classmap.h 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. #define COMMON_FILE_SOCK_PERMS "ioctl", "read", "write", "create", \
  2. "getattr", "setattr", "lock", "relabelfrom", "relabelto", "append"
  3. #define COMMON_FILE_PERMS COMMON_FILE_SOCK_PERMS, "unlink", "link", \
  4. "rename", "execute", "quotaon", "mounton", "audit_access", \
  5. "open", "execmod"
  6. #define COMMON_SOCK_PERMS COMMON_FILE_SOCK_PERMS, "bind", "connect", \
  7. "listen", "accept", "getopt", "setopt", "shutdown", "recvfrom", \
  8. "sendto", "name_bind"
  9. #define COMMON_IPC_PERMS "create", "destroy", "getattr", "setattr", "read", \
  10. "write", "associate", "unix_read", "unix_write"
  11. /*
  12. * Note: The name for any socket class should be suffixed by "socket",
  13. * and doesn't contain more than one substr of "socket".
  14. */
  15. struct security_class_mapping secclass_map[] = {
  16. { "security",
  17. { "compute_av", "compute_create", "compute_member",
  18. "check_context", "load_policy", "compute_relabel",
  19. "compute_user", "setenforce", "setbool", "setsecparam",
  20. "setcheckreqprot", "read_policy", NULL } },
  21. { "process",
  22. { "fork", "transition", "sigchld", "sigkill",
  23. "sigstop", "signull", "signal", "ptrace", "getsched", "setsched",
  24. "getsession", "getpgid", "setpgid", "getcap", "setcap", "share",
  25. "getattr", "setexec", "setfscreate", "noatsecure", "siginh",
  26. "setrlimit", "rlimitinh", "dyntransition", "setcurrent",
  27. "execmem", "execstack", "execheap", "setkeycreate",
  28. "setsockcreate", NULL } },
  29. { "system",
  30. { "ipc_info", "syslog_read", "syslog_mod",
  31. "syslog_console", "module_request", NULL } },
  32. { "capability",
  33. { "chown", "dac_override", "dac_read_search",
  34. "fowner", "fsetid", "kill", "setgid", "setuid", "setpcap",
  35. "linux_immutable", "net_bind_service", "net_broadcast",
  36. "net_admin", "net_raw", "ipc_lock", "ipc_owner", "sys_module",
  37. "sys_rawio", "sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin",
  38. "sys_boot", "sys_nice", "sys_resource", "sys_time",
  39. "sys_tty_config", "mknod", "lease", "audit_write",
  40. "audit_control", "setfcap", NULL } },
  41. { "filesystem",
  42. { "mount", "remount", "unmount", "getattr",
  43. "relabelfrom", "relabelto", "associate", "quotamod",
  44. "quotaget", NULL } },
  45. { "file",
  46. { COMMON_FILE_PERMS,
  47. "execute_no_trans", "entrypoint", NULL } },
  48. { "dir",
  49. { COMMON_FILE_PERMS, "add_name", "remove_name",
  50. "reparent", "search", "rmdir", NULL } },
  51. { "fd", { "use", NULL } },
  52. { "lnk_file",
  53. { COMMON_FILE_PERMS, NULL } },
  54. { "chr_file",
  55. { COMMON_FILE_PERMS, NULL } },
  56. { "blk_file",
  57. { COMMON_FILE_PERMS, NULL } },
  58. { "sock_file",
  59. { COMMON_FILE_PERMS, NULL } },
  60. { "fifo_file",
  61. { COMMON_FILE_PERMS, NULL } },
  62. { "socket",
  63. { COMMON_SOCK_PERMS, NULL } },
  64. { "tcp_socket",
  65. { COMMON_SOCK_PERMS,
  66. "node_bind", "name_connect",
  67. NULL } },
  68. { "udp_socket",
  69. { COMMON_SOCK_PERMS,
  70. "node_bind", NULL } },
  71. { "rawip_socket",
  72. { COMMON_SOCK_PERMS,
  73. "node_bind", NULL } },
  74. { "node",
  75. { "recvfrom", "sendto", NULL } },
  76. { "netif",
  77. { "ingress", "egress", NULL } },
  78. { "netlink_socket",
  79. { COMMON_SOCK_PERMS, NULL } },
  80. { "packet_socket",
  81. { COMMON_SOCK_PERMS, NULL } },
  82. { "key_socket",
  83. { COMMON_SOCK_PERMS, NULL } },
  84. { "unix_stream_socket",
  85. { COMMON_SOCK_PERMS, "connectto", NULL } },
  86. { "unix_dgram_socket",
  87. { COMMON_SOCK_PERMS, NULL } },
  88. { "sem",
  89. { COMMON_IPC_PERMS, NULL } },
  90. { "msg", { "send", "receive", NULL } },
  91. { "msgq",
  92. { COMMON_IPC_PERMS, "enqueue", NULL } },
  93. { "shm",
  94. { COMMON_IPC_PERMS, "lock", NULL } },
  95. { "ipc",
  96. { COMMON_IPC_PERMS, NULL } },
  97. { "netlink_route_socket",
  98. { COMMON_SOCK_PERMS,
  99. "nlmsg_read", "nlmsg_write", NULL } },
  100. { "netlink_tcpdiag_socket",
  101. { COMMON_SOCK_PERMS,
  102. "nlmsg_read", "nlmsg_write", NULL } },
  103. { "netlink_nflog_socket",
  104. { COMMON_SOCK_PERMS, NULL } },
  105. { "netlink_xfrm_socket",
  106. { COMMON_SOCK_PERMS,
  107. "nlmsg_read", "nlmsg_write", NULL } },
  108. { "netlink_selinux_socket",
  109. { COMMON_SOCK_PERMS, NULL } },
  110. { "netlink_iscsi_socket",
  111. { COMMON_SOCK_PERMS, NULL } },
  112. { "netlink_audit_socket",
  113. { COMMON_SOCK_PERMS,
  114. "nlmsg_read", "nlmsg_write", "nlmsg_relay", "nlmsg_readpriv",
  115. "nlmsg_tty_audit", NULL } },
  116. { "netlink_fib_lookup_socket",
  117. { COMMON_SOCK_PERMS, NULL } },
  118. { "netlink_connector_socket",
  119. { COMMON_SOCK_PERMS, NULL } },
  120. { "netlink_netfilter_socket",
  121. { COMMON_SOCK_PERMS, NULL } },
  122. { "netlink_dnrt_socket",
  123. { COMMON_SOCK_PERMS, NULL } },
  124. { "association",
  125. { "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
  126. { "netlink_kobject_uevent_socket",
  127. { COMMON_SOCK_PERMS, NULL } },
  128. { "netlink_generic_socket",
  129. { COMMON_SOCK_PERMS, NULL } },
  130. { "netlink_scsitransport_socket",
  131. { COMMON_SOCK_PERMS, NULL } },
  132. { "netlink_rdma_socket",
  133. { COMMON_SOCK_PERMS, NULL } },
  134. { "netlink_crypto_socket",
  135. { COMMON_SOCK_PERMS, NULL } },
  136. { "appletalk_socket",
  137. { COMMON_SOCK_PERMS, NULL } },
  138. { "packet",
  139. { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
  140. { "key",
  141. { "view", "read", "write", "search", "link", "setattr", "create",
  142. NULL } },
  143. { "dccp_socket",
  144. { COMMON_SOCK_PERMS,
  145. "node_bind", "name_connect", NULL } },
  146. { "memprotect", { "mmap_zero", NULL } },
  147. { "peer", { "recv", NULL } },
  148. { "capability2",
  149. { "mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend",
  150. NULL } },
  151. { "kernel_service", { "use_as_override", "create_files_as", NULL } },
  152. { "tun_socket",
  153. { COMMON_SOCK_PERMS, NULL } },
  154. { "binder", { "impersonate", "call", "set_context_mgr", "transfer", NULL } },
  155. { NULL }
  156. };