ima_policy.c 18.5 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14 15 16
 *
 */
#include <linux/module.h>
#include <linux/list.h>
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
17
#include <linux/parser.h>
18
#include <linux/slab.h>
19
#include <linux/genhd.h>
20 21 22 23

#include "ima.h"

/* flags definitions */
24 25
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
26 27
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
28
#define IMA_FOWNER	0x0010
29
#define IMA_FSUUID	0x0020
30

31 32 33 34 35
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
36
#define AUDIT		0x0040
M
Mimi Zohar 已提交
37 38 39 40 41

#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
42

43
struct ima_rule_entry {
44
	struct list_head list;
M
Mimi Zohar 已提交
45
	int action;
46 47 48 49
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
50
	u8 fsuuid[16];
51
	kuid_t uid;
52
	kuid_t fowner;
M
Mimi Zohar 已提交
53 54
	struct {
		void *rule;	/* LSM file metadata specific */
55
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
56 57
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
58 59
};

60 61
/*
 * Without LSM specific knowledge, the default policy can only be
62
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
63
 */
64 65 66 67 68 69 70

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
71
static struct ima_rule_entry default_rules[] = {
72 73 74 75 76 77 78 79 80
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
81
	 .flags = IMA_FUNC | IMA_MASK},
82
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
83
	 .flags = IMA_FUNC | IMA_MASK},
84
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, .uid = GLOBAL_ROOT_UID,
85
	 .flags = IMA_FUNC | IMA_MASK | IMA_UID},
86
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
87 88
};

89
static struct ima_rule_entry default_appraise_rules[] = {
90 91 92 93 94 95 96 97 98 99 100
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
101 102 103 104 105
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
static struct list_head *ima_rules;
106

107
static DEFINE_MUTEX(ima_rules_mutex);
M
Mimi Zohar 已提交
108

109
static bool ima_use_tcb __initdata;
110
static int __init default_measure_policy_setup(char *str)
111 112 113 114
{
	ima_use_tcb = 1;
	return 1;
}
115 116 117 118 119 120 121 122 123
__setup("ima_tcb", default_measure_policy_setup);

static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
124

125
/*
126 127 128 129
 * Although the IMA policy does not change, the LSM policy can be
 * reloaded, leaving the IMA LSM based rules referring to the old,
 * stale LSM policy.
 *
130
 * Update the IMA LSM based rules to reflect the reloaded LSM policy.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153
 * We assume the rules still exist; and BUG_ON() if they don't.
 */
static void ima_lsm_update_rules(void)
{
	struct ima_rule_entry *entry, *tmp;
	int result;
	int i;

	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
	mutex_unlock(&ima_rules_mutex);
}

154 155 156 157 158 159 160 161 162
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
163
static bool ima_match_rules(struct ima_rule_entry *rule,
164 165 166
			    struct inode *inode, enum ima_hooks func, int mask)
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
167
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
168
	int i;
169

170 171
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
172
		return false;
173 174
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
175 176 177 178
		return false;
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
179
	if ((rule->flags & IMA_FSUUID) &&
180
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
181
		return false;
182
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
183
		return false;
184
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
185
		return false;
M
Mimi Zohar 已提交
186
	for (i = 0; i < MAX_LSM_RULES; i++) {
187
		int rc = 0;
M
Mimi Zohar 已提交
188
		u32 osid, sid;
189
		int retried = 0;
M
Mimi Zohar 已提交
190 191 192

		if (!rule->lsm[i].rule)
			continue;
193
retry:
M
Mimi Zohar 已提交
194 195 196 197 198 199 200
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
201
							Audit_equal,
M
Mimi Zohar 已提交
202 203 204 205 206 207 208 209 210
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
211
							Audit_equal,
M
Mimi Zohar 已提交
212 213 214 215 216
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
217 218 219 220
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
221
		}
M
Mimi Zohar 已提交
222 223 224
		if (!rc)
			return false;
	}
225 226 227
	return true;
}

228 229
/*
 * In addition to knowing that we need to appraise the file in general,
230
 * we need to differentiate between calling hooks, for hook specific rules.
231
 */
232
static int get_subaction(struct ima_rule_entry *rule, int func)
233
{
234 235 236
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

237
	switch (func) {
238 239 240 241 242 243 244 245 246 247 248 249
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case MODULE_CHECK:
		return IMA_MODULE_APPRAISE;
	case FILE_CHECK:
	default:
		return IMA_FILE_APPRAISE;
	}
}

250 251 252 253 254 255 256 257 258 259 260 261 262
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
 * (There is no need for locking when walking the policy list,
 * as elements in the list are never deleted, nor does the list
 * change.)
 */
M
Mimi Zohar 已提交
263 264
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
265
{
266
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
267
	int action = 0, actmask = flags | (flags << 1);
268

269
	list_for_each_entry(entry, ima_rules, list) {
270

M
Mimi Zohar 已提交
271 272 273 274 275
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
276

277 278
		action |= entry->flags & IMA_ACTION_FLAGS;

279
		action |= entry->action & IMA_DO_MASK;
280
		if (entry->action & IMA_APPRAISE)
281
			action |= get_subaction(entry, func);
282

283 284 285 286
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
287

M
Mimi Zohar 已提交
288 289
		if (!actmask)
			break;
290
	}
M
Mimi Zohar 已提交
291 292

	return action;
293 294 295 296 297
}

/**
 * ima_init_policy - initialize the default measure rules.
 *
298 299
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
300
 */
301
void __init ima_init_policy(void)
302
{
303
	int i, measure_entries, appraise_entries;
304 305

	/* if !ima_use_tcb set entries = 0 so we load NO default rules */
306 307 308
	measure_entries = ima_use_tcb ? ARRAY_SIZE(default_rules) : 0;
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
309

310 311 312 313 314 315 316 317 318 319 320 321 322
	for (i = 0; i < measure_entries + appraise_entries; i++) {
		if (i < measure_entries)
			list_add_tail(&default_rules[i].list,
				      &ima_default_rules);
		else {
			int j = i - measure_entries;

			list_add_tail(&default_appraise_rules[j].list,
				      &ima_default_rules);
		}
	}

	ima_rules = &ima_default_rules;
323
}
M
Mimi Zohar 已提交
324 325 326 327 328 329 330 331 332 333

/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
 * policy.  Once updated, the policy is locked, no additional rules can be
 * added to the policy.
 */
void ima_update_policy(void)
{
334
	static const char op[] = "policy_update";
M
Mimi Zohar 已提交
335 336 337 338
	const char *cause = "already exists";
	int result = 1;
	int audit_info = 0;

339 340
	if (ima_rules == &ima_default_rules) {
		ima_rules = &ima_policy_rules;
M
Mimi Zohar 已提交
341 342 343 344 345 346 347 348 349 350
		cause = "complete";
		result = 0;
	}
	integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
			    NULL, op, cause, result, audit_info);
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
351
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
352
	Opt_audit,
M
Mimi Zohar 已提交
353 354
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
355
	Opt_func, Opt_mask, Opt_fsmagic, Opt_uid, Opt_fowner,
356
	Opt_appraise_type, Opt_fsuuid
M
Mimi Zohar 已提交
357 358 359 360 361
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
362 363
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
364
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
365 366 367 368 369 370 371 372 373
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
374
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
375
	{Opt_uid, "uid=%s"},
376
	{Opt_fowner, "fowner=%s"},
377
	{Opt_appraise_type, "appraise_type=%s"},
M
Mimi Zohar 已提交
378 379 380
	{Opt_err, NULL}
};

381
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
382
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
383 384 385
{
	int result;

386 387 388
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

389 390 391 392
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
393 394
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
395 396
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
397
					   &entry->lsm[lsm_rule].rule);
398 399
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
400
		return -EINVAL;
401 402
	}

M
Mimi Zohar 已提交
403 404 405
	return result;
}

406 407 408 409 410 411 412
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

413
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
414 415 416 417 418
{
	struct audit_buffer *ab;
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
419
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
420

421
	entry->uid = INVALID_UID;
422
	entry->fowner = INVALID_UID;
423
	entry->action = UNKNOWN;
E
Eric Paris 已提交
424
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
425 426 427 428 429 430
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
431 432
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
433 434 435
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
436
			ima_log_string(ab, "action", "measure");
437 438 439 440

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
441 442 443
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
444
			ima_log_string(ab, "action", "dont_measure");
445 446 447 448

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
449 450
			entry->action = DONT_MEASURE;
			break;
451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
467 468 469 470 471 472 473 474
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
475
		case Opt_func:
476
			ima_log_string(ab, "func", args[0].from);
477 478

			if (entry->func)
479
				result = -EINVAL;
480

481 482 483 484 485
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
486 487
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
M
Mimi Zohar 已提交
488 489 490
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
491 492 493 494 495 496 497 498
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
499
			ima_log_string(ab, "mask", args[0].from);
500 501 502 503

			if (entry->mask)
				result = -EINVAL;

M
Mimi Zohar 已提交
504 505 506 507 508 509 510 511 512 513 514 515 516 517
			if ((strcmp(args[0].from, "MAY_EXEC")) == 0)
				entry->mask = MAY_EXEC;
			else if (strcmp(args[0].from, "MAY_WRITE") == 0)
				entry->mask = MAY_WRITE;
			else if (strcmp(args[0].from, "MAY_READ") == 0)
				entry->mask = MAY_READ;
			else if (strcmp(args[0].from, "MAY_APPEND") == 0)
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_MASK;
			break;
		case Opt_fsmagic:
518
			ima_log_string(ab, "fsmagic", args[0].from);
519 520 521 522 523 524

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

525
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
526 527 528
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
529 530 531 532
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
533
				       sizeof(entry->fsuuid))) {
534 535 536 537
				result = -EINVAL;
				break;
			}

538 539 540 541
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
542
			break;
M
Mimi Zohar 已提交
543
		case Opt_uid:
544
			ima_log_string(ab, "uid", args[0].from);
545

546
			if (uid_valid(entry->uid)) {
547 548 549 550
				result = -EINVAL;
				break;
			}

551
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
552
			if (!result) {
553 554
				entry->uid = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->uid) || (((uid_t)lnum) != lnum))
M
Mimi Zohar 已提交
555 556 557 558 559
					result = -EINVAL;
				else
					entry->flags |= IMA_UID;
			}
			break;
560 561 562
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

563
			if (uid_valid(entry->fowner)) {
564 565 566 567
				result = -EINVAL;
				break;
			}

568
			result = kstrtoul(args[0].from, 10, &lnum);
569
			if (!result) {
570 571
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
572 573 574 575 576
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
577
		case Opt_obj_user:
578
			ima_log_string(ab, "obj_user", args[0].from);
579
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
580 581 582 583
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
584
			ima_log_string(ab, "obj_role", args[0].from);
585
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
586 587 588 589
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
590
			ima_log_string(ab, "obj_type", args[0].from);
591
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
592 593 594 595
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
596
			ima_log_string(ab, "subj_user", args[0].from);
597
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
598 599 600 601
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
602
			ima_log_string(ab, "subj_role", args[0].from);
603
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
604 605 606 607
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
608
			ima_log_string(ab, "subj_type", args[0].from);
609
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
610 611 612
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
613 614 615 616 617 618 619 620 621 622 623 624
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
M
Mimi Zohar 已提交
625
		case Opt_err:
626
			ima_log_string(ab, "UNKNOWN", p);
627
			result = -EINVAL;
M
Mimi Zohar 已提交
628 629 630
			break;
		}
	}
631
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
632
		result = -EINVAL;
633 634
	else if (entry->func == MODULE_CHECK)
		ima_appraise |= IMA_APPRAISE_MODULES;
635
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
636 637 638 639 640
	audit_log_end(ab);
	return result;
}

/**
641
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
642 643 644
 * @rule - ima measurement policy rule
 *
 * Uses a mutex to protect the policy list from multiple concurrent writers.
645
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
646
 */
647
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
648
{
649
	static const char op[] = "update_policy";
650
	char *p;
651
	struct ima_rule_entry *entry;
652
	ssize_t result, len;
M
Mimi Zohar 已提交
653 654 655
	int audit_info = 0;

	/* Prevent installed policy from changing */
656
	if (ima_rules != &ima_default_rules) {
M
Mimi Zohar 已提交
657 658 659 660 661 662 663 664 665 666 667 668 669 670 671
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "already exists",
				    -EACCES, audit_info);
		return -EACCES;
	}

	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

672 673
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
E
Eric Paris 已提交
674 675 676 677 678 679

	if (*p == '#') {
		kfree(entry);
		return len;
	}

680
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
681
	if (result) {
M
Mimi Zohar 已提交
682
		kfree(entry);
M
Mimi Zohar 已提交
683 684 685
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "invalid policy", result,
				    audit_info);
E
Eric Paris 已提交
686
		return result;
M
Mimi Zohar 已提交
687
	}
E
Eric Paris 已提交
688

689 690 691
	mutex_lock(&ima_rules_mutex);
	list_add_tail(&entry->list, &ima_policy_rules);
	mutex_unlock(&ima_rules_mutex);
E
Eric Paris 已提交
692 693

	return len;
M
Mimi Zohar 已提交
694 695 696
}

/* ima_delete_rules called to cleanup invalid policy */
697
void ima_delete_rules(void)
M
Mimi Zohar 已提交
698
{
699
	struct ima_rule_entry *entry, *tmp;
700
	int i;
M
Mimi Zohar 已提交
701

702 703
	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
704 705 706
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
707 708 709
		list_del(&entry->list);
		kfree(entry);
	}
710
	mutex_unlock(&ima_rules_mutex);
M
Mimi Zohar 已提交
711
}