summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_init.c
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.vnet.ibm.com>2016-10-31 20:22:15 +0300
committerMimi Zohar <zohar@linux.vnet.ibm.com>2016-11-14 06:50:09 +0300
commit064be15c525d02e46251fd529d84e5835b0b1339 (patch)
tree59d953ff0c392f477ce82bf4d5699f8ac67ee5d5 /security/integrity/ima/ima_init.c
parentf5acb3dcba1ffb7f0b8cbb9dba61500eea5d610b (diff)
downloadlinux-064be15c525d02e46251fd529d84e5835b0b1339.tar.xz
ima: include the reason for TPM-bypass mode
This patch includes the reason for going into TPM-bypass mode and not using the TPM. Signed-off-by: Mimi Zohar (zohar@linux.vnet.ibm>
Diffstat (limited to 'security/integrity/ima/ima_init.c')
-rw-r--r--security/integrity/ima/ima_init.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c
index 32912bd54ead..2ac1f41db5c0 100644
--- a/security/integrity/ima/ima_init.c
+++ b/security/integrity/ima/ima_init.c
@@ -115,7 +115,8 @@ int __init ima_init(void)
ima_used_chip = 1;
if (!ima_used_chip)
- pr_info("No TPM chip found, activating TPM-bypass!\n");
+ pr_info("No TPM chip found, activating TPM-bypass! (rc=%d)\n",
+ rc);
rc = integrity_init_keyring(INTEGRITY_KEYRING_IMA);
if (rc)