ima_policy.c 21.4 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2008 IBM Corporation
 * Author: Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, version 2 of the License.
 *
 * ima_policy.c
10
 *	- initialize default measure policy rules
11 12 13 14 15 16
 *
 */
#include <linux/module.h>
#include <linux/list.h>
#include <linux/security.h>
#include <linux/magic.h>
M
Mimi Zohar 已提交
17
#include <linux/parser.h>
18
#include <linux/slab.h>
19
#include <linux/genhd.h>
20 21 22 23

#include "ima.h"

/* flags definitions */
24 25
#define IMA_FUNC	0x0001
#define IMA_MASK	0x0002
26 27
#define IMA_FSMAGIC	0x0004
#define IMA_UID		0x0008
28
#define IMA_FOWNER	0x0010
29
#define IMA_FSUUID	0x0020
30
#define IMA_INMASK	0x0040
31
#define IMA_EUID	0x0080
32

33 34 35 36 37
#define UNKNOWN		0
#define MEASURE		0x0001	/* same as IMA_MEASURE */
#define DONT_MEASURE	0x0002
#define APPRAISE	0x0004	/* same as IMA_APPRAISE */
#define DONT_APPRAISE	0x0008
P
Peter Moody 已提交
38
#define AUDIT		0x0040
M
Mimi Zohar 已提交
39

40 41
int ima_policy_flag;

M
Mimi Zohar 已提交
42 43 44 45
#define MAX_LSM_RULES 6
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
	LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
};
46

M
Mimi Zohar 已提交
47 48
enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };

49
struct ima_rule_entry {
50
	struct list_head list;
M
Mimi Zohar 已提交
51
	int action;
52 53 54 55
	unsigned int flags;
	enum ima_hooks func;
	int mask;
	unsigned long fsmagic;
56
	u8 fsuuid[16];
57
	kuid_t uid;
58
	kuid_t fowner;
M
Mimi Zohar 已提交
59 60
	struct {
		void *rule;	/* LSM file metadata specific */
61
		void *args_p;	/* audit value */
M
Mimi Zohar 已提交
62 63
		int type;	/* audit type */
	} lsm[MAX_LSM_RULES];
64 65
};

66 67
/*
 * Without LSM specific knowledge, the default policy can only be
68
 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner
M
Mimi Zohar 已提交
69
 */
70 71 72 73 74 75 76

/*
 * The minimum rule set to allow for full TCB coverage.  Measures all files
 * opened or mmap for exec and everything read by root.  Dangerous because
 * normal users can easily run the machine out of memory simply building
 * and running executables.
 */
M
Mimi Zohar 已提交
77
static struct ima_rule_entry dont_measure_rules[] = {
78 79 80 81 82 83 84 85
	{.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
86 87
	{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
	 .flags = IMA_FSMAGIC},
M
Mimi Zohar 已提交
88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
	{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
};

static struct ima_rule_entry original_measurement_rules[] = {
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
	 .flags = IMA_FUNC | IMA_MASK},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
};

static struct ima_rule_entry default_measurement_rules[] = {
103
	{.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
104
	 .flags = IMA_FUNC | IMA_MASK},
105
	{.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
106
	 .flags = IMA_FUNC | IMA_MASK},
M
Mimi Zohar 已提交
107 108 109 110
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
	{.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
	 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
111
	{.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
112
	{.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
113 114
};

115
static struct ima_rule_entry default_appraise_rules[] = {
116 117 118 119 120 121 122 123 124
	{.action = DONT_APPRAISE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = RAMFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
	{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
125
	{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
126
	{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
127
#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
128
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
129 130 131 132 133
#else
	/* force signature */
	{.action = APPRAISE, .fowner = GLOBAL_ROOT_UID,
	 .flags = IMA_FOWNER | IMA_DIGSIG_REQUIRED},
#endif
134 135 136 137 138
};

static LIST_HEAD(ima_default_rules);
static LIST_HEAD(ima_policy_rules);
static struct list_head *ima_rules;
139

140
static DEFINE_MUTEX(ima_rules_mutex);
M
Mimi Zohar 已提交
141

M
Mimi Zohar 已提交
142
static int ima_policy __initdata;
143
static int __init default_measure_policy_setup(char *str)
144
{
M
Mimi Zohar 已提交
145 146 147 148
	if (ima_policy)
		return 1;

	ima_policy = ORIGINAL_TCB;
149 150
	return 1;
}
151 152
__setup("ima_tcb", default_measure_policy_setup);

M
Mimi Zohar 已提交
153 154 155 156 157 158 159 160 161 162 163 164
static int __init policy_setup(char *str)
{
	if (ima_policy)
		return 1;

	if (strcmp(str, "tcb") == 0)
		ima_policy = DEFAULT_TCB;

	return 1;
}
__setup("ima_policy=", policy_setup);

165 166 167 168 169 170 171
static bool ima_use_appraise_tcb __initdata;
static int __init default_appraise_policy_setup(char *str)
{
	ima_use_appraise_tcb = 1;
	return 1;
}
__setup("ima_appraise_tcb", default_appraise_policy_setup);
172

173
/*
174 175 176 177
 * Although the IMA policy does not change, the LSM policy can be
 * reloaded, leaving the IMA LSM based rules referring to the old,
 * stale LSM policy.
 *
178
 * Update the IMA LSM based rules to reflect the reloaded LSM policy.
179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201
 * We assume the rules still exist; and BUG_ON() if they don't.
 */
static void ima_lsm_update_rules(void)
{
	struct ima_rule_entry *entry, *tmp;
	int result;
	int i;

	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
		for (i = 0; i < MAX_LSM_RULES; i++) {
			if (!entry->lsm[i].rule)
				continue;
			result = security_filter_rule_init(entry->lsm[i].type,
							   Audit_equal,
							   entry->lsm[i].args_p,
							   &entry->lsm[i].rule);
			BUG_ON(!entry->lsm[i].rule);
		}
	}
	mutex_unlock(&ima_rules_mutex);
}

202 203 204 205 206 207 208 209 210
/**
 * ima_match_rules - determine whether an inode matches the measure rule.
 * @rule: a pointer to a rule
 * @inode: a pointer to an inode
 * @func: LIM hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Returns true on rule match, false on failure.
 */
211
static bool ima_match_rules(struct ima_rule_entry *rule,
212 213 214
			    struct inode *inode, enum ima_hooks func, int mask)
{
	struct task_struct *tsk = current;
M
Mimi Zohar 已提交
215
	const struct cred *cred = current_cred();
M
Mimi Zohar 已提交
216
	int i;
217

218 219
	if ((rule->flags & IMA_FUNC) &&
	    (rule->func != func && func != POST_SETATTR))
220
		return false;
221 222
	if ((rule->flags & IMA_MASK) &&
	    (rule->mask != mask && func != POST_SETATTR))
223
		return false;
224 225 226
	if ((rule->flags & IMA_INMASK) &&
	    (!(rule->mask & mask) && func != POST_SETATTR))
		return false;
227 228 229
	if ((rule->flags & IMA_FSMAGIC)
	    && rule->fsmagic != inode->i_sb->s_magic)
		return false;
230
	if ((rule->flags & IMA_FSUUID) &&
231
	    memcmp(rule->fsuuid, inode->i_sb->s_uuid, sizeof(rule->fsuuid)))
232
		return false;
233
	if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid))
234
		return false;
235 236 237 238 239 240 241 242 243 244
	if (rule->flags & IMA_EUID) {
		if (has_capability_noaudit(current, CAP_SETUID)) {
			if (!uid_eq(rule->uid, cred->euid)
			    && !uid_eq(rule->uid, cred->suid)
			    && !uid_eq(rule->uid, cred->uid))
				return false;
		} else if (!uid_eq(rule->uid, cred->euid))
			return false;
	}

245
	if ((rule->flags & IMA_FOWNER) && !uid_eq(rule->fowner, inode->i_uid))
246
		return false;
M
Mimi Zohar 已提交
247
	for (i = 0; i < MAX_LSM_RULES; i++) {
248
		int rc = 0;
M
Mimi Zohar 已提交
249
		u32 osid, sid;
250
		int retried = 0;
M
Mimi Zohar 已提交
251 252 253

		if (!rule->lsm[i].rule)
			continue;
254
retry:
M
Mimi Zohar 已提交
255 256 257 258 259 260 261
		switch (i) {
		case LSM_OBJ_USER:
		case LSM_OBJ_ROLE:
		case LSM_OBJ_TYPE:
			security_inode_getsecid(inode, &osid);
			rc = security_filter_rule_match(osid,
							rule->lsm[i].type,
262
							Audit_equal,
M
Mimi Zohar 已提交
263 264 265 266 267 268 269 270 271
							rule->lsm[i].rule,
							NULL);
			break;
		case LSM_SUBJ_USER:
		case LSM_SUBJ_ROLE:
		case LSM_SUBJ_TYPE:
			security_task_getsecid(tsk, &sid);
			rc = security_filter_rule_match(sid,
							rule->lsm[i].type,
272
							Audit_equal,
M
Mimi Zohar 已提交
273 274 275 276 277
							rule->lsm[i].rule,
							NULL);
		default:
			break;
		}
278 279 280 281
		if ((rc < 0) && (!retried)) {
			retried = 1;
			ima_lsm_update_rules();
			goto retry;
282
		}
M
Mimi Zohar 已提交
283 284 285
		if (!rc)
			return false;
	}
286 287 288
	return true;
}

289 290
/*
 * In addition to knowing that we need to appraise the file in general,
291
 * we need to differentiate between calling hooks, for hook specific rules.
292
 */
293
static int get_subaction(struct ima_rule_entry *rule, int func)
294
{
295 296 297
	if (!(rule->flags & IMA_FUNC))
		return IMA_FILE_APPRAISE;

298
	switch (func) {
299 300 301 302 303 304
	case MMAP_CHECK:
		return IMA_MMAP_APPRAISE;
	case BPRM_CHECK:
		return IMA_BPRM_APPRAISE;
	case MODULE_CHECK:
		return IMA_MODULE_APPRAISE;
305 306
	case FIRMWARE_CHECK:
		return IMA_FIRMWARE_APPRAISE;
307 308 309 310 311 312
	case FILE_CHECK:
	default:
		return IMA_FILE_APPRAISE;
	}
}

313 314 315 316 317 318 319 320 321 322 323 324 325
/**
 * ima_match_policy - decision based on LSM and other conditions
 * @inode: pointer to an inode for which the policy decision is being made
 * @func: IMA hook identifier
 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC)
 *
 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
 * conditions.
 *
 * (There is no need for locking when walking the policy list,
 * as elements in the list are never deleted, nor does the list
 * change.)
 */
M
Mimi Zohar 已提交
326 327
int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
		     int flags)
328
{
329
	struct ima_rule_entry *entry;
M
Mimi Zohar 已提交
330
	int action = 0, actmask = flags | (flags << 1);
331

332
	list_for_each_entry(entry, ima_rules, list) {
333

M
Mimi Zohar 已提交
334 335 336 337 338
		if (!(entry->action & actmask))
			continue;

		if (!ima_match_rules(entry, inode, func, mask))
			continue;
339

340 341
		action |= entry->flags & IMA_ACTION_FLAGS;

342
		action |= entry->action & IMA_DO_MASK;
343
		if (entry->action & IMA_APPRAISE)
344
			action |= get_subaction(entry, func);
345

346 347 348 349
		if (entry->action & IMA_DO_MASK)
			actmask &= ~(entry->action | entry->action << 1);
		else
			actmask &= ~(entry->action | entry->action >> 1);
350

M
Mimi Zohar 已提交
351 352
		if (!actmask)
			break;
353
	}
M
Mimi Zohar 已提交
354 355

	return action;
356 357
}

358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377
/*
 * Initialize the ima_policy_flag variable based on the currently
 * loaded policy.  Based on this flag, the decision to short circuit
 * out of a function or not call the function in the first place
 * can be made earlier.
 */
void ima_update_policy_flag(void)
{
	struct ima_rule_entry *entry;

	ima_policy_flag = 0;
	list_for_each_entry(entry, ima_rules, list) {
		if (entry->action & IMA_DO_MASK)
			ima_policy_flag |= entry->action;
	}

	if (!ima_appraise)
		ima_policy_flag &= ~IMA_APPRAISE;
}

378 379 380
/**
 * ima_init_policy - initialize the default measure rules.
 *
381 382
 * ima_rules points to either the ima_default_rules or the
 * the new ima_policy_rules.
383
 */
384
void __init ima_init_policy(void)
385
{
386
	int i, measure_entries, appraise_entries;
387

M
Mimi Zohar 已提交
388 389
	/* if !ima_policy set entries = 0 so we load NO default rules */
	measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
390 391
	appraise_entries = ima_use_appraise_tcb ?
			 ARRAY_SIZE(default_appraise_rules) : 0;
392

393
	for (i = 0; i < measure_entries; i++)
M
Mimi Zohar 已提交
394 395 396 397 398 399 400 401 402 403 404 405 406 407 408
		list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);

	switch (ima_policy) {
	case ORIGINAL_TCB:
		for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
			list_add_tail(&original_measurement_rules[i].list,
				      &ima_default_rules);
		break;
	case DEFAULT_TCB:
		for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
			list_add_tail(&default_measurement_rules[i].list,
				      &ima_default_rules);
	default:
		break;
	}
409 410 411 412

	for (i = 0; i < appraise_entries; i++) {
		list_add_tail(&default_appraise_rules[i].list,
			      &ima_default_rules);
413 414 415
	}

	ima_rules = &ima_default_rules;
416
}
M
Mimi Zohar 已提交
417 418 419 420 421 422 423 424 425 426

/**
 * ima_update_policy - update default_rules with new measure rules
 *
 * Called on file .release to update the default rules with a complete new
 * policy.  Once updated, the policy is locked, no additional rules can be
 * added to the policy.
 */
void ima_update_policy(void)
{
427 428
	ima_rules = &ima_policy_rules;
	ima_update_policy_flag();
M
Mimi Zohar 已提交
429 430 431 432 433
}

enum {
	Opt_err = -1,
	Opt_measure = 1, Opt_dont_measure,
434
	Opt_appraise, Opt_dont_appraise,
P
Peter Moody 已提交
435
	Opt_audit,
M
Mimi Zohar 已提交
436 437
	Opt_obj_user, Opt_obj_role, Opt_obj_type,
	Opt_subj_user, Opt_subj_role, Opt_subj_type,
438 439
	Opt_func, Opt_mask, Opt_fsmagic,
	Opt_uid, Opt_euid, Opt_fowner,
440
	Opt_appraise_type, Opt_fsuuid, Opt_permit_directio
M
Mimi Zohar 已提交
441 442 443 444 445
};

static match_table_t policy_tokens = {
	{Opt_measure, "measure"},
	{Opt_dont_measure, "dont_measure"},
446 447
	{Opt_appraise, "appraise"},
	{Opt_dont_appraise, "dont_appraise"},
P
Peter Moody 已提交
448
	{Opt_audit, "audit"},
M
Mimi Zohar 已提交
449 450 451 452 453 454 455 456 457
	{Opt_obj_user, "obj_user=%s"},
	{Opt_obj_role, "obj_role=%s"},
	{Opt_obj_type, "obj_type=%s"},
	{Opt_subj_user, "subj_user=%s"},
	{Opt_subj_role, "subj_role=%s"},
	{Opt_subj_type, "subj_type=%s"},
	{Opt_func, "func=%s"},
	{Opt_mask, "mask=%s"},
	{Opt_fsmagic, "fsmagic=%s"},
458
	{Opt_fsuuid, "fsuuid=%s"},
M
Mimi Zohar 已提交
459
	{Opt_uid, "uid=%s"},
460
	{Opt_euid, "euid=%s"},
461
	{Opt_fowner, "fowner=%s"},
462
	{Opt_appraise_type, "appraise_type=%s"},
463
	{Opt_permit_directio, "permit_directio"},
M
Mimi Zohar 已提交
464 465 466
	{Opt_err, NULL}
};

467
static int ima_lsm_rule_init(struct ima_rule_entry *entry,
468
			     substring_t *args, int lsm_rule, int audit_type)
M
Mimi Zohar 已提交
469 470 471
{
	int result;

472 473 474
	if (entry->lsm[lsm_rule].rule)
		return -EINVAL;

475 476 477 478
	entry->lsm[lsm_rule].args_p = match_strdup(args);
	if (!entry->lsm[lsm_rule].args_p)
		return -ENOMEM;

M
Mimi Zohar 已提交
479 480
	entry->lsm[lsm_rule].type = audit_type;
	result = security_filter_rule_init(entry->lsm[lsm_rule].type,
481 482
					   Audit_equal,
					   entry->lsm[lsm_rule].args_p,
M
Mimi Zohar 已提交
483
					   &entry->lsm[lsm_rule].rule);
484 485
	if (!entry->lsm[lsm_rule].rule) {
		kfree(entry->lsm[lsm_rule].args_p);
M
Mimi Zohar 已提交
486
		return -EINVAL;
487 488
	}

M
Mimi Zohar 已提交
489 490 491
	return result;
}

492 493 494 495 496 497 498
static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
	audit_log_format(ab, "%s=", key);
	audit_log_untrustedstring(ab, value);
	audit_log_format(ab, " ");
}

499
static int ima_parse_rule(char *rule, struct ima_rule_entry *entry)
M
Mimi Zohar 已提交
500 501
{
	struct audit_buffer *ab;
502
	char *from;
M
Mimi Zohar 已提交
503 504 505
	char *p;
	int result = 0;

M
Mimi Zohar 已提交
506
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
M
Mimi Zohar 已提交
507

508
	entry->uid = INVALID_UID;
509
	entry->fowner = INVALID_UID;
510
	entry->action = UNKNOWN;
E
Eric Paris 已提交
511
	while ((p = strsep(&rule, " \t")) != NULL) {
M
Mimi Zohar 已提交
512 513 514 515 516 517
		substring_t args[MAX_OPT_ARGS];
		int token;
		unsigned long lnum;

		if (result < 0)
			break;
E
Eric Paris 已提交
518 519
		if ((*p == '\0') || (*p == ' ') || (*p == '\t'))
			continue;
M
Mimi Zohar 已提交
520 521 522
		token = match_token(p, policy_tokens, args);
		switch (token) {
		case Opt_measure:
523
			ima_log_string(ab, "action", "measure");
524 525 526 527

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
528 529 530
			entry->action = MEASURE;
			break;
		case Opt_dont_measure:
531
			ima_log_string(ab, "action", "dont_measure");
532 533 534 535

			if (entry->action != UNKNOWN)
				result = -EINVAL;

M
Mimi Zohar 已提交
536 537
			entry->action = DONT_MEASURE;
			break;
538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553
		case Opt_appraise:
			ima_log_string(ab, "action", "appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = APPRAISE;
			break;
		case Opt_dont_appraise:
			ima_log_string(ab, "action", "dont_appraise");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = DONT_APPRAISE;
			break;
P
Peter Moody 已提交
554 555 556 557 558 559 560 561
		case Opt_audit:
			ima_log_string(ab, "action", "audit");

			if (entry->action != UNKNOWN)
				result = -EINVAL;

			entry->action = AUDIT;
			break;
M
Mimi Zohar 已提交
562
		case Opt_func:
563
			ima_log_string(ab, "func", args[0].from);
564 565

			if (entry->func)
566
				result = -EINVAL;
567

568 569 570 571 572
			if (strcmp(args[0].from, "FILE_CHECK") == 0)
				entry->func = FILE_CHECK;
			/* PATH_CHECK is for backwards compat */
			else if (strcmp(args[0].from, "PATH_CHECK") == 0)
				entry->func = FILE_CHECK;
573 574
			else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
				entry->func = MODULE_CHECK;
575 576
			else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
				entry->func = FIRMWARE_CHECK;
M
Mimi Zohar 已提交
577 578 579
			else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
				|| (strcmp(args[0].from, "MMAP_CHECK") == 0))
				entry->func = MMAP_CHECK;
M
Mimi Zohar 已提交
580 581 582 583 584 585 586 587
			else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
				entry->func = BPRM_CHECK;
			else
				result = -EINVAL;
			if (!result)
				entry->flags |= IMA_FUNC;
			break;
		case Opt_mask:
588
			ima_log_string(ab, "mask", args[0].from);
589 590 591 592

			if (entry->mask)
				result = -EINVAL;

593 594 595 596 597
			from = args[0].from;
			if (*from == '^')
				from++;

			if ((strcmp(from, "MAY_EXEC")) == 0)
M
Mimi Zohar 已提交
598
				entry->mask = MAY_EXEC;
599
			else if (strcmp(from, "MAY_WRITE") == 0)
M
Mimi Zohar 已提交
600
				entry->mask = MAY_WRITE;
601
			else if (strcmp(from, "MAY_READ") == 0)
M
Mimi Zohar 已提交
602
				entry->mask = MAY_READ;
603
			else if (strcmp(from, "MAY_APPEND") == 0)
M
Mimi Zohar 已提交
604 605 606 607
				entry->mask = MAY_APPEND;
			else
				result = -EINVAL;
			if (!result)
608 609
				entry->flags |= (*args[0].from == '^')
				     ? IMA_INMASK : IMA_MASK;
M
Mimi Zohar 已提交
610 611
			break;
		case Opt_fsmagic:
612
			ima_log_string(ab, "fsmagic", args[0].from);
613 614 615 616 617 618

			if (entry->fsmagic) {
				result = -EINVAL;
				break;
			}

619
			result = kstrtoul(args[0].from, 16, &entry->fsmagic);
M
Mimi Zohar 已提交
620 621 622
			if (!result)
				entry->flags |= IMA_FSMAGIC;
			break;
623 624 625 626
		case Opt_fsuuid:
			ima_log_string(ab, "fsuuid", args[0].from);

			if (memchr_inv(entry->fsuuid, 0x00,
627
				       sizeof(entry->fsuuid))) {
628 629 630 631
				result = -EINVAL;
				break;
			}

632 633 634 635
			result = blk_part_pack_uuid(args[0].from,
						    entry->fsuuid);
			if (!result)
				entry->flags |= IMA_FSUUID;
636
			break;
M
Mimi Zohar 已提交
637
		case Opt_uid:
638
			ima_log_string(ab, "uid", args[0].from);
639 640 641
		case Opt_euid:
			if (token == Opt_euid)
				ima_log_string(ab, "euid", args[0].from);
642

643
			if (uid_valid(entry->uid)) {
644 645 646 647
				result = -EINVAL;
				break;
			}

648
			result = kstrtoul(args[0].from, 10, &lnum);
M
Mimi Zohar 已提交
649
			if (!result) {
650 651 652 653
				entry->uid = make_kuid(current_user_ns(),
						       (uid_t) lnum);
				if (!uid_valid(entry->uid) ||
				    (uid_t)lnum != lnum)
M
Mimi Zohar 已提交
654 655
					result = -EINVAL;
				else
656 657
					entry->flags |= (token == Opt_uid)
					    ? IMA_UID : IMA_EUID;
M
Mimi Zohar 已提交
658 659
			}
			break;
660 661 662
		case Opt_fowner:
			ima_log_string(ab, "fowner", args[0].from);

663
			if (uid_valid(entry->fowner)) {
664 665 666 667
				result = -EINVAL;
				break;
			}

668
			result = kstrtoul(args[0].from, 10, &lnum);
669
			if (!result) {
670 671
				entry->fowner = make_kuid(current_user_ns(), (uid_t)lnum);
				if (!uid_valid(entry->fowner) || (((uid_t)lnum) != lnum))
672 673 674 675 676
					result = -EINVAL;
				else
					entry->flags |= IMA_FOWNER;
			}
			break;
M
Mimi Zohar 已提交
677
		case Opt_obj_user:
678
			ima_log_string(ab, "obj_user", args[0].from);
679
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
680 681 682 683
						   LSM_OBJ_USER,
						   AUDIT_OBJ_USER);
			break;
		case Opt_obj_role:
684
			ima_log_string(ab, "obj_role", args[0].from);
685
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
686 687 688 689
						   LSM_OBJ_ROLE,
						   AUDIT_OBJ_ROLE);
			break;
		case Opt_obj_type:
690
			ima_log_string(ab, "obj_type", args[0].from);
691
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
692 693 694 695
						   LSM_OBJ_TYPE,
						   AUDIT_OBJ_TYPE);
			break;
		case Opt_subj_user:
696
			ima_log_string(ab, "subj_user", args[0].from);
697
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
698 699 700 701
						   LSM_SUBJ_USER,
						   AUDIT_SUBJ_USER);
			break;
		case Opt_subj_role:
702
			ima_log_string(ab, "subj_role", args[0].from);
703
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
704 705 706 707
						   LSM_SUBJ_ROLE,
						   AUDIT_SUBJ_ROLE);
			break;
		case Opt_subj_type:
708
			ima_log_string(ab, "subj_type", args[0].from);
709
			result = ima_lsm_rule_init(entry, args,
M
Mimi Zohar 已提交
710 711 712
						   LSM_SUBJ_TYPE,
						   AUDIT_SUBJ_TYPE);
			break;
713 714 715 716 717 718 719 720 721 722 723 724
		case Opt_appraise_type:
			if (entry->action != APPRAISE) {
				result = -EINVAL;
				break;
			}

			ima_log_string(ab, "appraise_type", args[0].from);
			if ((strcmp(args[0].from, "imasig")) == 0)
				entry->flags |= IMA_DIGSIG_REQUIRED;
			else
				result = -EINVAL;
			break;
725 726 727
		case Opt_permit_directio:
			entry->flags |= IMA_PERMIT_DIRECTIO;
			break;
M
Mimi Zohar 已提交
728
		case Opt_err:
729
			ima_log_string(ab, "UNKNOWN", p);
730
			result = -EINVAL;
M
Mimi Zohar 已提交
731 732 733
			break;
		}
	}
734
	if (!result && (entry->action == UNKNOWN))
M
Mimi Zohar 已提交
735
		result = -EINVAL;
736 737
	else if (entry->func == MODULE_CHECK)
		ima_appraise |= IMA_APPRAISE_MODULES;
738 739
	else if (entry->func == FIRMWARE_CHECK)
		ima_appraise |= IMA_APPRAISE_FIRMWARE;
740
	audit_log_format(ab, "res=%d", !result);
M
Mimi Zohar 已提交
741 742 743 744 745
	audit_log_end(ab);
	return result;
}

/**
746
 * ima_parse_add_rule - add a rule to ima_policy_rules
M
Mimi Zohar 已提交
747 748 749
 * @rule - ima measurement policy rule
 *
 * Uses a mutex to protect the policy list from multiple concurrent writers.
750
 * Returns the length of the rule parsed, an error code on failure
M
Mimi Zohar 已提交
751
 */
752
ssize_t ima_parse_add_rule(char *rule)
M
Mimi Zohar 已提交
753
{
754
	static const char op[] = "update_policy";
755
	char *p;
756
	struct ima_rule_entry *entry;
757
	ssize_t result, len;
M
Mimi Zohar 已提交
758 759
	int audit_info = 0;

760 761
	p = strsep(&rule, "\n");
	len = strlen(p) + 1;
762
	p += strspn(p, " \t");
763

764
	if (*p == '#' || *p == '\0')
765 766
		return len;

M
Mimi Zohar 已提交
767 768 769 770 771 772 773 774 775
	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (!entry) {
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);
		return -ENOMEM;
	}

	INIT_LIST_HEAD(&entry->list);

776
	result = ima_parse_rule(p, entry);
E
Eric Paris 已提交
777
	if (result) {
M
Mimi Zohar 已提交
778
		kfree(entry);
M
Mimi Zohar 已提交
779
		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
780
				    NULL, op, "invalid-policy", result,
M
Mimi Zohar 已提交
781
				    audit_info);
E
Eric Paris 已提交
782
		return result;
M
Mimi Zohar 已提交
783
	}
E
Eric Paris 已提交
784

785 786 787
	mutex_lock(&ima_rules_mutex);
	list_add_tail(&entry->list, &ima_policy_rules);
	mutex_unlock(&ima_rules_mutex);
E
Eric Paris 已提交
788 789

	return len;
M
Mimi Zohar 已提交
790 791 792
}

/* ima_delete_rules called to cleanup invalid policy */
793
void ima_delete_rules(void)
M
Mimi Zohar 已提交
794
{
795
	struct ima_rule_entry *entry, *tmp;
796
	int i;
M
Mimi Zohar 已提交
797

798 799
	mutex_lock(&ima_rules_mutex);
	list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
800 801 802
		for (i = 0; i < MAX_LSM_RULES; i++)
			kfree(entry->lsm[i].args_p);

M
Mimi Zohar 已提交
803 804 805
		list_del(&entry->list);
		kfree(entry);
	}
806
	mutex_unlock(&ima_rules_mutex);
M
Mimi Zohar 已提交
807
}