ima_policy.c 28.0 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14
 *
 */
#include <linux/module.h>
#include <linux/list.h>
15
#include <linux/fs.h>
16 17
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
18
#include <linux/parser.h>
19
#include <linux/slab.h>
20
#include <linux/rculist.h>
21
#include <linux/genhd.h>
22
#include <linux/seq_file.h>
23 24 25 26

#include "ima.h"

/* flags definitions */
27 28
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
29 30
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
31
#define IMA_FOWNER	0x0010
32
#define IMA_FSUUID	0x0020
33
#define IMA_INMASK	0x0040
34
#define IMA_EUID	0x0080
35

36 37 38 39 40
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
41
#define AUDIT		0x0040
M
Mimi Zohar 已提交
42

43
int ima_policy_flag;
44
static int temp_ima_appraise;
45

M
Mimi Zohar 已提交
46 47 48 49
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
50

M
Mimi Zohar 已提交
51 52
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

53
struct ima_rule_entry {
54
	struct list_head list;
M
Mimi Zohar 已提交
55
	int action;
56 57 58 59
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
60
	u8 fsuuid[16];
61
	kuid_t uid;
62
	kuid_t fowner;
M
Mimi Zohar 已提交
63 64
	struct {
		void *rule;	/* LSM file metadata specific */
65
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
66 67
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
68 69
};

70 71
/*
 * Without LSM specific knowledge, the default policy can only be
72
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
73
 */
74 75 76 77 78 79 80

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
M
Mimi Zohar 已提交
81
static struct ima_rule_entry dont_measure_rules[] = {
82 83 84 85 86 87 88 89
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
90 91
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

static struct ima_rule_entry original_measurement_rules[] = {
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

static struct ima_rule_entry default_measurement_rules[] = {
107
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
108
	 .flags = IMA_FUNC | IMA_MASK},
109
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
110
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
111 112 113 114
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
115
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
116
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
117
	{.action = MEASURE, .func = POLICY_CHECK, .flags = IMA_FUNC},
118 119
};

120
static struct ima_rule_entry default_appraise_rules[] = {
121 122 123 124 125 126 127 128 129
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
130
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
131
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
132 133 134 135
#ifdef CONFIG_IMA_WRITE_POLICY
	{.action = APPRAISE, .func = POLICY_CHECK,
	.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
#endif
136
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
137
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
138 139 140 141 142
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
143 144 145 146
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
147
static LIST_HEAD(ima_temp_rules);
148
static struct list_head *ima_rules;
149

M
Mimi Zohar 已提交
150
static int ima_policy __initdata;
151

152
static int __init default_measure_policy_setup(char *str)
153
{
M
Mimi Zohar 已提交
154 155 156 157
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
158 159
	return 1;
}
160 161
__setup("ima_tcb", default_measure_policy_setup);

M
Mimi Zohar 已提交
162 163 164 165 166 167 168 169 170 171 172 173
static int __init policy_setup(char *str)
{
	if (ima_policy)
		return 1;

	if (strcmp(str, "tcb") == 0)
		ima_policy = DEFAULT_TCB;

	return 1;
}
__setup("ima_policy=", policy_setup);

174 175 176 177 178 179 180
static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
181

182
/*
183 184 185 186
 * The LSM policy can be reloaded, leaving the IMA LSM based rules referring
 * to the old, stale LSM policy.  Update the IMA LSM based rules to reflect
 * the reloaded LSM policy.  We assume the rules still exist; and BUG_ON() if
 * they don't.
187 188 189
 */
static void ima_lsm_update_rules(void)
{
190
	struct ima_rule_entry *entry;
191 192 193
	int result;
	int i;

194
	list_for_each_entry(entry, &ima_policy_rules, list) {
195 196 197 198 199 200 201 202 203 204 205 206
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
}

207 208 209 210 211 212 213 214 215
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
216 217
static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
			    enum ima_hooks func, int mask)
218 219
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
220
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
221
	int i;
222

223 224
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
225
		return false;
226 227
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
228
		return false;
229 230 231
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
232 233 234
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
235
	if ((rule->flags & IMA_FSUUID) &&
236
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
237
		return false;
238
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
239
		return false;
240 241 242 243 244 245 246 247 248 249
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

250
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
251
		return false;
M
Mimi Zohar 已提交
252
	for (i = 0; i < MAX_LSM_RULES; i++) {
253
		int rc = 0;
M
Mimi Zohar 已提交
254
		u32 osid, sid;
255
		int retried = 0;
M
Mimi Zohar 已提交
256 257 258

		if (!rule->lsm[i].rule)
			continue;
259
retry:
M
Mimi Zohar 已提交
260 261 262 263 264 265 266
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
267
							Audit_equal,
M
Mimi Zohar 已提交
268 269 270 271 272 273 274 275 276
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
277
							Audit_equal,
M
Mimi Zohar 已提交
278 279 280 281 282
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
283 284 285 286
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
287
		}
M
Mimi Zohar 已提交
288 289 290
		if (!rc)
			return false;
	}
291 292 293
	return true;
}

294 295
/*
 * In addition to knowing that we need to appraise the file in general,
296
 * we need to differentiate between calling hooks, for hook specific rules.
297
 */
298
static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
299
{
300 301 302
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

303
	switch (func) {
304 305 306 307 308
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case FILE_CHECK:
309
	case POST_SETATTR:
310
		return IMA_FILE_APPRAISE;
311 312 313
	case MODULE_CHECK ... MAX_CHECK - 1:
	default:
		return IMA_READ_APPRAISE;
314 315 316
	}
}

317 318 319 320 321 322 323 324 325
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
326 327 328
 * Since the IMA policy may be updated multiple times we need to lock the
 * list when walking it.  Reads are many orders of magnitude more numerous
 * than writes so ima_match_policy() is classical RCU candidate.
329
 */
M
Mimi Zohar 已提交
330 331
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
332
{
333
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
334
	int action = 0, actmask = flags | (flags << 1);
335

336 337
	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
338

M
Mimi Zohar 已提交
339 340 341 342 343
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
344

345 346
		action |= entry->flags & IMA_ACTION_FLAGS;

347
		action |= entry->action & IMA_DO_MASK;
348
		if (entry->action & IMA_APPRAISE)
349
			action |= get_subaction(entry, func);
350

351 352 353 354
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
355

M
Mimi Zohar 已提交
356 357
		if (!actmask)
			break;
358
	}
359
	rcu_read_unlock();
M
Mimi Zohar 已提交
360 361

	return action;
362 363
}

364 365 366 367 368 369 370 371 372 373 374 375 376 377 378
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

379
	ima_appraise |= temp_ima_appraise;
380 381 382 383
	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

384 385 386
/**
 * ima_init_policy - initialize the default measure rules.
 *
387 388
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
389
 */
390
void __init ima_init_policy(void)
391
{
392
	int i, measure_entries, appraise_entries;
393

M
Mimi Zohar 已提交
394 395
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
396 397
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
398

399
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
400 401 402 403 404 405 406 407 408 409 410 411 412 413 414
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
415 416 417 418

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
M
Mimi Zohar 已提交
419 420
		if (default_appraise_rules[i].func == POLICY_CHECK)
			temp_ima_appraise |= IMA_APPRAISE_POLICY;
421 422 423
	}

	ima_rules = &ima_default_rules;
M
Mimi Zohar 已提交
424
	ima_update_policy_flag();
425
}
M
Mimi Zohar 已提交
426

427
/* Make sure we have a valid policy, at least containing some rules. */
428
int ima_check_policy(void)
429 430 431 432 433 434
{
	if (list_empty(&ima_temp_rules))
		return -EINVAL;
	return 0;
}

M
Mimi Zohar 已提交
435 436 437 438
/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
439 440 441 442 443 444
 * policy.  What we do here is to splice ima_policy_rules and ima_temp_rules so
 * they make a queue.  The policy may be updated multiple times and this is the
 * RCU updater.
 *
 * Policy rules are never deleted so ima_policy_flag gets zeroed only once when
 * we switch from the default policy to user defined.
M
Mimi Zohar 已提交
445 446 447
 */
void ima_update_policy(void)
{
448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468
	struct list_head *first, *last, *policy;

	/* append current policy with the new rules */
	first = (&ima_temp_rules)->next;
	last = (&ima_temp_rules)->prev;
	policy = &ima_policy_rules;

	synchronize_rcu();

	last->next = policy;
	rcu_assign_pointer(list_next_rcu(policy->prev), first);
	first->prev = policy->prev;
	policy->prev = last;

	/* prepare for the next policy rules addition */
	INIT_LIST_HEAD(&ima_temp_rules);

	if (ima_rules != policy) {
		ima_policy_flag = 0;
		ima_rules = policy;
	}
469
	ima_update_policy_flag();
M
Mimi Zohar 已提交
470 471 472 473 474
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
475
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
476
	Opt_audit,
M
Mimi Zohar 已提交
477 478
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
479
	Opt_func, Opt_mask, Opt_fsmagic,
480 481
	Opt_fsuuid, Opt_uid, Opt_euid, Opt_fowner,
	Opt_appraise_type, Opt_permit_directio
M
Mimi Zohar 已提交
482 483 484 485 486
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
487 488
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
489
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
490 491 492 493 494 495 496 497 498
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
499
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
500
	{Opt_uid, "uid=%s"},
501
	{Opt_euid, "euid=%s"},
502
	{Opt_fowner, "fowner=%s"},
503
	{Opt_appraise_type, "appraise_type=%s"},
504
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
505 506 507
	{Opt_err, NULL}
};

508
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
509
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
510 511 512
{
	int result;

513 514 515
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

516 517 518 519
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
520 521
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
522 523
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
524
					   &entry->lsm[lsm_rule].rule);
525 526
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
527
		return -EINVAL;
528 529
	}

M
Mimi Zohar 已提交
530 531 532
	return result;
}

533 534 535 536 537 538 539
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

540
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
541 542
{
	struct audit_buffer *ab;
543
	char *from;
M
Mimi Zohar 已提交
544 545 546
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
547
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
548

549
	entry->uid = INVALID_UID;
550
	entry->fowner = INVALID_UID;
551
	entry->action = UNKNOWN;
E
Eric Paris 已提交
552
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
553 554 555 556 557 558
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
559 560
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
561 562 563
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
564
			ima_log_string(ab, "action", "measure");
565 566 567 568

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
569 570 571
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
572
			ima_log_string(ab, "action", "dont_measure");
573 574 575 576

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
577 578
			entry->action = DONT_MEASURE;
			break;
579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
595 596 597 598 599 600 601 602
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
603
		case Opt_func:
604
			ima_log_string(ab, "func", args[0].from);
605 606

			if (entry->func)
607
				result = -EINVAL;
608

609 610 611 612 613
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
614 615
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
616 617
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
618 619 620
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
621 622
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
623 624 625 626 627 628
			else if (strcmp(args[0].from, "KEXEC_KERNEL_CHECK") ==
				 0)
				entry->func = KEXEC_KERNEL_CHECK;
			else if (strcmp(args[0].from, "KEXEC_INITRAMFS_CHECK")
				 == 0)
				entry->func = KEXEC_INITRAMFS_CHECK;
629 630
			else if (strcmp(args[0].from, "POLICY_CHECK") == 0)
				entry->func = POLICY_CHECK;
M
Mimi Zohar 已提交
631 632 633 634 635 636
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
637
			ima_log_string(ab, "mask", args[0].from);
638 639 640 641

			if (entry->mask)
				result = -EINVAL;

642 643 644 645 646
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
647
				entry->mask = MAY_EXEC;
648
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
649
				entry->mask = MAY_WRITE;
650
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
651
				entry->mask = MAY_READ;
652
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
653 654 655 656
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
657 658
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
659 660
			break;
		case Opt_fsmagic:
661
			ima_log_string(ab, "fsmagic", args[0].from);
662 663 664 665 666 667

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

668
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
669 670 671
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
672 673 674 675
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
676
				       sizeof(entry->fsuuid))) {
677 678 679 680
				result = -EINVAL;
				break;
			}

681 682 683 684
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
685
			break;
M
Mimi Zohar 已提交
686
		case Opt_uid:
687
			ima_log_string(ab, "uid", args[0].from);
688 689 690
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
691

692
			if (uid_valid(entry->uid)) {
693 694 695 696
				result = -EINVAL;
				break;
			}

697
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
698
			if (!result) {
699 700 701 702
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
703 704
					result = -EINVAL;
				else
705 706
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
707 708
			}
			break;
709 710 711
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

712
			if (uid_valid(entry->fowner)) {
713 714 715 716
				result = -EINVAL;
				break;
			}

717
			result = kstrtoul(args[0].from, 10, &lnum);
718
			if (!result) {
719 720
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
721 722 723 724 725
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
726
		case Opt_obj_user:
727
			ima_log_string(ab, "obj_user", args[0].from);
728
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
729 730 731 732
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
733
			ima_log_string(ab, "obj_role", args[0].from);
734
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
735 736 737 738
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
739
			ima_log_string(ab, "obj_type", args[0].from);
740
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
741 742 743 744
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
745
			ima_log_string(ab, "subj_user", args[0].from);
746
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
747 748 749 750
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
751
			ima_log_string(ab, "subj_role", args[0].from);
752
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
753 754 755 756
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
757
			ima_log_string(ab, "subj_type", args[0].from);
758
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
759 760 761
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
762 763 764 765 766 767 768 769 770 771 772 773
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
774 775 776
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
777
		case Opt_err:
778
			ima_log_string(ab, "UNKNOWN", p);
779
			result = -EINVAL;
M
Mimi Zohar 已提交
780 781 782
			break;
		}
	}
783
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
784
		result = -EINVAL;
785
	else if (entry->func == MODULE_CHECK)
786
		temp_ima_appraise |= IMA_APPRAISE_MODULES;
787
	else if (entry->func == FIRMWARE_CHECK)
788
		temp_ima_appraise |= IMA_APPRAISE_FIRMWARE;
789 790
	else if (entry->func == POLICY_CHECK)
		temp_ima_appraise |= IMA_APPRAISE_POLICY;
791
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
792 793 794 795 796
	audit_log_end(ab);
	return result;
}

/**
797
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
798 799
 * @rule - ima measurement policy rule
 *
800
 * Avoid locking by allowing just one writer at a time in ima_write_policy()
801
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
802
 */
803
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
804
{
805
	static const char op[] = "update_policy";
806
	char *p;
807
	struct ima_rule_entry *entry;
808
	ssize_t result, len;
M
Mimi Zohar 已提交
809 810
	int audit_info = 0;

811 812
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
813
	p += strspn(p, " \t");
814

815
	if (*p == '#' || *p == '\0')
816 817
		return len;

M
Mimi Zohar 已提交
818 819 820 821 822 823 824 825 826
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

827
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
828
	if (result) {
M
Mimi Zohar 已提交
829
		kfree(entry);
M
Mimi Zohar 已提交
830
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
831
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
832
				    audit_info);
E
Eric Paris 已提交
833
		return result;
M
Mimi Zohar 已提交
834
	}
E
Eric Paris 已提交
835

836
	list_add_tail(&entry->list, &ima_temp_rules);
E
Eric Paris 已提交
837 838

	return len;
M
Mimi Zohar 已提交
839 840
}

841 842 843 844 845 846
/**
 * ima_delete_rules() called to cleanup invalid in-flight policy.
 * We don't need locking as we operate on the temp list, which is
 * different from the active one.  There is also only one user of
 * ima_delete_rules() at a time.
 */
847
void ima_delete_rules(void)
M
Mimi Zohar 已提交
848
{
849
	struct ima_rule_entry *entry, *tmp;
850
	int i;
M
Mimi Zohar 已提交
851

852
	temp_ima_appraise = 0;
853
	list_for_each_entry_safe(entry, tmp, &ima_temp_rules, list) {
854 855 856
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
857 858 859 860
		list_del(&entry->list);
		kfree(entry);
	}
}
861 862 863 864 865 866 867 868 869 870 871 872 873 874 875

#ifdef	CONFIG_IMA_READ_POLICY
enum {
	mask_exec = 0, mask_write, mask_read, mask_append
};

static char *mask_tokens[] = {
	"MAY_EXEC",
	"MAY_WRITE",
	"MAY_READ",
	"MAY_APPEND"
};

enum {
	func_file = 0, func_mmap, func_bprm,
876
	func_module, func_firmware, func_post,
877 878
	func_kexec_kernel, func_kexec_initramfs,
	func_policy
879 880 881 882 883 884 885 886
};

static char *func_tokens[] = {
	"FILE_CHECK",
	"MMAP_CHECK",
	"BPRM_CHECK",
	"MODULE_CHECK",
	"FIRMWARE_CHECK",
887
	"POST_SETATTR",
888 889
	"KEXEC_KERNEL_CHECK",
	"KEXEC_INITRAMFS_CHECK",
890
	"POLICY_CHECK"
891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928
};

void *ima_policy_start(struct seq_file *m, loff_t *pos)
{
	loff_t l = *pos;
	struct ima_rule_entry *entry;

	rcu_read_lock();
	list_for_each_entry_rcu(entry, ima_rules, list) {
		if (!l--) {
			rcu_read_unlock();
			return entry;
		}
	}
	rcu_read_unlock();
	return NULL;
}

void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct ima_rule_entry *entry = v;

	rcu_read_lock();
	entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list);
	rcu_read_unlock();
	(*pos)++;

	return (&entry->list == ima_rules) ? NULL : entry;
}

void ima_policy_stop(struct seq_file *m, void *v)
{
}

#define pt(token)	policy_tokens[token + Opt_err].pattern
#define mt(token)	mask_tokens[token]
#define ft(token)	func_tokens[token]

929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954
/*
 * policy_func_show - display the ima_hooks policy rule
 */
static void policy_func_show(struct seq_file *m, enum ima_hooks func)
{
	char tbuf[64] = {0,};

	switch (func) {
	case FILE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_file));
		break;
	case MMAP_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_mmap));
		break;
	case BPRM_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_bprm));
		break;
	case MODULE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_module));
		break;
	case FIRMWARE_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_firmware));
		break;
	case POST_SETATTR:
		seq_printf(m, pt(Opt_func), ft(func_post));
		break;
955 956 957 958 959 960
	case KEXEC_KERNEL_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_kernel));
		break;
	case KEXEC_INITRAMFS_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_kexec_initramfs));
		break;
961 962 963
	case POLICY_CHECK:
		seq_printf(m, pt(Opt_func), ft(func_policy));
		break;
964 965 966 967 968 969 970 971
	default:
		snprintf(tbuf, sizeof(tbuf), "%d", func);
		seq_printf(m, pt(Opt_func), tbuf);
		break;
	}
	seq_puts(m, " ");
}

972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992
int ima_policy_show(struct seq_file *m, void *v)
{
	struct ima_rule_entry *entry = v;
	int i = 0;
	char tbuf[64] = {0,};

	rcu_read_lock();

	if (entry->action & MEASURE)
		seq_puts(m, pt(Opt_measure));
	if (entry->action & DONT_MEASURE)
		seq_puts(m, pt(Opt_dont_measure));
	if (entry->action & APPRAISE)
		seq_puts(m, pt(Opt_appraise));
	if (entry->action & DONT_APPRAISE)
		seq_puts(m, pt(Opt_dont_appraise));
	if (entry->action & AUDIT)
		seq_puts(m, pt(Opt_audit));

	seq_puts(m, " ");

993 994
	if (entry->flags & IMA_FUNC)
		policy_func_show(m, entry->func);
995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085

	if (entry->flags & IMA_MASK) {
		if (entry->mask & MAY_EXEC)
			seq_printf(m, pt(Opt_mask), mt(mask_exec));
		if (entry->mask & MAY_WRITE)
			seq_printf(m, pt(Opt_mask), mt(mask_write));
		if (entry->mask & MAY_READ)
			seq_printf(m, pt(Opt_mask), mt(mask_read));
		if (entry->mask & MAY_APPEND)
			seq_printf(m, pt(Opt_mask), mt(mask_append));
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSMAGIC) {
		snprintf(tbuf, sizeof(tbuf), "0x%lx", entry->fsmagic);
		seq_printf(m, pt(Opt_fsmagic), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FSUUID) {
		seq_puts(m, "fsuuid=");
		for (i = 0; i < ARRAY_SIZE(entry->fsuuid); ++i) {
			switch (i) {
			case 4:
			case 6:
			case 8:
			case 10:
				seq_puts(m, "-");
			}
			seq_printf(m, "%x", entry->fsuuid[i]);
		}
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_UID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_uid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_EUID) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->uid));
		seq_printf(m, pt(Opt_euid), tbuf);
		seq_puts(m, " ");
	}

	if (entry->flags & IMA_FOWNER) {
		snprintf(tbuf, sizeof(tbuf), "%d", __kuid_val(entry->fowner));
		seq_printf(m, pt(Opt_fowner), tbuf);
		seq_puts(m, " ");
	}

	for (i = 0; i < MAX_LSM_RULES; i++) {
		if (entry->lsm[i].rule) {
			switch (i) {
			case LSM_OBJ_USER:
				seq_printf(m, pt(Opt_obj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_ROLE:
				seq_printf(m, pt(Opt_obj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_OBJ_TYPE:
				seq_printf(m, pt(Opt_obj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_USER:
				seq_printf(m, pt(Opt_subj_user),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_ROLE:
				seq_printf(m, pt(Opt_subj_role),
					   (char *)entry->lsm[i].args_p);
				break;
			case LSM_SUBJ_TYPE:
				seq_printf(m, pt(Opt_subj_type),
					   (char *)entry->lsm[i].args_p);
				break;
			}
		}
	}
	if (entry->flags & IMA_DIGSIG_REQUIRED)
		seq_puts(m, "appraise_type=imasig ");
	if (entry->flags & IMA_PERMIT_DIRECTIO)
		seq_puts(m, "permit_directio ");
	rcu_read_unlock();
	seq_puts(m, "\n");
	return 0;
}
#endif	/* CONFIG_IMA_READ_POLICY */