summaryrefslogtreecommitdiff
path: root/security/integrity/digsig.c
diff options
context:
space:
mode:
authorNayna Jain <nayna@linux.ibm.com>2023-08-15 07:27:20 -0400
committerJarkko Sakkinen <jarkko@kernel.org>2023-08-17 20:12:35 +0000
commit4cb1ed94f18047d0863f976bc95aa7c0584cc51c (patch)
tree6cd37cc5b70f084183b3f015ecc4555e4720744e /security/integrity/digsig.c
parent7b9de406582d12b72cce72c056b5678e8c0627eb (diff)
downloadlinux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.tar.gz
linux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.tar.bz2
linux-4cb1ed94f18047d0863f976bc95aa7c0584cc51c.zip
integrity: check whether imputed trust is enabled
trust_moklist() is specific to UEFI enabled systems. Other platforms rely only on the Kconfig. Define a generic wrapper named imputed_trust_enabled(). Signed-off-by: Nayna Jain <nayna@linux.ibm.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Tested-by: Nageswara R Sastry <rnsastry@linux.ibm.com> Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
Diffstat (limited to 'security/integrity/digsig.c')
-rw-r--r--security/integrity/digsig.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/integrity/digsig.c b/security/integrity/digsig.c
index d0704b1597d4..df387de29bfa 100644
--- a/security/integrity/digsig.c
+++ b/security/integrity/digsig.c
@@ -113,7 +113,7 @@ static int __init __integrity_init_keyring(const unsigned int id,
} else {
if (id == INTEGRITY_KEYRING_PLATFORM)
set_platform_trusted_keys(keyring[id]);
- if (id == INTEGRITY_KEYRING_MACHINE && trust_moklist())
+ if (id == INTEGRITY_KEYRING_MACHINE && imputed_trust_enabled())
set_machine_trusted_keys(keyring[id]);
if (id == INTEGRITY_KEYRING_IMA)
load_module_cert(keyring[id]);