root/security/integrity/ima/ima_mok.c

/* [<][>][^][v][top][bottom][index][help] */

DEFINITIONS

This source file includes following definitions.
  1. ima_mok_init

   1 // SPDX-License-Identifier: GPL-2.0-only
   2 /*
   3  * Copyright (C) 2015 Juniper Networks, Inc.
   4  *
   5  * Author:
   6  * Petko Manolov <petko.manolov@konsulko.com>
   7  */
   8 
   9 #include <linux/export.h>
  10 #include <linux/kernel.h>
  11 #include <linux/sched.h>
  12 #include <linux/cred.h>
  13 #include <linux/err.h>
  14 #include <linux/init.h>
  15 #include <linux/slab.h>
  16 #include <keys/system_keyring.h>
  17 
  18 
  19 struct key *ima_blacklist_keyring;
  20 
  21 /*
  22  * Allocate the IMA blacklist keyring
  23  */
  24 __init int ima_mok_init(void)
  25 {
  26         struct key_restriction *restriction;
  27 
  28         pr_notice("Allocating IMA blacklist keyring.\n");
  29 
  30         restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL);
  31         if (!restriction)
  32                 panic("Can't allocate IMA blacklist restriction.");
  33 
  34         restriction->check = restrict_link_by_builtin_trusted;
  35 
  36         ima_blacklist_keyring = keyring_alloc(".ima_blacklist",
  37                                 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(),
  38                                 (KEY_POS_ALL & ~KEY_POS_SETATTR) |
  39                                 KEY_USR_VIEW | KEY_USR_READ |
  40                                 KEY_USR_WRITE | KEY_USR_SEARCH,
  41                                 KEY_ALLOC_NOT_IN_QUOTA,
  42                                 restriction, NULL);
  43 
  44         if (IS_ERR(ima_blacklist_keyring))
  45                 panic("Can't allocate IMA blacklist keyring.");
  46 
  47         set_bit(KEY_FLAG_KEEP, &ima_blacklist_keyring->flags);
  48         return 0;
  49 }
  50 device_initcall(ima_mok_init);

/* [<][>][^][v][top][bottom][index][help] */