mirror of
https://github.com/torvalds/linux.git
synced 2025-04-06 00:16:18 +00:00

-----BEGIN PGP SIGNATURE----- iQJIBAABCAAyFiEES0KozwfymdVUl37v6iDy2pc3iXMFAmfgWewUHHBhdWxAcGF1 bC1tb29yZS5jb20ACgkQ6iDy2pc3iXNTXA/9F7Fo5ov6mP15jChSSZWuVPBdi1gD y8Q8sCbu/KeCRO1Qb4QTv8ZCVGkP+EDK47IIvLXj27Aa19y1m3E4r1mddCSBQ3eu jSqR/kOXf3j8AWPP2m4qYK/EJvNqNd/V67PkktFal+95crcmz3IDV68qWuNafdSc r8VuprrEw+NSuKhPh4e2tM0hvOmAzePuvI6gGPb9z7Fj807/qfSOteAkvYpJ1y+d vZzHLeu3FRExxu4wKZZymGpT2+5Xl/MrjRJUtKuJdxXW8FphPUr5cfHDIP0Ae97w J70RGr0Oy02dQnCtAMkOGi7lpS1S1r0Qnhr+eloQQvG7J2eRRPZqGrmaU69qopAo JY/Xc7/r29pGwGnXtiHKZ4ej65mTIN9bmPsHIjjr01hiB/gEUnX2vdVSwVYLxOsF dzCnXb1VBc4mSIJ1Sjst0a6CRNPVA3U/bCfCbvfeyhn6A0XHmJI1PDRbxEXavnki sQIAtLv5M0Pyzyjij+6qHfd8TsUgiH/rtR6st31SnL5iqIWkE9wPMFldg064vHgS 8dECnF7G9ZU/OErJjTQVshJE3fDEJvbQj8YIq7u1gQOZV02G7U3q4R3Aoj3GoSKJ dMjoeG18+yuIevW/OHWtbjp4QMpp2R4xuXaJJlfsB2OaOX6jSS4S5KpYO3eKQ/Jd kNQxuG8VD3tK8jc= =QD7q -----END PGP SIGNATURE----- Merge tag 'selinux-pr-20250323' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux Pull selinux updates from Paul Moore: - Add additional SELinux access controls for kernel file reads/loads The SELinux kernel file read/load access controls were never updated beyond the initial kernel module support, this pull request adds support for firmware, kexec, policies, and x.509 certificates. - Add support for wildcards in network interface names There are a number of userspace tools which auto-generate network interface names using some pattern of <XXXX>-<NN> where <XXXX> is a fixed string, e.g. "podman", and <NN> is a increasing counter. Supporting wildcards in the SELinux policy for network interfaces simplifies the policy associted with these interfaces. - Fix a potential problem in the kernel read file SELinux code SELinux should always check the file label in the security_kernel_read_file() LSM hook, regardless of if the file is being read in chunks. Unfortunately, the existing code only considered the file label on the first chunk; this pull request fixes this problem. There is more detail in the individual commit, but thankfully the existing code didn't expose a bug due to multi-stage reads only taking place in one driver, and that driver loading a file type that isn't targeted by the SELinux policy. - Fix the subshell error handling in the example policy loader Minor fix to SELinux example policy loader in scripts/selinux due to an undesired interaction with subshells and errexit. * tag 'selinux-pr-20250323' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux: selinux: get netif_wildcard policycap from policy instead of cache selinux: support wildcard network interface names selinux: Chain up tool resolving errors in install_policy.sh selinux: add permission checks for loading other kinds of kernel files selinux: always check the file label in selinux_kernel_read_file() selinux: fix spelling error
194 lines
8.7 KiB
C
194 lines
8.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
|
|
#define COMMON_FILE_SOCK_PERMS \
|
|
"ioctl", "read", "write", "create", "getattr", "setattr", "lock", \
|
|
"relabelfrom", "relabelto", "append", "map"
|
|
|
|
#define COMMON_FILE_PERMS \
|
|
COMMON_FILE_SOCK_PERMS, "unlink", "link", "rename", "execute", \
|
|
"quotaon", "mounton", "audit_access", "open", "execmod", \
|
|
"watch", "watch_mount", "watch_sb", "watch_with_perm", \
|
|
"watch_reads", "watch_mountns"
|
|
|
|
#define COMMON_SOCK_PERMS \
|
|
COMMON_FILE_SOCK_PERMS, "bind", "connect", "listen", "accept", \
|
|
"getopt", "setopt", "shutdown", "recvfrom", "sendto", \
|
|
"name_bind"
|
|
|
|
#define COMMON_IPC_PERMS \
|
|
"create", "destroy", "getattr", "setattr", "read", "write", \
|
|
"associate", "unix_read", "unix_write"
|
|
|
|
#define COMMON_CAP_PERMS \
|
|
"chown", "dac_override", "dac_read_search", "fowner", "fsetid", \
|
|
"kill", "setgid", "setuid", "setpcap", "linux_immutable", \
|
|
"net_bind_service", "net_broadcast", "net_admin", "net_raw", \
|
|
"ipc_lock", "ipc_owner", "sys_module", "sys_rawio", \
|
|
"sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \
|
|
"sys_boot", "sys_nice", "sys_resource", "sys_time", \
|
|
"sys_tty_config", "mknod", "lease", "audit_write", \
|
|
"audit_control", "setfcap"
|
|
|
|
#define COMMON_CAP2_PERMS \
|
|
"mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend", \
|
|
"audit_read", "perfmon", "bpf", "checkpoint_restore"
|
|
|
|
#ifdef __KERNEL__ /* avoid this check when building host programs */
|
|
#include <linux/capability.h>
|
|
|
|
#if CAP_LAST_CAP > CAP_CHECKPOINT_RESTORE
|
|
#error New capability defined, please update COMMON_CAP2_PERMS.
|
|
#endif
|
|
#endif
|
|
|
|
/*
|
|
* Note: The name for any socket class should be suffixed by "socket",
|
|
* and doesn't contain more than one substr of "socket".
|
|
*/
|
|
const struct security_class_mapping secclass_map[] = {
|
|
{ "security",
|
|
{ "compute_av", "compute_create", "compute_member", "check_context",
|
|
"load_policy", "compute_relabel", "compute_user", "setenforce",
|
|
"setbool", "setsecparam", "setcheckreqprot", "read_policy",
|
|
"validate_trans", NULL } },
|
|
{ "process",
|
|
{ "fork", "transition", "sigchld", "sigkill",
|
|
"sigstop", "signull", "signal", "ptrace",
|
|
"getsched", "setsched", "getsession", "getpgid",
|
|
"setpgid", "getcap", "setcap", "share",
|
|
"getattr", "setexec", "setfscreate", "noatsecure",
|
|
"siginh", "setrlimit", "rlimitinh", "dyntransition",
|
|
"setcurrent", "execmem", "execstack", "execheap",
|
|
"setkeycreate", "setsockcreate", "getrlimit", NULL } },
|
|
{ "process2", { "nnp_transition", "nosuid_transition", NULL } },
|
|
{ "system",
|
|
{ "ipc_info", "syslog_read", "syslog_mod", "syslog_console",
|
|
"module_request", "module_load", "firmware_load",
|
|
"kexec_image_load", "kexec_initramfs_load", "policy_load",
|
|
"x509_certificate_load", NULL } },
|
|
{ "capability", { COMMON_CAP_PERMS, NULL } },
|
|
{ "filesystem",
|
|
{ "mount", "remount", "unmount", "getattr", "relabelfrom",
|
|
"relabelto", "associate", "quotamod", "quotaget", "watch", NULL } },
|
|
{ "file",
|
|
{ COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } },
|
|
{ "dir",
|
|
{ COMMON_FILE_PERMS, "add_name", "remove_name", "reparent", "search",
|
|
"rmdir", NULL } },
|
|
{ "fd", { "use", NULL } },
|
|
{ "lnk_file", { COMMON_FILE_PERMS, NULL } },
|
|
{ "chr_file", { COMMON_FILE_PERMS, NULL } },
|
|
{ "blk_file", { COMMON_FILE_PERMS, NULL } },
|
|
{ "sock_file", { COMMON_FILE_PERMS, NULL } },
|
|
{ "fifo_file", { COMMON_FILE_PERMS, NULL } },
|
|
{ "socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "tcp_socket",
|
|
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
|
|
{ "udp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
|
|
{ "rawip_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
|
|
{ "node", { "recvfrom", "sendto", NULL } },
|
|
{ "netif", { "ingress", "egress", NULL } },
|
|
{ "netlink_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "packet_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "key_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "unix_stream_socket", { COMMON_SOCK_PERMS, "connectto", NULL } },
|
|
{ "unix_dgram_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "sem", { COMMON_IPC_PERMS, NULL } },
|
|
{ "msg", { "send", "receive", NULL } },
|
|
{ "msgq", { COMMON_IPC_PERMS, "enqueue", NULL } },
|
|
{ "shm", { COMMON_IPC_PERMS, "lock", NULL } },
|
|
{ "ipc", { COMMON_IPC_PERMS, NULL } },
|
|
{ "netlink_route_socket",
|
|
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
|
|
{ "netlink_tcpdiag_socket",
|
|
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
|
|
{ "netlink_nflog_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_xfrm_socket",
|
|
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
|
|
{ "netlink_selinux_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_iscsi_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_audit_socket",
|
|
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg_relay",
|
|
"nlmsg_readpriv", "nlmsg_tty_audit", "nlmsg", NULL } },
|
|
{ "netlink_fib_lookup_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_connector_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_netfilter_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_dnrt_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "association",
|
|
{ "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
|
|
{ "netlink_kobject_uevent_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_generic_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_scsitransport_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_rdma_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netlink_crypto_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "appletalk_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "packet",
|
|
{ "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
|
|
{ "key",
|
|
{ "view", "read", "write", "search", "link", "setattr", "create",
|
|
NULL } },
|
|
{ "dccp_socket",
|
|
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
|
|
{ "memprotect", { "mmap_zero", NULL } },
|
|
{ "peer", { "recv", NULL } },
|
|
{ "capability2", { COMMON_CAP2_PERMS, NULL } },
|
|
{ "kernel_service", { "use_as_override", "create_files_as", NULL } },
|
|
{ "tun_socket", { COMMON_SOCK_PERMS, "attach_queue", NULL } },
|
|
{ "binder",
|
|
{ "impersonate", "call", "set_context_mgr", "transfer", NULL } },
|
|
{ "cap_userns", { COMMON_CAP_PERMS, NULL } },
|
|
{ "cap2_userns", { COMMON_CAP2_PERMS, NULL } },
|
|
{ "sctp_socket",
|
|
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", "association",
|
|
NULL } },
|
|
{ "icmp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
|
|
{ "ax25_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "ipx_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "netrom_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "atmpvc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "x25_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "rose_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "decnet_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "atmsvc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "rds_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "irda_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "pppox_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "llc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "can_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "tipc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "bluetooth_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "iucv_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "rxrpc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "isdn_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "phonet_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "ieee802154_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "caif_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "alg_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "nfc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "vsock_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "kcm_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "qipcrtr_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "smc_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "infiniband_pkey", { "access", NULL } },
|
|
{ "infiniband_endport", { "manage_subnet", NULL } },
|
|
{ "bpf",
|
|
{ "map_create", "map_read", "map_write", "prog_load", "prog_run",
|
|
NULL } },
|
|
{ "xdp_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "mctp_socket", { COMMON_SOCK_PERMS, NULL } },
|
|
{ "perf_event",
|
|
{ "open", "cpu", "kernel", "tracepoint", "read", "write", NULL } },
|
|
{ "anon_inode", { COMMON_FILE_PERMS, NULL } },
|
|
{ "io_uring", { "override_creds", "sqpoll", "cmd", "allowed", NULL } },
|
|
{ "user_namespace", { "create", NULL } },
|
|
/* last one */ { NULL, {} }
|
|
};
|
|
|
|
#ifdef __KERNEL__ /* avoid this check when building host programs */
|
|
#include <linux/socket.h>
|
|
|
|
#if PF_MAX > 46
|
|
#error New address family defined, please update secclass_map.
|
|
#endif
|
|
#endif
|