diff options
author | Justin M. Forbes <jforbes@fedoraproject.org> | 2020-08-13 12:44:32 -0500 |
---|---|---|
committer | Justin M. Forbes <jforbes@fedoraproject.org> | 2020-08-13 12:44:32 -0500 |
commit | f7a3bf654752fa0e92c7ab3e57e48d3415632852 (patch) | |
tree | 499e2cc107f4bff8b98bd676b494d51ae89dcb4a /0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch | |
parent | 142d1dbc8748e066ce794a391416b045d570be71 (diff) | |
download | kernel-f7a3bf654752fa0e92c7ab3e57e48d3415632852.tar.gz kernel-f7a3bf654752fa0e92c7ab3e57e48d3415632852.tar.xz kernel-f7a3bf654752fa0e92c7ab3e57e48d3415632852.zip |
kernel-5.9.0-0.rc0.20200813gitdc06fe51d26e.1
* Thu Aug 13 2020 Fedora Kernel Team <kernel-team@fedoraproject.org> [5.9.0-0.rc0.20200813gitdc06fe51d26e.1]
- dc06fe51d26e rebase
- More mismatches ("Justin M. Forbes")
- Fedora config change due to deps ("Justin M. Forbes")
- CONFIG_SND_SOC_MAX98390 is now selected by SND_SOC_INTEL_DA7219_MAX98357A_GENERIC ("Justin M. Forbes")
- Config change required for build part 2 ("Justin M. Forbes")
- Config change required for build ("Justin M. Forbes")
- Fedora config update ("Justin M. Forbes")
- Revert "Merge branch 'make_configs_fix' into 'os-build'" (Justin Forbes)
- redhat/configs/process_configs.sh: Remove *.config.orig files (Prarit Bhargava)
- redhat/configs/process_configs.sh: Add process_configs_known_broken flag (Prarit Bhargava)
- redhat/Makefile: Fix '*-configs' targets (Prarit Bhargava)
- Updated changelog for the release based on v5.8 (Fedora Kernel Team)
- Add ability to sync upstream through Makefile (Don Zickus)
- Add master merge check (Don Zickus)
- Replace hardcoded values 'os-build' and project id with variables (Don Zickus)
- gitattributes: Remove unnecesary export restrictions (Prarit Bhargava)
- redhat/Makefile.common: Fix MARKER (Prarit Bhargava)
Resolves: rhbz#
Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
Diffstat (limited to '0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch')
-rw-r--r-- | 0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch b/0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch index ff9bcbd19..3007da2bf 100644 --- a/0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch +++ b/0001-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch @@ -26,10 +26,10 @@ Signed-off-by: Jeremy Cline <jcline@redhat.com> create mode 100644 drivers/firmware/efi/secureboot.c diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index a1b8cb9a2579..28d43754aeb6 100644 +index 112efbef3414..c9de4b36ca51 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c -@@ -1256,19 +1256,7 @@ void __init setup_arch(char **cmdline_p) +@@ -1255,19 +1255,7 @@ void __init setup_arch(char **cmdline_p) /* Allocate bigger log buffer */ setup_log_buf(1); @@ -107,10 +107,10 @@ index 000000000000..de0a3714a5d4 + } +} diff --git a/include/linux/efi.h b/include/linux/efi.h -index 2e2f9f608f68..6f5b3b019d3e 100644 +index 92aa4697f558..1cdc5d8b6ac3 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h -@@ -781,6 +781,14 @@ extern int __init efi_setup_pcdp_console(char *); +@@ -785,6 +785,14 @@ extern int __init efi_setup_pcdp_console(char *); #define EFI_MEM_ATTR 10 /* Did firmware publish an EFI_MEMORY_ATTRIBUTES table? */ #define EFI_MEM_NO_SOFT_RESERVE 11 /* Is the kernel configured to ignore soft reservations? */ #define EFI_PRESERVE_BS_REGIONS 12 /* Are EFI boot-services memory segments available? */ @@ -125,7 +125,7 @@ index 2e2f9f608f68..6f5b3b019d3e 100644 #ifdef CONFIG_EFI /* -@@ -792,6 +800,8 @@ static inline bool efi_enabled(int feature) +@@ -796,6 +804,8 @@ static inline bool efi_enabled(int feature) } extern void efi_reboot(enum reboot_mode reboot_mode, const char *__unused); @@ -134,7 +134,7 @@ index 2e2f9f608f68..6f5b3b019d3e 100644 bool __pure __efi_soft_reserve_enabled(void); static inline bool __pure efi_soft_reserve_enabled(void) -@@ -818,6 +828,8 @@ efi_capsule_pending(int *reset_type) +@@ -822,6 +832,8 @@ efi_capsule_pending(int *reset_type) return false; } @@ -143,7 +143,7 @@ index 2e2f9f608f68..6f5b3b019d3e 100644 static inline bool efi_soft_reserve_enabled(void) { return false; -@@ -1090,12 +1102,6 @@ static inline bool efi_runtime_disabled(void) { return true; } +@@ -1094,12 +1106,6 @@ static inline bool efi_runtime_disabled(void) { return true; } extern void efi_call_virt_check_flags(unsigned long flags, const char *call); extern unsigned long efi_call_virt_save_flags(void); |