[PATCH 2/2] mtd: phram, slram: Disable when the kernel is locked down
Richard Weinberger
richard.weinberger at gmail.com
Tue Sep 10 22:18:49 UTC 2019
On Tue, Sep 10, 2019 at 5:17 PM James Morris <jmorris at namei.org> wrote:
>
> On Tue, 10 Sep 2019, Matthew Garrett wrote:
>
> > On Fri, Aug 30, 2019 at 11:47 AM Ben Hutchings <ben at decadent.org.uk> wrote:
> > >
> > > These drivers allow mapping arbitrary memory ranges as MTD devices.
> > > This should be disabled to preserve the kernel's integrity when it is
> > > locked down.
> > >
> > > * Add the HWPARAM flag to the module parameters
> > > * When slram is built-in, it uses __setup() to read kernel parameters,
> > > so add an explicit check security_locked_down() check
> > >
> > > Signed-off-by: Ben Hutchings <ben at decadent.org.uk>
> > > Cc: Matthew Garrett <mjg59 at google.com>
> > > Cc: David Howells <dhowells at redhat.com>
> > > Cc: Joern Engel <joern at lazybastard.org>
> > > Cc: linux-mtd at lists.infradead.org
> >
> > Reviewed-by: Matthew Garrett <mjg59 at google.com>
> >
> > James, should I pick patches like this up and send them to you, or
> > will you queue them directly after they're acked?
>
> As long as I'm on the to or cc when they're acked, I can grab them.
Acked-by: Richard Weinberger <richard at nod.at>
BTW: I don't have 1/2 in my inbox, is it also MTD related?
--
Thanks,
//richard
More information about the Linux-security-module-archive
mailing list