security: introduce kernel_fw_from_file hook
authorKees Cook <keescook@chromium.org>
Tue, 25 Feb 2014 18:28:04 +0000 (10:28 -0800)
committerKees Cook <keescook@chromium.org>
Fri, 25 Jul 2014 18:47:45 +0000 (11:47 -0700)
In order to validate the contents of firmware being loaded, there must be
a hook to evaluate any loaded firmware that wasn't built into the kernel
itself. Without this, there is a risk that a root user could load malicious
firmware designed to mount an attack against kernel memory (e.g. via DMA).

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Takashi Iwai <tiwai@suse.de>
include/linux/security.h
security/capability.c
security/security.c

Simple merge
Simple merge
Simple merge