ima_policy.c 27.8 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14
 *
 */
#include <linux/module.h>
#include <linux/list.h>
15
#include <linux/fs.h>
16 17
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
18
#include <linux/parser.h>
19
#include <linux/slab.h>
20
#include <linux/rculist.h>
21
#include <linux/genhd.h>
22
#include <linux/seq_file.h>
23 24 25 26

#include "ima.h"

/* flags definitions */
27 28
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
29 30
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
31
#define IMA_FOWNER	0x0010
32
#define IMA_FSUUID	0x0020
33
#define IMA_INMASK	0x0040
34
#define IMA_EUID	0x0080
35

36 37 38 39 40
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
41
#define AUDIT		0x0040
M
Mimi Zohar 已提交
42

43
int ima_policy_flag;
44
static int temp_ima_appraise;
45

M
Mimi Zohar 已提交
46 47 48 49
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
50

M
Mimi Zohar 已提交
51 52
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

53
struct ima_rule_entry {
54
	struct list_head list;
M
Mimi Zohar 已提交
55
	int action;
56 57 58 59
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
60
	u8 fsuuid[16];
61
	kuid_t uid;
62
	kuid_t fowner;
M
Mimi Zohar 已提交
63 64
	struct {
		void *rule;	/* LSM file metadata specific */
65
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
66 67
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
68 69
};

70 71
/*
 * Without LSM specific knowledge, the default policy can only be
72
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
73
 */
74 75 76 77 78 79 80

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
M
Mimi Zohar 已提交
81
static struct ima_rule_entry dont_measure_rules[] = {
82 83 84 85 86 87 88 89
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
90 91
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

static struct ima_rule_entry original_measurement_rules[] = {
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

static struct ima_rule_entry default_measurement_rules[] = {
107
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
108
	 .flags = IMA_FUNC | IMA_MASK},
109
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
110
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
111 112 113 114
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
115
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
116
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
117
	{.action = MEASURE, .func = POLICY_CHECK, .flags = IMA_FUNC},
118 119
};

120
static struct ima_rule_entry default_appraise_rules[] = {
121 122 123 124 125 126 127 128 129
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
130
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
131
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
132
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
133
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
134 135 136 137 138
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
139 140 141 142
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
143
static LIST_HEAD(ima_temp_rules);
144
static struct list_head *ima_rules;
145

M
Mimi Zohar 已提交
146
static int ima_policy __initdata;
147

148
static int __init default_measure_policy_setup(char *str)
149
{
M
Mimi Zohar 已提交
150 151 152 153
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
154 155
	return 1;
}
156 157
__setup("ima_tcb", default_measure_policy_setup);

M
Mimi Zohar 已提交
158 159 160 161 162 163 164 165 166 167 168 169
static int __init policy_setup(char *str)
{
	if (ima_policy)
		return 1;

	if (strcmp(str, "tcb") == 0)
		ima_policy = DEFAULT_TCB;

	return 1;
}
__setup("ima_policy=", policy_setup);

170 171 172 173 174 175 176
static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
177

178
/*
179 180 181 182
 * The LSM policy can be reloaded, leaving the IMA LSM based rules referring
 * to the old, stale LSM policy.  Update the IMA LSM based rules to reflect
 * the reloaded LSM policy.  We assume the rules still exist; and BUG_ON() if
 * they don't.
183 184 185
 */
static void ima_lsm_update_rules(void)
{
186
	struct ima_rule_entry *entry;
187 188 189
	int result;
	int i;

190
	list_for_each_entry(entry, &ima_policy_rules, list) {
191 192 193 194 195 196 197 198 199 200 201 202
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
}

203 204 205 206 207 208 209 210 211
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
212 213
static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
			    enum ima_hooks func, int mask)
214 215
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
216
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
217
	int i;
218

219 220
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
221
		return false;
222 223
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
224
		return false;
225 226 227
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
228 229 230
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
231
	if ((rule->flags & IMA_FSUUID) &&
232
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
233
		return false;
234
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
235
		return false;
236 237 238 239 240 241 242 243 244 245
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

246
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
247
		return false;
M
Mimi Zohar 已提交
248
	for (i = 0; i < MAX_LSM_RULES; i++) {
249
		int rc = 0;
M
Mimi Zohar 已提交
250
		u32 osid, sid;
251
		int retried = 0;
M
Mimi Zohar 已提交
252 253 254

		if (!rule->lsm[i].rule)
			continue;
255
retry:
M
Mimi Zohar 已提交
256 257 258 259 260 261 262
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
263
							Audit_equal,
M
Mimi Zohar 已提交
264 265 266 267 268 269 270 271 272
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
273
							Audit_equal,
M
Mimi Zohar 已提交
274 275 276 277 278
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
279 280 281 282
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
283
		}
M
Mimi Zohar 已提交
284 285 286
		if (!rc)
			return false;
	}
287 288 289
	return true;
}

290 291
/*
 * In addition to knowing that we need to appraise the file in general,
292
 * we need to differentiate between calling hooks, for hook specific rules.
293
 */
294
static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
295
{
296 297 298
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

299
	switch (func) {
300 301 302 303 304
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case FILE_CHECK:
305
	case POST_SETATTR:
306
		return IMA_FILE_APPRAISE;
307 308 309
	case MODULE_CHECK ... MAX_CHECK - 1:
	default:
		return IMA_READ_APPRAISE;
310 311 312
	}
}

313 314 315 316 317 318 319 320 321
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
322 323 324
 * Since the IMA policy may be updated multiple times we need to lock the
 * list when walking it.  Reads are many orders of magnitude more numerous
 * than writes so ima_match_policy() is classical RCU candidate.
325
 */
M
Mimi Zohar 已提交
326 327
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
328
{
329
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
330
	int action = 0, actmask = flags | (flags << 1);
331

332 333
	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
334

M
Mimi Zohar 已提交
335 336 337 338 339
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
340

341 342
		action |= entry->flags & IMA_ACTION_FLAGS;

343
		action |= entry->action & IMA_DO_MASK;
344
		if (entry->action & IMA_APPRAISE)
345
			action |= get_subaction(entry, func);
346

347 348 349 350
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
351

M
Mimi Zohar 已提交
352 353
		if (!actmask)
			break;
354
	}
355
	rcu_read_unlock();
M
Mimi Zohar 已提交
356 357

	return action;
358 359
}

360 361 362 363 364 365 366 367 368 369 370 371 372 373 374
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

375
	ima_appraise |= temp_ima_appraise;
376 377 378 379
	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

380 381 382
/**
 * ima_init_policy - initialize the default measure rules.
 *
383 384
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
385
 */
386
void __init ima_init_policy(void)
387
{
388
	int i, measure_entries, appraise_entries;
389

M
Mimi Zohar 已提交
390 391
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
392 393
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
394

395
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
396 397 398 399 400 401 402 403 404 405 406 407 408 409 410
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
411 412 413 414

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
415 416 417
	}

	ima_rules = &ima_default_rules;
418
}
M
Mimi Zohar 已提交
419

420
/* Make sure we have a valid policy, at least containing some rules. */
421
int ima_check_policy(void)
422 423 424 425 426 427
{
	if (list_empty(&ima_temp_rules))
		return -EINVAL;
	return 0;
}

M
Mimi Zohar 已提交
428 429 430 431
/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
432 433 434 435 436 437
 * policy.  What we do here is to splice ima_policy_rules and ima_temp_rules so
 * they make a queue.  The policy may be updated multiple times and this is the
 * RCU updater.
 *
 * Policy rules are never deleted so ima_policy_flag gets zeroed only once when
 * we switch from the default policy to user defined.
M
Mimi Zohar 已提交
438 439 440
 */
void ima_update_policy(void)
{
441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461
	struct list_head *first, *last, *policy;

	/* append current policy with the new rules */
	first = (&ima_temp_rules)->next;
	last = (&ima_temp_rules)->prev;
	policy = &ima_policy_rules;

	synchronize_rcu();

	last->next = policy;
	rcu_assign_pointer(list_next_rcu(policy->prev), first);
	first->prev = policy->prev;
	policy->prev = last;

	/* prepare for the next policy rules addition */
	INIT_LIST_HEAD(&ima_temp_rules);

	if (ima_rules != policy) {
		ima_policy_flag = 0;
		ima_rules = policy;
	}
462
	ima_update_policy_flag();
M
Mimi Zohar 已提交
463 464 465 466 467
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
468
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
469
	Opt_audit,
M
Mimi Zohar 已提交
470 471
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
472
	Opt_func, Opt_mask, Opt_fsmagic,
473 474
	Opt_fsuuid, Opt_uid, Opt_euid, Opt_fowner,
	Opt_appraise_type, Opt_permit_directio
M
Mimi Zohar 已提交
475 476 477 478 479
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
480 481
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
482
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
483 484 485 486 487 488 489 490 491
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
492
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
493
	{Opt_uid, "uid=%s"},
494
	{Opt_euid, "euid=%s"},
495
	{Opt_fowner, "fowner=%s"},
496
	{Opt_appraise_type, "appraise_type=%s"},
497
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
498 499 500
	{Opt_err, NULL}
};

501
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
502
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
503 504 505
{
	int result;

506 507 508
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

509 510 511 512
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
513 514
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
515 516
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
517
					   &entry->lsm[lsm_rule].rule);
518 519
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
520
		return -EINVAL;
521 522
	}

M
Mimi Zohar 已提交
523 524 525
	return result;
}

526 527 528 529 530 531 532
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

533
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
534 535
{
	struct audit_buffer *ab;
536
	char *from;
M
Mimi Zohar 已提交
537 538 539
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
540
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
541

542
	entry->uid = INVALID_UID;
543
	entry->fowner = INVALID_UID;
544
	entry->action = UNKNOWN;
E
Eric Paris 已提交
545
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
546 547 548 549 550 551
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
552 553
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
554 555 556
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
557
			ima_log_string(ab, "action", "measure");
558 559 560 561

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
562 563 564
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
565
			ima_log_string(ab, "action", "dont_measure");
566 567 568 569

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
570 571
			entry->action = DONT_MEASURE;
			break;
572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
588 589 590 591 592 593 594 595
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
596
		case Opt_func:
597
			ima_log_string(ab, "func", args[0].from);
598 599

			if (entry->func)
600
				result = -EINVAL;
601

602 603 604 605 606
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
607 608
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
609 610
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
611 612 613
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
614 615
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
616 617 618 619 620 621
			else if (strcmp(args[0].from, "KEXEC_KERNEL_CHECK") ==
				 0)
				entry->func = KEXEC_KERNEL_CHECK;
			else if (strcmp(args[0].from, "KEXEC_INITRAMFS_CHECK")
				 == 0)
				entry->func = KEXEC_INITRAMFS_CHECK;
622 623
			else if (strcmp(args[0].from, "POLICY_CHECK") == 0)
				entry->func = POLICY_CHECK;
M
Mimi Zohar 已提交
624 625 626 627 628 629
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
630
			ima_log_string(ab, "mask", args[0].from);
631 632 633 634

			if (entry->mask)
				result = -EINVAL;

635 636 637 638 639
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
640
				entry->mask = MAY_EXEC;
641
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
642
				entry->mask = MAY_WRITE;
643
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
644
				entry->mask = MAY_READ;
645
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
646 647 648 649
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
650 651
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
652 653
			break;
		case Opt_fsmagic:
654
			ima_log_string(ab, "fsmagic", args[0].from);
655 656 657 658 659 660

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

661
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
662 663 664
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
665 666 667 668
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
669
				       sizeof(entry->fsuuid))) {
670 671 672 673
				result = -EINVAL;
				break;
			}

674 675 676 677
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
678
			break;
M
Mimi Zohar 已提交
679
		case Opt_uid:
680
			ima_log_string(ab, "uid", args[0].from);
681 682 683
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
684

685
			if (uid_valid(entry->uid)) {
686 687 688 689
				result = -EINVAL;
				break;
			}

690
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
691
			if (!result) {
692 693 694 695
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
696 697
					result = -EINVAL;
				else
698 699
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
700 701
			}
			break;
702 703 704
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

705
			if (uid_valid(entry->fowner)) {
706 707 708 709
				result = -EINVAL;
				break;
			}

710
			result = kstrtoul(args[0].from, 10, &lnum);
711
			if (!result) {
712 713
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
714 715 716 717 718
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
719
		case Opt_obj_user:
720
			ima_log_string(ab, "obj_user", args[0].from);
721
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
722 723 724 725
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
726
			ima_log_string(ab, "obj_role", args[0].from);
727
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
728 729 730 731
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
732
			ima_log_string(ab, "obj_type", args[0].from);
733
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
734 735 736 737
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
738
			ima_log_string(ab, "subj_user", args[0].from);
739
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
740 741 742 743
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
744
			ima_log_string(ab, "subj_role", args[0].from);
745
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
746 747 748 749
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
750
			ima_log_string(ab, "subj_type", args[0].from);
751
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
752 753 754
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
755 756 757 758 759 760 761 762 763 764 765 766
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
767 768 769
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
770
		case Opt_err:
771
			ima_log_string(ab, "UNKNOWN", p);
772
			result = -EINVAL;
M
Mimi Zohar 已提交
773 774 775
			break;
		}
	}
776
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
777
		result = -EINVAL;
778
	else if (entry->func == MODULE_CHECK)
779
		temp_ima_appraise |= IMA_APPRAISE_MODULES;
780
	else if (entry->func == FIRMWARE_CHECK)
781
		temp_ima_appraise |= IMA_APPRAISE_FIRMWARE;
782 783
	else if (entry->func == POLICY_CHECK)
		temp_ima_appraise |= IMA_APPRAISE_POLICY;
784
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
785 786 787 788 789
	audit_log_end(ab);
	return result;
}

/**
790
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
791 792
 * @rule - ima measurement policy rule
 *
793
 * Avoid locking by allowing just one writer at a time in ima_write_policy()
794
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
795
 */
796
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
797
{
798
	static const char op[] = "update_policy";
799
	char *p;
800
	struct ima_rule_entry *entry;
801
	ssize_t result, len;
M
Mimi Zohar 已提交
802 803
	int audit_info = 0;

804 805
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
806
	p += strspn(p, " \t");
807

808
	if (*p == '#' || *p == '\0')
809 810
		return len;

M
Mimi Zohar 已提交
811 812 813 814 815 816 817 818 819
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

820
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
821
	if (result) {
M
Mimi Zohar 已提交
822
		kfree(entry);
M
Mimi Zohar 已提交
823
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
824
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
825
				    audit_info);
E
Eric Paris 已提交
826
		return result;
M
Mimi Zohar 已提交
827
	}
E
Eric Paris 已提交
828

829
	list_add_tail(&entry->list, &ima_temp_rules);
E
Eric Paris 已提交
830 831

	return len;
M
Mimi Zohar 已提交
832 833
}

834 835 836 837 838 839
/**
 * ima_delete_rules() called to cleanup invalid in-flight policy.
 * We don't need locking as we operate on the temp list, which is
 * different from the active one.  There is also only one user of
 * ima_delete_rules() at a time.
 */
840
void ima_delete_rules(void)
M
Mimi Zohar 已提交
841
{
842
	struct ima_rule_entry *entry, *tmp;
843
	int i;
M
Mimi Zohar 已提交
844

845
	temp_ima_appraise = 0;
846
	list_for_each_entry_safe(entry, tmp, &ima_temp_rules, list) {
847 848 849
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
850 851 852 853
		list_del(&entry->list);
		kfree(entry);
	}
}
854 855 856 857 858 859 860 861 862 863 864 865 866 867 868

#ifdef	CONFIG_IMA_READ_POLICY
enum {
	mask_exec = 0, mask_write, mask_read, mask_append
};

static char *mask_tokens[] = {
	"MAY_EXEC",
	"MAY_WRITE",
	"MAY_READ",
	"MAY_APPEND"
};

enum {
	func_file = 0, func_mmap, func_bprm,
869
	func_module, func_firmware, func_post,
870 871
	func_kexec_kernel, func_kexec_initramfs,
	func_policy
872 873 874 875 876 877 878 879
};

static char *func_tokens[] = {
	"FILE_CHECK",
	"MMAP_CHECK",
	"BPRM_CHECK",
	"MODULE_CHECK",
	"FIRMWARE_CHECK",
880 881
	"KEXEC_KERNEL_CHECK",
	"KEXEC_INITRAMFS_CHECK",
882
	"POLICY_CHECK",
883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921
	"POST_SETATTR"
};

void *ima_policy_start(struct seq_file *m, loff_t *pos)
{
	loff_t l = *pos;
	struct ima_rule_entry *entry;

	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
		if (!l--) {
			rcu_read_unlock();
			return entry;
		}
	}
	rcu_read_unlock();
	return NULL;
}

void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct ima_rule_entry *entry = v;

	rcu_read_lock();
	entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list);
	rcu_read_unlock();
	(*pos)++;

	return (&entry->list == ima_rules) ? NULL : entry;
}

void ima_policy_stop(struct seq_file *m, void *v)
{
}

#define pt(token)	policy_tokens[token + Opt_err].pattern
#define mt(token)	mask_tokens[token]
#define ft(token)	func_tokens[token]

922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947
/*
 * policy_func_show - display the ima_hooks policy rule
 */
static void policy_func_show(struct seq_file *m, enum ima_hooks func)
{
	char tbuf[64] = {0,};

	switch (func) {
	case FILE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_file));
		break;
	case MMAP_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_mmap));
		break;
	case BPRM_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_bprm));
		break;
	case MODULE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_module));
		break;
	case FIRMWARE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_firmware));
		break;
	case POST_SETATTR:
		seq_printf(m, pt(Opt_func), ft(func_post));
		break;
948 949 950 951 952 953
	case KEXEC_KERNEL_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_kernel));
		break;
	case KEXEC_INITRAMFS_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_initramfs));
		break;
954 955 956
	case POLICY_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_policy));
		break;
957 958 959 960 961 962 963 964
	default:
		snprintf(tbuf, sizeof(tbuf), "%d", func);
		seq_printf(m, pt(Opt_func), tbuf);
		break;
	}
	seq_puts(m, " ");
}

965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985
int ima_policy_show(struct seq_file *m, void *v)
{
	struct ima_rule_entry *entry = v;
	int i = 0;
	char tbuf[64] = {0,};

	rcu_read_lock();

	if (entry->action & MEASURE)
		seq_puts(m, pt(Opt_measure));
	if (entry->action & DONT_MEASURE)
		seq_puts(m, pt(Opt_dont_measure));
	if (entry->action & APPRAISE)
		seq_puts(m, pt(Opt_appraise));
	if (entry->action & DONT_APPRAISE)
		seq_puts(m, pt(Opt_dont_appraise));
	if (entry->action & AUDIT)
		seq_puts(m, pt(Opt_audit));

	seq_puts(m, " ");

986 987
	if (entry->flags & IMA_FUNC)
		policy_func_show(m, entry->func);
988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078

	if (entry->flags & IMA_MASK) {
		if (entry->mask & MAY_EXEC)
			seq_printf(m, pt(Opt_mask), mt(mask_exec));
		if (entry->mask & MAY_WRITE)
			seq_printf(m, pt(Opt_mask), mt(mask_write));
		if (entry->mask & MAY_READ)
			seq_printf(m, pt(Opt_mask), mt(mask_read));
		if (entry->mask & MAY_APPEND)
			seq_printf(m, pt(Opt_mask), mt(mask_append));
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSMAGIC) {
		snprintf(tbuf, sizeof(tbuf), "0x%lx", entry->fsmagic);
		seq_printf(m, pt(Opt_fsmagic), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSUUID) {
		seq_puts(m, "fsuuid=");
		for (i = 0; i < ARRAY_SIZE(entry->fsuuid); ++i) {
			switch (i) {
			case 4:
			case 6:
			case 8:
			case 10:
				seq_puts(m, "-");
			}
			seq_printf(m, "%x", entry->fsuuid[i]);
		}
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_UID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_uid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_EUID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_euid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FOWNER) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->fowner));
		seq_printf(m, pt(Opt_fowner), tbuf);
		seq_puts(m, " ");
	}

	for (i = 0; i < MAX_LSM_RULES; i++) {
		if (entry->lsm[i].rule) {
			switch (i) {
			case LSM_OBJ_USER:
				seq_printf(m, pt(Opt_obj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_ROLE:
				seq_printf(m, pt(Opt_obj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_TYPE:
				seq_printf(m, pt(Opt_obj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_USER:
				seq_printf(m, pt(Opt_subj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_ROLE:
				seq_printf(m, pt(Opt_subj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_TYPE:
				seq_printf(m, pt(Opt_subj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			}
		}
	}
	if (entry->flags & IMA_DIGSIG_REQUIRED)
		seq_puts(m, "appraise_type=imasig ");
	if (entry->flags & IMA_PERMIT_DIRECTIO)
		seq_puts(m, "permit_directio ");
	rcu_read_unlock();
	seq_puts(m, "\n");
	return 0;
}
#endif	/* CONFIG_IMA_READ_POLICY */