[PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
tusharsu at linux.microsoft.com
Fri Dec 11 17:28:11 UTC 2020
<snip>
>> + */
>> +void ima_measure_critical_data(const char *event_name,
>> + const void *buf, int buf_len,
>> + bool measure_buf_hash)
>> +{
>> + if (!event_name || !buf || !buf_len) {
>> + pr_err("Invalid arguments passed to %s().\n", __func__);
>
> This is a problem for the developer making use of the
> ima_measure_critical_data() API and shouldn't be logged, IMO, because a
> user/admin can do nothing about it. I think the error message should be
> dropped.
>
Thanks Tyler.
Will drop the message.
More information about the Linux-security-module-archive
mailing list