 2016 14:37:45 +0000
|
||||
Subject: [PATCH 21/24] Prohibit PCMCIA CIS storage when the kernel is locked
|
||||
|
@ -1,4 +1,4 @@
|
||||
From d061a6c86996f3fab2f7012d0620f4303a704733 Mon Sep 17 00:00:00 2001
|
||||
From f7452e58686ef325e666deb63510f193fef718e1 Mon Sep 17 00:00:00 2001
|
||||
From: David Howells <dhowells@redhat.com>
|
||||
Date: Wed, 7 Dec 2016 10:28:39 +0000
|
||||
Subject: [PATCH 22/24] Lock down TIOCSSERIAL
|
||||
|
@ -1,4 +1,4 @@
|
||||
From ad7945ca0bc2325161f20853b1fd0890e3442009 Mon Sep 17 00:00:00 2001
|
||||
From d0d433798e20cc9e29d091d0f55aa7e987d000e1 Mon Sep 17 00:00:00 2001
|
||||
From: Vito Caputo <vito.caputo@coreos.com>
|
||||
Date: Wed, 25 Nov 2015 02:59:45 -0800
|
||||
Subject: [PATCH 23/24] kbuild: derive relative path for KBUILD_SRC from CURDIR
|
||||
@ -12,7 +12,7 @@ by some undesirable path component.
|
||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/Makefile b/Makefile
|
||||
index 8aad6bc50d52..7479fb7244a9 100644
|
||||
index 0f31ef4aea7b..9456c4def17f 100644
|
||||
--- a/Makefile
|
||||
+++ b/Makefile
|
||||
@@ -142,7 +142,8 @@ $(filter-out _all sub-make $(CURDIR)/Makefile, $(MAKECMDGOALS)) _all: sub-make
|
||||
|
@ -1,4 +1,4 @@
|
||||
From 8bd6dd0f53963431a9e02121a5ee6eb314abb86d Mon Sep 17 00:00:00 2001
|
||||
From fe4ad5f7bc5dd42ae943d8eb431a0307a60b839f Mon Sep 17 00:00:00 2001
|
||||
From: Geoff Levand <geoff@infradead.org>
|
||||
Date: Fri, 11 Nov 2016 17:28:52 -0800
|
||||
Subject: [PATCH 24/24] Add arm64 coreos verity hash
|
||||
|
Loading…
x
Reference in New Issue
Block a user