Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp6349324ybi; Wed, 29 May 2019 06:37:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqzGIOpVAS3aZKhJ6kfH7ynADl6XQF7FNmqEY0WktWAzkIl9uzKLgcadSvw+ZSiPJXV7CPZO X-Received: by 2002:a17:90a:aa81:: with SMTP id l1mr11823983pjq.55.1559137076613; Wed, 29 May 2019 06:37:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559137076; cv=none; d=google.com; s=arc-20160816; b=zTMkoB2K6uoWgK6XwilqqdOBDWlDUYarrviZFI5uTiLoCOiwCKseE6QQcmMajNMBau oSDf5NqlCx1XiRlrdhLxUMZtdU7d/18MICRDjAZeh1gHKAtRb/MOP/lKjlZ3IZWiskiQ 9zMcE13Avrf6vB3gubzWrJBJRxcaUrm9co27HHMRpN5SB+UYaj0avZ9ohExM7lVvnOSZ P3s8e4h+X4t+oFHubj/PYo9KpK2ERU7N6wuRBCQnlDuvikG3EmpjItkcqA85Ai63/RA6 cTdcRoYlEYZ22CGczhHmUHMfv5AGCAY+lj3lu1WfFjtk/YDX+m3kApd3IR1JILH1QKqI hKjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=mfEz3uSJSLhVntt+TLUMCWTsV0Zjr79P9zYai7n7c0U=; b=luQmTXA9bGa0v6V0OCDQF9QVU0Xq87wJcr+CQjTWtBfwk/VWlhBXsqRLNodczFRmM0 Z0j6FO+ZYQ6ioZixBJOT0pMxWGhB+t5LBXgGAOMUZbTA9pXAHwuzR0jje4TSpm2M5Rz8 j2SmNFOQVa65ZpUlf2zwV7btiQui8w1ONFwh7EPAn2FzhIvtACENqiozjFZoFKu9Jwrt Wah16PPPpnz80mHjiLazE8N/I3HO0woSatana5QuNE6LMsAABBo0jKJk/NR3AqOeC8on u8C7+asWBM/sOfKNV+QM49IbeZzDtAPI/IydxcjGd94JNt/iBnYnnYRJJ5QYRVP3Kqkh n42w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3si7259223pjv.49.2019.05.29.06.37.39; Wed, 29 May 2019 06:37:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727269AbfE2NgN (ORCPT + 99 others); Wed, 29 May 2019 09:36:13 -0400 Received: from lhrrgout.huawei.com ([185.176.76.210]:32974 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726612AbfE2NgM (ORCPT ); Wed, 29 May 2019 09:36:12 -0400 Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 18762D6F4E180265B89C; Wed, 29 May 2019 14:36:11 +0100 (IST) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.154) by smtpsuk.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 29 May 2019 14:36:03 +0100 From: Roberto Sassu To: , , CC: , , , , , Roberto Sassu , Subject: [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly Date: Wed, 29 May 2019 15:30:35 +0200 Message-ID: <20190529133035.28724-4-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190529133035.28724-1-roberto.sassu@huawei.com> References: <20190529133035.28724-1-roberto.sassu@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.154] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Show the '^' character when a policy rule has flag IMA_INMASK. Fixes: 80eae209d63ac ("IMA: allow reading back the current IMA policy") Signed-off-by: Roberto Sassu Cc: stable@vger.kernel.org --- security/integrity/ima/ima_policy.c | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index e0cc323f948f..ae4034f041c4 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c @@ -1146,10 +1146,10 @@ enum { }; static const char *const mask_tokens[] = { - "MAY_EXEC", - "MAY_WRITE", - "MAY_READ", - "MAY_APPEND" + "^MAY_EXEC", + "^MAY_WRITE", + "^MAY_READ", + "^MAY_APPEND" }; #define __ima_hook_stringify(str) (#str), @@ -1209,6 +1209,7 @@ int ima_policy_show(struct seq_file *m, void *v) struct ima_rule_entry *entry = v; int i; char tbuf[64] = {0,}; + int offset = 0; rcu_read_lock(); @@ -1232,15 +1233,17 @@ int ima_policy_show(struct seq_file *m, void *v) if (entry->flags & IMA_FUNC) policy_func_show(m, entry->func); - if (entry->flags & IMA_MASK) { + if ((entry->flags & IMA_MASK) || (entry->flags & IMA_INMASK)) { + if (entry->flags & IMA_MASK) + offset = 1; if (entry->mask & MAY_EXEC) - seq_printf(m, pt(Opt_mask), mt(mask_exec)); + seq_printf(m, pt(Opt_mask), mt(mask_exec) + offset); if (entry->mask & MAY_WRITE) - seq_printf(m, pt(Opt_mask), mt(mask_write)); + seq_printf(m, pt(Opt_mask), mt(mask_write) + offset); if (entry->mask & MAY_READ) - seq_printf(m, pt(Opt_mask), mt(mask_read)); + seq_printf(m, pt(Opt_mask), mt(mask_read) + offset); if (entry->mask & MAY_APPEND) - seq_printf(m, pt(Opt_mask), mt(mask_append)); + seq_printf(m, pt(Opt_mask), mt(mask_append) + offset); seq_puts(m, " "); } -- 2.17.1