Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751507AbdH3N1p (ORCPT ); Wed, 30 Aug 2017 09:27:45 -0400 Received: from mail-wm0-f51.google.com ([74.125.82.51]:37596 "EHLO mail-wm0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751302AbdH3N1n (ORCPT ); Wed, 30 Aug 2017 09:27:43 -0400 X-Google-Smtp-Source: ADKCNb6wc04HMPTgm2RoTMZyiWIXq7H3Y0Gp3+ORMAeGhYbhVKc909Sn9+IzWAysCWsYkbLm2k02PLDT0AdRwVB25B8= MIME-Version: 1.0 In-Reply-To: <20170830095735.GB31503@amd> References: <20170816231458.2299-1-labbott@redhat.com> <20170816231458.2299-3-labbott@redhat.com> <20170817033148.ownsmbdzk2vhupme@thunk.org> <20170830095735.GB31503@amd> From: Nick Kralevich Date: Wed, 30 Aug 2017 06:27:40 -0700 Message-ID: Subject: Re: [kernel-hardening] Re: [PATCHv3 2/2] extract early boot entropy from the passed cmdline To: Pavel Machek Cc: "Theodore Ts'o" , Laura Abbott , Kees Cook , Daniel Micay , kernel-hardening@lists.openwall.com, lkml , linux-mm@kvack.org, Andrew Morton Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 305 Lines: 8 On Wed, Aug 30, 2017 at 2:57 AM, Pavel Machek wrote: > The command line is visible to unpriviledged userspace (/proc/cmdline, > dmesg). Is that a problem? These files are not exposed to untrusted processes on Android. -- Nick Kralevich | Android Security | nnk@google.com | 650.214.4037