ima_policy.c 20.0 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14 15 16
 *
 */
#include <linux/module.h>
#include <linux/list.h>
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
17
#include <linux/parser.h>
18
#include <linux/slab.h>
19
#include <linux/genhd.h>
20 21 22 23

#include "ima.h"

/* flags definitions */
24 25
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
26 27
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
28
#define IMA_FOWNER	0x0010
29
#define IMA_FSUUID	0x0020
30
#define IMA_INMASK	0x0040
31
#define IMA_EUID	0x0080
32

33 34 35 36 37
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
38
#define AUDIT		0x0040
M
Mimi Zohar 已提交
39

40 41
int ima_policy_flag;

M
Mimi Zohar 已提交
42 43 44 45
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
46

47
struct ima_rule_entry {
48
	struct list_head list;
M
Mimi Zohar 已提交
49
	int action;
50 51 52 53
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
54
	u8 fsuuid[16];
55
	kuid_t uid;
56
	kuid_t fowner;
M
Mimi Zohar 已提交
57 58
	struct {
		void *rule;	/* LSM file metadata specific */
59
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
60 61
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
62 63
};

64 65
/*
 * Without LSM specific knowledge, the default policy can only be
66
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
67
 */
68 69 70 71 72 73 74

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
75
static struct ima_rule_entry default_rules[] = {
76 77 78 79 80 81 82 83
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
84 85
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
86
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
87
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
88
	 .flags = IMA_FUNC | IMA_MASK},
89
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
90
	 .flags = IMA_FUNC | IMA_MASK},
91
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, .uid = GLOBAL_ROOT_UID,
92
	 .flags = IMA_FUNC | IMA_MASK | IMA_UID},
93
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
94
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
95 96
};

97
static struct ima_rule_entry default_appraise_rules[] = {
98 99 100 101 102 103 104 105 106
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
107
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
108
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
109
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
110
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
111 112 113 114 115
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
116 117 118 119 120
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
static struct list_head *ima_rules;
121

122
static DEFINE_MUTEX(ima_rules_mutex);
M
Mimi Zohar 已提交
123

124
static bool ima_use_tcb __initdata;
125
static int __init default_measure_policy_setup(char *str)
126 127 128 129
{
	ima_use_tcb = 1;
	return 1;
}
130 131 132 133 134 135 136 137 138
__setup("ima_tcb", default_measure_policy_setup);

static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
139

140
/*
141 142 143 144
 * Although the IMA policy does not change, the LSM policy can be
 * reloaded, leaving the IMA LSM based rules referring to the old,
 * stale LSM policy.
 *
145
 * Update the IMA LSM based rules to reflect the reloaded LSM policy.
146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168
 * We assume the rules still exist; and BUG_ON() if they don't.
 */
static void ima_lsm_update_rules(void)
{
	struct ima_rule_entry *entry, *tmp;
	int result;
	int i;

	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
	mutex_unlock(&ima_rules_mutex);
}

169 170 171 172 173 174 175 176 177
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
178
static bool ima_match_rules(struct ima_rule_entry *rule,
179 180 181
			    struct inode *inode, enum ima_hooks func, int mask)
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
182
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
183
	int i;
184

185 186
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
187
		return false;
188 189
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
190
		return false;
191 192 193
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
194 195 196
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
197
	if ((rule->flags & IMA_FSUUID) &&
198
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
199
		return false;
200
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
201
		return false;
202 203 204 205 206 207 208 209 210 211
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

212
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
213
		return false;
M
Mimi Zohar 已提交
214
	for (i = 0; i < MAX_LSM_RULES; i++) {
215
		int rc = 0;
M
Mimi Zohar 已提交
216
		u32 osid, sid;
217
		int retried = 0;
M
Mimi Zohar 已提交
218 219 220

		if (!rule->lsm[i].rule)
			continue;
221
retry:
M
Mimi Zohar 已提交
222 223 224 225 226 227 228
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
229
							Audit_equal,
M
Mimi Zohar 已提交
230 231 232 233 234 235 236 237 238
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
239
							Audit_equal,
M
Mimi Zohar 已提交
240 241 242 243 244
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
245 246 247 248
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
249
		}
M
Mimi Zohar 已提交
250 251 252
		if (!rc)
			return false;
	}
253 254 255
	return true;
}

256 257
/*
 * In addition to knowing that we need to appraise the file in general,
258
 * we need to differentiate between calling hooks, for hook specific rules.
259
 */
260
static int get_subaction(struct ima_rule_entry *rule, int func)
261
{
262 263 264
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

265
	switch (func) {
266 267 268 269 270 271
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case MODULE_CHECK:
		return IMA_MODULE_APPRAISE;
272 273
	case FIRMWARE_CHECK:
		return IMA_FIRMWARE_APPRAISE;
274 275 276 277 278 279
	case FILE_CHECK:
	default:
		return IMA_FILE_APPRAISE;
	}
}

280 281 282 283 284 285 286 287 288 289 290 291 292
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
 * (There is no need for locking when walking the policy list,
 * as elements in the list are never deleted, nor does the list
 * change.)
 */
M
Mimi Zohar 已提交
293 294
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
295
{
296
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
297
	int action = 0, actmask = flags | (flags << 1);
298

299
	list_for_each_entry(entry, ima_rules, list) {
300

M
Mimi Zohar 已提交
301 302 303 304 305
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
306

307 308
		action |= entry->flags & IMA_ACTION_FLAGS;

309
		action |= entry->action & IMA_DO_MASK;
310
		if (entry->action & IMA_APPRAISE)
311
			action |= get_subaction(entry, func);
312

313 314 315 316
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
317

M
Mimi Zohar 已提交
318 319
		if (!actmask)
			break;
320
	}
M
Mimi Zohar 已提交
321 322

	return action;
323 324
}

325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	ima_policy_flag = 0;
	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

345 346 347
/**
 * ima_init_policy - initialize the default measure rules.
 *
348 349
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
350
 */
351
void __init ima_init_policy(void)
352
{
353
	int i, measure_entries, appraise_entries;
354 355

	/* if !ima_use_tcb set entries = 0 so we load NO default rules */
356 357 358
	measure_entries = ima_use_tcb ? ARRAY_SIZE(default_rules) : 0;
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
359

360 361 362 363 364 365
	for (i = 0; i < measure_entries; i++)
		list_add_tail(&default_rules[i].list, &ima_default_rules);

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
366 367 368
	}

	ima_rules = &ima_default_rules;
369
}
M
Mimi Zohar 已提交
370 371 372 373 374 375 376 377 378 379

/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
 * policy.  Once updated, the policy is locked, no additional rules can be
 * added to the policy.
 */
void ima_update_policy(void)
{
380 381
	ima_rules = &ima_policy_rules;
	ima_update_policy_flag();
M
Mimi Zohar 已提交
382 383 384 385 386
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
387
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
388
	Opt_audit,
M
Mimi Zohar 已提交
389 390
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
391 392
	Opt_func, Opt_mask, Opt_fsmagic,
	Opt_uid, Opt_euid, Opt_fowner,
393
	Opt_appraise_type, Opt_fsuuid, Opt_permit_directio
M
Mimi Zohar 已提交
394 395 396 397 398
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
399 400
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
401
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
402 403 404 405 406 407 408 409 410
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
411
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
412
	{Opt_uid, "uid=%s"},
413
	{Opt_euid, "euid=%s"},
414
	{Opt_fowner, "fowner=%s"},
415
	{Opt_appraise_type, "appraise_type=%s"},
416
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
417 418 419
	{Opt_err, NULL}
};

420
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
421
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
422 423 424
{
	int result;

425 426 427
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

428 429 430 431
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
432 433
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
434 435
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
436
					   &entry->lsm[lsm_rule].rule);
437 438
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
439
		return -EINVAL;
440 441
	}

M
Mimi Zohar 已提交
442 443 444
	return result;
}

445 446 447 448 449 450 451
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

452
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
453 454
{
	struct audit_buffer *ab;
455
	char *from;
M
Mimi Zohar 已提交
456 457 458
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
459
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
460

461
	entry->uid = INVALID_UID;
462
	entry->fowner = INVALID_UID;
463
	entry->action = UNKNOWN;
E
Eric Paris 已提交
464
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
465 466 467 468 469 470
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
471 472
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
473 474 475
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
476
			ima_log_string(ab, "action", "measure");
477 478 479 480

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
481 482 483
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
484
			ima_log_string(ab, "action", "dont_measure");
485 486 487 488

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
489 490
			entry->action = DONT_MEASURE;
			break;
491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
507 508 509 510 511 512 513 514
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
515
		case Opt_func:
516
			ima_log_string(ab, "func", args[0].from);
517 518

			if (entry->func)
519
				result = -EINVAL;
520

521 522 523 524 525
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
526 527
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
528 529
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
530 531 532
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
533 534 535 536 537 538 539 540
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
541
			ima_log_string(ab, "mask", args[0].from);
542 543 544 545

			if (entry->mask)
				result = -EINVAL;

546 547 548 549 550
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
551
				entry->mask = MAY_EXEC;
552
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
553
				entry->mask = MAY_WRITE;
554
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
555
				entry->mask = MAY_READ;
556
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
557 558 559 560
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
561 562
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
563 564
			break;
		case Opt_fsmagic:
565
			ima_log_string(ab, "fsmagic", args[0].from);
566 567 568 569 570 571

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

572
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
573 574 575
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
576 577 578 579
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
580
				       sizeof(entry->fsuuid))) {
581 582 583 584
				result = -EINVAL;
				break;
			}

585 586 587 588
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
589
			break;
M
Mimi Zohar 已提交
590
		case Opt_uid:
591
			ima_log_string(ab, "uid", args[0].from);
592 593 594
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
595

596
			if (uid_valid(entry->uid)) {
597 598 599 600
				result = -EINVAL;
				break;
			}

601
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
602
			if (!result) {
603 604 605 606
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
607 608
					result = -EINVAL;
				else
609 610
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
611 612
			}
			break;
613 614 615
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

616
			if (uid_valid(entry->fowner)) {
617 618 619 620
				result = -EINVAL;
				break;
			}

621
			result = kstrtoul(args[0].from, 10, &lnum);
622
			if (!result) {
623 624
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
625 626 627 628 629
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
630
		case Opt_obj_user:
631
			ima_log_string(ab, "obj_user", args[0].from);
632
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
633 634 635 636
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
637
			ima_log_string(ab, "obj_role", args[0].from);
638
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
639 640 641 642
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
643
			ima_log_string(ab, "obj_type", args[0].from);
644
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
645 646 647 648
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
649
			ima_log_string(ab, "subj_user", args[0].from);
650
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
651 652 653 654
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
655
			ima_log_string(ab, "subj_role", args[0].from);
656
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
657 658 659 660
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
661
			ima_log_string(ab, "subj_type", args[0].from);
662
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
663 664 665
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
666 667 668 669 670 671 672 673 674 675 676 677
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
678 679 680
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
681
		case Opt_err:
682
			ima_log_string(ab, "UNKNOWN", p);
683
			result = -EINVAL;
M
Mimi Zohar 已提交
684 685 686
			break;
		}
	}
687
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
688
		result = -EINVAL;
689 690
	else if (entry->func == MODULE_CHECK)
		ima_appraise |= IMA_APPRAISE_MODULES;
691 692
	else if (entry->func == FIRMWARE_CHECK)
		ima_appraise |= IMA_APPRAISE_FIRMWARE;
693
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
694 695 696 697 698
	audit_log_end(ab);
	return result;
}

/**
699
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
700 701 702
 * @rule - ima measurement policy rule
 *
 * Uses a mutex to protect the policy list from multiple concurrent writers.
703
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
704
 */
705
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
706
{
707
	static const char op[] = "update_policy";
708
	char *p;
709
	struct ima_rule_entry *entry;
710
	ssize_t result, len;
M
Mimi Zohar 已提交
711 712
	int audit_info = 0;

713 714
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
715
	p += strspn(p, " \t");
716

717
	if (*p == '#' || *p == '\0')
718 719
		return len;

M
Mimi Zohar 已提交
720 721 722 723 724 725 726 727 728
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

729
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
730
	if (result) {
M
Mimi Zohar 已提交
731
		kfree(entry);
M
Mimi Zohar 已提交
732
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
733
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
734
				    audit_info);
E
Eric Paris 已提交
735
		return result;
M
Mimi Zohar 已提交
736
	}
E
Eric Paris 已提交
737

738 739 740
	mutex_lock(&ima_rules_mutex);
	list_add_tail(&entry->list, &ima_policy_rules);
	mutex_unlock(&ima_rules_mutex);
E
Eric Paris 已提交
741 742

	return len;
M
Mimi Zohar 已提交
743 744 745
}

/* ima_delete_rules called to cleanup invalid policy */
746
void ima_delete_rules(void)
M
Mimi Zohar 已提交
747
{
748
	struct ima_rule_entry *entry, *tmp;
749
	int i;
M
Mimi Zohar 已提交
750

751 752
	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
753 754 755
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
756 757 758
		list_del(&entry->list);
		kfree(entry);
	}
759
	mutex_unlock(&ima_rules_mutex);
M
Mimi Zohar 已提交
760
}