diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2016-10-31 18:22:15 +0100 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2016-11-14 04:50:09 +0100 |
commit | 064be15c525d02e46251fd529d84e5835b0b1339 (patch) | |
tree | 59d953ff0c392f477ce82bf4d5699f8ac67ee5d5 /security | |
parent | Revert "ima: limit file hash setting by user to fix and log modes" (diff) | |
download | linux-064be15c525d02e46251fd529d84e5835b0b1339.tar.xz linux-064be15c525d02e46251fd529d84e5835b0b1339.zip |
ima: include the reason for TPM-bypass mode
This patch includes the reason for going into TPM-bypass mode
and not using the TPM.
Signed-off-by: Mimi Zohar (zohar@linux.vnet.ibm>
Diffstat (limited to 'security')
-rw-r--r-- | security/integrity/ima/ima_init.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c index 32912bd54ead..2ac1f41db5c0 100644 --- a/security/integrity/ima/ima_init.c +++ b/security/integrity/ima/ima_init.c @@ -115,7 +115,8 @@ int __init ima_init(void) ima_used_chip = 1; if (!ima_used_chip) - pr_info("No TPM chip found, activating TPM-bypass!\n"); + pr_info("No TPM chip found, activating TPM-bypass! (rc=%d)\n", + rc); rc = integrity_init_keyring(INTEGRITY_KEYRING_IMA); if (rc) |