diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index ef349a7616096ef49f840fc1283a9d4b276c2777..dce0a8a217bb4b3fd47bf7dc222963b237753e41 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -429,6 +429,14 @@ void ima_post_path_mknod(struct dentry *dentry) */ int ima_read_file(struct file *file, enum kernel_read_file_id read_id) { + /* + * READING_FIRMWARE_PREALLOC_BUFFER + * + * Do devices using pre-allocated memory run the risk of the + * firmware being accessible to the device prior to the completion + * of IMA's signature verification any more than when using two + * buffers? + */ return 0; }