xref: /linux/security/selinux/include/classmap.h (revision c34e9ab9a612ee8b18273398ef75c207b01f516d)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 
3 #define COMMON_FILE_SOCK_PERMS                                            \
4 	"ioctl", "read", "write", "create", "getattr", "setattr", "lock", \
5 		"relabelfrom", "relabelto", "append", "map"
6 
7 #define COMMON_FILE_PERMS                                                \
8 	COMMON_FILE_SOCK_PERMS, "unlink", "link", "rename", "execute",   \
9 		"quotaon", "mounton", "audit_access", "open", "execmod", \
10 		"watch", "watch_mount", "watch_sb", "watch_with_perm",   \
11 		"watch_reads"
12 
13 #define COMMON_SOCK_PERMS                                              \
14 	COMMON_FILE_SOCK_PERMS, "bind", "connect", "listen", "accept", \
15 		"getopt", "setopt", "shutdown", "recvfrom", "sendto",  \
16 		"name_bind"
17 
18 #define COMMON_IPC_PERMS                                            \
19 	"create", "destroy", "getattr", "setattr", "read", "write", \
20 		"associate", "unix_read", "unix_write"
21 
22 #define COMMON_CAP_PERMS                                                     \
23 	"chown", "dac_override", "dac_read_search", "fowner", "fsetid",      \
24 		"kill", "setgid", "setuid", "setpcap", "linux_immutable",    \
25 		"net_bind_service", "net_broadcast", "net_admin", "net_raw", \
26 		"ipc_lock", "ipc_owner", "sys_module", "sys_rawio",          \
27 		"sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin",        \
28 		"sys_boot", "sys_nice", "sys_resource", "sys_time",          \
29 		"sys_tty_config", "mknod", "lease", "audit_write",           \
30 		"audit_control", "setfcap"
31 
32 #define COMMON_CAP2_PERMS                                                     \
33 	"mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend", \
34 		"audit_read", "perfmon", "bpf", "checkpoint_restore"
35 
36 #ifdef __KERNEL__ /* avoid this check when building host programs */
37 #include <linux/capability.h>
38 
39 #if CAP_LAST_CAP > CAP_CHECKPOINT_RESTORE
40 #error New capability defined, please update COMMON_CAP2_PERMS.
41 #endif
42 #endif
43 
44 /*
45  * Note: The name for any socket class should be suffixed by "socket",
46  *	 and doesn't contain more than one substr of "socket".
47  */
48 const struct security_class_mapping secclass_map[] = {
49 	{ "security",
50 	  { "compute_av", "compute_create", "compute_member", "check_context",
51 	    "load_policy", "compute_relabel", "compute_user", "setenforce",
52 	    "setbool", "setsecparam", "setcheckreqprot", "read_policy",
53 	    "validate_trans", NULL } },
54 	{ "process",
55 	  { "fork",	    "transition",    "sigchld",	    "sigkill",
56 	    "sigstop",	    "signull",	     "signal",	    "ptrace",
57 	    "getsched",	    "setsched",	     "getsession",  "getpgid",
58 	    "setpgid",	    "getcap",	     "setcap",	    "share",
59 	    "getattr",	    "setexec",	     "setfscreate", "noatsecure",
60 	    "siginh",	    "setrlimit",     "rlimitinh",   "dyntransition",
61 	    "setcurrent",   "execmem",	     "execstack",   "execheap",
62 	    "setkeycreate", "setsockcreate", "getrlimit",   NULL } },
63 	{ "process2", { "nnp_transition", "nosuid_transition", NULL } },
64 	{ "system",
65 	  { "ipc_info", "syslog_read", "syslog_mod", "syslog_console",
66 	    "module_request", "module_load", NULL } },
67 	{ "capability", { COMMON_CAP_PERMS, NULL } },
68 	{ "filesystem",
69 	  { "mount", "remount", "unmount", "getattr", "relabelfrom",
70 	    "relabelto", "associate", "quotamod", "quotaget", "watch", NULL } },
71 	{ "file",
72 	  { COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } },
73 	{ "dir",
74 	  { COMMON_FILE_PERMS, "add_name", "remove_name", "reparent", "search",
75 	    "rmdir", NULL } },
76 	{ "fd", { "use", NULL } },
77 	{ "lnk_file", { COMMON_FILE_PERMS, NULL } },
78 	{ "chr_file", { COMMON_FILE_PERMS, NULL } },
79 	{ "blk_file", { COMMON_FILE_PERMS, NULL } },
80 	{ "sock_file", { COMMON_FILE_PERMS, NULL } },
81 	{ "fifo_file", { COMMON_FILE_PERMS, NULL } },
82 	{ "socket", { COMMON_SOCK_PERMS, NULL } },
83 	{ "tcp_socket",
84 	  { COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
85 	{ "udp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
86 	{ "rawip_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
87 	{ "node", { "recvfrom", "sendto", NULL } },
88 	{ "netif", { "ingress", "egress", NULL } },
89 	{ "netlink_socket", { COMMON_SOCK_PERMS, NULL } },
90 	{ "packet_socket", { COMMON_SOCK_PERMS, NULL } },
91 	{ "key_socket", { COMMON_SOCK_PERMS, NULL } },
92 	{ "unix_stream_socket", { COMMON_SOCK_PERMS, "connectto", NULL } },
93 	{ "unix_dgram_socket", { COMMON_SOCK_PERMS, NULL } },
94 	{ "sem", { COMMON_IPC_PERMS, NULL } },
95 	{ "msg", { "send", "receive", NULL } },
96 	{ "msgq", { COMMON_IPC_PERMS, "enqueue", NULL } },
97 	{ "shm", { COMMON_IPC_PERMS, "lock", NULL } },
98 	{ "ipc", { COMMON_IPC_PERMS, NULL } },
99 	{ "netlink_route_socket",
100 	  { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
101 	{ "netlink_tcpdiag_socket",
102 	  { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
103 	{ "netlink_nflog_socket", { COMMON_SOCK_PERMS, NULL } },
104 	{ "netlink_xfrm_socket",
105 	  { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
106 	{ "netlink_selinux_socket", { COMMON_SOCK_PERMS, NULL } },
107 	{ "netlink_iscsi_socket", { COMMON_SOCK_PERMS, NULL } },
108 	{ "netlink_audit_socket",
109 	  { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg_relay",
110 	    "nlmsg_readpriv", "nlmsg_tty_audit", "nlmsg", NULL } },
111 	{ "netlink_fib_lookup_socket", { COMMON_SOCK_PERMS, NULL } },
112 	{ "netlink_connector_socket", { COMMON_SOCK_PERMS, NULL } },
113 	{ "netlink_netfilter_socket", { COMMON_SOCK_PERMS, NULL } },
114 	{ "netlink_dnrt_socket", { COMMON_SOCK_PERMS, NULL } },
115 	{ "association",
116 	  { "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
117 	{ "netlink_kobject_uevent_socket", { COMMON_SOCK_PERMS, NULL } },
118 	{ "netlink_generic_socket", { COMMON_SOCK_PERMS, NULL } },
119 	{ "netlink_scsitransport_socket", { COMMON_SOCK_PERMS, NULL } },
120 	{ "netlink_rdma_socket", { COMMON_SOCK_PERMS, NULL } },
121 	{ "netlink_crypto_socket", { COMMON_SOCK_PERMS, NULL } },
122 	{ "appletalk_socket", { COMMON_SOCK_PERMS, NULL } },
123 	{ "packet",
124 	  { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
125 	{ "key",
126 	  { "view", "read", "write", "search", "link", "setattr", "create",
127 	    NULL } },
128 	{ "dccp_socket",
129 	  { COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
130 	{ "memprotect", { "mmap_zero", NULL } },
131 	{ "peer", { "recv", NULL } },
132 	{ "capability2", { COMMON_CAP2_PERMS, NULL } },
133 	{ "kernel_service", { "use_as_override", "create_files_as", NULL } },
134 	{ "tun_socket", { COMMON_SOCK_PERMS, "attach_queue", NULL } },
135 	{ "binder",
136 	  { "impersonate", "call", "set_context_mgr", "transfer", NULL } },
137 	{ "cap_userns", { COMMON_CAP_PERMS, NULL } },
138 	{ "cap2_userns", { COMMON_CAP2_PERMS, NULL } },
139 	{ "sctp_socket",
140 	  { COMMON_SOCK_PERMS, "node_bind", "name_connect", "association",
141 	    NULL } },
142 	{ "icmp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
143 	{ "ax25_socket", { COMMON_SOCK_PERMS, NULL } },
144 	{ "ipx_socket", { COMMON_SOCK_PERMS, NULL } },
145 	{ "netrom_socket", { COMMON_SOCK_PERMS, NULL } },
146 	{ "atmpvc_socket", { COMMON_SOCK_PERMS, NULL } },
147 	{ "x25_socket", { COMMON_SOCK_PERMS, NULL } },
148 	{ "rose_socket", { COMMON_SOCK_PERMS, NULL } },
149 	{ "decnet_socket", { COMMON_SOCK_PERMS, NULL } },
150 	{ "atmsvc_socket", { COMMON_SOCK_PERMS, NULL } },
151 	{ "rds_socket", { COMMON_SOCK_PERMS, NULL } },
152 	{ "irda_socket", { COMMON_SOCK_PERMS, NULL } },
153 	{ "pppox_socket", { COMMON_SOCK_PERMS, NULL } },
154 	{ "llc_socket", { COMMON_SOCK_PERMS, NULL } },
155 	{ "can_socket", { COMMON_SOCK_PERMS, NULL } },
156 	{ "tipc_socket", { COMMON_SOCK_PERMS, NULL } },
157 	{ "bluetooth_socket", { COMMON_SOCK_PERMS, NULL } },
158 	{ "iucv_socket", { COMMON_SOCK_PERMS, NULL } },
159 	{ "rxrpc_socket", { COMMON_SOCK_PERMS, NULL } },
160 	{ "isdn_socket", { COMMON_SOCK_PERMS, NULL } },
161 	{ "phonet_socket", { COMMON_SOCK_PERMS, NULL } },
162 	{ "ieee802154_socket", { COMMON_SOCK_PERMS, NULL } },
163 	{ "caif_socket", { COMMON_SOCK_PERMS, NULL } },
164 	{ "alg_socket", { COMMON_SOCK_PERMS, NULL } },
165 	{ "nfc_socket", { COMMON_SOCK_PERMS, NULL } },
166 	{ "vsock_socket", { COMMON_SOCK_PERMS, NULL } },
167 	{ "kcm_socket", { COMMON_SOCK_PERMS, NULL } },
168 	{ "qipcrtr_socket", { COMMON_SOCK_PERMS, NULL } },
169 	{ "smc_socket", { COMMON_SOCK_PERMS, NULL } },
170 	{ "infiniband_pkey", { "access", NULL } },
171 	{ "infiniband_endport", { "manage_subnet", NULL } },
172 	{ "bpf",
173 	  { "map_create", "map_read", "map_write", "prog_load", "prog_run",
174 	    NULL } },
175 	{ "xdp_socket", { COMMON_SOCK_PERMS, NULL } },
176 	{ "mctp_socket", { COMMON_SOCK_PERMS, NULL } },
177 	{ "perf_event",
178 	  { "open", "cpu", "kernel", "tracepoint", "read", "write", NULL } },
179 	{ "anon_inode", { COMMON_FILE_PERMS, NULL } },
180 	{ "io_uring", { "override_creds", "sqpoll", "cmd", NULL } },
181 	{ "user_namespace", { "create", NULL } },
182 	{ NULL }
183 };
184 
185 #ifdef __KERNEL__ /* avoid this check when building host programs */
186 #include <linux/socket.h>
187 
188 #if PF_MAX > 46
189 #error New address family defined, please update secclass_map.
190 #endif
191 #endif
192