mtd: Disable slram and phram when locked down
authorBen Hutchings <ben@decadent.org.uk>
Thu, 2 Jun 2016 23:48:39 +0000 (00:48 +0100)
committerBen Hutchings <ben@decadent.org.uk>
Tue, 19 Nov 2019 01:43:33 +0000 (01:43 +0000)
commit3d63d62a7726101cbbb9b3a9f6d9d0d8315d6e1d
treebacb76400d4adb5daa55f1980e55776cb7b32303
parentfdd0ea6cafb8d523d36e4cde19d1a0a859fcf34a
mtd: Disable slram and phram when locked down

The slram and phram drivers both allow mapping regions of physical
address space such that they can then be read and written by userland
through the MTD interface.  This is probably usable to manipulate
hardware into overwriting kernel code on many systems.  Prevent that
if locked down.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name mtd-disable-slram-and-phram-when-locked-down.patch
drivers/mtd/devices/phram.c
drivers/mtd/devices/slram.c