New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring the patch to upstream #1
Comments
Hello.
No.
Grml (2014.11) and DEFT Zero (RC1). |
thanks for your feedback. would be nice to see it in upstream, would help the whole community :-) just as reference: Grml is Grml-Forensic https://grml-forensic.org/ (as there is another live distri called https://grml.org/ ) |
http://git.grml.org/?p=grml-kernel.git;a=blob;f=linux-3/debian/patches/grml/ext4-readonly.patch |
ups sorry, my mistake :-( |
Seems like a very useful patch. Why is it not part of upstream yet? |
Hi
@ msuhanov do you know whether Sumuri Paladin or Caine Forensic Distro have their kernels patched? |
CAINE: No. It marks block devices as read-only, but this mode isn't enforced with a kernel patch. PALADIN: It includes a modified version of my patch (they never included the original patch, even old versions of PALADIN have a different message string, while the logic is the same). However, the distribution uses its own userspace scripts (and they fail sometimes). Also, at least once the patch was silently removed and then returned (without a change log entry). |
Thanks. I actually wrote the Paladin dev team and I will post their reply here as soon as I get one. |
Did you get any reply? |
Dear Maxim
Have you tried to bring this patch to the upstream linux kernel?
Do you know if any of the "forensic distributions" uses it?
Kind regards
KoSli
The text was updated successfully, but these errors were encountered: