diff options
author | Josh Boyer <jwboyer@fedoraproject.org> | 2016-05-25 11:13:52 -0400 |
---|---|---|
committer | Josh Boyer <jwboyer@fedoraproject.org> | 2016-05-25 11:13:52 -0400 |
commit | 42d2805cbe603c4665670101f6a676eb0dd07abe (patch) | |
tree | f90742b1e7e5aea36e869f408e598db0d0bb9928 /Add-sysrq-option-to-disable-secure-boot-mode.patch | |
parent | cfaea7dc727cbea3f1150d2f8e9749a167519e32 (diff) | |
download | kernel-42d2805cbe603c4665670101f6a676eb0dd07abe.tar.gz kernel-42d2805cbe603c4665670101f6a676eb0dd07abe.tar.xz kernel-42d2805cbe603c4665670101f6a676eb0dd07abe.zip |
Linux v4.6-10203-g84787c572d40
- Enable CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE (rhbz 1339281)
- Fixup SB patchset to work with upstream changes
Diffstat (limited to 'Add-sysrq-option-to-disable-secure-boot-mode.patch')
-rw-r--r-- | Add-sysrq-option-to-disable-secure-boot-mode.patch | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/Add-sysrq-option-to-disable-secure-boot-mode.patch b/Add-sysrq-option-to-disable-secure-boot-mode.patch index 4600848cf..3cecd1399 100644 --- a/Add-sysrq-option-to-disable-secure-boot-mode.patch +++ b/Add-sysrq-option-to-disable-secure-boot-mode.patch @@ -1,7 +1,7 @@ -From 16d2ba5d5bc46e67e6aa7a3d113fbcc18c217388 Mon Sep 17 00:00:00 2001 +From e27a9a98dcf3ff95568593026da065a72ad21b92 Mon Sep 17 00:00:00 2001 From: Kyle McMartin <kyle@redhat.com> Date: Fri, 30 Aug 2013 09:28:51 -0400 -Subject: [PATCH 20/20] Add sysrq option to disable secure boot mode +Subject: [PATCH 9/9] Add sysrq option to disable secure boot mode Bugzilla: N/A Upstream-status: Fedora mustard @@ -16,7 +16,7 @@ Upstream-status: Fedora mustard 7 files changed, 64 insertions(+), 9 deletions(-) diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c -index f93826b8522c..41679b1aca83 100644 +index a666b6c29c77..7732c769937b 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c @@ -70,6 +70,11 @@ @@ -31,7 +31,7 @@ index f93826b8522c..41679b1aca83 100644 #include <video/edid.h> #include <asm/mtrr.h> -@@ -1261,6 +1266,37 @@ void __init i386_reserve_resources(void) +@@ -1286,6 +1291,37 @@ void __init i386_reserve_resources(void) #endif /* CONFIG_X86_32 */ @@ -70,10 +70,10 @@ index f93826b8522c..41679b1aca83 100644 .notifier_call = dump_kernel_offset }; diff --git a/drivers/input/misc/uinput.c b/drivers/input/misc/uinput.c -index 345df9b03aed..dea6a6c4a39b 100644 +index abe1a927b332..f4126fcec10c 100644 --- a/drivers/input/misc/uinput.c +++ b/drivers/input/misc/uinput.c -@@ -364,6 +364,7 @@ static int uinput_allocate_device(struct uinput_device *udev) +@@ -379,6 +379,7 @@ static int uinput_allocate_device(struct uinput_device *udev) if (!udev->dev) return -ENOMEM; @@ -82,10 +82,10 @@ index 345df9b03aed..dea6a6c4a39b 100644 input_set_drvdata(udev->dev, udev); diff --git a/drivers/tty/sysrq.c b/drivers/tty/sysrq.c -index 95b330a9ea98..dfa3e154a719 100644 +index e5139402e7f8..5ef2e04a03ad 100644 --- a/drivers/tty/sysrq.c +++ b/drivers/tty/sysrq.c -@@ -472,6 +472,7 @@ static struct sysrq_key_op *sysrq_key_table[36] = { +@@ -478,6 +478,7 @@ static struct sysrq_key_op *sysrq_key_table[36] = { /* x: May be registered on mips for TLB dump */ /* x: May be registered on ppc/powerpc for xmon */ /* x: May be registered on sparc64 for global PMU dump */ @@ -93,7 +93,7 @@ index 95b330a9ea98..dfa3e154a719 100644 NULL, /* x */ /* y: May be registered on sparc64 for global register dump */ NULL, /* y */ -@@ -515,7 +516,7 @@ static void __sysrq_put_key_op(int key, struct sysrq_key_op *op_p) +@@ -521,7 +522,7 @@ static void __sysrq_put_key_op(int key, struct sysrq_key_op *op_p) sysrq_key_table[i] = op_p; } @@ -102,7 +102,7 @@ index 95b330a9ea98..dfa3e154a719 100644 { struct sysrq_key_op *op_p; int orig_log_level; -@@ -535,11 +536,15 @@ void __handle_sysrq(int key, bool check_mask) +@@ -541,11 +542,15 @@ void __handle_sysrq(int key, bool check_mask) op_p = __sysrq_get_key_op(key); if (op_p) { @@ -119,7 +119,7 @@ index 95b330a9ea98..dfa3e154a719 100644 pr_cont("%s\n", op_p->action_msg); console_loglevel = orig_log_level; op_p->handler(key); -@@ -571,7 +576,7 @@ void __handle_sysrq(int key, bool check_mask) +@@ -577,7 +582,7 @@ void __handle_sysrq(int key, bool check_mask) void handle_sysrq(int key) { if (sysrq_on()) @@ -128,7 +128,7 @@ index 95b330a9ea98..dfa3e154a719 100644 } EXPORT_SYMBOL(handle_sysrq); -@@ -652,7 +657,7 @@ static void sysrq_do_reset(unsigned long _state) +@@ -658,7 +663,7 @@ static void sysrq_do_reset(unsigned long _state) static void sysrq_handle_reset_request(struct sysrq_state *state) { if (state->reset_requested) @@ -137,7 +137,7 @@ index 95b330a9ea98..dfa3e154a719 100644 if (sysrq_reset_downtime_ms) mod_timer(&state->keyreset_timer, -@@ -803,8 +808,10 @@ static bool sysrq_handle_keypress(struct sysrq_state *sysrq, +@@ -809,8 +814,10 @@ static bool sysrq_handle_keypress(struct sysrq_state *sysrq, default: if (sysrq->active && value && value != 2) { @@ -149,7 +149,7 @@ index 95b330a9ea98..dfa3e154a719 100644 } break; } -@@ -1084,7 +1091,7 @@ static ssize_t write_sysrq_trigger(struct file *file, const char __user *buf, +@@ -1094,7 +1101,7 @@ static ssize_t write_sysrq_trigger(struct file *file, const char __user *buf, if (get_user(c, buf)) return -EFAULT; @@ -159,7 +159,7 @@ index 95b330a9ea98..dfa3e154a719 100644 return count; diff --git a/include/linux/input.h b/include/linux/input.h -index 82ce323b9986..9e534f228945 100644 +index 1e967694e9a5..2b56c6f9673c 100644 --- a/include/linux/input.h +++ b/include/linux/input.h @@ -42,6 +42,7 @@ struct input_value { @@ -216,7 +216,7 @@ index 387fa7d05c98..4b07e30b3279 100644 int unregister_sysrq_key(int key, struct sysrq_key_op *op); struct sysrq_key_op *__sysrq_get_key_op(int key); diff --git a/kernel/debug/kdb/kdb_main.c b/kernel/debug/kdb/kdb_main.c -index 4121345498e0..0ff3cef5df96 100644 +index 2a20c0dfdafc..3d17205dab77 100644 --- a/kernel/debug/kdb/kdb_main.c +++ b/kernel/debug/kdb/kdb_main.c @@ -1968,7 +1968,7 @@ static int kdb_sr(int argc, const char **argv) @@ -229,10 +229,10 @@ index 4121345498e0..0ff3cef5df96 100644 return 0; diff --git a/kernel/module.c b/kernel/module.c -index 2b403ab0ef29..7818c110e95c 100644 +index ea484f3a35b2..84b00659b0ee 100644 --- a/kernel/module.c +++ b/kernel/module.c -@@ -292,7 +292,7 @@ static void module_assert_mutex_or_preempt(void) +@@ -269,7 +269,7 @@ static void module_assert_mutex_or_preempt(void) #endif } @@ -242,5 +242,5 @@ index 2b403ab0ef29..7818c110e95c 100644 module_param(sig_enforce, bool_enable_only, 0644); #endif /* !CONFIG_MODULE_SIG_FORCE */ -- -2.4.3 +2.5.5 |