-
由 Matthew Garrett 提交于
custom_method effectively allows arbitrary access to system memory, making it possible for an attacker to circumvent restrictions on module loading. Disable it if the kernel is locked down. Signed-off-by: NMatthew Garrett <mjg59@google.com> Signed-off-by: NDavid Howells <dhowells@redhat.com> Reviewed-by: NKees Cook <keescook@chromium.org> cc: linux-acpi@vger.kernel.org Signed-off-by: NJames Morris <jmorris@namei.org>
f474e148