[PATCH 15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down
dhowells at redhat.com
Mon Apr 10 13:16:48 UTC 2017
Andy Shevchenko <andy.shevchenko at gmail.com> wrote:
> >> It looks a bit fragile when responsility of whatever reasons kernel
> >> can't serve become a driver burden.
> >> Can we fix this in debugfs framework instead?
> > Fix it with debugfs how? We can't offload the decision to userspace.
> I mean to do at least similar like you have done for module
> parameters. So, instead of putting above code to each attribute in
> question make a special (marked) attribute instead and debugfs
> framework will know how to deal with that.
Hmmm... It's tricky in that debugfs doesn't have any of its own structures,
but is entirely built on standard VFS ones, so finding somewhere to store the
information is going to be awkward. One obvious solution is to entirely lock
down debugfs in secure boot more, but that might be a bit drastic.
Note that it's still going to be a driver burden to some extent anyway. The
driver has to tell the core what needs to be restricted.
Further, I guess configfs needs attention also.
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive