| /* |
| * Copyright (C) 2015 Juniper Networks, Inc. |
| * |
| * Author: |
| * Petko Manolov <petko.manolov@konsulko.com> |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License as |
| * published by the Free Software Foundation, version 2 of the |
| * License. |
| * |
| */ |
| |
| #include <linux/export.h> |
| #include <linux/kernel.h> |
| #include <linux/sched.h> |
| #include <linux/cred.h> |
| #include <linux/err.h> |
| #include <linux/init.h> |
| #include <linux/slab.h> |
| #include <keys/system_keyring.h> |
| |
| |
| struct key *ima_blacklist_keyring; |
| |
| /* |
| * Allocate the IMA blacklist keyring |
| */ |
| static __init int ima_mok_init(void) |
| { |
| struct key_restriction *restriction; |
| |
| pr_notice("Allocating IMA blacklist keyring.\n"); |
| |
| restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); |
| if (!restriction) |
| panic("Can't allocate IMA blacklist restriction."); |
| |
| restriction->check = restrict_link_by_builtin_trusted; |
| |
| ima_blacklist_keyring = keyring_alloc(".ima_blacklist", |
| KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), |
| (KEY_POS_ALL & ~KEY_POS_SETATTR) | |
| KEY_USR_VIEW | KEY_USR_READ | |
| KEY_USR_WRITE | KEY_USR_SEARCH, |
| KEY_ALLOC_NOT_IN_QUOTA | |
| KEY_ALLOC_SET_KEEP, |
| restriction, NULL); |
| |
| if (IS_ERR(ima_blacklist_keyring)) |
| panic("Can't allocate IMA blacklist keyring."); |
| return 0; |
| } |
| device_initcall(ima_mok_init); |