asus-wmi: Restrict debugfs interface when securelevel is set
authorMatthew Garrett <mjg59@srcf.ucam.org>
Fri, 9 Mar 2012 13:46:50 +0000 (08:46 -0500)
committerBen Hutchings <ben@decadent.org.uk>
Mon, 27 Feb 2017 15:58:07 +0000 (15:58 +0000)
commitb6bb6738a217da8249f0df625bc5d632e0da54ec
treeef857c1c2970860e1dd1950c6c95600cd3572e35
parent1e4c365923345a6f1f77021443462a6199f7ff28
asus-wmi: Restrict debugfs interface when securelevel is set

We have no way of validating what all of the Asus WMI methods do on a
given machine, and there's a risk that some will allow hardware state to
be manipulated in such a way that arbitrary code can be executed in the
kernel. Prevent that if securelevel is set.

Signed-off-by: Matthew Garrett <mjg59@srcf.ucam.org>
Gbp-Pq: Topic features/all/securelevel
Gbp-Pq: Name asus-wmi-restrict-debugfs-interface-when-securelevel.patch
drivers/platform/x86/asus-wmi.c