From: Mimi Zohar Date: Fri, 27 Apr 2018 18:31:40 +0000 (-0400) Subject: ima: based on policy verify firmware signatures (pre-allocated buffer) X-Git-Tag: v5.15~8678^2~7 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=fd90bc559bfba743ae8de87ff23b92a5e4668062;p=platform%2Fkernel%2Flinux-starfive.git ima: based on policy verify firmware signatures (pre-allocated buffer) Don't differentiate, for now, between kernel_read_file_id READING_FIRMWARE and READING_FIRMWARE_PREALLOC_BUFFER enumerations. Fixes: a098ecd firmware: support loading into a pre-allocated buffer (since 4.8) Signed-off-by: Mimi Zohar Cc: Luis R. Rodriguez Cc: David Howells Cc: Kees Cook Cc: Serge E. Hallyn Cc: Stephen Boyd --- diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index e771b73..83f8492 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -447,6 +447,7 @@ int ima_read_file(struct file *file, enum kernel_read_file_id read_id) static int read_idmap[READING_MAX_ID] = { [READING_FIRMWARE] = FIRMWARE_CHECK, + [READING_FIRMWARE_PREALLOC_BUFFER] = FIRMWARE_CHECK, [READING_MODULE] = MODULE_CHECK, [READING_KEXEC_IMAGE] = KEXEC_KERNEL_CHECK, [READING_KEXEC_INITRAMFS] = KEXEC_INITRAMFS_CHECK,