diff options
| -rw-r--r-- | security/integrity/ima/ima_audit.c | 13 | ||||
| -rw-r--r-- | security/integrity/ima/ima_main.c | 16 |
2 files changed, 4 insertions, 25 deletions
diff --git a/security/integrity/ima/ima_audit.c b/security/integrity/ima/ima_audit.c index c1461150691c..b628eea477a6 100644 --- a/security/integrity/ima/ima_audit.c +++ b/security/integrity/ima/ima_audit.c | |||
| @@ -22,18 +22,9 @@ static int ima_audit; | |||
| 22 | static int __init ima_audit_setup(char *str) | 22 | static int __init ima_audit_setup(char *str) |
| 23 | { | 23 | { |
| 24 | unsigned long audit; | 24 | unsigned long audit; |
| 25 | int rc, result = 0; | ||
| 26 | char *op = "ima_audit"; | ||
| 27 | char *cause; | ||
| 28 | 25 | ||
| 29 | rc = strict_strtoul(str, 0, &audit); | 26 | if (!strict_strtoul(str, 0, &audit)) |
| 30 | if (rc || audit > 1) | 27 | ima_audit = audit ? 1 : 0; |
| 31 | result = 1; | ||
| 32 | else | ||
| 33 | ima_audit = audit; | ||
| 34 | cause = ima_audit ? "enabled" : "not_enabled"; | ||
| 35 | integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL, | ||
| 36 | op, cause, result, 0); | ||
| 37 | return 1; | 28 | return 1; |
| 38 | } | 29 | } |
| 39 | __setup("ima_audit=", ima_audit_setup); | 30 | __setup("ima_audit=", ima_audit_setup); |
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index f4e7266f5aee..122f17fc7fc1 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c | |||
| @@ -29,20 +29,8 @@ int ima_initialized; | |||
| 29 | char *ima_hash = "sha1"; | 29 | char *ima_hash = "sha1"; |
| 30 | static int __init hash_setup(char *str) | 30 | static int __init hash_setup(char *str) |
| 31 | { | 31 | { |
| 32 | const char *op = "hash_setup"; | 32 | if (strncmp(str, "md5", 3) == 0) |
| 33 | const char *hash = "sha1"; | 33 | ima_hash = "md5"; |
| 34 | int result = 0; | ||
| 35 | int audit_info = 0; | ||
| 36 | |||
| 37 | if (strncmp(str, "md5", 3) == 0) { | ||
| 38 | hash = "md5"; | ||
| 39 | ima_hash = str; | ||
| 40 | } else if (strncmp(str, "sha1", 4) != 0) { | ||
| 41 | hash = "invalid_hash_type"; | ||
| 42 | result = 1; | ||
| 43 | } | ||
| 44 | integrity_audit_msg(AUDIT_INTEGRITY_HASH, NULL, NULL, op, hash, | ||
| 45 | result, audit_info); | ||
| 46 | return 1; | 34 | return 1; |
| 47 | } | 35 | } |
| 48 | __setup("ima_hash=", hash_setup); | 36 | __setup("ima_hash=", hash_setup); |
