1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
| #define COMMON_FILE_SOCK_PERMS "ioctl", "read", "write", "create", \
| "getattr", "setattr", "lock", "relabelfrom", "relabelto", "append"
|
| #define COMMON_FILE_PERMS COMMON_FILE_SOCK_PERMS, "unlink", "link", \
| "rename", "execute", "quotaon", "mounton", "audit_access", \
| "open", "execmod"
|
| #define COMMON_SOCK_PERMS COMMON_FILE_SOCK_PERMS, "bind", "connect", \
| "listen", "accept", "getopt", "setopt", "shutdown", "recvfrom", \
| "sendto", "name_bind"
|
| #define COMMON_IPC_PERMS "create", "destroy", "getattr", "setattr", "read", \
| "write", "associate", "unix_read", "unix_write"
|
| #define COMMON_CAP_PERMS "chown", "dac_override", "dac_read_search", \
| "fowner", "fsetid", "kill", "setgid", "setuid", "setpcap", \
| "linux_immutable", "net_bind_service", "net_broadcast", \
| "net_admin", "net_raw", "ipc_lock", "ipc_owner", "sys_module", \
| "sys_rawio", "sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \
| "sys_boot", "sys_nice", "sys_resource", "sys_time", \
| "sys_tty_config", "mknod", "lease", "audit_write", \
| "audit_control", "setfcap"
|
| #define COMMON_CAP2_PERMS "mac_override", "mac_admin", "syslog", \
| "wake_alarm", "block_suspend", "audit_read"
|
| /*
| * Note: The name for any socket class should be suffixed by "socket",
| * and doesn't contain more than one substr of "socket".
| */
| struct security_class_mapping secclass_map[] = {
| { "security",
| { "compute_av", "compute_create", "compute_member",
| "check_context", "load_policy", "compute_relabel",
| "compute_user", "setenforce", "setbool", "setsecparam",
| "setcheckreqprot", "read_policy", "validate_trans", NULL } },
| { "process",
| { "fork", "transition", "sigchld", "sigkill",
| "sigstop", "signull", "signal", "ptrace", "getsched", "setsched",
| "getsession", "getpgid", "setpgid", "getcap", "setcap", "share",
| "getattr", "setexec", "setfscreate", "noatsecure", "siginh",
| "setrlimit", "rlimitinh", "dyntransition", "setcurrent",
| "execmem", "execstack", "execheap", "setkeycreate",
| "setsockcreate", NULL } },
| { "system",
| { "ipc_info", "syslog_read", "syslog_mod",
| "syslog_console", "module_request", "module_load", NULL } },
| { "capability",
| { COMMON_CAP_PERMS, NULL } },
| { "filesystem",
| { "mount", "remount", "unmount", "getattr",
| "relabelfrom", "relabelto", "associate", "quotamod",
| "quotaget", NULL } },
| { "file",
| { COMMON_FILE_PERMS,
| "execute_no_trans", "entrypoint", NULL } },
| { "dir",
| { COMMON_FILE_PERMS, "add_name", "remove_name",
| "reparent", "search", "rmdir", NULL } },
| { "fd", { "use", NULL } },
| { "lnk_file",
| { COMMON_FILE_PERMS, NULL } },
| { "chr_file",
| { COMMON_FILE_PERMS, NULL } },
| { "blk_file",
| { COMMON_FILE_PERMS, NULL } },
| { "sock_file",
| { COMMON_FILE_PERMS, NULL } },
| { "fifo_file",
| { COMMON_FILE_PERMS, NULL } },
| { "socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "tcp_socket",
| { COMMON_SOCK_PERMS,
| "node_bind", "name_connect",
| NULL } },
| { "udp_socket",
| { COMMON_SOCK_PERMS,
| "node_bind", NULL } },
| { "rawip_socket",
| { COMMON_SOCK_PERMS,
| "node_bind", NULL } },
| { "node",
| { "recvfrom", "sendto", NULL } },
| { "netif",
| { "ingress", "egress", NULL } },
| { "netlink_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "packet_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "key_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "unix_stream_socket",
| { COMMON_SOCK_PERMS, "connectto", NULL } },
| { "unix_dgram_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "sem",
| { COMMON_IPC_PERMS, NULL } },
| { "msg", { "send", "receive", NULL } },
| { "msgq",
| { COMMON_IPC_PERMS, "enqueue", NULL } },
| { "shm",
| { COMMON_IPC_PERMS, "lock", NULL } },
| { "ipc",
| { COMMON_IPC_PERMS, NULL } },
| { "netlink_route_socket",
| { COMMON_SOCK_PERMS,
| "nlmsg_read", "nlmsg_write", NULL } },
| { "netlink_tcpdiag_socket",
| { COMMON_SOCK_PERMS,
| "nlmsg_read", "nlmsg_write", NULL } },
| { "netlink_nflog_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_xfrm_socket",
| { COMMON_SOCK_PERMS,
| "nlmsg_read", "nlmsg_write", NULL } },
| { "netlink_selinux_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_iscsi_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_audit_socket",
| { COMMON_SOCK_PERMS,
| "nlmsg_read", "nlmsg_write", "nlmsg_relay", "nlmsg_readpriv",
| "nlmsg_tty_audit", NULL } },
| { "netlink_fib_lookup_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_connector_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_netfilter_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_dnrt_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "association",
| { "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
| { "netlink_kobject_uevent_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_generic_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_scsitransport_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_rdma_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "netlink_crypto_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "appletalk_socket",
| { COMMON_SOCK_PERMS, NULL } },
| { "packet",
| { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
| { "key",
| { "view", "read", "write", "search", "link", "setattr", "create",
| NULL } },
| { "dccp_socket",
| { COMMON_SOCK_PERMS,
| "node_bind", "name_connect", NULL } },
| { "memprotect", { "mmap_zero", NULL } },
| { "peer", { "recv", NULL } },
| { "capability2",
| { COMMON_CAP2_PERMS, NULL } },
| { "kernel_service", { "use_as_override", "create_files_as", NULL } },
| { "tun_socket",
| { COMMON_SOCK_PERMS, "attach_queue", NULL } },
| { "binder", { "impersonate", "call", "set_context_mgr", "transfer",
| NULL } },
| { "cap_userns",
| { COMMON_CAP_PERMS, NULL } },
| { "cap2_userns",
| { COMMON_CAP2_PERMS, NULL } },
| { "bpf",
| {"map_create", "map_read", "map_write", "prog_load", "prog_run"} },
| { NULL }
| };
|
|