On Wed, 2019-09-11 at 00:18 +0200, Richard Weinberger wrote: > On Tue, Sep 10, 2019 at 5:17 PM James Morris wrote: > > On Tue, 10 Sep 2019, Matthew Garrett wrote: > > > > > On Fri, Aug 30, 2019 at 11:47 AM Ben Hutchings wrote: > > > > These drivers allow mapping arbitrary memory ranges as MTD devices. > > > > This should be disabled to preserve the kernel's integrity when it is > > > > locked down. > > > > > > > > * Add the HWPARAM flag to the module parameters > > > > * When slram is built-in, it uses __setup() to read kernel parameters, > > > > so add an explicit check security_locked_down() check > > > > > > > > Signed-off-by: Ben Hutchings > > > > Cc: Matthew Garrett > > > > Cc: David Howells > > > > Cc: Joern Engel > > > > Cc: linux-mtd@lists.infradead.org > > > > > > Reviewed-by: Matthew Garrett > > > > > > James, should I pick patches like this up and send them to you, or > > > will you queue them directly after they're acked? > > > > As long as I'm on the to or cc when they're acked, I can grab them. > > Acked-by: Richard Weinberger > > BTW: I don't have 1/2 in my inbox, is it also MTD related? No, that was for some other drivers (comedi) that allow setting I/O addresses from user-space. Ben. -- Ben Hutchings The obvious mathematical breakthrough [to break modern encryption] would be development of an easy way to factor large prime numbers. - Bill Gates