Skip to content
Commit 13752fe2 authored by Kees Cook's avatar Kees Cook
Browse files

security: introduce kernel_fw_from_file hook



In order to validate the contents of firmware being loaded, there must be
a hook to evaluate any loaded firmware that wasn't built into the kernel
itself. Without this, there is a risk that a root user could load malicious
firmware designed to mount an attack against kernel memory (e.g. via DMA).

Signed-off-by: default avatarKees Cook <keescook@chromium.org>
Reviewed-by: default avatarTakashi Iwai <tiwai@suse.de>
parent 7d8b6c63
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment