<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/acpi/custom_method.c, branch v3.2.38</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/acpi/custom_method.c?h=v3.2.38</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/acpi/custom_method.c?h=v3.2.38'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-05-29T05:50:40Z</updated>
<entry>
<title>ACPI: Split out custom_method functionality into an own driver</title>
<updated>2011-05-29T05:50:40Z</updated>
<author>
<name>Thomas Renninger</name>
<email>trenn@suse.de</email>
</author>
<published>2011-05-26T10:26:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=526b4af47f44148c9d665e57723ed9f86634c6e3'/>
<id>urn:sha1:526b4af47f44148c9d665e57723ed9f86634c6e3</id>
<content type='text'>
With /sys/kernel/debug/acpi/custom_method root can write
to arbitrary memory and increase his priveleges, even if
these are restricted.

-&gt; Make this an own debug .config option and warn about the
security issue in the config description.

-&gt; Still keep acpi/debugfs.c which now only creates an empty
   /sys/kernel/debug/acpi directory. There might be other
   users of it later.

Signed-off-by: Thomas Renninger &lt;trenn@suse.de&gt;
Acked-by: Rafael J. Wysocki &lt;rjw@sisk.pl&gt;
Acked-by: rui.zhang@intel.com
Signed-off-by: Len Brown &lt;len.brown@intel.com&gt;
</content>
</entry>
</feed>
