asus-wmi: Restrict debugfs interface when securelevel is set
authorMatthew Garrett <mjg59@srcf.ucam.org>
Fri, 9 Mar 2012 13:46:50 +0000 (08:46 -0500)
committerSalvatore Bonaccorso <carnil@debian.org>
Sun, 6 Aug 2017 04:24:47 +0000 (05:24 +0100)
commit88e503cc9b3ca57d9f8250714e957c6b20a6b6cf
tree8018a069d9e4e465344edb28656618688196bc5d
parentc10f450959d2f965d5689fe0e8ee7ad5faa3be41
asus-wmi: Restrict debugfs interface when securelevel is set

We have no way of validating what all of the Asus WMI methods do on a
given machine, and there's a risk that some will allow hardware state to
be manipulated in such a way that arbitrary code can be executed in the
kernel. Prevent that if securelevel is set.

Signed-off-by: Matthew Garrett <mjg59@srcf.ucam.org>
Gbp-Pq: Topic features/all/securelevel
Gbp-Pq: Name asus-wmi-restrict-debugfs-interface-when-securelevel.patch
drivers/platform/x86/asus-wmi.c