aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.vnet.ibm.com>2015-06-11 20:48:33 -0400
committerMimi Zohar <zohar@linux.vnet.ibm.com>2015-06-16 08:18:45 -0400
commit24fd03c87695a76f0517df42a37e51b1597d2c8a (patch)
treea08107bb7ad12b472a5b1b60cea8770211113c31 /security
parent4351c294b8c1028077280f761e158d167b592974 (diff)
ima: update builtin policies
This patch defines a builtin measurement policy "tcb", similar to the existing "ima_tcb", but with additional rules to also measure files based on the effective uid and to measure files opened with the "read" mode bit set (eg. read, read-write). Changing the builtin "ima_tcb" policy could potentially break existing users. Instead of defining a new separate boot command line option each time the builtin measurement policy is modified, this patch defines a single generic boot command line option "ima_policy=" to specify the builtin policy and deprecates the use of the builtin ima_tcb policy. [The "ima_policy=" boot command line option is based on Roberto Sassu's "ima: added new policy type exec" patch.] Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Signed-off-by: Dr. Greg Wettstein <gw@idfusion.org> Cc: stable@vger.kernel.org
Diffstat (limited to 'security')
-rw-r--r--security/integrity/ima/ima_policy.c65
1 files changed, 56 insertions, 9 deletions
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
index b3a2038ed424..3997e206f82d 100644
--- a/security/integrity/ima/ima_policy.c
+++ b/security/integrity/ima/ima_policy.c
@@ -44,6 +44,8 @@ enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
44 LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE 44 LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE
45}; 45};
46 46
47enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB };
48
47struct ima_rule_entry { 49struct ima_rule_entry {
48 struct list_head list; 50 struct list_head list;
49 int action; 51 int action;
@@ -72,7 +74,7 @@ struct ima_rule_entry {
72 * normal users can easily run the machine out of memory simply building 74 * normal users can easily run the machine out of memory simply building
73 * and running executables. 75 * and running executables.
74 */ 76 */
75static struct ima_rule_entry default_rules[] = { 77static struct ima_rule_entry dont_measure_rules[] = {
76 {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC}, 78 {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
77 {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC}, 79 {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
78 {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC}, 80 {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
@@ -83,13 +85,29 @@ static struct ima_rule_entry default_rules[] = {
83 {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, 85 {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
84 {.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC, 86 {.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
85 .flags = IMA_FSMAGIC}, 87 .flags = IMA_FSMAGIC},
86 {.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}, 88 {.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
89};
90
91static struct ima_rule_entry original_measurement_rules[] = {
92 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
93 .flags = IMA_FUNC | IMA_MASK},
94 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
95 .flags = IMA_FUNC | IMA_MASK},
96 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
97 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID},
98 {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
99 {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
100};
101
102static struct ima_rule_entry default_measurement_rules[] = {
87 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 103 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
88 .flags = IMA_FUNC | IMA_MASK}, 104 .flags = IMA_FUNC | IMA_MASK},
89 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 105 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
90 .flags = IMA_FUNC | IMA_MASK}, 106 .flags = IMA_FUNC | IMA_MASK},
91 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, .uid = GLOBAL_ROOT_UID, 107 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
92 .flags = IMA_FUNC | IMA_MASK | IMA_UID}, 108 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID},
109 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ,
110 .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID},
93 {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, 111 {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC},
94 {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, 112 {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC},
95}; 113};
@@ -121,14 +139,29 @@ static struct list_head *ima_rules;
121 139
122static DEFINE_MUTEX(ima_rules_mutex); 140static DEFINE_MUTEX(ima_rules_mutex);
123 141
124static bool ima_use_tcb __initdata; 142static int ima_policy __initdata;
125static int __init default_measure_policy_setup(char *str) 143static int __init default_measure_policy_setup(char *str)
126{ 144{
127 ima_use_tcb = 1; 145 if (ima_policy)
146 return 1;
147
148 ima_policy = ORIGINAL_TCB;
128 return 1; 149 return 1;
129} 150}
130__setup("ima_tcb", default_measure_policy_setup); 151__setup("ima_tcb", default_measure_policy_setup);
131 152
153static int __init policy_setup(char *str)
154{
155 if (ima_policy)
156 return 1;
157
158 if (strcmp(str, "tcb") == 0)
159 ima_policy = DEFAULT_TCB;
160
161 return 1;
162}
163__setup("ima_policy=", policy_setup);
164
132static bool ima_use_appraise_tcb __initdata; 165static bool ima_use_appraise_tcb __initdata;
133static int __init default_appraise_policy_setup(char *str) 166static int __init default_appraise_policy_setup(char *str)
134{ 167{
@@ -352,13 +385,27 @@ void __init ima_init_policy(void)
352{ 385{
353 int i, measure_entries, appraise_entries; 386 int i, measure_entries, appraise_entries;
354 387
355 /* if !ima_use_tcb set entries = 0 so we load NO default rules */ 388 /* if !ima_policy set entries = 0 so we load NO default rules */
356 measure_entries = ima_use_tcb ? ARRAY_SIZE(default_rules) : 0; 389 measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
357 appraise_entries = ima_use_appraise_tcb ? 390 appraise_entries = ima_use_appraise_tcb ?
358 ARRAY_SIZE(default_appraise_rules) : 0; 391 ARRAY_SIZE(default_appraise_rules) : 0;
359 392
360 for (i = 0; i < measure_entries; i++) 393 for (i = 0; i < measure_entries; i++)
361 list_add_tail(&default_rules[i].list, &ima_default_rules); 394 list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);
395
396 switch (ima_policy) {
397 case ORIGINAL_TCB:
398 for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++)
399 list_add_tail(&original_measurement_rules[i].list,
400 &ima_default_rules);
401 break;
402 case DEFAULT_TCB:
403 for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++)
404 list_add_tail(&default_measurement_rules[i].list,
405 &ima_default_rules);
406 default:
407 break;
408 }
362 409
363 for (i = 0; i < appraise_entries; i++) { 410 for (i = 0; i < appraise_entries; i++) {
364 list_add_tail(&default_appraise_rules[i].list, 411 list_add_tail(&default_appraise_rules[i].list,