asus-wmi: Restrict debugfs interface when securelevel is set
authorMatthew Garrett <mjg59@srcf.ucam.org>
Fri, 9 Mar 2012 13:46:50 +0000 (08:46 -0500)
committerBen Hutchings <ben@decadent.org.uk>
Thu, 12 Jan 2017 15:52:37 +0000 (15:52 +0000)
commitc23d8ae8660a53a5cb13761e3057eef5fd65ebb3
tree92e2d3c9184c602f5c11fe017c864f75752b3441
parentc81c34b7322ad44751a4f9b4d845c00a82f78695
asus-wmi: Restrict debugfs interface when securelevel is set

We have no way of validating what all of the Asus WMI methods do on a
given machine, and there's a risk that some will allow hardware state to
be manipulated in such a way that arbitrary code can be executed in the
kernel. Prevent that if securelevel is set.

Signed-off-by: Matthew Garrett <mjg59@srcf.ucam.org>
Gbp-Pq: Topic features/all/securelevel
Gbp-Pq: Name asus-wmi-restrict-debugfs-interface-when-securelevel.patch
drivers/platform/x86/asus-wmi.c