ima_policy.c 19.0 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14 15 16
 *
 */
#include <linux/module.h>
#include <linux/list.h>
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
17
#include <linux/parser.h>
18
#include <linux/slab.h>
19
#include <linux/genhd.h>
20 21 22 23

#include "ima.h"

/* flags definitions */
24 25
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
26 27
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
28
#define IMA_FOWNER	0x0010
29
#define IMA_FSUUID	0x0020
30

31 32 33 34 35
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
36
#define AUDIT		0x0040
M
Mimi Zohar 已提交
37 38 39 40 41

#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
42

43
struct ima_rule_entry {
44
	struct list_head list;
M
Mimi Zohar 已提交
45
	int action;
46 47 48 49
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
50
	u8 fsuuid[16];
51
	kuid_t uid;
52
	kuid_t fowner;
M
Mimi Zohar 已提交
53 54
	struct {
		void *rule;	/* LSM file metadata specific */
55
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
56 57
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
58 59
};

60 61
/*
 * Without LSM specific knowledge, the default policy can only be
62
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
63
 */
64 65 66 67 68 69 70

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
71
static struct ima_rule_entry default_rules[] = {
72 73 74 75 76 77 78 79 80
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
81
	 .flags = IMA_FUNC | IMA_MASK},
82
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
83
	 .flags = IMA_FUNC | IMA_MASK},
84
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, .uid = GLOBAL_ROOT_UID,
85
	 .flags = IMA_FUNC | IMA_MASK | IMA_UID},
86
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
87
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
88 89
};

90
static struct ima_rule_entry default_appraise_rules[] = {
91 92 93 94 95 96 97 98 99 100 101
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
102 103 104 105 106
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
static struct list_head *ima_rules;
107

108
static DEFINE_MUTEX(ima_rules_mutex);
M
Mimi Zohar 已提交
109

110
static bool ima_use_tcb __initdata;
111
static int __init default_measure_policy_setup(char *str)
112 113 114 115
{
	ima_use_tcb = 1;
	return 1;
}
116 117 118 119 120 121 122 123 124
__setup("ima_tcb", default_measure_policy_setup);

static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
125

126
/*
127 128 129 130
 * Although the IMA policy does not change, the LSM policy can be
 * reloaded, leaving the IMA LSM based rules referring to the old,
 * stale LSM policy.
 *
131
 * Update the IMA LSM based rules to reflect the reloaded LSM policy.
132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
 * We assume the rules still exist; and BUG_ON() if they don't.
 */
static void ima_lsm_update_rules(void)
{
	struct ima_rule_entry *entry, *tmp;
	int result;
	int i;

	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
	mutex_unlock(&ima_rules_mutex);
}

155 156 157 158 159 160 161 162 163
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
164
static bool ima_match_rules(struct ima_rule_entry *rule,
165 166 167
			    struct inode *inode, enum ima_hooks func, int mask)
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
168
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
169
	int i;
170

171 172
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
173
		return false;
174 175
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
176 177 178 179
		return false;
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
180
	if ((rule->flags & IMA_FSUUID) &&
181
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
182
		return false;
183
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
184
		return false;
185
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
186
		return false;
M
Mimi Zohar 已提交
187
	for (i = 0; i < MAX_LSM_RULES; i++) {
188
		int rc = 0;
M
Mimi Zohar 已提交
189
		u32 osid, sid;
190
		int retried = 0;
M
Mimi Zohar 已提交
191 192 193

		if (!rule->lsm[i].rule)
			continue;
194
retry:
M
Mimi Zohar 已提交
195 196 197 198 199 200 201
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
202
							Audit_equal,
M
Mimi Zohar 已提交
203 204 205 206 207 208 209 210 211
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
212
							Audit_equal,
M
Mimi Zohar 已提交
213 214 215 216 217
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
218 219 220 221
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
222
		}
M
Mimi Zohar 已提交
223 224 225
		if (!rc)
			return false;
	}
226 227 228
	return true;
}

229 230
/*
 * In addition to knowing that we need to appraise the file in general,
231
 * we need to differentiate between calling hooks, for hook specific rules.
232
 */
233
static int get_subaction(struct ima_rule_entry *rule, int func)
234
{
235 236 237
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

238
	switch (func) {
239 240 241 242 243 244
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case MODULE_CHECK:
		return IMA_MODULE_APPRAISE;
245 246
	case FIRMWARE_CHECK:
		return IMA_FIRMWARE_APPRAISE;
247 248 249 250 251 252
	case FILE_CHECK:
	default:
		return IMA_FILE_APPRAISE;
	}
}

253 254 255 256 257 258 259 260 261 262 263 264 265
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
 * (There is no need for locking when walking the policy list,
 * as elements in the list are never deleted, nor does the list
 * change.)
 */
M
Mimi Zohar 已提交
266 267
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
268
{
269
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
270
	int action = 0, actmask = flags | (flags << 1);
271

272
	list_for_each_entry(entry, ima_rules, list) {
273

M
Mimi Zohar 已提交
274 275 276 277 278
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
279

280 281
		action |= entry->flags & IMA_ACTION_FLAGS;

282
		action |= entry->action & IMA_DO_MASK;
283
		if (entry->action & IMA_APPRAISE)
284
			action |= get_subaction(entry, func);
285

286 287 288 289
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
290

M
Mimi Zohar 已提交
291 292
		if (!actmask)
			break;
293
	}
M
Mimi Zohar 已提交
294 295

	return action;
296 297 298 299 300
}

/**
 * ima_init_policy - initialize the default measure rules.
 *
301 302
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
303
 */
304
void __init ima_init_policy(void)
305
{
306
	int i, measure_entries, appraise_entries;
307 308

	/* if !ima_use_tcb set entries = 0 so we load NO default rules */
309 310 311
	measure_entries = ima_use_tcb ? ARRAY_SIZE(default_rules) : 0;
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
312

313 314 315 316 317 318 319 320 321 322 323 324 325
	for (i = 0; i < measure_entries + appraise_entries; i++) {
		if (i < measure_entries)
			list_add_tail(&default_rules[i].list,
				      &ima_default_rules);
		else {
			int j = i - measure_entries;

			list_add_tail(&default_appraise_rules[j].list,
				      &ima_default_rules);
		}
	}

	ima_rules = &ima_default_rules;
326
}
M
Mimi Zohar 已提交
327 328 329 330 331 332 333 334 335 336

/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
 * policy.  Once updated, the policy is locked, no additional rules can be
 * added to the policy.
 */
void ima_update_policy(void)
{
337
	static const char op[] = "policy_update";
338
	const char *cause = "already-exists";
M
Mimi Zohar 已提交
339 340 341
	int result = 1;
	int audit_info = 0;

342 343
	if (ima_rules == &ima_default_rules) {
		ima_rules = &ima_policy_rules;
M
Mimi Zohar 已提交
344 345 346 347 348 349 350 351 352 353
		cause = "complete";
		result = 0;
	}
	integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
			    NULL, op, cause, result, audit_info);
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
354
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
355
	Opt_audit,
M
Mimi Zohar 已提交
356 357
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
358
	Opt_func, Opt_mask, Opt_fsmagic, Opt_uid, Opt_fowner,
359
	Opt_appraise_type, Opt_fsuuid, Opt_permit_directio
M
Mimi Zohar 已提交
360 361 362 363 364
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
365 366
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
367
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
368 369 370 371 372 373 374 375 376
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
377
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
378
	{Opt_uid, "uid=%s"},
379
	{Opt_fowner, "fowner=%s"},
380
	{Opt_appraise_type, "appraise_type=%s"},
381
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
382 383 384
	{Opt_err, NULL}
};

385
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
386
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
387 388 389
{
	int result;

390 391 392
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

393 394 395 396
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
397 398
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
399 400
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
401
					   &entry->lsm[lsm_rule].rule);
402 403
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
404
		return -EINVAL;
405 406
	}

M
Mimi Zohar 已提交
407 408 409
	return result;
}

410 411 412 413 414 415 416
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

417
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
418 419 420 421 422
{
	struct audit_buffer *ab;
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
423
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
424

425
	entry->uid = INVALID_UID;
426
	entry->fowner = INVALID_UID;
427
	entry->action = UNKNOWN;
E
Eric Paris 已提交
428
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
429 430 431 432 433 434
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
435 436
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
437 438 439
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
440
			ima_log_string(ab, "action", "measure");
441 442 443 444

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
445 446 447
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
448
			ima_log_string(ab, "action", "dont_measure");
449 450 451 452

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
453 454
			entry->action = DONT_MEASURE;
			break;
455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
471 472 473 474 475 476 477 478
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
479
		case Opt_func:
480
			ima_log_string(ab, "func", args[0].from);
481 482

			if (entry->func)
483
				result = -EINVAL;
484

485 486 487 488 489
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
490 491
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
492 493
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
494 495 496
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
497 498 499 500 501 502 503 504
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
505
			ima_log_string(ab, "mask", args[0].from);
506 507 508 509

			if (entry->mask)
				result = -EINVAL;

M
Mimi Zohar 已提交
510 511 512 513 514 515 516 517 518 519 520 521 522 523
			if ((strcmp(args[0].from, "MAY_EXEC")) == 0)
				entry->mask = MAY_EXEC;
			else if (strcmp(args[0].from, "MAY_WRITE") == 0)
				entry->mask = MAY_WRITE;
			else if (strcmp(args[0].from, "MAY_READ") == 0)
				entry->mask = MAY_READ;
			else if (strcmp(args[0].from, "MAY_APPEND") == 0)
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_MASK;
			break;
		case Opt_fsmagic:
524
			ima_log_string(ab, "fsmagic", args[0].from);
525 526 527 528 529 530

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

531
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
532 533 534
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
535 536 537 538
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
539
				       sizeof(entry->fsuuid))) {
540 541 542 543
				result = -EINVAL;
				break;
			}

544 545 546 547
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
548
			break;
M
Mimi Zohar 已提交
549
		case Opt_uid:
550
			ima_log_string(ab, "uid", args[0].from);
551

552
			if (uid_valid(entry->uid)) {
553 554 555 556
				result = -EINVAL;
				break;
			}

557
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
558
			if (!result) {
559 560
				entry->uid = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->uid) || (((uid_t)lnum) != lnum))
M
Mimi Zohar 已提交
561 562 563 564 565
					result = -EINVAL;
				else
					entry->flags |= IMA_UID;
			}
			break;
566 567 568
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

569
			if (uid_valid(entry->fowner)) {
570 571 572 573
				result = -EINVAL;
				break;
			}

574
			result = kstrtoul(args[0].from, 10, &lnum);
575
			if (!result) {
576 577
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
578 579 580 581 582
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
583
		case Opt_obj_user:
584
			ima_log_string(ab, "obj_user", args[0].from);
585
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
586 587 588 589
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
590
			ima_log_string(ab, "obj_role", args[0].from);
591
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
592 593 594 595
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
596
			ima_log_string(ab, "obj_type", args[0].from);
597
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
598 599 600 601
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
602
			ima_log_string(ab, "subj_user", args[0].from);
603
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
604 605 606 607
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
608
			ima_log_string(ab, "subj_role", args[0].from);
609
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
610 611 612 613
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
614
			ima_log_string(ab, "subj_type", args[0].from);
615
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
616 617 618
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
619 620 621 622 623 624 625 626 627 628 629 630
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
631 632 633
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
634
		case Opt_err:
635
			ima_log_string(ab, "UNKNOWN", p);
636
			result = -EINVAL;
M
Mimi Zohar 已提交
637 638 639
			break;
		}
	}
640
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
641
		result = -EINVAL;
642 643
	else if (entry->func == MODULE_CHECK)
		ima_appraise |= IMA_APPRAISE_MODULES;
644 645
	else if (entry->func == FIRMWARE_CHECK)
		ima_appraise |= IMA_APPRAISE_FIRMWARE;
646
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
647 648 649 650 651
	audit_log_end(ab);
	return result;
}

/**
652
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
653 654 655
 * @rule - ima measurement policy rule
 *
 * Uses a mutex to protect the policy list from multiple concurrent writers.
656
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
657
 */
658
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
659
{
660
	static const char op[] = "update_policy";
661
	char *p;
662
	struct ima_rule_entry *entry;
663
	ssize_t result, len;
M
Mimi Zohar 已提交
664 665 666
	int audit_info = 0;

	/* Prevent installed policy from changing */
667
	if (ima_rules != &ima_default_rules) {
M
Mimi Zohar 已提交
668
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
669
				    NULL, op, "already-exists",
M
Mimi Zohar 已提交
670 671 672 673 674 675 676 677 678 679 680 681 682
				    -EACCES, audit_info);
		return -EACCES;
	}

	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

683 684
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
E
Eric Paris 已提交
685 686 687 688 689 690

	if (*p == '#') {
		kfree(entry);
		return len;
	}

691
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
692
	if (result) {
M
Mimi Zohar 已提交
693
		kfree(entry);
M
Mimi Zohar 已提交
694
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
695
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
696
				    audit_info);
E
Eric Paris 已提交
697
		return result;
M
Mimi Zohar 已提交
698
	}
E
Eric Paris 已提交
699

700 701 702
	mutex_lock(&ima_rules_mutex);
	list_add_tail(&entry->list, &ima_policy_rules);
	mutex_unlock(&ima_rules_mutex);
E
Eric Paris 已提交
703 704

	return len;
M
Mimi Zohar 已提交
705 706 707
}

/* ima_delete_rules called to cleanup invalid policy */
708
void ima_delete_rules(void)
M
Mimi Zohar 已提交
709
{
710
	struct ima_rule_entry *entry, *tmp;
711
	int i;
M
Mimi Zohar 已提交
712

713 714
	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
715 716 717
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
718 719 720
		list_del(&entry->list);
		kfree(entry);
	}
721
	mutex_unlock(&ima_rules_mutex);
M
Mimi Zohar 已提交
722
}