2005-04-16 16:20:36 -06:00
|
|
|
/* This file is automatically generated. Do not edit. */
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__MOUNT, "mount")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__REMOUNT, "remount")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__UNMOUNT, "unmount")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__RELABELFROM, "relabelfrom")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__RELABELTO, "relabelto")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__TRANSITION, "transition")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__ASSOCIATE, "associate")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__QUOTAMOD, "quotamod")
|
|
|
|
S_(SECCLASS_FILESYSTEM, FILESYSTEM__QUOTAGET, "quotaget")
|
|
|
|
S_(SECCLASS_DIR, DIR__ADD_NAME, "add_name")
|
|
|
|
S_(SECCLASS_DIR, DIR__REMOVE_NAME, "remove_name")
|
|
|
|
S_(SECCLASS_DIR, DIR__REPARENT, "reparent")
|
|
|
|
S_(SECCLASS_DIR, DIR__SEARCH, "search")
|
|
|
|
S_(SECCLASS_DIR, DIR__RMDIR, "rmdir")
|
|
|
|
S_(SECCLASS_FILE, FILE__EXECUTE_NO_TRANS, "execute_no_trans")
|
|
|
|
S_(SECCLASS_FILE, FILE__ENTRYPOINT, "entrypoint")
|
|
|
|
S_(SECCLASS_FILE, FILE__EXECMOD, "execmod")
|
|
|
|
S_(SECCLASS_CHR_FILE, CHR_FILE__EXECUTE_NO_TRANS, "execute_no_trans")
|
|
|
|
S_(SECCLASS_CHR_FILE, CHR_FILE__ENTRYPOINT, "entrypoint")
|
|
|
|
S_(SECCLASS_CHR_FILE, CHR_FILE__EXECMOD, "execmod")
|
|
|
|
S_(SECCLASS_FD, FD__USE, "use")
|
|
|
|
S_(SECCLASS_TCP_SOCKET, TCP_SOCKET__CONNECTTO, "connectto")
|
|
|
|
S_(SECCLASS_TCP_SOCKET, TCP_SOCKET__NEWCONN, "newconn")
|
|
|
|
S_(SECCLASS_TCP_SOCKET, TCP_SOCKET__ACCEPTFROM, "acceptfrom")
|
|
|
|
S_(SECCLASS_TCP_SOCKET, TCP_SOCKET__NODE_BIND, "node_bind")
|
|
|
|
S_(SECCLASS_TCP_SOCKET, TCP_SOCKET__NAME_CONNECT, "name_connect")
|
|
|
|
S_(SECCLASS_UDP_SOCKET, UDP_SOCKET__NODE_BIND, "node_bind")
|
|
|
|
S_(SECCLASS_RAWIP_SOCKET, RAWIP_SOCKET__NODE_BIND, "node_bind")
|
|
|
|
S_(SECCLASS_NODE, NODE__TCP_RECV, "tcp_recv")
|
|
|
|
S_(SECCLASS_NODE, NODE__TCP_SEND, "tcp_send")
|
|
|
|
S_(SECCLASS_NODE, NODE__UDP_RECV, "udp_recv")
|
|
|
|
S_(SECCLASS_NODE, NODE__UDP_SEND, "udp_send")
|
|
|
|
S_(SECCLASS_NODE, NODE__RAWIP_RECV, "rawip_recv")
|
|
|
|
S_(SECCLASS_NODE, NODE__RAWIP_SEND, "rawip_send")
|
|
|
|
S_(SECCLASS_NODE, NODE__ENFORCE_DEST, "enforce_dest")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__TCP_RECV, "tcp_recv")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__TCP_SEND, "tcp_send")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__UDP_RECV, "udp_recv")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__UDP_SEND, "udp_send")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__RAWIP_RECV, "rawip_recv")
|
|
|
|
S_(SECCLASS_NETIF, NETIF__RAWIP_SEND, "rawip_send")
|
|
|
|
S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__CONNECTTO, "connectto")
|
|
|
|
S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__NEWCONN, "newconn")
|
|
|
|
S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__ACCEPTFROM, "acceptfrom")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__FORK, "fork")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__TRANSITION, "transition")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGCHLD, "sigchld")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGKILL, "sigkill")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGSTOP, "sigstop")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGNULL, "signull")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGNAL, "signal")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__PTRACE, "ptrace")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__GETSCHED, "getsched")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETSCHED, "setsched")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__GETSESSION, "getsession")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__GETPGID, "getpgid")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETPGID, "setpgid")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__GETCAP, "getcap")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETCAP, "setcap")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SHARE, "share")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETEXEC, "setexec")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETFSCREATE, "setfscreate")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__NOATSECURE, "noatsecure")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SIGINH, "siginh")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETRLIMIT, "setrlimit")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__RLIMITINH, "rlimitinh")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__DYNTRANSITION, "dyntransition")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__SETCURRENT, "setcurrent")
|
|
|
|
S_(SECCLASS_PROCESS, PROCESS__EXECMEM, "execmem")
|
2005-06-25 15:54:34 -06:00
|
|
|
S_(SECCLASS_PROCESS, PROCESS__EXECSTACK, "execstack")
|
2005-06-25 15:54:35 -06:00
|
|
|
S_(SECCLASS_PROCESS, PROCESS__EXECHEAP, "execheap")
|
2005-04-16 16:20:36 -06:00
|
|
|
S_(SECCLASS_MSGQ, MSGQ__ENQUEUE, "enqueue")
|
|
|
|
S_(SECCLASS_MSG, MSG__SEND, "send")
|
|
|
|
S_(SECCLASS_MSG, MSG__RECEIVE, "receive")
|
|
|
|
S_(SECCLASS_SHM, SHM__LOCK, "lock")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__COMPUTE_AV, "compute_av")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__COMPUTE_CREATE, "compute_create")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__COMPUTE_MEMBER, "compute_member")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__CHECK_CONTEXT, "check_context")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__LOAD_POLICY, "load_policy")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__COMPUTE_RELABEL, "compute_relabel")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__COMPUTE_USER, "compute_user")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__SETENFORCE, "setenforce")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__SETBOOL, "setbool")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__SETSECPARAM, "setsecparam")
|
|
|
|
S_(SECCLASS_SECURITY, SECURITY__SETCHECKREQPROT, "setcheckreqprot")
|
|
|
|
S_(SECCLASS_SYSTEM, SYSTEM__IPC_INFO, "ipc_info")
|
|
|
|
S_(SECCLASS_SYSTEM, SYSTEM__SYSLOG_READ, "syslog_read")
|
|
|
|
S_(SECCLASS_SYSTEM, SYSTEM__SYSLOG_MOD, "syslog_mod")
|
|
|
|
S_(SECCLASS_SYSTEM, SYSTEM__SYSLOG_CONSOLE, "syslog_console")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__CHOWN, "chown")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__DAC_OVERRIDE, "dac_override")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__DAC_READ_SEARCH, "dac_read_search")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__FOWNER, "fowner")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__FSETID, "fsetid")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__KILL, "kill")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SETGID, "setgid")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SETUID, "setuid")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SETPCAP, "setpcap")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__LINUX_IMMUTABLE, "linux_immutable")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__NET_BIND_SERVICE, "net_bind_service")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__NET_BROADCAST, "net_broadcast")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__NET_ADMIN, "net_admin")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__NET_RAW, "net_raw")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__IPC_LOCK, "ipc_lock")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__IPC_OWNER, "ipc_owner")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_MODULE, "sys_module")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_RAWIO, "sys_rawio")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_CHROOT, "sys_chroot")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_PTRACE, "sys_ptrace")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_PACCT, "sys_pacct")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_ADMIN, "sys_admin")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_BOOT, "sys_boot")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_NICE, "sys_nice")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_RESOURCE, "sys_resource")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_TIME, "sys_time")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__SYS_TTY_CONFIG, "sys_tty_config")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__MKNOD, "mknod")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__LEASE, "lease")
|
2005-04-16 16:24:13 -06:00
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_WRITE, "audit_write")
|
|
|
|
S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_CONTROL, "audit_control")
|
2005-04-16 16:20:36 -06:00
|
|
|
S_(SECCLASS_PASSWD, PASSWD__PASSWD, "passwd")
|
|
|
|
S_(SECCLASS_PASSWD, PASSWD__CHFN, "chfn")
|
|
|
|
S_(SECCLASS_PASSWD, PASSWD__CHSH, "chsh")
|
|
|
|
S_(SECCLASS_PASSWD, PASSWD__ROOTOK, "rootok")
|
|
|
|
S_(SECCLASS_PASSWD, PASSWD__CRONTAB, "crontab")
|
|
|
|
S_(SECCLASS_DRAWABLE, DRAWABLE__CREATE, "create")
|
|
|
|
S_(SECCLASS_DRAWABLE, DRAWABLE__DESTROY, "destroy")
|
|
|
|
S_(SECCLASS_DRAWABLE, DRAWABLE__DRAW, "draw")
|
|
|
|
S_(SECCLASS_DRAWABLE, DRAWABLE__COPY, "copy")
|
|
|
|
S_(SECCLASS_DRAWABLE, DRAWABLE__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_GC, GC__CREATE, "create")
|
|
|
|
S_(SECCLASS_GC, GC__FREE, "free")
|
|
|
|
S_(SECCLASS_GC, GC__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_GC, GC__SETATTR, "setattr")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__ADDCHILD, "addchild")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CREATE, "create")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__DESTROY, "destroy")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__MAP, "map")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__UNMAP, "unmap")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CHSTACK, "chstack")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CHPROPLIST, "chproplist")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CHPROP, "chprop")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__LISTPROP, "listprop")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__SETATTR, "setattr")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__SETFOCUS, "setfocus")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__MOVE, "move")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CHSELECTION, "chselection")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CHPARENT, "chparent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CTRLLIFE, "ctrllife")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__ENUMERATE, "enumerate")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__TRANSPARENT, "transparent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__MOUSEMOTION, "mousemotion")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__CLIENTCOMEVENT, "clientcomevent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__INPUTEVENT, "inputevent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__DRAWEVENT, "drawevent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__WINDOWCHANGEEVENT, "windowchangeevent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__WINDOWCHANGEREQUEST, "windowchangerequest")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__SERVERCHANGEEVENT, "serverchangeevent")
|
|
|
|
S_(SECCLASS_WINDOW, WINDOW__EXTENSIONEVENT, "extensionevent")
|
|
|
|
S_(SECCLASS_FONT, FONT__LOAD, "load")
|
|
|
|
S_(SECCLASS_FONT, FONT__FREE, "free")
|
|
|
|
S_(SECCLASS_FONT, FONT__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_FONT, FONT__USE, "use")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__CREATE, "create")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__FREE, "free")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__INSTALL, "install")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__UNINSTALL, "uninstall")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__LIST, "list")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__READ, "read")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__STORE, "store")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_COLORMAP, COLORMAP__SETATTR, "setattr")
|
|
|
|
S_(SECCLASS_PROPERTY, PROPERTY__CREATE, "create")
|
|
|
|
S_(SECCLASS_PROPERTY, PROPERTY__FREE, "free")
|
|
|
|
S_(SECCLASS_PROPERTY, PROPERTY__READ, "read")
|
|
|
|
S_(SECCLASS_PROPERTY, PROPERTY__WRITE, "write")
|
|
|
|
S_(SECCLASS_CURSOR, CURSOR__CREATE, "create")
|
|
|
|
S_(SECCLASS_CURSOR, CURSOR__CREATEGLYPH, "createglyph")
|
|
|
|
S_(SECCLASS_CURSOR, CURSOR__FREE, "free")
|
|
|
|
S_(SECCLASS_CURSOR, CURSOR__ASSIGN, "assign")
|
|
|
|
S_(SECCLASS_CURSOR, CURSOR__SETATTR, "setattr")
|
|
|
|
S_(SECCLASS_XCLIENT, XCLIENT__KILL, "kill")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__LOOKUP, "lookup")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__SETATTR, "setattr")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__SETFOCUS, "setfocus")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__WARPPOINTER, "warppointer")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__ACTIVEGRAB, "activegrab")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__PASSIVEGRAB, "passivegrab")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__UNGRAB, "ungrab")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__BELL, "bell")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__MOUSEMOTION, "mousemotion")
|
|
|
|
S_(SECCLASS_XINPUT, XINPUT__RELABELINPUT, "relabelinput")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__SCREENSAVER, "screensaver")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__GETHOSTLIST, "gethostlist")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__SETHOSTLIST, "sethostlist")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__GETFONTPATH, "getfontpath")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__SETFONTPATH, "setfontpath")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__GETATTR, "getattr")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__GRAB, "grab")
|
|
|
|
S_(SECCLASS_XSERVER, XSERVER__UNGRAB, "ungrab")
|
|
|
|
S_(SECCLASS_XEXTENSION, XEXTENSION__QUERY, "query")
|
|
|
|
S_(SECCLASS_XEXTENSION, XEXTENSION__USE, "use")
|
|
|
|
S_(SECCLASS_PAX, PAX__PAGEEXEC, "pageexec")
|
|
|
|
S_(SECCLASS_PAX, PAX__EMUTRAMP, "emutramp")
|
|
|
|
S_(SECCLASS_PAX, PAX__MPROTECT, "mprotect")
|
|
|
|
S_(SECCLASS_PAX, PAX__RANDMMAP, "randmmap")
|
|
|
|
S_(SECCLASS_PAX, PAX__RANDEXEC, "randexec")
|
|
|
|
S_(SECCLASS_PAX, PAX__SEGMEXEC, "segmexec")
|
|
|
|
S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
|
|
|
S_(SECCLASS_NETLINK_FIREWALL_SOCKET, NETLINK_FIREWALL_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_FIREWALL_SOCKET, NETLINK_FIREWALL_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
|
|
|
S_(SECCLASS_NETLINK_TCPDIAG_SOCKET, NETLINK_TCPDIAG_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_TCPDIAG_SOCKET, NETLINK_TCPDIAG_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
|
|
|
S_(SECCLASS_NETLINK_XFRM_SOCKET, NETLINK_XFRM_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_XFRM_SOCKET, NETLINK_XFRM_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
|
|
|
S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
[PATCH] SELinux: add finer grained permissions to Netlink audit processing
This patch provides finer grained permissions for the audit family of
Netlink sockets under SELinux.
1. We need a way to differentiate between privileged and unprivileged
reads of kernel data maintained by the audit subsystem. The AUDIT_GET
operation is unprivileged: it returns the current status of the audit
subsystem (e.g. whether it's enabled etc.). The AUDIT_LIST operation
however returns a list of the current audit ruleset, which is considered
privileged by the audit folk. To deal with this, a new SELinux
permission has been implemented and applied to the operation:
nlmsg_readpriv, which can be allocated to appropriately privileged
domains. Unprivileged domains would only be allocated nlmsg_read.
2. There is a requirement for certain domains to generate audit events
from userspace. These events need to be collected by the kernel,
collated and transmitted sequentially back to the audit daemon. An
example is user level login, an auditable event under CAPP, where
login-related domains generate AUDIT_USER messages via PAM which are
relayed back to auditd via the kernel. To prevent handing out
nlmsg_write permissions to such domains, a new permission has been
added, nlmsg_relay, which is intended for this type of purpose: data is
passed via the kernel back to userspace but no privileged information is
written to the kernel.
Also, AUDIT_LOGIN messages are now valid only for kernel->user messaging,
so this value has been removed from the SELinux nlmsgtab (which is only
used to check user->kernel messages).
Signed-off-by: James Morris <jmorris@redhat.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-05-01 09:58:40 -06:00
|
|
|
S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_RELAY, "nlmsg_relay")
|
|
|
|
S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_READPRIV, "nlmsg_readpriv")
|
2005-04-16 16:20:36 -06:00
|
|
|
S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_READ, "nlmsg_read")
|
|
|
|
S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_WRITE, "nlmsg_write")
|
|
|
|
S_(SECCLASS_DBUS, DBUS__ACQUIRE_SVC, "acquire_svc")
|
|
|
|
S_(SECCLASS_DBUS, DBUS__SEND_MSG, "send_msg")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__GETPWD, "getpwd")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__GETGRP, "getgrp")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__GETHOST, "gethost")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__GETSTAT, "getstat")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__ADMIN, "admin")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__SHMEMPWD, "shmempwd")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__SHMEMGRP, "shmemgrp")
|
|
|
|
S_(SECCLASS_NSCD, NSCD__SHMEMHOST, "shmemhost")
|
2005-04-16 16:24:13 -06:00
|
|
|
S_(SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, "sendto")
|
|
|
|
S_(SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, "recvfrom")
|
2006-01-06 14:22:39 -07:00
|
|
|
S_(SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, "setcontext")
|
2006-06-09 01:27:28 -06:00
|
|
|
S_(SECCLASS_PACKET, PACKET__SEND, "send")
|
|
|
|
S_(SECCLASS_PACKET, PACKET__RECV, "recv")
|
|
|
|
S_(SECCLASS_PACKET, PACKET__RELABELTO, "relabelto")
|