asus-wmi: Restrict debugfs interface when securelevel is set
authorMatthew Garrett <mjg59@srcf.ucam.org>
Fri, 9 Mar 2012 13:46:50 +0000 (08:46 -0500)
committerYves-Alexis Perez <corsac@debian.org>
Fri, 9 Feb 2018 12:58:52 +0000 (12:58 +0000)
commitefd7543d012d9e39f7cef6ff47bd59be4ad9b701
tree3889d1562c53f030539681a9d3448f06cd6ecc17
parent006e06e85bb51e1535fcd2907ca1a62b25d0021a
asus-wmi: Restrict debugfs interface when securelevel is set

We have no way of validating what all of the Asus WMI methods do on a
given machine, and there's a risk that some will allow hardware state to
be manipulated in such a way that arbitrary code can be executed in the
kernel. Prevent that if securelevel is set.

Signed-off-by: Matthew Garrett <mjg59@srcf.ucam.org>
Gbp-Pq: Topic features/all/securelevel
Gbp-Pq: Name asus-wmi-restrict-debugfs-interface-when-securelevel.patch
drivers/platform/x86/asus-wmi.c