blob: b8c53723e09bfe7d6c211bc05df35793ae9ac8b2 [file] [log] [blame]
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -04001#define COMMON_FILE_SOCK_PERMS "ioctl", "read", "write", "create", \
2 "getattr", "setattr", "lock", "relabelfrom", "relabelto", "append"
3
4#define COMMON_FILE_PERMS COMMON_FILE_SOCK_PERMS, "unlink", "link", \
Eric Paris49b7b8d2010-07-23 11:44:09 -04005 "rename", "execute", "swapon", "quotaon", "mounton", "audit_access", \
Eric Parisb4244852010-07-23 11:44:15 -04006 "open", "execmod"
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -04007
8#define COMMON_SOCK_PERMS COMMON_FILE_SOCK_PERMS, "bind", "connect", \
9 "listen", "accept", "getopt", "setopt", "shutdown", "recvfrom", \
10 "sendto", "recv_msg", "send_msg", "name_bind"
11
12#define COMMON_IPC_PERMS "create", "destroy", "getattr", "setattr", "read", \
13 "write", "associate", "unix_read", "unix_write"
14
Harry Ciao4bc6c2d2011-03-02 13:46:08 +080015/*
16 * Note: The name for any socket class should be suffixed by "socket",
17 * and doesn't contain more than one substr of "socket".
18 */
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040019struct security_class_mapping secclass_map[] = {
20 { "security",
21 { "compute_av", "compute_create", "compute_member",
22 "check_context", "load_policy", "compute_relabel",
23 "compute_user", "setenforce", "setbool", "setsecparam",
Eric Pariscee74f42010-10-13 17:50:25 -040024 "setcheckreqprot", "read_policy", NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040025 { "process",
26 { "fork", "transition", "sigchld", "sigkill",
27 "sigstop", "signull", "signal", "ptrace", "getsched", "setsched",
28 "getsession", "getpgid", "setpgid", "getcap", "setcap", "share",
29 "getattr", "setexec", "setfscreate", "noatsecure", "siginh",
30 "setrlimit", "rlimitinh", "dyntransition", "setcurrent",
31 "execmem", "execstack", "execheap", "setkeycreate",
32 "setsockcreate", NULL } },
33 { "system",
34 { "ipc_info", "syslog_read", "syslog_mod",
35 "syslog_console", "module_request", NULL } },
36 { "capability",
37 { "chown", "dac_override", "dac_read_search",
38 "fowner", "fsetid", "kill", "setgid", "setuid", "setpcap",
39 "linux_immutable", "net_bind_service", "net_broadcast",
40 "net_admin", "net_raw", "ipc_lock", "ipc_owner", "sys_module",
41 "sys_rawio", "sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin",
42 "sys_boot", "sys_nice", "sys_resource", "sys_time",
43 "sys_tty_config", "mknod", "lease", "audit_write",
44 "audit_control", "setfcap", NULL } },
45 { "filesystem",
46 { "mount", "remount", "unmount", "getattr",
47 "relabelfrom", "relabelto", "transition", "associate", "quotamod",
48 "quotaget", NULL } },
49 { "file",
50 { COMMON_FILE_PERMS,
Eric Parisb4244852010-07-23 11:44:15 -040051 "execute_no_trans", "entrypoint", NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040052 { "dir",
53 { COMMON_FILE_PERMS, "add_name", "remove_name",
Eric Paris49b7b8d2010-07-23 11:44:09 -040054 "reparent", "search", "rmdir", NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040055 { "fd", { "use", NULL } },
56 { "lnk_file",
57 { COMMON_FILE_PERMS, NULL } },
58 { "chr_file",
Eric Parisb4244852010-07-23 11:44:15 -040059 { COMMON_FILE_PERMS, NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040060 { "blk_file",
Eric Paris49b7b8d2010-07-23 11:44:09 -040061 { COMMON_FILE_PERMS, NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040062 { "sock_file",
Eric Paris49b7b8d2010-07-23 11:44:09 -040063 { COMMON_FILE_PERMS, NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040064 { "fifo_file",
Eric Paris49b7b8d2010-07-23 11:44:09 -040065 { COMMON_FILE_PERMS, NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -040066 { "socket",
67 { COMMON_SOCK_PERMS, NULL } },
68 { "tcp_socket",
69 { COMMON_SOCK_PERMS,
70 "connectto", "newconn", "acceptfrom", "node_bind", "name_connect",
71 NULL } },
72 { "udp_socket",
73 { COMMON_SOCK_PERMS,
74 "node_bind", NULL } },
75 { "rawip_socket",
76 { COMMON_SOCK_PERMS,
77 "node_bind", NULL } },
78 { "node",
79 { "tcp_recv", "tcp_send", "udp_recv", "udp_send",
80 "rawip_recv", "rawip_send", "enforce_dest",
81 "dccp_recv", "dccp_send", "recvfrom", "sendto", NULL } },
82 { "netif",
83 { "tcp_recv", "tcp_send", "udp_recv", "udp_send",
84 "rawip_recv", "rawip_send", "dccp_recv", "dccp_send",
85 "ingress", "egress", NULL } },
86 { "netlink_socket",
87 { COMMON_SOCK_PERMS, NULL } },
88 { "packet_socket",
89 { COMMON_SOCK_PERMS, NULL } },
90 { "key_socket",
91 { COMMON_SOCK_PERMS, NULL } },
92 { "unix_stream_socket",
93 { COMMON_SOCK_PERMS, "connectto", "newconn", "acceptfrom", NULL
94 } },
95 { "unix_dgram_socket",
96 { COMMON_SOCK_PERMS, NULL
97 } },
98 { "sem",
99 { COMMON_IPC_PERMS, NULL } },
100 { "msg", { "send", "receive", NULL } },
101 { "msgq",
102 { COMMON_IPC_PERMS, "enqueue", NULL } },
103 { "shm",
104 { COMMON_IPC_PERMS, "lock", NULL } },
105 { "ipc",
106 { COMMON_IPC_PERMS, NULL } },
107 { "netlink_route_socket",
108 { COMMON_SOCK_PERMS,
109 "nlmsg_read", "nlmsg_write", NULL } },
110 { "netlink_firewall_socket",
111 { COMMON_SOCK_PERMS,
112 "nlmsg_read", "nlmsg_write", NULL } },
113 { "netlink_tcpdiag_socket",
114 { COMMON_SOCK_PERMS,
115 "nlmsg_read", "nlmsg_write", NULL } },
116 { "netlink_nflog_socket",
117 { COMMON_SOCK_PERMS, NULL } },
118 { "netlink_xfrm_socket",
119 { COMMON_SOCK_PERMS,
120 "nlmsg_read", "nlmsg_write", NULL } },
121 { "netlink_selinux_socket",
122 { COMMON_SOCK_PERMS, NULL } },
123 { "netlink_audit_socket",
124 { COMMON_SOCK_PERMS,
125 "nlmsg_read", "nlmsg_write", "nlmsg_relay", "nlmsg_readpriv",
126 "nlmsg_tty_audit", NULL } },
127 { "netlink_ip6fw_socket",
128 { COMMON_SOCK_PERMS,
129 "nlmsg_read", "nlmsg_write", NULL } },
130 { "netlink_dnrt_socket",
131 { COMMON_SOCK_PERMS, NULL } },
132 { "association",
133 { "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
134 { "netlink_kobject_uevent_socket",
135 { COMMON_SOCK_PERMS, NULL } },
136 { "appletalk_socket",
137 { COMMON_SOCK_PERMS, NULL } },
138 { "packet",
Eric Paris47ac19e2011-02-25 15:39:20 -0500139 { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -0400140 { "key",
141 { "view", "read", "write", "search", "link", "setattr", "create",
142 NULL } },
143 { "dccp_socket",
144 { COMMON_SOCK_PERMS,
145 "node_bind", "name_connect", NULL } },
146 { "memprotect", { "mmap_zero", NULL } },
147 { "peer", { "recv", NULL } },
Serge E. Hallynce6ada32010-11-25 17:11:32 +0000148 { "capability2", { "mac_override", "mac_admin", "syslog", NULL } },
Stephen Smalleyc6d3aaa2009-09-30 13:37:50 -0400149 { "kernel_service", { "use_as_override", "create_files_as", NULL } },
150 { "tun_socket",
151 { COMMON_SOCK_PERMS, NULL } },
152 { NULL }
153 };