[PATCH 06/12] acpi: Limit access to custom_method if trusted_kernel is true

2015-03-13 Thread Matthew Garrett
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to modify the kernel at runtime. Prevent this if trusted_kernel is true. Signed-off-by: Matthew Garrett --- drivers/acpi/custom_method.c | 4 1 file changed, 4 insertions(+) diff --git

[PATCH 06/12] acpi: Limit access to custom_method if trusted_kernel is true

2015-03-13 Thread Matthew Garrett
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to modify the kernel at runtime. Prevent this if trusted_kernel is true. Signed-off-by: Matthew Garrett matthew.garr...@nebula.com --- drivers/acpi/custom_method.c | 4 1 file changed, 4

[PATCH 06/12] acpi: Limit access to custom_method if trusted_kernel is true

2014-02-26 Thread Matthew Garrett
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to modify the kernel at runtime. Prevent this if trusted_kernel is true. Signed-off-by: Matthew Garrett --- drivers/acpi/custom_method.c | 4 1 file changed, 4 insertions(+) diff --git

[PATCH 06/12] acpi: Limit access to custom_method if trusted_kernel is true

2014-02-26 Thread Matthew Garrett
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to modify the kernel at runtime. Prevent this if trusted_kernel is true. Signed-off-by: Matthew Garrett matthew.garr...@nebula.com --- drivers/acpi/custom_method.c | 4 1 file changed, 4