From e60feda2fa2454e00dd01f51d5ec3473bcb2ce61 Mon Sep 17 00:00:00 2001 From: Marcin Deranek Date: Fri, 25 Mar 2022 19:11:47 +0100 Subject: sys-kernel/hardened-sources added 5.16 branch --- .../hardened-sources/files/linux-hardened-gentoo-v1.patch | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 sys-kernel/hardened-sources/files/linux-hardened-gentoo-v1.patch (limited to 'sys-kernel/hardened-sources/files/linux-hardened-gentoo-v1.patch') diff --git a/sys-kernel/hardened-sources/files/linux-hardened-gentoo-v1.patch b/sys-kernel/hardened-sources/files/linux-hardened-gentoo-v1.patch new file mode 100644 index 0000000..5bd9820 --- /dev/null +++ b/sys-kernel/hardened-sources/files/linux-hardened-gentoo-v1.patch @@ -0,0 +1,11 @@ +diff --git a/security/Kconfig b/security/Kconfig +index 7561f6f99..01f0bf73f 100644 +--- a/security/Kconfig ++++ b/security/Kconfig +@@ -166,5 +166,6 @@ config HARDENED_USERCOPY + config HARDENED_USERCOPY_FALLBACK + bool "Allow usercopy whitelist violations to fallback to object size" + depends on HARDENED_USERCOPY ++ depends on !GENTOO_KERNEL_SELF_PROTECTION + help + This is a temporary option that allows missing usercopy whitelists -- cgit v1.2.3