Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/security/selinux/include/classmap.h
26439 views
1
/* SPDX-License-Identifier: GPL-2.0 */
2
3
#define COMMON_FILE_SOCK_PERMS \
4
"ioctl", "read", "write", "create", "getattr", "setattr", "lock", \
5
"relabelfrom", "relabelto", "append", "map"
6
7
#define COMMON_FILE_PERMS \
8
COMMON_FILE_SOCK_PERMS, "unlink", "link", "rename", "execute", \
9
"quotaon", "mounton", "audit_access", "open", "execmod", \
10
"watch", "watch_mount", "watch_sb", "watch_with_perm", \
11
"watch_reads", "watch_mountns"
12
13
#define COMMON_SOCK_PERMS \
14
COMMON_FILE_SOCK_PERMS, "bind", "connect", "listen", "accept", \
15
"getopt", "setopt", "shutdown", "recvfrom", "sendto", \
16
"name_bind"
17
18
#define COMMON_IPC_PERMS \
19
"create", "destroy", "getattr", "setattr", "read", "write", \
20
"associate", "unix_read", "unix_write"
21
22
#define COMMON_CAP_PERMS \
23
"chown", "dac_override", "dac_read_search", "fowner", "fsetid", \
24
"kill", "setgid", "setuid", "setpcap", "linux_immutable", \
25
"net_bind_service", "net_broadcast", "net_admin", "net_raw", \
26
"ipc_lock", "ipc_owner", "sys_module", "sys_rawio", \
27
"sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \
28
"sys_boot", "sys_nice", "sys_resource", "sys_time", \
29
"sys_tty_config", "mknod", "lease", "audit_write", \
30
"audit_control", "setfcap"
31
32
#define COMMON_CAP2_PERMS \
33
"mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend", \
34
"audit_read", "perfmon", "bpf", "checkpoint_restore"
35
36
#ifdef __KERNEL__ /* avoid this check when building host programs */
37
#include <linux/capability.h>
38
39
#if CAP_LAST_CAP > CAP_CHECKPOINT_RESTORE
40
#error New capability defined, please update COMMON_CAP2_PERMS.
41
#endif
42
#endif
43
44
/*
45
* Note: The name for any socket class should be suffixed by "socket",
46
* and doesn't contain more than one substr of "socket".
47
*/
48
const struct security_class_mapping secclass_map[] = {
49
{ "security",
50
{ "compute_av", "compute_create", "compute_member", "check_context",
51
"load_policy", "compute_relabel", "compute_user", "setenforce",
52
"setbool", "setsecparam", "setcheckreqprot", "read_policy",
53
"validate_trans", NULL } },
54
{ "process",
55
{ "fork", "transition", "sigchld", "sigkill",
56
"sigstop", "signull", "signal", "ptrace",
57
"getsched", "setsched", "getsession", "getpgid",
58
"setpgid", "getcap", "setcap", "share",
59
"getattr", "setexec", "setfscreate", "noatsecure",
60
"siginh", "setrlimit", "rlimitinh", "dyntransition",
61
"setcurrent", "execmem", "execstack", "execheap",
62
"setkeycreate", "setsockcreate", "getrlimit", NULL } },
63
{ "process2", { "nnp_transition", "nosuid_transition", NULL } },
64
{ "system",
65
{ "ipc_info", "syslog_read", "syslog_mod", "syslog_console",
66
"module_request", "module_load", "firmware_load",
67
"kexec_image_load", "kexec_initramfs_load", "policy_load",
68
"x509_certificate_load", NULL } },
69
{ "capability", { COMMON_CAP_PERMS, NULL } },
70
{ "filesystem",
71
{ "mount", "remount", "unmount", "getattr", "relabelfrom",
72
"relabelto", "associate", "quotamod", "quotaget", "watch", NULL } },
73
{ "file",
74
{ COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } },
75
{ "dir",
76
{ COMMON_FILE_PERMS, "add_name", "remove_name", "reparent", "search",
77
"rmdir", NULL } },
78
{ "fd", { "use", NULL } },
79
{ "lnk_file", { COMMON_FILE_PERMS, NULL } },
80
{ "chr_file", { COMMON_FILE_PERMS, NULL } },
81
{ "blk_file", { COMMON_FILE_PERMS, NULL } },
82
{ "sock_file", { COMMON_FILE_PERMS, NULL } },
83
{ "fifo_file", { COMMON_FILE_PERMS, NULL } },
84
{ "socket", { COMMON_SOCK_PERMS, NULL } },
85
{ "tcp_socket",
86
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
87
{ "udp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
88
{ "rawip_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
89
{ "node", { "recvfrom", "sendto", NULL } },
90
{ "netif", { "ingress", "egress", NULL } },
91
{ "netlink_socket", { COMMON_SOCK_PERMS, NULL } },
92
{ "packet_socket", { COMMON_SOCK_PERMS, NULL } },
93
{ "key_socket", { COMMON_SOCK_PERMS, NULL } },
94
{ "unix_stream_socket", { COMMON_SOCK_PERMS, "connectto", NULL } },
95
{ "unix_dgram_socket", { COMMON_SOCK_PERMS, NULL } },
96
{ "sem", { COMMON_IPC_PERMS, NULL } },
97
{ "msg", { "send", "receive", NULL } },
98
{ "msgq", { COMMON_IPC_PERMS, "enqueue", NULL } },
99
{ "shm", { COMMON_IPC_PERMS, "lock", NULL } },
100
{ "ipc", { COMMON_IPC_PERMS, NULL } },
101
{ "netlink_route_socket",
102
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
103
{ "netlink_tcpdiag_socket",
104
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
105
{ "netlink_nflog_socket", { COMMON_SOCK_PERMS, NULL } },
106
{ "netlink_xfrm_socket",
107
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
108
{ "netlink_selinux_socket", { COMMON_SOCK_PERMS, NULL } },
109
{ "netlink_iscsi_socket", { COMMON_SOCK_PERMS, NULL } },
110
{ "netlink_audit_socket",
111
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg_relay",
112
"nlmsg_readpriv", "nlmsg_tty_audit", "nlmsg", NULL } },
113
{ "netlink_fib_lookup_socket", { COMMON_SOCK_PERMS, NULL } },
114
{ "netlink_connector_socket", { COMMON_SOCK_PERMS, NULL } },
115
{ "netlink_netfilter_socket", { COMMON_SOCK_PERMS, NULL } },
116
{ "netlink_dnrt_socket", { COMMON_SOCK_PERMS, NULL } },
117
{ "association",
118
{ "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
119
{ "netlink_kobject_uevent_socket", { COMMON_SOCK_PERMS, NULL } },
120
{ "netlink_generic_socket", { COMMON_SOCK_PERMS, NULL } },
121
{ "netlink_scsitransport_socket", { COMMON_SOCK_PERMS, NULL } },
122
{ "netlink_rdma_socket", { COMMON_SOCK_PERMS, NULL } },
123
{ "netlink_crypto_socket", { COMMON_SOCK_PERMS, NULL } },
124
{ "appletalk_socket", { COMMON_SOCK_PERMS, NULL } },
125
{ "packet",
126
{ "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
127
{ "key",
128
{ "view", "read", "write", "search", "link", "setattr", "create",
129
NULL } },
130
{ "memprotect", { "mmap_zero", NULL } },
131
{ "peer", { "recv", NULL } },
132
{ "capability2", { COMMON_CAP2_PERMS, NULL } },
133
{ "kernel_service", { "use_as_override", "create_files_as", NULL } },
134
{ "tun_socket", { COMMON_SOCK_PERMS, "attach_queue", NULL } },
135
{ "binder",
136
{ "impersonate", "call", "set_context_mgr", "transfer", NULL } },
137
{ "cap_userns", { COMMON_CAP_PERMS, NULL } },
138
{ "cap2_userns", { COMMON_CAP2_PERMS, NULL } },
139
{ "sctp_socket",
140
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", "association",
141
NULL } },
142
{ "icmp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
143
{ "ax25_socket", { COMMON_SOCK_PERMS, NULL } },
144
{ "ipx_socket", { COMMON_SOCK_PERMS, NULL } },
145
{ "netrom_socket", { COMMON_SOCK_PERMS, NULL } },
146
{ "atmpvc_socket", { COMMON_SOCK_PERMS, NULL } },
147
{ "x25_socket", { COMMON_SOCK_PERMS, NULL } },
148
{ "rose_socket", { COMMON_SOCK_PERMS, NULL } },
149
{ "decnet_socket", { COMMON_SOCK_PERMS, NULL } },
150
{ "atmsvc_socket", { COMMON_SOCK_PERMS, NULL } },
151
{ "rds_socket", { COMMON_SOCK_PERMS, NULL } },
152
{ "irda_socket", { COMMON_SOCK_PERMS, NULL } },
153
{ "pppox_socket", { COMMON_SOCK_PERMS, NULL } },
154
{ "llc_socket", { COMMON_SOCK_PERMS, NULL } },
155
{ "can_socket", { COMMON_SOCK_PERMS, NULL } },
156
{ "tipc_socket", { COMMON_SOCK_PERMS, NULL } },
157
{ "bluetooth_socket", { COMMON_SOCK_PERMS, NULL } },
158
{ "iucv_socket", { COMMON_SOCK_PERMS, NULL } },
159
{ "rxrpc_socket", { COMMON_SOCK_PERMS, NULL } },
160
{ "isdn_socket", { COMMON_SOCK_PERMS, NULL } },
161
{ "phonet_socket", { COMMON_SOCK_PERMS, NULL } },
162
{ "ieee802154_socket", { COMMON_SOCK_PERMS, NULL } },
163
{ "caif_socket", { COMMON_SOCK_PERMS, NULL } },
164
{ "alg_socket", { COMMON_SOCK_PERMS, NULL } },
165
{ "nfc_socket", { COMMON_SOCK_PERMS, NULL } },
166
{ "vsock_socket", { COMMON_SOCK_PERMS, NULL } },
167
{ "kcm_socket", { COMMON_SOCK_PERMS, NULL } },
168
{ "qipcrtr_socket", { COMMON_SOCK_PERMS, NULL } },
169
{ "smc_socket", { COMMON_SOCK_PERMS, NULL } },
170
{ "infiniband_pkey", { "access", NULL } },
171
{ "infiniband_endport", { "manage_subnet", NULL } },
172
{ "bpf",
173
{ "map_create", "map_read", "map_write", "prog_load", "prog_run",
174
NULL } },
175
{ "xdp_socket", { COMMON_SOCK_PERMS, NULL } },
176
{ "mctp_socket", { COMMON_SOCK_PERMS, NULL } },
177
{ "perf_event",
178
{ "open", "cpu", "kernel", "tracepoint", "read", "write", NULL } },
179
{ "anon_inode", { COMMON_FILE_PERMS, NULL } },
180
{ "io_uring", { "override_creds", "sqpoll", "cmd", "allowed", NULL } },
181
{ "user_namespace", { "create", NULL } },
182
/* last one */ { NULL, {} }
183
};
184
185
#ifdef __KERNEL__ /* avoid this check when building host programs */
186
#include <linux/socket.h>
187
188
#if PF_MAX > 46
189
#error New address family defined, please update secclass_map.
190
#endif
191
#endif
192
193