linux/drivers/base/firmware_loader
Kees Cook 4f2d99b06b firmware_loader: Use security_post_load_data()
Now that security_post_load_data() is wired up, use it instead
of the NULL file argument style of security_post_read_file(),
and update the security_kernel_load_data() call to indicate that a
security_kernel_post_load_data() call is expected.

Wire up the IMA check to match earlier logic. Perhaps a generalized
change to ima_post_load_data() might look something like this:

    return process_buffer_measurement(buf, size,
                                      kernel_load_data_id_str(load_id),
                                      read_idmap[load_id] ?: FILE_CHECK,
                                      0, NULL);

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Link: https://lore.kernel.org/r/20201002173828.2099543-10-keescook@chromium.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-10-05 13:37:03 +02:00
..
builtin Fix built-in early-load Intel microcode alignment 2020-01-15 11:50:37 -08:00
fallback_platform.c firmware_loader: Use security_post_load_data() 2020-10-05 13:37:03 +02:00
fallback_table.c firmware_loader: move fw_fallback_config to a private kernel symbol namespace 2020-04-28 21:05:42 +02:00
fallback.c firmware_loader: Use security_post_load_data() 2020-10-05 13:37:03 +02:00
fallback.h firmware_loader: change enum fw_opt to u32 2020-05-27 12:20:47 +02:00
firmware.h firmware_loader: fix memory leak for paged buffer 2020-08-28 11:32:07 +02:00
Kconfig drivers: base: Fix Kconfig indentation 2019-11-20 15:10:25 +01:00
main.c fs/kernel_read_file: Add file_size output argument 2020-10-05 13:37:03 +02:00
Makefile firmware: Add new platform fallback mechanism and firmware_request_platform() 2020-03-20 14:54:04 +01:00