ima_policy.c 26.7 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14 15 16
 *
 */
#include <linux/module.h>
#include <linux/list.h>
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
17
#include <linux/parser.h>
18
#include <linux/slab.h>
19
#include <linux/rculist.h>
20
#include <linux/genhd.h>
21
#include <linux/seq_file.h>
22 23 24 25

#include "ima.h"

/* flags definitions */
26 27
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
28 29
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
30
#define IMA_FOWNER	0x0010
31
#define IMA_FSUUID	0x0020
32
#define IMA_INMASK	0x0040
33
#define IMA_EUID	0x0080
34

35 36 37 38 39
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
40
#define AUDIT		0x0040
M
Mimi Zohar 已提交
41

42
int ima_policy_flag;
43
static int temp_ima_appraise;
44

M
Mimi Zohar 已提交
45 46 47 48
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
49

M
Mimi Zohar 已提交
50 51
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

52
struct ima_rule_entry {
53
	struct list_head list;
M
Mimi Zohar 已提交
54
	int action;
55 56 57 58
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
59
	u8 fsuuid[16];
60
	kuid_t uid;
61
	kuid_t fowner;
M
Mimi Zohar 已提交
62 63
	struct {
		void *rule;	/* LSM file metadata specific */
64
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
65 66
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
67 68
};

69 70
/*
 * Without LSM specific knowledge, the default policy can only be
71
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
72
 */
73 74 75 76 77 78 79

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
M
Mimi Zohar 已提交
80
static struct ima_rule_entry dont_measure_rules[] = {
81 82 83 84 85 86 87 88
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
89 90
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

static struct ima_rule_entry original_measurement_rules[] = {
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

static struct ima_rule_entry default_measurement_rules[] = {
106
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
107
	 .flags = IMA_FUNC | IMA_MASK},
108
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
109
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
110 111 112 113
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
114
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
115
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
116 117
};

118
static struct ima_rule_entry default_appraise_rules[] = {
119 120 121 122 123 124 125 126 127
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
128
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
129
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
130
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
131
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
132 133 134 135 136
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
137 138 139 140
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
141
static LIST_HEAD(ima_temp_rules);
142
static struct list_head *ima_rules;
143

M
Mimi Zohar 已提交
144
static int ima_policy __initdata;
145

146
static int __init default_measure_policy_setup(char *str)
147
{
M
Mimi Zohar 已提交
148 149 150 151
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
152 153
	return 1;
}
154 155
__setup("ima_tcb", default_measure_policy_setup);

M
Mimi Zohar 已提交
156 157 158 159 160 161 162 163 164 165 166 167
static int __init policy_setup(char *str)
{
	if (ima_policy)
		return 1;

	if (strcmp(str, "tcb") == 0)
		ima_policy = DEFAULT_TCB;

	return 1;
}
__setup("ima_policy=", policy_setup);

168 169 170 171 172 173 174
static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
175

176
/*
177 178 179 180
 * The LSM policy can be reloaded, leaving the IMA LSM based rules referring
 * to the old, stale LSM policy.  Update the IMA LSM based rules to reflect
 * the reloaded LSM policy.  We assume the rules still exist; and BUG_ON() if
 * they don't.
181 182 183
 */
static void ima_lsm_update_rules(void)
{
184
	struct ima_rule_entry *entry;
185 186 187
	int result;
	int i;

188
	list_for_each_entry(entry, &ima_policy_rules, list) {
189 190 191 192 193 194 195 196 197 198 199 200
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
}

201 202 203 204 205 206 207 208 209
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
210
static bool ima_match_rules(struct ima_rule_entry *rule,
211 212 213
			    struct inode *inode, enum ima_hooks func, int mask)
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
214
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
215
	int i;
216

217 218
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
219
		return false;
220 221
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
222
		return false;
223 224 225
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
226 227 228
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
229
	if ((rule->flags & IMA_FSUUID) &&
230
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
231
		return false;
232
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
233
		return false;
234 235 236 237 238 239 240 241 242 243
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

244
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
245
		return false;
M
Mimi Zohar 已提交
246
	for (i = 0; i < MAX_LSM_RULES; i++) {
247
		int rc = 0;
M
Mimi Zohar 已提交
248
		u32 osid, sid;
249
		int retried = 0;
M
Mimi Zohar 已提交
250 251 252

		if (!rule->lsm[i].rule)
			continue;
253
retry:
M
Mimi Zohar 已提交
254 255 256 257 258 259 260
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
261
							Audit_equal,
M
Mimi Zohar 已提交
262 263 264 265 266 267 268 269 270
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
271
							Audit_equal,
M
Mimi Zohar 已提交
272 273 274 275 276
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
277 278 279 280
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
281
		}
M
Mimi Zohar 已提交
282 283 284
		if (!rc)
			return false;
	}
285 286 287
	return true;
}

288 289
/*
 * In addition to knowing that we need to appraise the file in general,
290
 * we need to differentiate between calling hooks, for hook specific rules.
291
 */
292
static int get_subaction(struct ima_rule_entry *rule, int func)
293
{
294 295 296
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

297
	switch (func) {
298 299 300 301 302 303
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case MODULE_CHECK:
		return IMA_MODULE_APPRAISE;
304 305
	case FIRMWARE_CHECK:
		return IMA_FIRMWARE_APPRAISE;
306 307 308 309 310 311
	case FILE_CHECK:
	default:
		return IMA_FILE_APPRAISE;
	}
}

312 313 314 315 316 317 318 319 320
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
321 322 323
 * Since the IMA policy may be updated multiple times we need to lock the
 * list when walking it.  Reads are many orders of magnitude more numerous
 * than writes so ima_match_policy() is classical RCU candidate.
324
 */
M
Mimi Zohar 已提交
325 326
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
327
{
328
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
329
	int action = 0, actmask = flags | (flags << 1);
330

331 332
	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
333

M
Mimi Zohar 已提交
334 335 336 337 338
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
339

340 341
		action |= entry->flags & IMA_ACTION_FLAGS;

342
		action |= entry->action & IMA_DO_MASK;
343
		if (entry->action & IMA_APPRAISE)
344
			action |= get_subaction(entry, func);
345

346 347 348 349
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
350

M
Mimi Zohar 已提交
351 352
		if (!actmask)
			break;
353
	}
354
	rcu_read_unlock();
M
Mimi Zohar 已提交
355 356

	return action;
357 358
}

359 360 361 362 363 364 365 366 367 368 369 370 371 372 373
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

374
	ima_appraise |= temp_ima_appraise;
375 376 377 378
	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

379 380 381
/**
 * ima_init_policy - initialize the default measure rules.
 *
382 383
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
384
 */
385
void __init ima_init_policy(void)
386
{
387
	int i, measure_entries, appraise_entries;
388

M
Mimi Zohar 已提交
389 390
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
391 392
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
393

394
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
395 396 397 398 399 400 401 402 403 404 405 406 407 408 409
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
410 411 412 413

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
414 415 416
	}

	ima_rules = &ima_default_rules;
417
}
M
Mimi Zohar 已提交
418 419 420 421 422

/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
423 424 425 426 427 428
 * policy.  What we do here is to splice ima_policy_rules and ima_temp_rules so
 * they make a queue.  The policy may be updated multiple times and this is the
 * RCU updater.
 *
 * Policy rules are never deleted so ima_policy_flag gets zeroed only once when
 * we switch from the default policy to user defined.
M
Mimi Zohar 已提交
429 430 431
 */
void ima_update_policy(void)
{
432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452
	struct list_head *first, *last, *policy;

	/* append current policy with the new rules */
	first = (&ima_temp_rules)->next;
	last = (&ima_temp_rules)->prev;
	policy = &ima_policy_rules;

	synchronize_rcu();

	last->next = policy;
	rcu_assign_pointer(list_next_rcu(policy->prev), first);
	first->prev = policy->prev;
	policy->prev = last;

	/* prepare for the next policy rules addition */
	INIT_LIST_HEAD(&ima_temp_rules);

	if (ima_rules != policy) {
		ima_policy_flag = 0;
		ima_rules = policy;
	}
453
	ima_update_policy_flag();
M
Mimi Zohar 已提交
454 455 456 457 458
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
459
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
460
	Opt_audit,
M
Mimi Zohar 已提交
461 462
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
463
	Opt_func, Opt_mask, Opt_fsmagic,
464 465
	Opt_fsuuid, Opt_uid, Opt_euid, Opt_fowner,
	Opt_appraise_type, Opt_permit_directio
M
Mimi Zohar 已提交
466 467 468 469 470
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
471 472
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
473
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
474 475 476 477 478 479 480 481 482
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
483
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
484
	{Opt_uid, "uid=%s"},
485
	{Opt_euid, "euid=%s"},
486
	{Opt_fowner, "fowner=%s"},
487
	{Opt_appraise_type, "appraise_type=%s"},
488
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
489 490 491
	{Opt_err, NULL}
};

492
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
493
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
494 495 496
{
	int result;

497 498 499
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

500 501 502 503
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
504 505
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
506 507
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
508
					   &entry->lsm[lsm_rule].rule);
509 510
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
511
		return -EINVAL;
512 513
	}

M
Mimi Zohar 已提交
514 515 516
	return result;
}

517 518 519 520 521 522 523
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

524
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
525 526
{
	struct audit_buffer *ab;
527
	char *from;
M
Mimi Zohar 已提交
528 529 530
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
531
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
532

533
	entry->uid = INVALID_UID;
534
	entry->fowner = INVALID_UID;
535
	entry->action = UNKNOWN;
E
Eric Paris 已提交
536
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
537 538 539 540 541 542
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
543 544
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
545 546 547
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
548
			ima_log_string(ab, "action", "measure");
549 550 551 552

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
553 554 555
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
556
			ima_log_string(ab, "action", "dont_measure");
557 558 559 560

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
561 562
			entry->action = DONT_MEASURE;
			break;
563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
579 580 581 582 583 584 585 586
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
587
		case Opt_func:
588
			ima_log_string(ab, "func", args[0].from);
589 590

			if (entry->func)
591
				result = -EINVAL;
592

593 594 595 596 597
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
598 599
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
600 601
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
602 603 604
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
605 606 607 608 609 610 611 612
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
613
			ima_log_string(ab, "mask", args[0].from);
614 615 616 617

			if (entry->mask)
				result = -EINVAL;

618 619 620 621 622
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
623
				entry->mask = MAY_EXEC;
624
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
625
				entry->mask = MAY_WRITE;
626
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
627
				entry->mask = MAY_READ;
628
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
629 630 631 632
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
633 634
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
635 636
			break;
		case Opt_fsmagic:
637
			ima_log_string(ab, "fsmagic", args[0].from);
638 639 640 641 642 643

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

644
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
645 646 647
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
648 649 650 651
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
652
				       sizeof(entry->fsuuid))) {
653 654 655 656
				result = -EINVAL;
				break;
			}

657 658 659 660
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
661
			break;
M
Mimi Zohar 已提交
662
		case Opt_uid:
663
			ima_log_string(ab, "uid", args[0].from);
664 665 666
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
667

668
			if (uid_valid(entry->uid)) {
669 670 671 672
				result = -EINVAL;
				break;
			}

673
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
674
			if (!result) {
675 676 677 678
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
679 680
					result = -EINVAL;
				else
681 682
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
683 684
			}
			break;
685 686 687
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

688
			if (uid_valid(entry->fowner)) {
689 690 691 692
				result = -EINVAL;
				break;
			}

693
			result = kstrtoul(args[0].from, 10, &lnum);
694
			if (!result) {
695 696
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
697 698 699 700 701
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
702
		case Opt_obj_user:
703
			ima_log_string(ab, "obj_user", args[0].from);
704
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
705 706 707 708
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
709
			ima_log_string(ab, "obj_role", args[0].from);
710
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
711 712 713 714
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
715
			ima_log_string(ab, "obj_type", args[0].from);
716
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
717 718 719 720
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
721
			ima_log_string(ab, "subj_user", args[0].from);
722
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
723 724 725 726
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
727
			ima_log_string(ab, "subj_role", args[0].from);
728
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
729 730 731 732
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
733
			ima_log_string(ab, "subj_type", args[0].from);
734
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
735 736 737
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
738 739 740 741 742 743 744 745 746 747 748 749
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
750 751 752
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
753
		case Opt_err:
754
			ima_log_string(ab, "UNKNOWN", p);
755
			result = -EINVAL;
M
Mimi Zohar 已提交
756 757 758
			break;
		}
	}
759
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
760
		result = -EINVAL;
761
	else if (entry->func == MODULE_CHECK)
762
		temp_ima_appraise |= IMA_APPRAISE_MODULES;
763
	else if (entry->func == FIRMWARE_CHECK)
764
		temp_ima_appraise |= IMA_APPRAISE_FIRMWARE;
765
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
766 767 768 769 770
	audit_log_end(ab);
	return result;
}

/**
771
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
772 773
 * @rule - ima measurement policy rule
 *
774
 * Avoid locking by allowing just one writer at a time in ima_write_policy()
775
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
776
 */
777
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
778
{
779
	static const char op[] = "update_policy";
780
	char *p;
781
	struct ima_rule_entry *entry;
782
	ssize_t result, len;
M
Mimi Zohar 已提交
783 784
	int audit_info = 0;

785 786
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
787
	p += strspn(p, " \t");
788

789
	if (*p == '#' || *p == '\0')
790 791
		return len;

M
Mimi Zohar 已提交
792 793 794 795 796 797 798 799 800
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

801
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
802
	if (result) {
M
Mimi Zohar 已提交
803
		kfree(entry);
M
Mimi Zohar 已提交
804
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
805
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
806
				    audit_info);
E
Eric Paris 已提交
807
		return result;
M
Mimi Zohar 已提交
808
	}
E
Eric Paris 已提交
809

810
	list_add_tail(&entry->list, &ima_temp_rules);
E
Eric Paris 已提交
811 812

	return len;
M
Mimi Zohar 已提交
813 814
}

815 816 817 818 819 820
/**
 * ima_delete_rules() called to cleanup invalid in-flight policy.
 * We don't need locking as we operate on the temp list, which is
 * different from the active one.  There is also only one user of
 * ima_delete_rules() at a time.
 */
821
void ima_delete_rules(void)
M
Mimi Zohar 已提交
822
{
823
	struct ima_rule_entry *entry, *tmp;
824
	int i;
M
Mimi Zohar 已提交
825

826
	temp_ima_appraise = 0;
827
	list_for_each_entry_safe(entry, tmp, &ima_temp_rules, list) {
828 829 830
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
831 832 833 834
		list_del(&entry->list);
		kfree(entry);
	}
}
835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036

#ifdef	CONFIG_IMA_READ_POLICY
enum {
	mask_exec = 0, mask_write, mask_read, mask_append
};

static char *mask_tokens[] = {
	"MAY_EXEC",
	"MAY_WRITE",
	"MAY_READ",
	"MAY_APPEND"
};

enum {
	func_file = 0, func_mmap, func_bprm,
	func_module, func_firmware, func_post
};

static char *func_tokens[] = {
	"FILE_CHECK",
	"MMAP_CHECK",
	"BPRM_CHECK",
	"MODULE_CHECK",
	"FIRMWARE_CHECK",
	"POST_SETATTR"
};

void *ima_policy_start(struct seq_file *m, loff_t *pos)
{
	loff_t l = *pos;
	struct ima_rule_entry *entry;

	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
		if (!l--) {
			rcu_read_unlock();
			return entry;
		}
	}
	rcu_read_unlock();
	return NULL;
}

void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct ima_rule_entry *entry = v;

	rcu_read_lock();
	entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list);
	rcu_read_unlock();
	(*pos)++;

	return (&entry->list == ima_rules) ? NULL : entry;
}

void ima_policy_stop(struct seq_file *m, void *v)
{
}

#define pt(token)	policy_tokens[token + Opt_err].pattern
#define mt(token)	mask_tokens[token]
#define ft(token)	func_tokens[token]

int ima_policy_show(struct seq_file *m, void *v)
{
	struct ima_rule_entry *entry = v;
	int i = 0;
	char tbuf[64] = {0,};

	rcu_read_lock();

	if (entry->action & MEASURE)
		seq_puts(m, pt(Opt_measure));
	if (entry->action & DONT_MEASURE)
		seq_puts(m, pt(Opt_dont_measure));
	if (entry->action & APPRAISE)
		seq_puts(m, pt(Opt_appraise));
	if (entry->action & DONT_APPRAISE)
		seq_puts(m, pt(Opt_dont_appraise));
	if (entry->action & AUDIT)
		seq_puts(m, pt(Opt_audit));

	seq_puts(m, " ");

	if (entry->flags & IMA_FUNC) {
		switch (entry->func) {
		case FILE_CHECK:
			seq_printf(m, pt(Opt_func), ft(func_file));
			break;
		case MMAP_CHECK:
			seq_printf(m, pt(Opt_func), ft(func_mmap));
			break;
		case BPRM_CHECK:
			seq_printf(m, pt(Opt_func), ft(func_bprm));
			break;
		case MODULE_CHECK:
			seq_printf(m, pt(Opt_func), ft(func_module));
			break;
		case FIRMWARE_CHECK:
			seq_printf(m, pt(Opt_func), ft(func_firmware));
			break;
		case POST_SETATTR:
			seq_printf(m, pt(Opt_func), ft(func_post));
			break;
		default:
			snprintf(tbuf, sizeof(tbuf), "%d", entry->func);
			seq_printf(m, pt(Opt_func), tbuf);
			break;
		}
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_MASK) {
		if (entry->mask & MAY_EXEC)
			seq_printf(m, pt(Opt_mask), mt(mask_exec));
		if (entry->mask & MAY_WRITE)
			seq_printf(m, pt(Opt_mask), mt(mask_write));
		if (entry->mask & MAY_READ)
			seq_printf(m, pt(Opt_mask), mt(mask_read));
		if (entry->mask & MAY_APPEND)
			seq_printf(m, pt(Opt_mask), mt(mask_append));
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSMAGIC) {
		snprintf(tbuf, sizeof(tbuf), "0x%lx", entry->fsmagic);
		seq_printf(m, pt(Opt_fsmagic), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSUUID) {
		seq_puts(m, "fsuuid=");
		for (i = 0; i < ARRAY_SIZE(entry->fsuuid); ++i) {
			switch (i) {
			case 4:
			case 6:
			case 8:
			case 10:
				seq_puts(m, "-");
			}
			seq_printf(m, "%x", entry->fsuuid[i]);
		}
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_UID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_uid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_EUID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_euid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FOWNER) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->fowner));
		seq_printf(m, pt(Opt_fowner), tbuf);
		seq_puts(m, " ");
	}

	for (i = 0; i < MAX_LSM_RULES; i++) {
		if (entry->lsm[i].rule) {
			switch (i) {
			case LSM_OBJ_USER:
				seq_printf(m, pt(Opt_obj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_ROLE:
				seq_printf(m, pt(Opt_obj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_TYPE:
				seq_printf(m, pt(Opt_obj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_USER:
				seq_printf(m, pt(Opt_subj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_ROLE:
				seq_printf(m, pt(Opt_subj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_TYPE:
				seq_printf(m, pt(Opt_subj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			}
		}
	}
	if (entry->flags & IMA_DIGSIG_REQUIRED)
		seq_puts(m, "appraise_type=imasig ");
	if (entry->flags & IMA_PERMIT_DIRECTIO)
		seq_puts(m, "permit_directio ");
	rcu_read_unlock();
	seq_puts(m, "\n");
	return 0;
}
#endif	/* CONFIG_IMA_READ_POLICY */