ima_policy.c 33.8 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12
 *
 */
13
#include <linux/init.h>
14
#include <linux/list.h>
15
#include <linux/fs.h>
16 17
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
18
#include <linux/parser.h>
19
#include <linux/slab.h>
20
#include <linux/rculist.h>
21
#include <linux/genhd.h>
22
#include <linux/seq_file.h>
23 24 25 26

#include "ima.h"

/* flags definitions */
27 28
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
29 30
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
31
#define IMA_FOWNER	0x0010
32
#define IMA_FSUUID	0x0020
33
#define IMA_INMASK	0x0040
34
#define IMA_EUID	0x0080
35
#define IMA_PCR		0x0100
36
#define IMA_FSNAME	0x0200
37

38 39 40 41 42
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
43
#define AUDIT		0x0040
44 45
#define HASH		0x0100
#define DONT_HASH	0x0200
M
Mimi Zohar 已提交
46

47 48 49
#define INVALID_PCR(a) (((a) < 0) || \
	(a) >= (FIELD_SIZEOF(struct integrity_iint_cache, measured_pcrs) * 8))

50
int ima_policy_flag;
51
static int temp_ima_appraise;
M
Mimi Zohar 已提交
52
static int build_ima_appraise __ro_after_init;
53

M
Mimi Zohar 已提交
54 55 56 57
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
58

M
Mimi Zohar 已提交
59 60
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

61
struct ima_rule_entry {
62
	struct list_head list;
M
Mimi Zohar 已提交
63
	int action;
64 65 66 67
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
68
	uuid_t fsuuid;
69
	kuid_t uid;
70
	kuid_t fowner;
71 72
	bool (*uid_op)(kuid_t, kuid_t);    /* Handlers for operators       */
	bool (*fowner_op)(kuid_t, kuid_t); /* uid_eq(), uid_gt(), uid_lt() */
73
	int pcr;
M
Mimi Zohar 已提交
74 75
	struct {
		void *rule;	/* LSM file metadata specific */
76
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
77 78
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
79
	char *fsname;
80 81
};

82 83
/*
 * Without LSM specific knowledge, the default policy can only be
84
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
85
 */
86 87 88 89 90 91 92

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
93
static struct ima_rule_entry dont_measure_rules[] __ro_after_init = {
94 95 96 97 98 99 100 101
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
102
	{.action = DONT_MEASURE, .fsmagic = SMACK_MAGIC, .flags = IMA_FSMAGIC},
103 104
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
105 106
	{.action = DONT_MEASURE, .fsmagic = CGROUP2_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
107 108 109
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

110
static struct ima_rule_entry original_measurement_rules[] __ro_after_init = {
M
Mimi Zohar 已提交
111 112 113 114 115
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
116 117
	 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq,
	 .flags = IMA_FUNC | IMA_MASK | IMA_UID},
M
Mimi Zohar 已提交
118 119 120 121
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

122
static struct ima_rule_entry default_measurement_rules[] __ro_after_init = {
123
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
124
	 .flags = IMA_FUNC | IMA_MASK},
125
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
126
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
127
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
128 129
	 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq,
	 .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
M
Mimi Zohar 已提交
130
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
131 132
	 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq,
	 .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
133
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
134
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
135
	{.action = MEASURE, .func = POLICY_CHECK, .flags = IMA_FUNC},
136 137
};

138
static struct ima_rule_entry default_appraise_rules[] __ro_after_init = {
139 140 141 142 143 144 145 146 147
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
148
	{.action = DONT_APPRAISE, .fsmagic = SMACK_MAGIC, .flags = IMA_FSMAGIC},
149
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
150
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
151
	{.action = DONT_APPRAISE, .fsmagic = CGROUP2_SUPER_MAGIC, .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
152 153 154 155
#ifdef CONFIG_IMA_WRITE_POLICY
	{.action = APPRAISE, .func = POLICY_CHECK,
	.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
156
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
157 158
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .fowner_op = &uid_eq,
	 .flags = IMA_FOWNER},
159 160
#else
	/* force signature */
161
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .fowner_op = &uid_eq,
162 163
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
164 165
};

M
Mimi Zohar 已提交
166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
static struct ima_rule_entry build_appraise_rules[] __ro_after_init = {
#ifdef CONFIG_IMA_APPRAISE_REQUIRE_MODULE_SIGS
	{.action = APPRAISE, .func = MODULE_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
#ifdef CONFIG_IMA_APPRAISE_REQUIRE_FIRMWARE_SIGS
	{.action = APPRAISE, .func = FIRMWARE_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
#ifdef CONFIG_IMA_APPRAISE_REQUIRE_KEXEC_SIGS
	{.action = APPRAISE, .func = KEXEC_KERNEL_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
#ifdef CONFIG_IMA_APPRAISE_REQUIRE_POLICY_SIGS
	{.action = APPRAISE, .func = POLICY_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
};

185 186 187 188 189 190 191 192 193 194 195
static struct ima_rule_entry secure_boot_rules[] __ro_after_init = {
	{.action = APPRAISE, .func = MODULE_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
	{.action = APPRAISE, .func = FIRMWARE_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
	{.action = APPRAISE, .func = KEXEC_KERNEL_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
	{.action = APPRAISE, .func = POLICY_CHECK,
	 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
};

196 197
static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
198
static LIST_HEAD(ima_temp_rules);
199
static struct list_head *ima_rules;
200

M
Mimi Zohar 已提交
201
static int ima_policy __initdata;
202

203
static int __init default_measure_policy_setup(char *str)
204
{
M
Mimi Zohar 已提交
205 206 207 208
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
209 210
	return 1;
}
211 212
__setup("ima_tcb", default_measure_policy_setup);

213
static bool ima_use_appraise_tcb __initdata;
214
static bool ima_use_secure_boot __initdata;
215
static bool ima_fail_unverifiable_sigs __ro_after_init;
M
Mimi Zohar 已提交
216 217
static int __init policy_setup(char *str)
{
218
	char *p;
M
Mimi Zohar 已提交
219

220 221 222 223 224 225
	while ((p = strsep(&str, " |\n")) != NULL) {
		if (*p == ' ')
			continue;
		if ((strcmp(p, "tcb") == 0) && !ima_policy)
			ima_policy = DEFAULT_TCB;
		else if (strcmp(p, "appraise_tcb") == 0)
226
			ima_use_appraise_tcb = true;
227
		else if (strcmp(p, "secure_boot") == 0)
228
			ima_use_secure_boot = true;
229 230
		else if (strcmp(p, "fail_securely") == 0)
			ima_fail_unverifiable_sigs = true;
231
	}
M
Mimi Zohar 已提交
232 233 234 235 236

	return 1;
}
__setup("ima_policy=", policy_setup);

237 238
static int __init default_appraise_policy_setup(char *str)
{
239
	ima_use_appraise_tcb = true;
240 241 242
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
243

244
/*
245 246 247 248
 * The LSM policy can be reloaded, leaving the IMA LSM based rules referring
 * to the old, stale LSM policy.  Update the IMA LSM based rules to reflect
 * the reloaded LSM policy.  We assume the rules still exist; and BUG_ON() if
 * they don't.
249 250 251
 */
static void ima_lsm_update_rules(void)
{
252
	struct ima_rule_entry *entry;
253 254 255
	int result;
	int i;

256
	list_for_each_entry(entry, &ima_policy_rules, list) {
257 258 259 260 261 262 263 264 265 266 267 268
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
}

269 270 271 272
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
273 274
 * @cred: a pointer to a credentials structure for user validation
 * @secid: the secid of the task to be validated
275 276 277 278 279
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
280
static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
281
			    const struct cred *cred, u32 secid,
282
			    enum ima_hooks func, int mask)
283
{
M
Mimi Zohar 已提交
284
	int i;
285

286 287
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
288
		return false;
289 290
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
291
		return false;
292 293 294
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
295 296 297
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
298 299 300
	if ((rule->flags & IMA_FSNAME)
	    && strcmp(rule->fsname, inode->i_sb->s_type->name))
		return false;
301
	if ((rule->flags & IMA_FSUUID) &&
302
	    !uuid_equal(&rule->fsuuid, &inode->i_sb->s_uuid))
303
		return false;
304
	if ((rule->flags & IMA_UID) && !rule->uid_op(cred->uid, rule->uid))
305
		return false;
306 307
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
308 309 310
			if (!rule->uid_op(cred->euid, rule->uid)
			    && !rule->uid_op(cred->suid, rule->uid)
			    && !rule->uid_op(cred->uid, rule->uid))
311
				return false;
312
		} else if (!rule->uid_op(cred->euid, rule->uid))
313 314 315
			return false;
	}

316 317
	if ((rule->flags & IMA_FOWNER) &&
	    !rule->fowner_op(inode->i_uid, rule->fowner))
318
		return false;
M
Mimi Zohar 已提交
319
	for (i = 0; i < MAX_LSM_RULES; i++) {
320
		int rc = 0;
321
		u32 osid;
322
		int retried = 0;
M
Mimi Zohar 已提交
323 324 325

		if (!rule->lsm[i].rule)
			continue;
326
retry:
M
Mimi Zohar 已提交
327 328 329 330 331 332 333
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
334
							Audit_equal,
M
Mimi Zohar 已提交
335 336 337 338 339 340
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
341
			rc = security_filter_rule_match(secid,
M
Mimi Zohar 已提交
342
							rule->lsm[i].type,
343
							Audit_equal,
M
Mimi Zohar 已提交
344 345 346 347 348
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
349 350 351 352
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
353
		}
M
Mimi Zohar 已提交
354 355 356
		if (!rc)
			return false;
	}
357 358 359
	return true;
}

360 361
/*
 * In addition to knowing that we need to appraise the file in general,
362
 * we need to differentiate between calling hooks, for hook specific rules.
363
 */
364
static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
365
{
366 367 368
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

369
	switch (func) {
370 371 372 373
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
374 375
	case CREDS_CHECK:
		return IMA_CREDS_APPRAISE;
376
	case FILE_CHECK:
377
	case POST_SETATTR:
378
		return IMA_FILE_APPRAISE;
379 380 381
	case MODULE_CHECK ... MAX_CHECK - 1:
	default:
		return IMA_READ_APPRAISE;
382 383 384
	}
}

385 386 387
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
388 389 390
 * @cred: pointer to a credentials structure for which the policy decision is
 *        being made
 * @secid: LSM secid of the task to be validated
391 392
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
393
 * @pcr: set the pcr to extend
394 395 396 397
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
398 399 400
 * Since the IMA policy may be updated multiple times we need to lock the
 * list when walking it.  Reads are many orders of magnitude more numerous
 * than writes so ima_match_policy() is classical RCU candidate.
401
 */
402 403
int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid,
		     enum ima_hooks func, int mask, int flags, int *pcr)
404
{
405
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
406
	int action = 0, actmask = flags | (flags << 1);
407

408 409
	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
410

M
Mimi Zohar 已提交
411 412 413
		if (!(entry->action & actmask))
			continue;

414
		if (!ima_match_rules(entry, inode, cred, secid, func, mask))
M
Mimi Zohar 已提交
415
			continue;
416

417 418
		action |= entry->flags & IMA_ACTION_FLAGS;

419
		action |= entry->action & IMA_DO_MASK;
420
		if (entry->action & IMA_APPRAISE) {
421
			action |= get_subaction(entry, func);
M
Mimi Zohar 已提交
422
			action &= ~IMA_HASH;
423 424
			if (ima_fail_unverifiable_sigs)
				action |= IMA_FAIL_UNVERIFIABLE_SIGS;
425
		}
426

427 428 429 430
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
431

432 433 434
		if ((pcr) && (entry->flags & IMA_PCR))
			*pcr = entry->pcr;

M
Mimi Zohar 已提交
435 436
		if (!actmask)
			break;
437
	}
438
	rcu_read_unlock();
M
Mimi Zohar 已提交
439 440

	return action;
441 442
}

443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

M
Mimi Zohar 已提交
458
	ima_appraise |= (build_ima_appraise | temp_ima_appraise);
459 460 461 462
	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

463 464 465 466 467 468 469 470
static int ima_appraise_flag(enum ima_hooks func)
{
	if (func == MODULE_CHECK)
		return IMA_APPRAISE_MODULES;
	else if (func == FIRMWARE_CHECK)
		return IMA_APPRAISE_FIRMWARE;
	else if (func == POLICY_CHECK)
		return IMA_APPRAISE_POLICY;
471 472
	else if (func == KEXEC_KERNEL_CHECK)
		return IMA_APPRAISE_KEXEC;
473 474 475
	return 0;
}

476 477 478
/**
 * ima_init_policy - initialize the default measure rules.
 *
479 480
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
481
 */
482
void __init ima_init_policy(void)
483
{
484
	int i, measure_entries, appraise_entries, secure_boot_entries;
485

M
Mimi Zohar 已提交
486 487
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
488 489
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
490 491
	secure_boot_entries = ima_use_secure_boot ?
			ARRAY_SIZE(secure_boot_rules) : 0;
492

493
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
509

510
	/*
M
Mimi Zohar 已提交
511 512
	 * Insert the builtin "secure_boot" policy rules requiring file
	 * signatures, prior to any other appraise rules.
513
	 */
514 515 516 517 518
	for (i = 0; i < secure_boot_entries; i++) {
		list_add_tail(&secure_boot_rules[i].list, &ima_default_rules);
		temp_ima_appraise |=
		    ima_appraise_flag(secure_boot_rules[i].func);
	}
519

M
Mimi Zohar 已提交
520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539
	/*
	 * Insert the build time appraise rules requiring file signatures
	 * for both the initial and custom policies, prior to other appraise
	 * rules.
	 */
	for (i = 0; i < ARRAY_SIZE(build_appraise_rules); i++) {
		struct ima_rule_entry *entry;

		if (!secure_boot_entries)
			list_add_tail(&build_appraise_rules[i].list,
				      &ima_default_rules);

		entry = kmemdup(&build_appraise_rules[i], sizeof(*entry),
				GFP_KERNEL);
		if (entry)
			list_add_tail(&entry->list, &ima_policy_rules);
		build_ima_appraise |=
			ima_appraise_flag(build_appraise_rules[i].func);
	}

540 541 542
	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
M
Mimi Zohar 已提交
543 544
		if (default_appraise_rules[i].func == POLICY_CHECK)
			temp_ima_appraise |= IMA_APPRAISE_POLICY;
545 546 547
	}

	ima_rules = &ima_default_rules;
M
Mimi Zohar 已提交
548
	ima_update_policy_flag();
549
}
M
Mimi Zohar 已提交
550

551
/* Make sure we have a valid policy, at least containing some rules. */
552
int ima_check_policy(void)
553 554 555 556 557 558
{
	if (list_empty(&ima_temp_rules))
		return -EINVAL;
	return 0;
}

M
Mimi Zohar 已提交
559 560 561 562
/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
563 564 565 566 567 568
 * policy.  What we do here is to splice ima_policy_rules and ima_temp_rules so
 * they make a queue.  The policy may be updated multiple times and this is the
 * RCU updater.
 *
 * Policy rules are never deleted so ima_policy_flag gets zeroed only once when
 * we switch from the default policy to user defined.
M
Mimi Zohar 已提交
569 570 571
 */
void ima_update_policy(void)
{
572
	struct list_head *policy = &ima_policy_rules;
573

574
	list_splice_tail_init_rcu(&ima_temp_rules, policy, synchronize_rcu);
575 576 577 578 579

	if (ima_rules != policy) {
		ima_policy_flag = 0;
		ima_rules = policy;
	}
580
	ima_update_policy_flag();
M
Mimi Zohar 已提交
581 582
}

583
/* Keep the enumeration in sync with the policy_tokens! */
M
Mimi Zohar 已提交
584
enum {
585
	Opt_measure, Opt_dont_measure,
586
	Opt_appraise, Opt_dont_appraise,
587
	Opt_audit, Opt_hash, Opt_dont_hash,
M
Mimi Zohar 已提交
588 589
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
590
	Opt_func, Opt_mask, Opt_fsmagic, Opt_fsname,
591 592 593
	Opt_fsuuid, Opt_uid_eq, Opt_euid_eq, Opt_fowner_eq,
	Opt_uid_gt, Opt_euid_gt, Opt_fowner_gt,
	Opt_uid_lt, Opt_euid_lt, Opt_fowner_lt,
594
	Opt_appraise_type, Opt_permit_directio,
595
	Opt_pcr, Opt_err
M
Mimi Zohar 已提交
596 597
};

598
static const match_table_t policy_tokens = {
M
Mimi Zohar 已提交
599 600
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
601 602
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
603
	{Opt_audit, "audit"},
604 605
	{Opt_hash, "hash"},
	{Opt_dont_hash, "dont_hash"},
M
Mimi Zohar 已提交
606 607 608 609 610 611 612 613 614
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
615
	{Opt_fsname, "fsname=%s"},
616
	{Opt_fsuuid, "fsuuid=%s"},
617 618 619 620 621 622 623 624 625
	{Opt_uid_eq, "uid=%s"},
	{Opt_euid_eq, "euid=%s"},
	{Opt_fowner_eq, "fowner=%s"},
	{Opt_uid_gt, "uid>%s"},
	{Opt_euid_gt, "euid>%s"},
	{Opt_fowner_gt, "fowner>%s"},
	{Opt_uid_lt, "uid<%s"},
	{Opt_euid_lt, "euid<%s"},
	{Opt_fowner_lt, "fowner<%s"},
626
	{Opt_appraise_type, "appraise_type=%s"},
627
	{Opt_permit_directio, "permit_directio"},
628
	{Opt_pcr, "pcr=%s"},
M
Mimi Zohar 已提交
629 630 631
	{Opt_err, NULL}
};

632
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
633
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
634 635 636
{
	int result;

637 638 639
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

640 641 642 643
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
644 645
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
646 647
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
648
					   &entry->lsm[lsm_rule].rule);
649 650
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
651
		return -EINVAL;
652 653
	}

M
Mimi Zohar 已提交
654 655 656
	return result;
}

657 658
static void ima_log_string_op(struct audit_buffer *ab, char *key, char *value,
			      bool (*rule_operator)(kuid_t, kuid_t))
659
{
660 661 662
	if (!ab)
		return;

663 664 665 666 667 668
	if (rule_operator == &uid_gt)
		audit_log_format(ab, "%s>", key);
	else if (rule_operator == &uid_lt)
		audit_log_format(ab, "%s<", key);
	else
		audit_log_format(ab, "%s=", key);
669
	audit_log_format(ab, "%s ", value);
670
}
671 672 673 674
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	ima_log_string_op(ab, key, value, NULL);
}
675

676
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
677 678
{
	struct audit_buffer *ab;
679
	char *from;
M
Mimi Zohar 已提交
680
	char *p;
681
	bool uid_token;
M
Mimi Zohar 已提交
682 683
	int result = 0;

684 685
	ab = integrity_audit_log_start(audit_context(), GFP_KERNEL,
				       AUDIT_INTEGRITY_POLICY_RULE);
M
Mimi Zohar 已提交
686

687
	entry->uid = INVALID_UID;
688
	entry->fowner = INVALID_UID;
689 690
	entry->uid_op = &uid_eq;
	entry->fowner_op = &uid_eq;
691
	entry->action = UNKNOWN;
E
Eric Paris 已提交
692
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
693 694 695 696 697 698
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
699 700
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
701 702 703
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
704
			ima_log_string(ab, "action", "measure");
705 706 707 708

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
709 710 711
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
712
			ima_log_string(ab, "action", "dont_measure");
713 714 715 716

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
717 718
			entry->action = DONT_MEASURE;
			break;
719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
735 736 737 738 739 740 741 742
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758
		case Opt_hash:
			ima_log_string(ab, "action", "hash");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = HASH;
			break;
		case Opt_dont_hash:
			ima_log_string(ab, "action", "dont_hash");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_HASH;
			break;
M
Mimi Zohar 已提交
759
		case Opt_func:
760
			ima_log_string(ab, "func", args[0].from);
761 762

			if (entry->func)
763
				result = -EINVAL;
764

765 766 767 768 769
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
770 771
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
772 773
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
774 775 776
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
777 778
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
779 780
			else if (strcmp(args[0].from, "CREDS_CHECK") == 0)
				entry->func = CREDS_CHECK;
781 782 783 784 785 786
			else if (strcmp(args[0].from, "KEXEC_KERNEL_CHECK") ==
				 0)
				entry->func = KEXEC_KERNEL_CHECK;
			else if (strcmp(args[0].from, "KEXEC_INITRAMFS_CHECK")
				 == 0)
				entry->func = KEXEC_INITRAMFS_CHECK;
787 788
			else if (strcmp(args[0].from, "POLICY_CHECK") == 0)
				entry->func = POLICY_CHECK;
M
Mimi Zohar 已提交
789 790 791 792 793 794
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
795
			ima_log_string(ab, "mask", args[0].from);
796 797 798 799

			if (entry->mask)
				result = -EINVAL;

800 801 802 803 804
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
805
				entry->mask = MAY_EXEC;
806
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
807
				entry->mask = MAY_WRITE;
808
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
809
				entry->mask = MAY_READ;
810
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
811 812 813 814
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
815 816
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
817 818
			break;
		case Opt_fsmagic:
819
			ima_log_string(ab, "fsmagic", args[0].from);
820 821 822 823 824 825

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

826
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
827 828 829
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
830 831 832 833 834 835 836 837 838 839 840
		case Opt_fsname:
			ima_log_string(ab, "fsname", args[0].from);

			entry->fsname = kstrdup(args[0].from, GFP_KERNEL);
			if (!entry->fsname) {
				result = -ENOMEM;
				break;
			}
			result = 0;
			entry->flags |= IMA_FSNAME;
			break;
841 842 843
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

844
			if (!uuid_is_null(&entry->fsuuid)) {
845 846 847 848
				result = -EINVAL;
				break;
			}

849
			result = uuid_parse(args[0].from, &entry->fsuuid);
850 851
			if (!result)
				entry->flags |= IMA_FSUUID;
852
			break;
853 854 855 856 857 858 859 860 861 862 863 864 865 866 867
		case Opt_uid_gt:
		case Opt_euid_gt:
			entry->uid_op = &uid_gt;
		case Opt_uid_lt:
		case Opt_euid_lt:
			if ((token == Opt_uid_lt) || (token == Opt_euid_lt))
				entry->uid_op = &uid_lt;
		case Opt_uid_eq:
		case Opt_euid_eq:
			uid_token = (token == Opt_uid_eq) ||
				    (token == Opt_uid_gt) ||
				    (token == Opt_uid_lt);

			ima_log_string_op(ab, uid_token ? "uid" : "euid",
					  args[0].from, entry->uid_op);
868

869
			if (uid_valid(entry->uid)) {
870 871 872 873
				result = -EINVAL;
				break;
			}

874
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
875
			if (!result) {
876 877 878 879
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
880 881
					result = -EINVAL;
				else
882
					entry->flags |= uid_token
883
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
884 885
			}
			break;
886 887 888 889 890 891 892 893
		case Opt_fowner_gt:
			entry->fowner_op = &uid_gt;
		case Opt_fowner_lt:
			if (token == Opt_fowner_lt)
				entry->fowner_op = &uid_lt;
		case Opt_fowner_eq:
			ima_log_string_op(ab, "fowner", args[0].from,
					  entry->fowner_op);
894

895
			if (uid_valid(entry->fowner)) {
896 897 898 899
				result = -EINVAL;
				break;
			}

900
			result = kstrtoul(args[0].from, 10, &lnum);
901
			if (!result) {
902 903
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
904 905 906 907 908
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
909
		case Opt_obj_user:
910
			ima_log_string(ab, "obj_user", args[0].from);
911
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
912 913 914 915
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
916
			ima_log_string(ab, "obj_role", args[0].from);
917
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
918 919 920 921
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
922
			ima_log_string(ab, "obj_type", args[0].from);
923
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
924 925 926 927
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
928
			ima_log_string(ab, "subj_user", args[0].from);
929
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
930 931 932 933
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
934
			ima_log_string(ab, "subj_role", args[0].from);
935
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
936 937 938 939
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
940
			ima_log_string(ab, "subj_type", args[0].from);
941
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
942 943 944
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
945 946 947 948 949 950 951 952 953 954 955 956
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
957 958
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
959 960 961 962 963 964 965 966 967 968 969 970 971 972
			break;
		case Opt_pcr:
			if (entry->action != MEASURE) {
				result = -EINVAL;
				break;
			}
			ima_log_string(ab, "pcr", args[0].from);

			result = kstrtoint(args[0].from, 10, &entry->pcr);
			if (result || INVALID_PCR(entry->pcr))
				result = -EINVAL;
			else
				entry->flags |= IMA_PCR;

973
			break;
M
Mimi Zohar 已提交
974
		case Opt_err:
975
			ima_log_string(ab, "UNKNOWN", p);
976
			result = -EINVAL;
M
Mimi Zohar 已提交
977 978 979
			break;
		}
	}
980
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
981
		result = -EINVAL;
982 983 984
	else if (entry->action == APPRAISE)
		temp_ima_appraise |= ima_appraise_flag(entry->func);

985
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
986 987 988 989 990
	audit_log_end(ab);
	return result;
}

/**
991
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
992 993
 * @rule - ima measurement policy rule
 *
994
 * Avoid locking by allowing just one writer at a time in ima_write_policy()
995
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
996
 */
997
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
998
{
999
	static const char op[] = "update_policy";
1000
	char *p;
1001
	struct ima_rule_entry *entry;
1002
	ssize_t result, len;
M
Mimi Zohar 已提交
1003 1004
	int audit_info = 0;

1005 1006
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
1007
	p += strspn(p, " \t");
1008

1009
	if (*p == '#' || *p == '\0')
1010 1011
		return len;

M
Mimi Zohar 已提交
1012 1013 1014 1015 1016 1017 1018 1019 1020
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

1021
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
1022
	if (result) {
M
Mimi Zohar 已提交
1023
		kfree(entry);
M
Mimi Zohar 已提交
1024
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
1025
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
1026
				    audit_info);
E
Eric Paris 已提交
1027
		return result;
M
Mimi Zohar 已提交
1028
	}
E
Eric Paris 已提交
1029

1030
	list_add_tail(&entry->list, &ima_temp_rules);
E
Eric Paris 已提交
1031 1032

	return len;
M
Mimi Zohar 已提交
1033 1034
}

1035 1036 1037 1038 1039 1040
/**
 * ima_delete_rules() called to cleanup invalid in-flight policy.
 * We don't need locking as we operate on the temp list, which is
 * different from the active one.  There is also only one user of
 * ima_delete_rules() at a time.
 */
1041
void ima_delete_rules(void)
M
Mimi Zohar 已提交
1042
{
1043
	struct ima_rule_entry *entry, *tmp;
1044
	int i;
M
Mimi Zohar 已提交
1045

1046
	temp_ima_appraise = 0;
1047
	list_for_each_entry_safe(entry, tmp, &ima_temp_rules, list) {
1048 1049 1050
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
1051 1052 1053 1054
		list_del(&entry->list);
		kfree(entry);
	}
}
1055 1056 1057 1058 1059 1060

#ifdef	CONFIG_IMA_READ_POLICY
enum {
	mask_exec = 0, mask_write, mask_read, mask_append
};

1061
static const char *const mask_tokens[] = {
1062 1063 1064 1065 1066 1067
	"MAY_EXEC",
	"MAY_WRITE",
	"MAY_READ",
	"MAY_APPEND"
};

1068
#define __ima_hook_stringify(str)	(#str),
1069

1070
static const char *const func_tokens[] = {
1071
	__ima_hooks(__ima_hook_stringify)
1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105
};

void *ima_policy_start(struct seq_file *m, loff_t *pos)
{
	loff_t l = *pos;
	struct ima_rule_entry *entry;

	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
		if (!l--) {
			rcu_read_unlock();
			return entry;
		}
	}
	rcu_read_unlock();
	return NULL;
}

void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct ima_rule_entry *entry = v;

	rcu_read_lock();
	entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list);
	rcu_read_unlock();
	(*pos)++;

	return (&entry->list == ima_rules) ? NULL : entry;
}

void ima_policy_stop(struct seq_file *m, void *v)
{
}

1106
#define pt(token)	policy_tokens[token].pattern
1107 1108
#define mt(token)	mask_tokens[token]

1109 1110 1111 1112 1113
/*
 * policy_func_show - display the ima_hooks policy rule
 */
static void policy_func_show(struct seq_file *m, enum ima_hooks func)
{
1114 1115 1116 1117
	if (func > 0 && func < MAX_CHECK)
		seq_printf(m, "func=%s ", func_tokens[func]);
	else
		seq_printf(m, "func=%d ", func);
1118 1119
}

1120 1121 1122
int ima_policy_show(struct seq_file *m, void *v)
{
	struct ima_rule_entry *entry = v;
1123
	int i;
1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137
	char tbuf[64] = {0,};

	rcu_read_lock();

	if (entry->action & MEASURE)
		seq_puts(m, pt(Opt_measure));
	if (entry->action & DONT_MEASURE)
		seq_puts(m, pt(Opt_dont_measure));
	if (entry->action & APPRAISE)
		seq_puts(m, pt(Opt_appraise));
	if (entry->action & DONT_APPRAISE)
		seq_puts(m, pt(Opt_dont_appraise));
	if (entry->action & AUDIT)
		seq_puts(m, pt(Opt_audit));
1138 1139 1140 1141
	if (entry->action & HASH)
		seq_puts(m, pt(Opt_hash));
	if (entry->action & DONT_HASH)
		seq_puts(m, pt(Opt_dont_hash));
1142 1143 1144

	seq_puts(m, " ");

1145 1146
	if (entry->flags & IMA_FUNC)
		policy_func_show(m, entry->func);
1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165

	if (entry->flags & IMA_MASK) {
		if (entry->mask & MAY_EXEC)
			seq_printf(m, pt(Opt_mask), mt(mask_exec));
		if (entry->mask & MAY_WRITE)
			seq_printf(m, pt(Opt_mask), mt(mask_write));
		if (entry->mask & MAY_READ)
			seq_printf(m, pt(Opt_mask), mt(mask_read));
		if (entry->mask & MAY_APPEND)
			seq_printf(m, pt(Opt_mask), mt(mask_append));
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSMAGIC) {
		snprintf(tbuf, sizeof(tbuf), "0x%lx", entry->fsmagic);
		seq_printf(m, pt(Opt_fsmagic), tbuf);
		seq_puts(m, " ");
	}

1166 1167 1168 1169 1170 1171
	if (entry->flags & IMA_FSNAME) {
		snprintf(tbuf, sizeof(tbuf), "%s", entry->fsname);
		seq_printf(m, pt(Opt_fsname), tbuf);
		seq_puts(m, " ");
	}

1172 1173 1174 1175 1176 1177
	if (entry->flags & IMA_PCR) {
		snprintf(tbuf, sizeof(tbuf), "%d", entry->pcr);
		seq_printf(m, pt(Opt_pcr), tbuf);
		seq_puts(m, " ");
	}

1178
	if (entry->flags & IMA_FSUUID) {
1179
		seq_printf(m, "fsuuid=%pU", &entry->fsuuid);
1180 1181 1182 1183 1184
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_UID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
1185 1186 1187 1188 1189 1190
		if (entry->uid_op == &uid_gt)
			seq_printf(m, pt(Opt_uid_gt), tbuf);
		else if (entry->uid_op == &uid_lt)
			seq_printf(m, pt(Opt_uid_lt), tbuf);
		else
			seq_printf(m, pt(Opt_uid_eq), tbuf);
1191 1192 1193 1194 1195
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_EUID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
1196 1197 1198 1199 1200 1201
		if (entry->uid_op == &uid_gt)
			seq_printf(m, pt(Opt_euid_gt), tbuf);
		else if (entry->uid_op == &uid_lt)
			seq_printf(m, pt(Opt_euid_lt), tbuf);
		else
			seq_printf(m, pt(Opt_euid_eq), tbuf);
1202 1203 1204 1205 1206
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FOWNER) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->fowner));
1207 1208 1209 1210 1211 1212
		if (entry->fowner_op == &uid_gt)
			seq_printf(m, pt(Opt_fowner_gt), tbuf);
		else if (entry->fowner_op == &uid_lt)
			seq_printf(m, pt(Opt_fowner_lt), tbuf);
		else
			seq_printf(m, pt(Opt_fowner_eq), tbuf);
1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254
		seq_puts(m, " ");
	}

	for (i = 0; i < MAX_LSM_RULES; i++) {
		if (entry->lsm[i].rule) {
			switch (i) {
			case LSM_OBJ_USER:
				seq_printf(m, pt(Opt_obj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_ROLE:
				seq_printf(m, pt(Opt_obj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_TYPE:
				seq_printf(m, pt(Opt_obj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_USER:
				seq_printf(m, pt(Opt_subj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_ROLE:
				seq_printf(m, pt(Opt_subj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_TYPE:
				seq_printf(m, pt(Opt_subj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			}
		}
	}
	if (entry->flags & IMA_DIGSIG_REQUIRED)
		seq_puts(m, "appraise_type=imasig ");
	if (entry->flags & IMA_PERMIT_DIRECTIO)
		seq_puts(m, "permit_directio ");
	rcu_read_unlock();
	seq_puts(m, "\n");
	return 0;
}
#endif	/* CONFIG_IMA_READ_POLICY */