diff options
author | Nayna Jain <nayna@linux.ibm.com> | 2023-08-15 07:27:20 -0400 |
---|---|---|
committer | Jarkko Sakkinen <jarkko@kernel.org> | 2023-08-17 20:12:35 +0000 |
commit | 4cb1ed94f18047d0863f976bc95aa7c0584cc51c (patch) | |
tree | 6cd37cc5b70f084183b3f015ecc4555e4720744e /security/integrity/integrity.h | |
parent | 7b9de406582d12b72cce72c056b5678e8c0627eb (diff) | |
download | linux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.tar.gz linux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.tar.bz2 linux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.zip |
integrity: check whether imputed trust is enabled
trust_moklist() is specific to UEFI enabled systems. Other platforms
rely only on the Kconfig.
Define a generic wrapper named imputed_trust_enabled().
Signed-off-by: Nayna Jain <nayna@linux.ibm.com>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Tested-by: Nageswara R Sastry <rnsastry@linux.ibm.com>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
Diffstat (limited to 'security/integrity/integrity.h')
-rw-r--r-- | security/integrity/integrity.h | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h index 7167a6e99bdc..d7553c93f5c0 100644 --- a/security/integrity/integrity.h +++ b/security/integrity/integrity.h @@ -320,13 +320,14 @@ static inline void __init add_to_platform_keyring(const char *source, #ifdef CONFIG_INTEGRITY_MACHINE_KEYRING void __init add_to_machine_keyring(const char *source, const void *data, size_t len); -bool __init trust_moklist(void); +bool __init imputed_trust_enabled(void); #else static inline void __init add_to_machine_keyring(const char *source, const void *data, size_t len) { } -static inline bool __init trust_moklist(void) + +static inline bool __init imputed_trust_enabled(void) { return false; } |