-
Matthew Garrett authored
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to circumvent restrictions on module loading. Disable it if the kernel is locked down. Signed-off-by:
Matthew Garrett <mjg59@google.com> Signed-off-by:
David Howells <dhowells@redhat.com> Reviewed-by:
Kees Cook <keescook@chromium.org> cc: linux-acpi@vger.kernel.org Signed-off-by:
James Morris <jmorris@namei.org>
f474e148