diff options
author | Bruno Meneguele <bmeneg@redhat.com> | 2020-09-04 16:40:58 -0300 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2020-09-08 22:03:50 -0400 |
commit | 7fe2bb7e7e5cf91d03ff9c35b7b997d088916cbc (patch) | |
tree | 168c14e992c4182c23eb0cc81867bedea79dcaff /security/integrity/ima/ima_policy.c | |
parent | 4afb28ab03d5d811b369af4472f3941557928569 (diff) | |
download | linux-7fe2bb7e7e5cf91d03ff9c35b7b997d088916cbc.tar.bz2 |
integrity: invalid kernel parameters feedback
Don't silently ignore unknown or invalid ima_{policy,appraise,hash} and evm
kernel boot command line options.
Signed-off-by: Bruno Meneguele <bmeneg@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima_policy.c')
-rw-r--r-- | security/integrity/ima/ima_policy.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index fe1df373c113..34221789c092 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c @@ -241,6 +241,8 @@ static int __init policy_setup(char *str) ima_use_secure_boot = true; else if (strcmp(p, "fail_securely") == 0) ima_fail_unverifiable_sigs = true; + else + pr_err("policy \"%s\" not found", p); } return 1; |