mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-23 07:21:14 +02:00
Add 4.2 kernel source
Add an ebuild for Linux 4.2 and bring over the relevant patches
This commit is contained in:
parent
dd7958f39e
commit
d6e00b8bb6
@ -27,6 +27,4 @@ ${PATCH_DIR}/10-Add-option-to-automatically-enforce-module-signature.patch \
|
|||||||
${PATCH_DIR}/12-efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch \
|
${PATCH_DIR}/12-efi-Make-EFI_SECURE_BOOT_SIG_ENFORCE-depend-on-EFI.patch \
|
||||||
${PATCH_DIR}/13-efi-Add-EFI_SECURE_BOOT-bit.patch \
|
${PATCH_DIR}/13-efi-Add-EFI_SECURE_BOOT-bit.patch \
|
||||||
${PATCH_DIR}/14-hibernate-Disable-in-a-signed-modules-environment.patch \
|
${PATCH_DIR}/14-hibernate-Disable-in-a-signed-modules-environment.patch \
|
||||||
${PATCH_DIR}/15-cpuset-use-trialcs-mems_allowed-as-a-temp-variable.patch \
|
|
||||||
${PATCH_DIR}/udp-fix-dst-races-with-multicast-early-demux.patch \
|
|
||||||
${PATCH_DIR}/net-wireless-wl18xx-Add-missing-MODULE_FIRMWARE.patch"
|
${PATCH_DIR}/net-wireless-wl18xx-Add-missing-MODULE_FIRMWARE.patch"
|
@ -1,51 +0,0 @@
|
|||||||
cpuset: use trialcs->mems_allowed as a temp variable
|
|
||||||
|
|
||||||
The comment says it's using trialcs->mems_allowed as a temp variable but
|
|
||||||
it didn't match the code. Change the code to match the comment.
|
|
||||||
|
|
||||||
This fixes an issue when writing in cpuset.mems when a sub-directory
|
|
||||||
exists: we need to write several times for the information to persist:
|
|
||||||
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset# mkdir footest9
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset# cd footest9
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# mkdir aa
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# cat cpuset.mems
|
|
||||||
|
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# echo 0 > cpuset.mems
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# cat cpuset.mems
|
|
||||||
|
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# echo 0 > cpuset.mems
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# cat cpuset.mems
|
|
||||||
| 0
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# cat aa/cpuset.mems
|
|
||||||
|
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# echo 0 > aa/cpuset.mems
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9# cat aa/cpuset.mems
|
|
||||||
| 0
|
|
||||||
| root@alban:/sys/fs/cgroup/cpuset/footest9#
|
|
||||||
|
|
||||||
This should help to fix the following issue in Docker:
|
|
||||||
https://github.com/opencontainers/runc/issues/133
|
|
||||||
In some conditions, a Docker container needs to be started twice in
|
|
||||||
order to work.
|
|
||||||
|
|
||||||
Signed-off-by: Alban Crequy <alban@endocode.com>
|
|
||||||
Tested-by: Iago López Galeiras <iago@endocode.com>
|
|
||||||
---
|
|
||||||
kernel/cpuset.c | 2 +-
|
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/kernel/cpuset.c b/kernel/cpuset.c
|
|
||||||
index ee14e3a..f0acff0 100644
|
|
||||||
--- a/kernel/cpuset.c
|
|
||||||
+++ b/kernel/cpuset.c
|
|
||||||
@@ -1223,7 +1223,7 @@ static int update_nodemask(struct cpuset *cs, struct cpuset *trialcs,
|
|
||||||
spin_unlock_irq(&callback_lock);
|
|
||||||
|
|
||||||
/* use trialcs->mems_allowed as a temp variable */
|
|
||||||
- update_nodemasks_hier(cs, &cs->mems_allowed);
|
|
||||||
+ update_nodemasks_hier(cs, &trialcs->mems_allowed);
|
|
||||||
done:
|
|
||||||
return retval;
|
|
||||||
}
|
|
||||||
--
|
|
@ -1,62 +0,0 @@
|
|||||||
From 10e2eb878f3ca07ac2f05fa5ca5e6c4c9174a27a Mon Sep 17 00:00:00 2001
|
|
||||||
From: Eric Dumazet <edumazet@google.com>
|
|
||||||
Date: Sat, 1 Aug 2015 12:14:33 +0200
|
|
||||||
Subject: [PATCH] udp: fix dst races with multicast early demux
|
|
||||||
MIME-Version: 1.0
|
|
||||||
Content-Type: text/plain; charset=UTF-8
|
|
||||||
Content-Transfer-Encoding: 8bit
|
|
||||||
|
|
||||||
Multicast dst are not cached. They carry DST_NOCACHE.
|
|
||||||
|
|
||||||
As mentioned in commit f8864972126899 ("ipv4: fix dst race in
|
|
||||||
sk_dst_get()"), these dst need special care before caching them
|
|
||||||
into a socket.
|
|
||||||
|
|
||||||
Caching them is allowed only if their refcnt was not 0, ie we
|
|
||||||
must use atomic_inc_not_zero()
|
|
||||||
|
|
||||||
Also, we must use READ_ONCE() to fetch sk->sk_rx_dst, as mentioned
|
|
||||||
in commit d0c294c53a771 ("tcp: prevent fetching dst twice in early demux
|
|
||||||
code")
|
|
||||||
|
|
||||||
Fixes: 421b3885bf6d ("udp: ipv4: Add udp early demux")
|
|
||||||
Tested-by: Gregory Hoggarth <Gregory.Hoggarth@alliedtelesis.co.nz>
|
|
||||||
Signed-off-by: Eric Dumazet <edumazet@google.com>
|
|
||||||
Reported-by: Gregory Hoggarth <Gregory.Hoggarth@alliedtelesis.co.nz>
|
|
||||||
Reported-by: Alex Gartrell <agartrell@fb.com>
|
|
||||||
Cc: Michal Kubeček <mkubecek@suse.cz>
|
|
||||||
Signed-off-by: David S. Miller <davem@davemloft.net>
|
|
||||||
---
|
|
||||||
net/ipv4/udp.c | 13 ++++++++++---
|
|
||||||
1 file changed, 10 insertions(+), 3 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c
|
|
||||||
index 83aa604..1b8c5ba 100644
|
|
||||||
--- a/net/ipv4/udp.c
|
|
||||||
+++ b/net/ipv4/udp.c
|
|
||||||
@@ -1995,12 +1995,19 @@ void udp_v4_early_demux(struct sk_buff *skb)
|
|
||||||
|
|
||||||
skb->sk = sk;
|
|
||||||
skb->destructor = sock_efree;
|
|
||||||
- dst = sk->sk_rx_dst;
|
|
||||||
+ dst = READ_ONCE(sk->sk_rx_dst);
|
|
||||||
|
|
||||||
if (dst)
|
|
||||||
dst = dst_check(dst, 0);
|
|
||||||
- if (dst)
|
|
||||||
- skb_dst_set_noref(skb, dst);
|
|
||||||
+ if (dst) {
|
|
||||||
+ /* DST_NOCACHE can not be used without taking a reference */
|
|
||||||
+ if (dst->flags & DST_NOCACHE) {
|
|
||||||
+ if (likely(atomic_inc_not_zero(&dst->__refcnt)))
|
|
||||||
+ skb_dst_set(skb, dst);
|
|
||||||
+ } else {
|
|
||||||
+ skb_dst_set_noref(skb, dst);
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
}
|
|
||||||
|
|
||||||
int udp_rcv(struct sk_buff *skb)
|
|
||||||
--
|
|
||||||
2.4.6
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 936a56597be7d12ca65e1d4df38f3e1d39308318 Mon Sep 17 00:00:00 2001
|
From 6067a76dca90f315916621a657a8a6379b1d0c3b Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Aug 2013 17:58:15 -0400
|
Date: Fri, 9 Aug 2013 17:58:15 -0400
|
||||||
Subject: [PATCH 01/14] Add secure_modules() call
|
Subject: [PATCH 01/14] Add secure_modules() call
|
||||||
@ -12,28 +12,27 @@ Upstream-status: Fedora mustard. Replaced by securelevels, but that was nak'd
|
|||||||
|
|
||||||
Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
|
Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
---
|
---
|
||||||
include/linux/module.h | 7 +++++++
|
include/linux/module.h | 6 ++++++
|
||||||
kernel/module.c | 10 ++++++++++
|
kernel/module.c | 10 ++++++++++
|
||||||
2 files changed, 17 insertions(+)
|
2 files changed, 16 insertions(+)
|
||||||
|
|
||||||
diff --git a/include/linux/module.h b/include/linux/module.h
|
diff --git a/include/linux/module.h b/include/linux/module.h
|
||||||
index c883b86..cdc46a7 100644
|
index 3a19c79..db38634 100644
|
||||||
--- a/include/linux/module.h
|
--- a/include/linux/module.h
|
||||||
+++ b/include/linux/module.h
|
+++ b/include/linux/module.h
|
||||||
@@ -508,6 +508,8 @@ int unregister_module_notifier(struct notifier_block *nb);
|
@@ -635,6 +635,8 @@ static inline bool module_requested_async_probing(struct module *module)
|
||||||
|
return module && module->async_probe_requested;
|
||||||
extern void print_modules(void);
|
}
|
||||||
|
|
||||||
+extern bool secure_modules(void);
|
+extern bool secure_modules(void);
|
||||||
+
|
+
|
||||||
#else /* !CONFIG_MODULES... */
|
#else /* !CONFIG_MODULES... */
|
||||||
|
|
||||||
/* Given an address, look for it in the exception tables. */
|
/* Given an address, look for it in the exception tables. */
|
||||||
@@ -618,6 +620,11 @@ static inline int unregister_module_notifier(struct notifier_block *nb)
|
@@ -751,6 +753,10 @@ static inline bool module_requested_async_probing(struct module *module)
|
||||||
static inline void print_modules(void)
|
return false;
|
||||||
{
|
|
||||||
}
|
}
|
||||||
+
|
|
||||||
+static inline bool secure_modules(void)
|
+static inline bool secure_modules(void)
|
||||||
+{
|
+{
|
||||||
+ return false;
|
+ return false;
|
||||||
@ -42,10 +41,10 @@ index c883b86..cdc46a7 100644
|
|||||||
|
|
||||||
#ifdef CONFIG_SYSFS
|
#ifdef CONFIG_SYSFS
|
||||||
diff --git a/kernel/module.c b/kernel/module.c
|
diff --git a/kernel/module.c b/kernel/module.c
|
||||||
index cfc9e84..1773828 100644
|
index b86b7bf..7f04524 100644
|
||||||
--- a/kernel/module.c
|
--- a/kernel/module.c
|
||||||
+++ b/kernel/module.c
|
+++ b/kernel/module.c
|
||||||
@@ -3915,3 +3915,13 @@ void module_layout(struct module *mod,
|
@@ -4087,3 +4087,13 @@ void module_layout(struct module *mod,
|
||||||
}
|
}
|
||||||
EXPORT_SYMBOL(module_layout);
|
EXPORT_SYMBOL(module_layout);
|
||||||
#endif
|
#endif
|
||||||
@ -60,5 +59,5 @@ index cfc9e84..1773828 100644
|
|||||||
+}
|
+}
|
||||||
+EXPORT_SYMBOL(secure_modules);
|
+EXPORT_SYMBOL(secure_modules);
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From b0000803ff4c4c769aefc37f2d8196756eeb0bb1 Mon Sep 17 00:00:00 2001
|
From 1d82a694eb7508eef1e25c4c4dfe5e4ae9206454 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Thu, 8 Mar 2012 10:10:38 -0500
|
Date: Thu, 8 Mar 2012 10:10:38 -0500
|
||||||
Subject: [PATCH 02/14] PCI: Lock down BAR access when module security is
|
Subject: [PATCH 02/14] PCI: Lock down BAR access when module security is
|
||||||
@ -114,5 +114,5 @@ index b91c4da..98f5637 100644
|
|||||||
|
|
||||||
dev = pci_get_bus_and_slot(bus, dfn);
|
dev = pci_get_bus_and_slot(bus, dfn);
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From a86490e90244d673cf1705dbfeb705cca4d5322e Mon Sep 17 00:00:00 2001
|
From dcddff58bc08a34053c033131bc800e16210a071 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Thu, 8 Mar 2012 10:35:59 -0500
|
Date: Thu, 8 Mar 2012 10:35:59 -0500
|
||||||
Subject: [PATCH 03/14] x86: Lock down IO port access when module security is
|
Subject: [PATCH 03/14] x86: Lock down IO port access when module security is
|
||||||
@ -68,5 +68,5 @@ index 6b1721f..53fe675 100644
|
|||||||
return -EFAULT;
|
return -EFAULT;
|
||||||
while (count-- > 0 && i < 65536) {
|
while (count-- > 0 && i < 65536) {
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From ab99ed435205e3d47265a572c22226c62db1923a Mon Sep 17 00:00:00 2001
|
From c2c125a4fdabc50a25952e5a81c0fd2b46fde688 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Mar 2012 08:39:37 -0500
|
Date: Fri, 9 Mar 2012 08:39:37 -0500
|
||||||
Subject: [PATCH 04/14] ACPI: Limit access to custom_method
|
Subject: [PATCH 04/14] ACPI: Limit access to custom_method
|
||||||
@ -27,5 +27,5 @@ index c68e724..4277938 100644
|
|||||||
/* parse the table header to get the table length */
|
/* parse the table header to get the table length */
|
||||||
if (count <= sizeof(struct acpi_table_header))
|
if (count <= sizeof(struct acpi_table_header))
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From d410f5739b850b6ad738ad042e88cd76c26a95f3 Mon Sep 17 00:00:00 2001
|
From 9adc395ee42eb155a05fc82ca07cb3d77f19abe6 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Mar 2012 08:46:50 -0500
|
Date: Fri, 9 Mar 2012 08:46:50 -0500
|
||||||
Subject: [PATCH 05/14] asus-wmi: Restrict debugfs interface when module
|
Subject: [PATCH 05/14] asus-wmi: Restrict debugfs interface when module
|
||||||
@ -16,10 +16,10 @@ Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
|
|||||||
1 file changed, 9 insertions(+)
|
1 file changed, 9 insertions(+)
|
||||||
|
|
||||||
diff --git a/drivers/platform/x86/asus-wmi.c b/drivers/platform/x86/asus-wmi.c
|
diff --git a/drivers/platform/x86/asus-wmi.c b/drivers/platform/x86/asus-wmi.c
|
||||||
index 7543a56..93b5a69 100644
|
index efbc3f0..071171b 100644
|
||||||
--- a/drivers/platform/x86/asus-wmi.c
|
--- a/drivers/platform/x86/asus-wmi.c
|
||||||
+++ b/drivers/platform/x86/asus-wmi.c
|
+++ b/drivers/platform/x86/asus-wmi.c
|
||||||
@@ -1589,6 +1589,9 @@ static int show_dsts(struct seq_file *m, void *data)
|
@@ -1868,6 +1868,9 @@ static int show_dsts(struct seq_file *m, void *data)
|
||||||
int err;
|
int err;
|
||||||
u32 retval = -1;
|
u32 retval = -1;
|
||||||
|
|
||||||
@ -29,7 +29,7 @@ index 7543a56..93b5a69 100644
|
|||||||
err = asus_wmi_get_devstate(asus, asus->debug.dev_id, &retval);
|
err = asus_wmi_get_devstate(asus, asus->debug.dev_id, &retval);
|
||||||
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
@@ -1605,6 +1608,9 @@ static int show_devs(struct seq_file *m, void *data)
|
@@ -1884,6 +1887,9 @@ static int show_devs(struct seq_file *m, void *data)
|
||||||
int err;
|
int err;
|
||||||
u32 retval = -1;
|
u32 retval = -1;
|
||||||
|
|
||||||
@ -39,7 +39,7 @@ index 7543a56..93b5a69 100644
|
|||||||
err = asus_wmi_set_devstate(asus->debug.dev_id, asus->debug.ctrl_param,
|
err = asus_wmi_set_devstate(asus->debug.dev_id, asus->debug.ctrl_param,
|
||||||
&retval);
|
&retval);
|
||||||
|
|
||||||
@@ -1629,6 +1635,9 @@ static int show_call(struct seq_file *m, void *data)
|
@@ -1908,6 +1914,9 @@ static int show_call(struct seq_file *m, void *data)
|
||||||
union acpi_object *obj;
|
union acpi_object *obj;
|
||||||
acpi_status status;
|
acpi_status status;
|
||||||
|
|
||||||
@ -50,5 +50,5 @@ index 7543a56..93b5a69 100644
|
|||||||
1, asus->debug.method_id,
|
1, asus->debug.method_id,
|
||||||
&input, &output);
|
&input, &output);
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From f463770943d3f1f6881fab3c9268fe1013cdf34a Mon Sep 17 00:00:00 2001
|
From 2ca28096b959a2f53a3a761426418aea7a4d48f6 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Mar 2012 09:28:15 -0500
|
Date: Fri, 9 Mar 2012 09:28:15 -0500
|
||||||
Subject: [PATCH 06/14] Restrict /dev/mem and /dev/kmem when module loading is
|
Subject: [PATCH 06/14] Restrict /dev/mem and /dev/kmem when module loading is
|
||||||
@ -38,5 +38,5 @@ index 53fe675..b52c888 100644
|
|||||||
unsigned long to_write = min_t(unsigned long, count,
|
unsigned long to_write = min_t(unsigned long, count,
|
||||||
(unsigned long)high_memory - p);
|
(unsigned long)high_memory - p);
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From a9f8a4bbb86570f8f418e400eb9cfe284b8f62ea Mon Sep 17 00:00:00 2001
|
From 9f838b6efbbabccbef59f278c13381c332e5b992 Mon Sep 17 00:00:00 2001
|
||||||
From: Josh Boyer <jwboyer@redhat.com>
|
From: Josh Boyer <jwboyer@redhat.com>
|
||||||
Date: Mon, 25 Jun 2012 19:57:30 -0400
|
Date: Mon, 25 Jun 2012 19:57:30 -0400
|
||||||
Subject: [PATCH 07/14] acpi: Ignore acpi_rsdp kernel parameter when module
|
Subject: [PATCH 07/14] acpi: Ignore acpi_rsdp kernel parameter when module
|
||||||
@ -14,7 +14,7 @@ Signed-off-by: Josh Boyer <jwboyer@redhat.com>
|
|||||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c
|
diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c
|
||||||
index 7ccba39..9cbdbcc 100644
|
index 3b8963f..a5ae6a7 100644
|
||||||
--- a/drivers/acpi/osl.c
|
--- a/drivers/acpi/osl.c
|
||||||
+++ b/drivers/acpi/osl.c
|
+++ b/drivers/acpi/osl.c
|
||||||
@@ -44,6 +44,7 @@
|
@@ -44,6 +44,7 @@
|
||||||
@ -25,7 +25,7 @@ index 7ccba39..9cbdbcc 100644
|
|||||||
|
|
||||||
#include <asm/io.h>
|
#include <asm/io.h>
|
||||||
#include <asm/uaccess.h>
|
#include <asm/uaccess.h>
|
||||||
@@ -252,7 +253,7 @@ early_param("acpi_rsdp", setup_acpi_rsdp);
|
@@ -255,7 +256,7 @@ early_param("acpi_rsdp", setup_acpi_rsdp);
|
||||||
acpi_physical_address __init acpi_os_get_root_pointer(void)
|
acpi_physical_address __init acpi_os_get_root_pointer(void)
|
||||||
{
|
{
|
||||||
#ifdef CONFIG_KEXEC
|
#ifdef CONFIG_KEXEC
|
||||||
@ -35,5 +35,5 @@ index 7ccba39..9cbdbcc 100644
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From a79e89146431a294b7afe9ad4f170c9e263f36c2 Mon Sep 17 00:00:00 2001
|
From 9b3e6387aadd3baa76e5c1abd7c9071b4871885a Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Aug 2013 03:33:56 -0400
|
Date: Fri, 9 Aug 2013 03:33:56 -0400
|
||||||
Subject: [PATCH 08/14] kexec: Disable at runtime if the kernel enforces module
|
Subject: [PATCH 08/14] kexec: Disable at runtime if the kernel enforces module
|
||||||
@ -14,7 +14,7 @@ Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
|
|||||||
1 file changed, 8 insertions(+)
|
1 file changed, 8 insertions(+)
|
||||||
|
|
||||||
diff --git a/kernel/kexec.c b/kernel/kexec.c
|
diff --git a/kernel/kexec.c b/kernel/kexec.c
|
||||||
index 7a36fdc..22d30d7 100644
|
index a785c10..81d6b40 100644
|
||||||
--- a/kernel/kexec.c
|
--- a/kernel/kexec.c
|
||||||
+++ b/kernel/kexec.c
|
+++ b/kernel/kexec.c
|
||||||
@@ -36,6 +36,7 @@
|
@@ -36,6 +36,7 @@
|
||||||
@ -25,7 +25,7 @@ index 7a36fdc..22d30d7 100644
|
|||||||
|
|
||||||
#include <asm/page.h>
|
#include <asm/page.h>
|
||||||
#include <asm/uaccess.h>
|
#include <asm/uaccess.h>
|
||||||
@@ -1247,6 +1248,13 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments,
|
@@ -1258,6 +1259,13 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments,
|
||||||
return -EPERM;
|
return -EPERM;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -40,5 +40,5 @@ index 7a36fdc..22d30d7 100644
|
|||||||
* This leaves us room for future extensions.
|
* This leaves us room for future extensions.
|
||||||
*/
|
*/
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 204575347e0f12cafb44b09e95f1512417c2bff2 Mon Sep 17 00:00:00 2001
|
From 54cae7b82dc43c871e0cba995d1cf14c5afd7a49 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 8 Feb 2013 11:12:13 -0800
|
Date: Fri, 8 Feb 2013 11:12:13 -0800
|
||||||
Subject: [PATCH 09/14] x86: Restrict MSR access when module loading is
|
Subject: [PATCH 09/14] x86: Restrict MSR access when module loading is
|
||||||
@ -40,5 +40,5 @@ index 113e707..26c2f83 100644
|
|||||||
err = -EFAULT;
|
err = -EFAULT;
|
||||||
break;
|
break;
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 51778d46aa09dd60ae2e4025ed87f17674beaa53 Mon Sep 17 00:00:00 2001
|
From 20d26ef5fc1f9686c8ef9965785227b8ce78e159 Mon Sep 17 00:00:00 2001
|
||||||
From: Matthew Garrett <matthew.garrett@nebula.com>
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
||||||
Date: Fri, 9 Aug 2013 18:36:30 -0400
|
Date: Fri, 9 Aug 2013 18:36:30 -0400
|
||||||
Subject: [PATCH 10/14] Add option to automatically enforce module signatures
|
Subject: [PATCH 10/14] Add option to automatically enforce module signatures
|
||||||
@ -34,10 +34,10 @@ index 82fbdbc..a811210 100644
|
|||||||
290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
||||||
2D0/A00 ALL e820_map E820 memory map table
|
2D0/A00 ALL e820_map E820 memory map table
|
||||||
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
|
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
|
||||||
index 226d569..6a8f880 100644
|
index b3a1a5d..e6680fb 100644
|
||||||
--- a/arch/x86/Kconfig
|
--- a/arch/x86/Kconfig
|
||||||
+++ b/arch/x86/Kconfig
|
+++ b/arch/x86/Kconfig
|
||||||
@@ -1697,6 +1697,16 @@ config EFI_MIXED
|
@@ -1704,6 +1704,16 @@ config EFI_MIXED
|
||||||
|
|
||||||
If unsure, say N.
|
If unsure, say N.
|
||||||
|
|
||||||
@ -55,7 +55,7 @@ index 226d569..6a8f880 100644
|
|||||||
def_bool y
|
def_bool y
|
||||||
prompt "Enable seccomp to safely compute untrusted bytecode"
|
prompt "Enable seccomp to safely compute untrusted bytecode"
|
||||||
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
|
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
|
||||||
index 48304b8..2ff1901 100644
|
index 7d69afd..03bfc83 100644
|
||||||
--- a/arch/x86/boot/compressed/eboot.c
|
--- a/arch/x86/boot/compressed/eboot.c
|
||||||
+++ b/arch/x86/boot/compressed/eboot.c
|
+++ b/arch/x86/boot/compressed/eboot.c
|
||||||
@@ -12,6 +12,7 @@
|
@@ -12,6 +12,7 @@
|
||||||
@ -104,7 +104,7 @@ index 48304b8..2ff1901 100644
|
|||||||
/*
|
/*
|
||||||
* See if we have Graphics Output Protocol
|
* See if we have Graphics Output Protocol
|
||||||
*/
|
*/
|
||||||
@@ -1408,6 +1440,10 @@ struct boot_params *efi_main(struct efi_config *c,
|
@@ -1416,6 +1448,10 @@ struct boot_params *efi_main(struct efi_config *c,
|
||||||
else
|
else
|
||||||
setup_boot_services32(efi_early);
|
setup_boot_services32(efi_early);
|
||||||
|
|
||||||
@ -130,10 +130,10 @@ index ab456dc..74ba408 100644
|
|||||||
* The sentinel is set to a nonzero value (0xff) in header.S.
|
* The sentinel is set to a nonzero value (0xff) in header.S.
|
||||||
*
|
*
|
||||||
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
||||||
index d74ac33..88dad73 100644
|
index 80f874b..c2e4f52 100644
|
||||||
--- a/arch/x86/kernel/setup.c
|
--- a/arch/x86/kernel/setup.c
|
||||||
+++ b/arch/x86/kernel/setup.c
|
+++ b/arch/x86/kernel/setup.c
|
||||||
@@ -1156,6 +1156,12 @@ void __init setup_arch(char **cmdline_p)
|
@@ -1160,6 +1160,12 @@ void __init setup_arch(char **cmdline_p)
|
||||||
|
|
||||||
io_delay_init();
|
io_delay_init();
|
||||||
|
|
||||||
@ -147,10 +147,10 @@ index d74ac33..88dad73 100644
|
|||||||
* Parse the ACPI tables for possible boot-time SMP configuration.
|
* Parse the ACPI tables for possible boot-time SMP configuration.
|
||||||
*/
|
*/
|
||||||
diff --git a/include/linux/module.h b/include/linux/module.h
|
diff --git a/include/linux/module.h b/include/linux/module.h
|
||||||
index cdc46a7..0c1edd3 100644
|
index db38634..4b8df91 100644
|
||||||
--- a/include/linux/module.h
|
--- a/include/linux/module.h
|
||||||
+++ b/include/linux/module.h
|
+++ b/include/linux/module.h
|
||||||
@@ -188,6 +188,12 @@ const struct exception_table_entry *search_exception_tables(unsigned long add);
|
@@ -273,6 +273,12 @@ const struct exception_table_entry *search_exception_tables(unsigned long add);
|
||||||
|
|
||||||
struct notifier_block;
|
struct notifier_block;
|
||||||
|
|
||||||
@ -164,10 +164,10 @@ index cdc46a7..0c1edd3 100644
|
|||||||
|
|
||||||
extern int modules_disabled; /* for sysctl */
|
extern int modules_disabled; /* for sysctl */
|
||||||
diff --git a/kernel/module.c b/kernel/module.c
|
diff --git a/kernel/module.c b/kernel/module.c
|
||||||
index 1773828..e7065d6 100644
|
index 7f04524..2b403ab 100644
|
||||||
--- a/kernel/module.c
|
--- a/kernel/module.c
|
||||||
+++ b/kernel/module.c
|
+++ b/kernel/module.c
|
||||||
@@ -3916,6 +3916,13 @@ void module_layout(struct module *mod,
|
@@ -4088,6 +4088,13 @@ void module_layout(struct module *mod,
|
||||||
EXPORT_SYMBOL(module_layout);
|
EXPORT_SYMBOL(module_layout);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -182,5 +182,5 @@ index 1773828..e7065d6 100644
|
|||||||
{
|
{
|
||||||
#ifdef CONFIG_MODULE_SIG
|
#ifdef CONFIG_MODULE_SIG
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 0a0fa32050ac4335b919bae16038acdea35ba55f Mon Sep 17 00:00:00 2001
|
From 4095f969830267114c73cbef05fc3b984f34bc34 Mon Sep 17 00:00:00 2001
|
||||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||||
Date: Tue, 5 Feb 2013 19:25:05 -0500
|
Date: Tue, 5 Feb 2013 19:25:05 -0500
|
||||||
Subject: [PATCH 11/14] efi: Disable secure boot if shim is in insecure mode
|
Subject: [PATCH 11/14] efi: Disable secure boot if shim is in insecure mode
|
||||||
@ -15,7 +15,7 @@ Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
|
|||||||
1 file changed, 19 insertions(+), 1 deletion(-)
|
1 file changed, 19 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
|
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
|
||||||
index 2ff1901..35268ab 100644
|
index 03bfc83..1e80f3a 100644
|
||||||
--- a/arch/x86/boot/compressed/eboot.c
|
--- a/arch/x86/boot/compressed/eboot.c
|
||||||
+++ b/arch/x86/boot/compressed/eboot.c
|
+++ b/arch/x86/boot/compressed/eboot.c
|
||||||
@@ -830,8 +830,9 @@ out:
|
@@ -830,8 +830,9 @@ out:
|
||||||
@ -54,5 +54,5 @@ index 2ff1901..35268ab 100644
|
|||||||
}
|
}
|
||||||
|
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 05994fcab209f56472d8a8ec75a48f1d92e37440 Mon Sep 17 00:00:00 2001
|
From 6435d27b9b072307909802f9417882d3b0a1f554 Mon Sep 17 00:00:00 2001
|
||||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||||
Date: Tue, 27 Aug 2013 13:28:43 -0400
|
Date: Tue, 27 Aug 2013 13:28:43 -0400
|
||||||
Subject: [PATCH 12/14] efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
|
Subject: [PATCH 12/14] efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
|
||||||
@ -12,10 +12,10 @@ Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
|
|||||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
|
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
|
||||||
index 6a8f880..d3c21e9 100644
|
index e6680fb..2c4b0e7 100644
|
||||||
--- a/arch/x86/Kconfig
|
--- a/arch/x86/Kconfig
|
||||||
+++ b/arch/x86/Kconfig
|
+++ b/arch/x86/Kconfig
|
||||||
@@ -1698,7 +1698,8 @@ config EFI_MIXED
|
@@ -1705,7 +1705,8 @@ config EFI_MIXED
|
||||||
If unsure, say N.
|
If unsure, say N.
|
||||||
|
|
||||||
config EFI_SECURE_BOOT_SIG_ENFORCE
|
config EFI_SECURE_BOOT_SIG_ENFORCE
|
||||||
@ -26,5 +26,5 @@ index 6a8f880..d3c21e9 100644
|
|||||||
---help---
|
---help---
|
||||||
UEFI Secure Boot provides a mechanism for ensuring that the
|
UEFI Secure Boot provides a mechanism for ensuring that the
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From e029a605d5db033c5349142ef8a051658f586238 Mon Sep 17 00:00:00 2001
|
From 0925cb3f7afbf104e9b5df5dea02dd0d8cdb0c2e Mon Sep 17 00:00:00 2001
|
||||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||||
Date: Tue, 27 Aug 2013 13:33:03 -0400
|
Date: Tue, 27 Aug 2013 13:33:03 -0400
|
||||||
Subject: [PATCH 13/14] efi: Add EFI_SECURE_BOOT bit
|
Subject: [PATCH 13/14] efi: Add EFI_SECURE_BOOT bit
|
||||||
@ -13,10 +13,10 @@ Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
|
|||||||
2 files changed, 3 insertions(+)
|
2 files changed, 3 insertions(+)
|
||||||
|
|
||||||
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
||||||
index 88dad73..d99c8c3 100644
|
index c2e4f52..5def6b4 100644
|
||||||
--- a/arch/x86/kernel/setup.c
|
--- a/arch/x86/kernel/setup.c
|
||||||
+++ b/arch/x86/kernel/setup.c
|
+++ b/arch/x86/kernel/setup.c
|
||||||
@@ -1158,7 +1158,9 @@ void __init setup_arch(char **cmdline_p)
|
@@ -1162,7 +1162,9 @@ void __init setup_arch(char **cmdline_p)
|
||||||
|
|
||||||
#ifdef CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE
|
#ifdef CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE
|
||||||
if (boot_params.secure_boot) {
|
if (boot_params.secure_boot) {
|
||||||
@ -27,10 +27,10 @@ index 88dad73..d99c8c3 100644
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
diff --git a/include/linux/efi.h b/include/linux/efi.h
|
diff --git a/include/linux/efi.h b/include/linux/efi.h
|
||||||
index af5be03..aa4ee20 100644
|
index 85ef051..de3e450 100644
|
||||||
--- a/include/linux/efi.h
|
--- a/include/linux/efi.h
|
||||||
+++ b/include/linux/efi.h
|
+++ b/include/linux/efi.h
|
||||||
@@ -943,6 +943,7 @@ extern int __init efi_setup_pcdp_console(char *);
|
@@ -959,6 +959,7 @@ extern int __init efi_setup_pcdp_console(char *);
|
||||||
#define EFI_PARAVIRT 6 /* Access is via a paravirt interface */
|
#define EFI_PARAVIRT 6 /* Access is via a paravirt interface */
|
||||||
#define EFI_ARCH_1 7 /* First arch-specific bit */
|
#define EFI_ARCH_1 7 /* First arch-specific bit */
|
||||||
#define EFI_DBG 8 /* Print additional debug info at runtime */
|
#define EFI_DBG 8 /* Print additional debug info at runtime */
|
||||||
@ -39,5 +39,5 @@ index af5be03..aa4ee20 100644
|
|||||||
#ifdef CONFIG_EFI
|
#ifdef CONFIG_EFI
|
||||||
/*
|
/*
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
From 4c471f14d2964118b1cbc7ec4440872215701c5f Mon Sep 17 00:00:00 2001
|
From f77ad7f8cdc798a27a4e1f3f1951df958547265f Mon Sep 17 00:00:00 2001
|
||||||
From: Josh Boyer <jwboyer@fedoraproject.org>
|
From: Josh Boyer <jwboyer@fedoraproject.org>
|
||||||
Date: Fri, 20 Jun 2014 08:53:24 -0400
|
Date: Fri, 20 Jun 2014 08:53:24 -0400
|
||||||
Subject: [PATCH 14/14] hibernate: Disable in a signed modules environment
|
Subject: [PATCH 14/14] hibernate: Disable in a signed modules environment
|
||||||
@ -14,7 +14,7 @@ Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
|
|||||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/kernel/power/hibernate.c b/kernel/power/hibernate.c
|
diff --git a/kernel/power/hibernate.c b/kernel/power/hibernate.c
|
||||||
index 2329daa..48a8e82 100644
|
index 690f78f..037303a 100644
|
||||||
--- a/kernel/power/hibernate.c
|
--- a/kernel/power/hibernate.c
|
||||||
+++ b/kernel/power/hibernate.c
|
+++ b/kernel/power/hibernate.c
|
||||||
@@ -29,6 +29,7 @@
|
@@ -29,6 +29,7 @@
|
||||||
@ -35,5 +35,5 @@ index 2329daa..48a8e82 100644
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
--
|
--
|
||||||
2.3.6
|
2.4.3
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user