ima_policy.c 28.6 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14
 *
 */
#include <linux/module.h>
#include <linux/list.h>
15
#include <linux/fs.h>
16 17
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
18
#include <linux/parser.h>
19
#include <linux/slab.h>
20
#include <linux/rculist.h>
21
#include <linux/genhd.h>
22
#include <linux/seq_file.h>
23 24 25 26

#include "ima.h"

/* flags definitions */
27 28
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
29 30
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
31
#define IMA_FOWNER	0x0010
32
#define IMA_FSUUID	0x0020
33
#define IMA_INMASK	0x0040
34
#define IMA_EUID	0x0080
35
#define IMA_PCR		0x0100
36

37 38 39 40 41
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
42
#define AUDIT		0x0040
M
Mimi Zohar 已提交
43

44 45 46
#define INVALID_PCR(a) (((a) < 0) || \
	(a) >= (FIELD_SIZEOF(struct integrity_iint_cache, measured_pcrs) * 8))

47
int ima_policy_flag;
48
static int temp_ima_appraise;
49

M
Mimi Zohar 已提交
50 51 52 53
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
54

M
Mimi Zohar 已提交
55 56
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

57
struct ima_rule_entry {
58
	struct list_head list;
M
Mimi Zohar 已提交
59
	int action;
60 61 62 63
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
64
	u8 fsuuid[16];
65
	kuid_t uid;
66
	kuid_t fowner;
67
	int pcr;
M
Mimi Zohar 已提交
68 69
	struct {
		void *rule;	/* LSM file metadata specific */
70
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
71 72
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
73 74
};

75 76
/*
 * Without LSM specific knowledge, the default policy can only be
77
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
78
 */
79 80 81 82 83 84 85

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
86
static struct ima_rule_entry dont_measure_rules[] __ro_after_init = {
87 88 89 90 91 92 93 94
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
95 96
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
97 98 99
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

100
static struct ima_rule_entry original_measurement_rules[] __ro_after_init = {
M
Mimi Zohar 已提交
101 102 103 104 105 106 107 108 109 110
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

111
static struct ima_rule_entry default_measurement_rules[] __ro_after_init = {
112
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
113
	 .flags = IMA_FUNC | IMA_MASK},
114
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
115
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
116 117 118 119
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
120
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
121
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
122
	{.action = MEASURE, .func = POLICY_CHECK, .flags = IMA_FUNC},
123 124
};

125
static struct ima_rule_entry default_appraise_rules[] __ro_after_init = {
126 127 128 129 130 131 132 133 134
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
135
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
136
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
137 138 139 140
#ifdef CONFIG_IMA_WRITE_POLICY
	{.action = APPRAISE, .func = POLICY_CHECK,
	.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
141
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
142
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
143 144 145 146 147
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
148 149 150 151
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
152
static LIST_HEAD(ima_temp_rules);
153
static struct list_head *ima_rules;
154

M
Mimi Zohar 已提交
155
static int ima_policy __initdata;
156

157
static int __init default_measure_policy_setup(char *str)
158
{
M
Mimi Zohar 已提交
159 160 161 162
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
163 164
	return 1;
}
165 166
__setup("ima_tcb", default_measure_policy_setup);

M
Mimi Zohar 已提交
167 168 169 170 171 172 173 174 175 176 177 178
static int __init policy_setup(char *str)
{
	if (ima_policy)
		return 1;

	if (strcmp(str, "tcb") == 0)
		ima_policy = DEFAULT_TCB;

	return 1;
}
__setup("ima_policy=", policy_setup);

179 180 181 182 183 184 185
static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
186

187
/*
188 189 190 191
 * The LSM policy can be reloaded, leaving the IMA LSM based rules referring
 * to the old, stale LSM policy.  Update the IMA LSM based rules to reflect
 * the reloaded LSM policy.  We assume the rules still exist; and BUG_ON() if
 * they don't.
192 193 194
 */
static void ima_lsm_update_rules(void)
{
195
	struct ima_rule_entry *entry;
196 197 198
	int result;
	int i;

199
	list_for_each_entry(entry, &ima_policy_rules, list) {
200 201 202 203 204 205 206 207 208 209 210 211
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
}

212 213 214 215 216 217 218 219 220
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
221 222
static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
			    enum ima_hooks func, int mask)
223 224
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
225
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
226
	int i;
227

228 229
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
230
		return false;
231 232
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
233
		return false;
234 235 236
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
237 238 239
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
240
	if ((rule->flags & IMA_FSUUID) &&
241
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
242
		return false;
243
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
244
		return false;
245 246 247 248 249 250 251 252 253 254
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

255
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
256
		return false;
M
Mimi Zohar 已提交
257
	for (i = 0; i < MAX_LSM_RULES; i++) {
258
		int rc = 0;
M
Mimi Zohar 已提交
259
		u32 osid, sid;
260
		int retried = 0;
M
Mimi Zohar 已提交
261 262 263

		if (!rule->lsm[i].rule)
			continue;
264
retry:
M
Mimi Zohar 已提交
265 266 267 268 269 270 271
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
272
							Audit_equal,
M
Mimi Zohar 已提交
273 274 275 276 277 278 279 280 281
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
282
							Audit_equal,
M
Mimi Zohar 已提交
283 284 285 286 287
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
288 289 290 291
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
292
		}
M
Mimi Zohar 已提交
293 294 295
		if (!rc)
			return false;
	}
296 297 298
	return true;
}

299 300
/*
 * In addition to knowing that we need to appraise the file in general,
301
 * we need to differentiate between calling hooks, for hook specific rules.
302
 */
303
static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
304
{
305 306 307
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

308
	switch (func) {
309 310 311 312 313
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case FILE_CHECK:
314
	case POST_SETATTR:
315
		return IMA_FILE_APPRAISE;
316 317 318
	case MODULE_CHECK ... MAX_CHECK - 1:
	default:
		return IMA_READ_APPRAISE;
319 320 321
	}
}

322 323 324 325 326
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
327
 * @pcr: set the pcr to extend
328 329 330 331
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
332 333 334
 * Since the IMA policy may be updated multiple times we need to lock the
 * list when walking it.  Reads are many orders of magnitude more numerous
 * than writes so ima_match_policy() is classical RCU candidate.
335
 */
M
Mimi Zohar 已提交
336
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
337
		     int flags, int *pcr)
338
{
339
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
340
	int action = 0, actmask = flags | (flags << 1);
341

342 343
	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
344

M
Mimi Zohar 已提交
345 346 347 348 349
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
350

351 352
		action |= entry->flags & IMA_ACTION_FLAGS;

353
		action |= entry->action & IMA_DO_MASK;
354
		if (entry->action & IMA_APPRAISE)
355
			action |= get_subaction(entry, func);
356

357 358 359 360
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
361

362 363 364
		if ((pcr) && (entry->flags & IMA_PCR))
			*pcr = entry->pcr;

M
Mimi Zohar 已提交
365 366
		if (!actmask)
			break;
367
	}
368
	rcu_read_unlock();
M
Mimi Zohar 已提交
369 370

	return action;
371 372
}

373 374 375 376 377 378 379 380 381 382 383 384 385 386 387
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

388
	ima_appraise |= temp_ima_appraise;
389 390 391 392
	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

393 394 395
/**
 * ima_init_policy - initialize the default measure rules.
 *
396 397
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
398
 */
399
void __init ima_init_policy(void)
400
{
401
	int i, measure_entries, appraise_entries;
402

M
Mimi Zohar 已提交
403 404
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
405 406
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
407

408
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
409 410 411 412 413 414 415 416 417 418 419 420 421 422 423
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
424 425 426 427

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
M
Mimi Zohar 已提交
428 429
		if (default_appraise_rules[i].func == POLICY_CHECK)
			temp_ima_appraise |= IMA_APPRAISE_POLICY;
430 431 432
	}

	ima_rules = &ima_default_rules;
M
Mimi Zohar 已提交
433
	ima_update_policy_flag();
434
}
M
Mimi Zohar 已提交
435

436
/* Make sure we have a valid policy, at least containing some rules. */
437
int ima_check_policy(void)
438 439 440 441 442 443
{
	if (list_empty(&ima_temp_rules))
		return -EINVAL;
	return 0;
}

M
Mimi Zohar 已提交
444 445 446 447
/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
448 449 450 451 452 453
 * policy.  What we do here is to splice ima_policy_rules and ima_temp_rules so
 * they make a queue.  The policy may be updated multiple times and this is the
 * RCU updater.
 *
 * Policy rules are never deleted so ima_policy_flag gets zeroed only once when
 * we switch from the default policy to user defined.
M
Mimi Zohar 已提交
454 455 456
 */
void ima_update_policy(void)
{
457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477
	struct list_head *first, *last, *policy;

	/* append current policy with the new rules */
	first = (&ima_temp_rules)->next;
	last = (&ima_temp_rules)->prev;
	policy = &ima_policy_rules;

	synchronize_rcu();

	last->next = policy;
	rcu_assign_pointer(list_next_rcu(policy->prev), first);
	first->prev = policy->prev;
	policy->prev = last;

	/* prepare for the next policy rules addition */
	INIT_LIST_HEAD(&ima_temp_rules);

	if (ima_rules != policy) {
		ima_policy_flag = 0;
		ima_rules = policy;
	}
478
	ima_update_policy_flag();
M
Mimi Zohar 已提交
479 480 481 482 483
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
484
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
485
	Opt_audit,
M
Mimi Zohar 已提交
486 487
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
488
	Opt_func, Opt_mask, Opt_fsmagic,
489
	Opt_fsuuid, Opt_uid, Opt_euid, Opt_fowner,
490 491
	Opt_appraise_type, Opt_permit_directio,
	Opt_pcr
M
Mimi Zohar 已提交
492 493 494 495 496
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
497 498
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
499
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
500 501 502 503 504 505 506 507 508
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
509
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
510
	{Opt_uid, "uid=%s"},
511
	{Opt_euid, "euid=%s"},
512
	{Opt_fowner, "fowner=%s"},
513
	{Opt_appraise_type, "appraise_type=%s"},
514
	{Opt_permit_directio, "permit_directio"},
515
	{Opt_pcr, "pcr=%s"},
M
Mimi Zohar 已提交
516 517 518
	{Opt_err, NULL}
};

519
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
520
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
521 522 523
{
	int result;

524 525 526
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

527 528 529 530
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
531 532
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
533 534
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
535
					   &entry->lsm[lsm_rule].rule);
536 537
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
538
		return -EINVAL;
539 540
	}

M
Mimi Zohar 已提交
541 542 543
	return result;
}

544 545 546 547 548 549 550
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

551
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
552 553
{
	struct audit_buffer *ab;
554
	char *from;
M
Mimi Zohar 已提交
555 556 557
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
558
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
559

560
	entry->uid = INVALID_UID;
561
	entry->fowner = INVALID_UID;
562
	entry->action = UNKNOWN;
E
Eric Paris 已提交
563
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
564 565 566 567 568 569
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
570 571
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
572 573 574
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
575
			ima_log_string(ab, "action", "measure");
576 577 578 579

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
580 581 582
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
583
			ima_log_string(ab, "action", "dont_measure");
584 585 586 587

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
588 589
			entry->action = DONT_MEASURE;
			break;
590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
606 607 608 609 610 611 612 613
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
614
		case Opt_func:
615
			ima_log_string(ab, "func", args[0].from);
616 617

			if (entry->func)
618
				result = -EINVAL;
619

620 621 622 623 624
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
625 626
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
627 628
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
629 630 631
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
632 633
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
634 635 636 637 638 639
			else if (strcmp(args[0].from, "KEXEC_KERNEL_CHECK") ==
				 0)
				entry->func = KEXEC_KERNEL_CHECK;
			else if (strcmp(args[0].from, "KEXEC_INITRAMFS_CHECK")
				 == 0)
				entry->func = KEXEC_INITRAMFS_CHECK;
640 641
			else if (strcmp(args[0].from, "POLICY_CHECK") == 0)
				entry->func = POLICY_CHECK;
M
Mimi Zohar 已提交
642 643 644 645 646 647
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
648
			ima_log_string(ab, "mask", args[0].from);
649 650 651 652

			if (entry->mask)
				result = -EINVAL;

653 654 655 656 657
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
658
				entry->mask = MAY_EXEC;
659
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
660
				entry->mask = MAY_WRITE;
661
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
662
				entry->mask = MAY_READ;
663
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
664 665 666 667
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
668 669
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
670 671
			break;
		case Opt_fsmagic:
672
			ima_log_string(ab, "fsmagic", args[0].from);
673 674 675 676 677 678

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

679
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
680 681 682
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
683 684 685 686
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
687
				       sizeof(entry->fsuuid))) {
688 689 690 691
				result = -EINVAL;
				break;
			}

692 693 694 695
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
696
			break;
M
Mimi Zohar 已提交
697
		case Opt_uid:
698
			ima_log_string(ab, "uid", args[0].from);
699 700 701
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
702

703
			if (uid_valid(entry->uid)) {
704 705 706 707
				result = -EINVAL;
				break;
			}

708
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
709
			if (!result) {
710 711 712 713
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
714 715
					result = -EINVAL;
				else
716 717
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
718 719
			}
			break;
720 721 722
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

723
			if (uid_valid(entry->fowner)) {
724 725 726 727
				result = -EINVAL;
				break;
			}

728
			result = kstrtoul(args[0].from, 10, &lnum);
729
			if (!result) {
730 731
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
732 733 734 735 736
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
737
		case Opt_obj_user:
738
			ima_log_string(ab, "obj_user", args[0].from);
739
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
740 741 742 743
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
744
			ima_log_string(ab, "obj_role", args[0].from);
745
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
746 747 748 749
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
750
			ima_log_string(ab, "obj_type", args[0].from);
751
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
752 753 754 755
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
756
			ima_log_string(ab, "subj_user", args[0].from);
757
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
758 759 760 761
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
762
			ima_log_string(ab, "subj_role", args[0].from);
763
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
764 765 766 767
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
768
			ima_log_string(ab, "subj_type", args[0].from);
769
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
770 771 772
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
773 774 775 776 777 778 779 780 781 782 783 784
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
785 786
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
787 788 789 790 791 792 793 794 795 796 797 798 799 800
			break;
		case Opt_pcr:
			if (entry->action != MEASURE) {
				result = -EINVAL;
				break;
			}
			ima_log_string(ab, "pcr", args[0].from);

			result = kstrtoint(args[0].from, 10, &entry->pcr);
			if (result || INVALID_PCR(entry->pcr))
				result = -EINVAL;
			else
				entry->flags |= IMA_PCR;

801
			break;
M
Mimi Zohar 已提交
802
		case Opt_err:
803
			ima_log_string(ab, "UNKNOWN", p);
804
			result = -EINVAL;
M
Mimi Zohar 已提交
805 806 807
			break;
		}
	}
808
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
809
		result = -EINVAL;
810
	else if (entry->func == MODULE_CHECK)
811
		temp_ima_appraise |= IMA_APPRAISE_MODULES;
812
	else if (entry->func == FIRMWARE_CHECK)
813
		temp_ima_appraise |= IMA_APPRAISE_FIRMWARE;
814 815
	else if (entry->func == POLICY_CHECK)
		temp_ima_appraise |= IMA_APPRAISE_POLICY;
816
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
817 818 819 820 821
	audit_log_end(ab);
	return result;
}

/**
822
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
823 824
 * @rule - ima measurement policy rule
 *
825
 * Avoid locking by allowing just one writer at a time in ima_write_policy()
826
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
827
 */
828
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
829
{
830
	static const char op[] = "update_policy";
831
	char *p;
832
	struct ima_rule_entry *entry;
833
	ssize_t result, len;
M
Mimi Zohar 已提交
834 835
	int audit_info = 0;

836 837
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
838
	p += strspn(p, " \t");
839

840
	if (*p == '#' || *p == '\0')
841 842
		return len;

M
Mimi Zohar 已提交
843 844 845 846 847 848 849 850 851
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

852
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
853
	if (result) {
M
Mimi Zohar 已提交
854
		kfree(entry);
M
Mimi Zohar 已提交
855
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
856
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
857
				    audit_info);
E
Eric Paris 已提交
858
		return result;
M
Mimi Zohar 已提交
859
	}
E
Eric Paris 已提交
860

861
	list_add_tail(&entry->list, &ima_temp_rules);
E
Eric Paris 已提交
862 863

	return len;
M
Mimi Zohar 已提交
864 865
}

866 867 868 869 870 871
/**
 * ima_delete_rules() called to cleanup invalid in-flight policy.
 * We don't need locking as we operate on the temp list, which is
 * different from the active one.  There is also only one user of
 * ima_delete_rules() at a time.
 */
872
void ima_delete_rules(void)
M
Mimi Zohar 已提交
873
{
874
	struct ima_rule_entry *entry, *tmp;
875
	int i;
M
Mimi Zohar 已提交
876

877
	temp_ima_appraise = 0;
878
	list_for_each_entry_safe(entry, tmp, &ima_temp_rules, list) {
879 880 881
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
882 883 884 885
		list_del(&entry->list);
		kfree(entry);
	}
}
886 887 888 889 890 891 892 893 894 895 896 897 898 899 900

#ifdef	CONFIG_IMA_READ_POLICY
enum {
	mask_exec = 0, mask_write, mask_read, mask_append
};

static char *mask_tokens[] = {
	"MAY_EXEC",
	"MAY_WRITE",
	"MAY_READ",
	"MAY_APPEND"
};

enum {
	func_file = 0, func_mmap, func_bprm,
901
	func_module, func_firmware, func_post,
902 903
	func_kexec_kernel, func_kexec_initramfs,
	func_policy
904 905 906 907 908 909 910 911
};

static char *func_tokens[] = {
	"FILE_CHECK",
	"MMAP_CHECK",
	"BPRM_CHECK",
	"MODULE_CHECK",
	"FIRMWARE_CHECK",
912
	"POST_SETATTR",
913 914
	"KEXEC_KERNEL_CHECK",
	"KEXEC_INITRAMFS_CHECK",
915
	"POLICY_CHECK"
916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953
};

void *ima_policy_start(struct seq_file *m, loff_t *pos)
{
	loff_t l = *pos;
	struct ima_rule_entry *entry;

	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
		if (!l--) {
			rcu_read_unlock();
			return entry;
		}
	}
	rcu_read_unlock();
	return NULL;
}

void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct ima_rule_entry *entry = v;

	rcu_read_lock();
	entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list);
	rcu_read_unlock();
	(*pos)++;

	return (&entry->list == ima_rules) ? NULL : entry;
}

void ima_policy_stop(struct seq_file *m, void *v)
{
}

#define pt(token)	policy_tokens[token + Opt_err].pattern
#define mt(token)	mask_tokens[token]
#define ft(token)	func_tokens[token]

954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979
/*
 * policy_func_show - display the ima_hooks policy rule
 */
static void policy_func_show(struct seq_file *m, enum ima_hooks func)
{
	char tbuf[64] = {0,};

	switch (func) {
	case FILE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_file));
		break;
	case MMAP_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_mmap));
		break;
	case BPRM_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_bprm));
		break;
	case MODULE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_module));
		break;
	case FIRMWARE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_firmware));
		break;
	case POST_SETATTR:
		seq_printf(m, pt(Opt_func), ft(func_post));
		break;
980 981 982 983 984 985
	case KEXEC_KERNEL_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_kernel));
		break;
	case KEXEC_INITRAMFS_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_initramfs));
		break;
986 987 988
	case POLICY_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_policy));
		break;
989 990 991 992 993 994 995 996
	default:
		snprintf(tbuf, sizeof(tbuf), "%d", func);
		seq_printf(m, pt(Opt_func), tbuf);
		break;
	}
	seq_puts(m, " ");
}

997 998 999
int ima_policy_show(struct seq_file *m, void *v)
{
	struct ima_rule_entry *entry = v;
1000
	int i;
1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017
	char tbuf[64] = {0,};

	rcu_read_lock();

	if (entry->action & MEASURE)
		seq_puts(m, pt(Opt_measure));
	if (entry->action & DONT_MEASURE)
		seq_puts(m, pt(Opt_dont_measure));
	if (entry->action & APPRAISE)
		seq_puts(m, pt(Opt_appraise));
	if (entry->action & DONT_APPRAISE)
		seq_puts(m, pt(Opt_dont_appraise));
	if (entry->action & AUDIT)
		seq_puts(m, pt(Opt_audit));

	seq_puts(m, " ");

1018 1019
	if (entry->flags & IMA_FUNC)
		policy_func_show(m, entry->func);
1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038

	if (entry->flags & IMA_MASK) {
		if (entry->mask & MAY_EXEC)
			seq_printf(m, pt(Opt_mask), mt(mask_exec));
		if (entry->mask & MAY_WRITE)
			seq_printf(m, pt(Opt_mask), mt(mask_write));
		if (entry->mask & MAY_READ)
			seq_printf(m, pt(Opt_mask), mt(mask_read));
		if (entry->mask & MAY_APPEND)
			seq_printf(m, pt(Opt_mask), mt(mask_append));
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSMAGIC) {
		snprintf(tbuf, sizeof(tbuf), "0x%lx", entry->fsmagic);
		seq_printf(m, pt(Opt_fsmagic), tbuf);
		seq_puts(m, " ");
	}

1039 1040 1041 1042 1043 1044
	if (entry->flags & IMA_PCR) {
		snprintf(tbuf, sizeof(tbuf), "%d", entry->pcr);
		seq_printf(m, pt(Opt_pcr), tbuf);
		seq_puts(m, " ");
	}

1045
	if (entry->flags & IMA_FSUUID) {
1046
		seq_printf(m, "fsuuid=%pU", entry->fsuuid);
1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_UID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_uid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_EUID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_euid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FOWNER) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->fowner));
		seq_printf(m, pt(Opt_fowner), tbuf);
		seq_puts(m, " ");
	}

	for (i = 0; i < MAX_LSM_RULES; i++) {
		if (entry->lsm[i].rule) {
			switch (i) {
			case LSM_OBJ_USER:
				seq_printf(m, pt(Opt_obj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_ROLE:
				seq_printf(m, pt(Opt_obj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_TYPE:
				seq_printf(m, pt(Opt_obj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_USER:
				seq_printf(m, pt(Opt_subj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_ROLE:
				seq_printf(m, pt(Opt_subj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_TYPE:
				seq_printf(m, pt(Opt_subj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			}
		}
	}
	if (entry->flags & IMA_DIGSIG_REQUIRED)
		seq_puts(m, "appraise_type=imasig ");
	if (entry->flags & IMA_PERMIT_DIRECTIO)
		seq_puts(m, "permit_directio ");
	rcu_read_unlock();
	seq_puts(m, "\n");
	return 0;
}
#endif	/* CONFIG_IMA_READ_POLICY */