summaryrefslogtreecommitdiffstats
path: root/security/keys
diff options
context:
space:
mode:
authorAndreas Rammhold <andreas@rammhold.de>2021-12-01 10:59:00 +0100
committerJarkko Sakkinen <jarkko@kernel.org>2022-03-08 13:55:52 +0200
commit969a26446bcd142faedfe8c6f41cd7668596c1fa (patch)
tree0178a0270dd561f7cddc5b8c479f377a80f972df /security/keys
parent2dd634664d4128668c44bc9e497af24157f1eef4 (diff)
downloadlinux-969a26446bcd142faedfe8c6f41cd7668596c1fa.tar.gz
linux-969a26446bcd142faedfe8c6f41cd7668596c1fa.tar.bz2
linux-969a26446bcd142faedfe8c6f41cd7668596c1fa.zip
KEYS: trusted: Fix trusted key backends when building as module
Before this commit the kernel could end up with no trusted key sources even though both of the currently supported backends (TPM and TEE) were compiled as modules. This manifested in the trusted key type not being registered at all. When checking if a CONFIG_… preprocessor variable is defined we only test for the builtin (=y) case and not the module (=m) case. By using the IS_REACHABLE() macro we do test for both cases. Fixes: 5d0682be3189 ("KEYS: trusted: Add generic trusted keys framework") Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org> Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de> Reviewed-by: Sumit Garg <sumit.garg@linaro.org> Signed-off-by: Andreas Rammhold <andreas@rammhold.de> Tested-by: Ahmad Fatoum <a.fatoum@pengutronix.de> Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de> Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
Diffstat (limited to 'security/keys')
-rw-r--r--security/keys/trusted-keys/trusted_core.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/keys/trusted-keys/trusted_core.c b/security/keys/trusted-keys/trusted_core.c
index d5c891d8d353..5b35f1b87644 100644
--- a/security/keys/trusted-keys/trusted_core.c
+++ b/security/keys/trusted-keys/trusted_core.c
@@ -27,10 +27,10 @@ module_param_named(source, trusted_key_source, charp, 0);
MODULE_PARM_DESC(source, "Select trusted keys source (tpm or tee)");
static const struct trusted_key_source trusted_key_sources[] = {
-#if defined(CONFIG_TCG_TPM)
+#if IS_REACHABLE(CONFIG_TCG_TPM)
{ "tpm", &trusted_key_tpm_ops },
#endif
-#if defined(CONFIG_TEE)
+#if IS_REACHABLE(CONFIG_TEE)
{ "tee", &trusted_key_tee_ops },
#endif
};