selinux/lib.rs
1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5pub mod permission_check;
6pub mod policy;
7pub mod security_server;
8
9pub use security_server::SecurityServer;
10
11mod access_vector_cache;
12mod exceptions_config;
13mod fifo_cache;
14mod sid_table;
15mod sync;
16
17use policy::arrays::FsUseType;
18
19use std::num::NonZeroU32;
20
21/// The Security ID (SID) used internally to refer to a security context.
22#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
23pub struct SecurityId(NonZeroU32);
24
25impl SecurityId {
26 /// Returns a `SecurityId` encoding the specified initial Security Context.
27 /// These are used when labeling kernel resources created before policy
28 /// load, allowing the policy to determine the Security Context to use.
29 pub fn initial(initial_sid: InitialSid) -> Self {
30 Self(NonZeroU32::new(initial_sid as u32).unwrap())
31 }
32}
33
34/// A class that may appear in SELinux policy or an access vector cache query.
35#[derive(Clone, Debug, Hash, PartialEq, Eq)]
36pub enum AbstractObjectClass {
37 Unspecified,
38 /// A well-known class used in the SELinux system, such as `process` or `file`.
39 System(ObjectClass),
40 /// A custom class that only has meaning in policies that define class with the given string
41 /// name.
42 Custom(String),
43}
44
45impl Default for AbstractObjectClass {
46 fn default() -> Self {
47 Self::Unspecified
48 }
49}
50
51/// Declares an `enum` and implements an `all_variants()` API for it.
52macro_rules! enumerable_enum {
53 ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
54 $($(#[$variant_meta:meta])* $variant:ident,)*
55 }) => {
56 $(#[$meta])*
57 pub enum $name {
58 $($(#[$variant_meta])* $variant,)*
59 $(Common($common_name),)?
60 }
61
62 impl $name {
63 pub fn all_variants() -> Vec<Self> {
64 let all_variants = vec![$($name::$variant),*];
65 $(let mut all_variants = all_variants; all_variants.extend($common_name::all_variants().into_iter().map(Self::Common));)?
66 all_variants
67 }
68 }
69 }
70}
71
72enumerable_enum! {
73 /// A well-known class in SELinux policy that has a particular meaning in policy enforcement
74 /// hooks.
75 #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)]
76 ObjectClass {
77 // keep-sorted start
78 /// The SELinux "anon_inode" object class.
79 AnonFsNode,
80 /// The SELinux "blk_file" object class.
81 Block,
82 /// The SELinux "bpf" object class.
83 Bpf,
84 /// The SELinux "capability" object class.
85 Capability,
86 /// The SELinux "capability2" object class.
87 Capability2,
88 /// The SELinux "chr_file" object class.
89 Character,
90 /// The SELinux "dir" object class.
91 Dir,
92 /// The SELinux "fd" object class.
93 Fd,
94 /// The SELinux "fifo_file" object class.
95 Fifo,
96 /// The SELinux "file" object class.
97 File,
98 /// The SELinux "filesystem" object class.
99 FileSystem,
100 /// The SELinux "key_socket" object class.
101 KeySocket,
102 /// The SELinux "lnk_file" object class.
103 Link,
104 /// The SELinux "netlink_audit_socket" object class.
105 NetlinkAuditSocket,
106 /// The SELinux "netlink_connector_socket" object class.
107 NetlinkConnectorSocket,
108 /// The SELinux "netlink_crypto_socket" object class.
109 NetlinkCryptoSocket,
110 /// The SELinux "netlink_dnrt_socket" object class.
111 NetlinkDnrtSocket,
112 /// The SELinux "netlink_fib_lookup_socket" object class.
113 NetlinkFibLookupSocket,
114 /// The SELinux "netlink_firewall_socket" object class.
115 NetlinkFirewallSocket,
116 /// The SELinux "netlink_generic_socket" object class.
117 NetlinkGenericSocket,
118 /// The SELinux "netlink_ip6fw_socket" object class.
119 NetlinkIp6FwSocket,
120 /// The SELinux "netlink_iscsi_socket" object class.
121 NetlinkIscsiSocket,
122 /// The SELinux "netlink_kobject_uevent_socket" object class.
123 NetlinkKobjectUeventSocket,
124 /// The SELinux "netlink_netfilter_socket" object class.
125 NetlinkNetfilterSocket,
126 /// The SELinux "netlink_nflog_socket" object class.
127 NetlinkNflogSocket,
128 /// The SELinux "netlink_rdma_socket" object class.
129 NetlinkRdmaSocket,
130 /// The SELinux "netlink_route_socket" object class.
131 NetlinkRouteSocket,
132 /// The SELinux "netlink_scsitransport_socket" object class.
133 NetlinkScsitransportSocket,
134 /// The SELinux "netlink_selinux_socket" object class.
135 NetlinkSelinuxSocket,
136 /// The SELinux "netlink_socket" object class.
137 NetlinkSocket,
138 /// The SELinux "netlink_tcpdiag_socket" object class.
139 NetlinkTcpDiagSocket,
140 /// The SELinux "netlink_xfrm_socket" object class.
141 NetlinkXfrmSocket,
142 /// The SELinux "packet_socket" object class.
143 PacketSocket,
144 /// The SELinux "process" object class.
145 Process,
146 /// The SELinux "rawip_socket" object class.
147 RawIpSocket,
148 /// The SELinux "security" object class.
149 Security,
150 /// The SELinux "sock_file" object class.
151 SockFile,
152 /// The SELinux "socket" object class.
153 Socket,
154 /// The SELinux "tcp_socket" object class.
155 TcpSocket,
156 /// The SELinux "udp_socket" object class.
157 UdpSocket,
158 /// The SELinux "unix_dgram_socket" object class.
159 UnixDgramSocket,
160 /// The SELinux "unix_stream_socket" object class.
161 UnixStreamSocket,
162 /// The SELinux "vsock_socket" object class.
163 VSockSocket,
164 // keep-sorted end
165 }
166}
167
168impl ObjectClass {
169 /// Returns the name used to refer to this object class in the SELinux binary policy.
170 pub fn name(&self) -> &'static str {
171 match self {
172 // keep-sorted start
173 Self::AnonFsNode => "anon_inode",
174 Self::Block => "blk_file",
175 Self::Bpf => "bpf",
176 Self::Capability => "capability",
177 Self::Capability2 => "capability2",
178 Self::Character => "chr_file",
179 Self::Dir => "dir",
180 Self::Fd => "fd",
181 Self::Fifo => "fifo_file",
182 Self::File => "file",
183 Self::FileSystem => "filesystem",
184 Self::KeySocket => "key_socket",
185 Self::Link => "lnk_file",
186 Self::NetlinkAuditSocket => "netlink_audit_socket",
187 Self::NetlinkConnectorSocket => "netlink_connector_socket",
188 Self::NetlinkCryptoSocket => "netlink_crypto_socket",
189 Self::NetlinkDnrtSocket => "netlink_dnrt_socket",
190 Self::NetlinkFibLookupSocket => "netlink_fib_lookup_socket",
191 Self::NetlinkFirewallSocket => "netlink_firewall_socket",
192 Self::NetlinkGenericSocket => "netlink_generic_socket",
193 Self::NetlinkIp6FwSocket => "netlink_ip6fw_socket",
194 Self::NetlinkIscsiSocket => "netlink_iscsi_socket",
195 Self::NetlinkKobjectUeventSocket => "netlink_kobject_uevent_socket",
196 Self::NetlinkNetfilterSocket => "netlink_netfilter_socket",
197 Self::NetlinkNflogSocket => "netlink_nflog_socket",
198 Self::NetlinkRdmaSocket => "netlink_rdma_socket",
199 Self::NetlinkRouteSocket => "netlink_route_socket",
200 Self::NetlinkScsitransportSocket => "netlink_scsitransport_socket",
201 Self::NetlinkSelinuxSocket => "netlink_selinux_socket",
202 Self::NetlinkSocket => "netlink_socket",
203 Self::NetlinkTcpDiagSocket => "netlink_tcpdiag_socket",
204 Self::NetlinkXfrmSocket => "netlink_xfrm_socket",
205 Self::PacketSocket => "packet_socket",
206 Self::Process => "process",
207 Self::RawIpSocket => "rawip_socket",
208 Self::Security => "security",
209 Self::SockFile => "sock_file",
210 Self::Socket => "socket",
211 Self::TcpSocket => "tcp_socket",
212 Self::UdpSocket => "udp_socket",
213 Self::UnixDgramSocket => "unix_dgram_socket",
214 Self::UnixStreamSocket => "unix_stream_socket",
215 Self::VSockSocket => "vsock_socket",
216 // keep-sorted end
217 }
218 }
219}
220
221impl From<ObjectClass> for AbstractObjectClass {
222 fn from(object_class: ObjectClass) -> Self {
223 Self::System(object_class)
224 }
225}
226
227impl From<String> for AbstractObjectClass {
228 fn from(name: String) -> Self {
229 Self::Custom(name)
230 }
231}
232
233enumerable_enum! {
234 /// Covers the set of classes that inherit from the common "cap" symbol (e.g. "capability" for
235 /// now and "cap_userns" after Starnix gains user namespacing support).
236 #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
237 CapClass {
238 // keep-sorted start
239 /// The SELinux "capability" object class.
240 Capability,
241 // keep-sorted end
242 }
243}
244
245impl From<CapClass> for ObjectClass {
246 fn from(cap_class: CapClass) -> Self {
247 match cap_class {
248 // keep-sorted start
249 CapClass::Capability => Self::Capability,
250 // keep-sorted end
251 }
252 }
253}
254
255enumerable_enum! {
256 /// Covers the set of classes that inherit from the common "cap2" symbol (e.g. "capability2" for
257 /// now and "cap2_userns" after Starnix gains user namespacing support).
258 #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
259 Cap2Class {
260 // keep-sorted start
261 /// The SELinux "capability2" object class.
262 Capability2,
263 // keep-sorted end
264 }
265}
266
267impl From<Cap2Class> for ObjectClass {
268 fn from(cap2_class: Cap2Class) -> Self {
269 match cap2_class {
270 // keep-sorted start
271 Cap2Class::Capability2 => Self::Capability2,
272 // keep-sorted end
273 }
274 }
275}
276
277enumerable_enum! {
278 /// A well-known file-like class in SELinux policy that has a particular meaning in policy
279 /// enforcement hooks.
280 #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
281 FileClass {
282 // keep-sorted start
283 /// The SELinux "anon_inode" object class.
284 AnonFsNode,
285 /// The SELinux "blk_file" object class.
286 Block,
287 /// The SELinux "chr_file" object class.
288 Character,
289 /// The SELinux "dir" object class.
290 Dir,
291 /// The SELinux "fifo_file" object class.
292 Fifo,
293 /// The SELinux "file" object class.
294 File,
295 /// The SELinux "lnk_file" object class.
296 Link,
297 /// The SELinux "sock_file" object class.
298 SockFile,
299 // keep-sorted end
300 }
301}
302
303impl From<FileClass> for ObjectClass {
304 fn from(file_class: FileClass) -> Self {
305 match file_class {
306 // keep-sorted start
307 FileClass::AnonFsNode => Self::AnonFsNode,
308 FileClass::Block => Self::Block,
309 FileClass::Character => Self::Character,
310 FileClass::Dir => Self::Dir,
311 FileClass::Fifo => Self::Fifo,
312 FileClass::File => Self::File,
313 FileClass::Link => Self::Link,
314 FileClass::SockFile => Self::SockFile,
315 // keep-sorted end
316 }
317 }
318}
319
320enumerable_enum! {
321 /// Distinguishes socket-like kernel object classes defined in SELinux policy.
322 #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
323 SocketClass {
324 // keep-sorted start
325 Key,
326 Netlink,
327 NetlinkAudit,
328 NetlinkConnector,
329 NetlinkCrypto,
330 NetlinkDnrt,
331 NetlinkFibLookup,
332 NetlinkFirewall,
333 NetlinkGeneric,
334 NetlinkIp6Fw,
335 NetlinkIscsi,
336 NetlinkKobjectUevent,
337 NetlinkNetfilter,
338 NetlinkNflog,
339 NetlinkRdma,
340 NetlinkRoute,
341 NetlinkScsitransport,
342 NetlinkSelinux,
343 NetlinkTcpDiag,
344 NetlinkXfrm,
345 Packet,
346 RawIp,
347 /// Generic socket class applied to all socket-like objects for which no more specific
348 /// class is defined.
349 Socket,
350 Tcp,
351 Udp,
352 UnixDgram,
353 UnixStream,
354 Vsock,
355 // keep-sorted end
356 }
357}
358
359impl From<SocketClass> for ObjectClass {
360 fn from(socket_class: SocketClass) -> Self {
361 match socket_class {
362 // keep-sorted start
363 SocketClass::Key => Self::KeySocket,
364 SocketClass::Netlink => Self::NetlinkSocket,
365 SocketClass::NetlinkAudit => Self::NetlinkAuditSocket,
366 SocketClass::NetlinkConnector => Self::NetlinkConnectorSocket,
367 SocketClass::NetlinkCrypto => Self::NetlinkCryptoSocket,
368 SocketClass::NetlinkDnrt => Self::NetlinkDnrtSocket,
369 SocketClass::NetlinkFibLookup => Self::NetlinkFibLookupSocket,
370 SocketClass::NetlinkFirewall => Self::NetlinkFirewallSocket,
371 SocketClass::NetlinkGeneric => Self::NetlinkGenericSocket,
372 SocketClass::NetlinkIp6Fw => Self::NetlinkIp6FwSocket,
373 SocketClass::NetlinkIscsi => Self::NetlinkIscsiSocket,
374 SocketClass::NetlinkKobjectUevent => Self::NetlinkDnrtSocket,
375 SocketClass::NetlinkNetfilter => Self::NetlinkNetfilterSocket,
376 SocketClass::NetlinkNflog => Self::NetlinkNflogSocket,
377 SocketClass::NetlinkRdma => Self::NetlinkRdmaSocket,
378 SocketClass::NetlinkRoute => Self::NetlinkRouteSocket,
379 SocketClass::NetlinkScsitransport => Self::NetlinkScsitransportSocket,
380 SocketClass::NetlinkSelinux => Self::NetlinkSelinuxSocket,
381 SocketClass::NetlinkTcpDiag => Self::NetlinkTcpDiagSocket,
382 SocketClass::NetlinkXfrm => Self::NetlinkXfrmSocket,
383 SocketClass::Packet => Self::PacketSocket,
384 SocketClass::RawIp => Self::RawIpSocket,
385 SocketClass::Socket => Self::Socket,
386 SocketClass::Tcp => Self::TcpSocket,
387 SocketClass::Udp => Self::UdpSocket,
388 SocketClass::UnixDgram => Self::UnixDgramSocket,
389 SocketClass::UnixStream => Self::UnixStreamSocket,
390 SocketClass::Vsock => Self::VSockSocket,
391 // keep-sorted end
392 }
393 }
394}
395
396/// Container for a security class that could be associated with a [`crate::vfs::FsNode`], to allow
397/// permissions common to both file-like and socket-like classes to be generated easily by hooks.
398#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
399pub enum FsNodeClass {
400 File(FileClass),
401 Socket(SocketClass),
402}
403
404impl From<FsNodeClass> for ObjectClass {
405 fn from(class: FsNodeClass) -> Self {
406 match class {
407 FsNodeClass::File(file_class) => file_class.into(),
408 FsNodeClass::Socket(sock_class) => sock_class.into(),
409 }
410 }
411}
412
413impl From<FileClass> for FsNodeClass {
414 fn from(file_class: FileClass) -> Self {
415 FsNodeClass::File(file_class)
416 }
417}
418
419impl From<SocketClass> for FsNodeClass {
420 fn from(sock_class: SocketClass) -> Self {
421 FsNodeClass::Socket(sock_class)
422 }
423}
424
425/// A permission that may appear in SELinux policy or an access vector cache query.
426#[derive(Clone, Debug, PartialEq)]
427pub enum AbstractPermission {
428 /// A permission that is interpreted directly by the system. These are kernel objects such as
429 /// a "process", "file", etc.
430 System(Permission),
431 /// A permission with an arbitrary string identifier.
432 Custom { class: AbstractObjectClass, permission: String },
433}
434
435impl AbstractPermission {
436 pub fn new_custom(class: AbstractObjectClass, permission: String) -> Self {
437 Self::Custom { class, permission }
438 }
439}
440
441impl From<Permission> for AbstractPermission {
442 fn from(permission: Permission) -> Self {
443 Self::System(permission)
444 }
445}
446
447pub trait ClassPermission {
448 fn class(&self) -> ObjectClass;
449}
450
451macro_rules! permission_enum {
452 ($(#[$meta:meta])* $name:ident {
453 $($(#[$variant_meta:meta])* $variant:ident($inner:ident)),*,
454 }) => {
455 $(#[$meta])*
456 pub enum $name {
457 $($(#[$variant_meta])* $variant($inner)),*
458 }
459
460 $(impl From<$inner> for $name {
461 fn from(v: $inner) -> Self {
462 Self::$variant(v)
463 }
464 })*
465
466 impl ClassPermission for $name {
467 fn class(&self) -> ObjectClass {
468 match self {
469 $($name::$variant(_) => ObjectClass::$variant),*
470 }
471 }
472 }
473
474 impl $name {
475 pub fn name(&self) -> &'static str {
476 match self {
477 $($name::$variant(v) => v.name()),*
478 }
479 }
480
481 pub fn all_variants() -> Vec<Self> {
482 let mut all_variants = vec![];
483 $(all_variants.extend($inner::all_variants().into_iter().map($name::from));)*
484 all_variants
485 }
486 }
487 }
488}
489
490permission_enum! {
491 /// A well-known `(class, permission)` pair in SELinux policy that has a particular meaning in
492 /// policy enforcement hooks.
493 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
494 Permission {
495 // keep-sorted start
496 /// Permissions for the well-known SELinux "anon_inode" file-like object class.
497 AnonFsNode(AnonFsNodePermission),
498 /// Permissions for the well-known SELinux "blk_file" file-like object class.
499 Block(BlockFilePermission),
500 /// Permissions for the well-known SELinux "bpf" file-like object class.
501 Bpf(BpfPermission),
502 /// Permissions for the well-known SELinux "capability" object class.
503 Capability(CapabilityPermission),
504 /// Permissions for the well-known SELinux "capability2" object class.
505 Capability2(Capability2Permission),
506 /// Permissions for the well-known SELinux "chr_file" file-like object class.
507 Character(CharacterFilePermission),
508 /// Permissions for the well-known SELinux "dir" file-like object class.
509 Dir(DirPermission),
510 /// Permissions for the well-known SELinux "fd" object class.
511 Fd(FdPermission),
512 /// Permissions for the well-known SELinux "fifo_file" file-like object class.
513 Fifo(FifoFilePermission),
514 /// Permissions for the well-known SELinux "file" object class.
515 File(FilePermission),
516 /// Permissions for the well-known SELinux "filesystem" object class.
517 FileSystem(FileSystemPermission),
518 /// Permissions for the well-known SELinux "packet_socket" object class.
519 KeySocket(KeySocketPermission),
520 /// Permissions for the well-known SELinux "lnk_file" file-like object class.
521 Link(LinkFilePermission),
522 /// Permissions for the well-known SELinux "netlink_audit_socket" file-like object class.
523 NetlinkAuditSocket(NetlinkAuditSocketPermission),
524 /// Permissions for the well-known SELinux "netlink_connector_socket" file-like object class.
525 NetlinkConnectorSocket(NetlinkConnectorSocketPermission),
526 /// Permissions for the well-known SELinux "netlink_crypto_socket" file-like object class.
527 NetlinkCryptoSocket(NetlinkCryptoSocketPermission),
528 /// Permissions for the well-known SELinux "netlink_dnrt_socket" file-like object class.
529 NetlinkDnrtSocket(NetlinkDnrtSocketPermission),
530 /// Permissions for the well-known SELinux "netlink_fib_lookup_socket" file-like object class.
531 NetlinkFibLookupSocket(NetlinkFibLookupSocketPermission),
532 /// Permissions for the well-known SELinux "netlink_firewall_socket" file-like object class.
533 NetlinkFirewallSocket(NetlinkFirewallSocketPermission),
534 /// Permissions for the well-known SELinux "netlink_generic_socket" file-like object class.
535 NetlinkGenericSocket(NetlinkGenericSocketPermission),
536 /// Permissions for the well-known SELinux "netlink_ip6fw_socket" file-like object class.
537 NetlinkIp6FwSocket(NetlinkIp6FwSocketPermission),
538 /// Permissions for the well-known SELinux "netlink_iscsi_socket" file-like object class.
539 NetlinkIscsiSocket(NetlinkIscsiSocketPermission),
540 /// Permissions for the well-known SELinux "netlink_kobject_uevent_socket" file-like object class.
541 NetlinkKobjectUeventSocket(NetlinkKobjectUeventSocketPermission),
542 /// Permissions for the well-known SELinux "netlink_netfilter_socket" file-like object class.
543 NetlinkNetfilterSocket(NetlinkNetfilterSocketPermission),
544 /// Permissions for the well-known SELinux "netlink_nflog_socket" file-like object class.
545 NetlinkNflogSocket(NetlinkNflogSocketPermission),
546 /// Permissions for the well-known SELinux "netlink_rdma_socket" file-like object class.
547 NetlinkRdmaSocket(NetlinkRdmaSocketPermission),
548 /// Permissions for the well-known SELinux "netlink_route_socket" file-like object class.
549 NetlinkRouteSocket(NetlinkRouteSocketPermission),
550 /// Permissions for the well-known SELinux "netlink_scsitransport_socket" file-like object class.
551 NetlinkScsitransportSocket(NetlinkScsitransportSocketPermission),
552 /// Permissions for the well-known SELinux "netlink_selinux_socket" file-like object class.
553 NetlinkSelinuxSocket(NetlinkSelinuxSocketPermission),
554 /// Permissions for the well-known SELinux "netlink_socket" file-like object class.
555 NetlinkSocket(NetlinkSocketPermission),
556 /// Permissions for the well-known SELinux "netlink_tcpdiag_socket" file-like object class.
557 NetlinkTcpDiagSocket(NetlinkTcpDiagSocketPermission),
558 /// Permissions for the well-known SELinux "netlink_xfrm_socket" file-like object class.
559 NetlinkXfrmSocket(NetlinkXfrmSocketPermission),
560 /// Permissions for the well-known SELinux "packet_socket" object class.
561 PacketSocket(PacketSocketPermission),
562 /// Permissions for the well-known SELinux "process" object class.
563 Process(ProcessPermission),
564 /// Permissions for the well-known SELinux "rawip_socket" object class.
565 RawIpSocket(RawIpSocketPermission),
566 /// Permissions for access to parts of the "selinuxfs" used to administer and query SELinux.
567 Security(SecurityPermission),
568 /// Permissions for the well-known SELinux "sock_file" file-like object class.
569 SockFile(SockFilePermission),
570 /// Permissions for the well-known SELinux "socket" object class.
571 Socket(SocketPermission),
572 /// Permissions for the well-known SELinux "tcp_socket" object class.
573 TcpSocket(TcpSocketPermission),
574 /// Permissions for the well-known SELinux "udp_socket" object class.
575 UdpSocket(UdpSocketPermission),
576 /// Permissions for the well-known SELinux "unix_dgram_socket" object class.
577 UnixDgramSocket(UnixDgramSocketPermission),
578 /// Permissions for the well-known SELinux "unix_stream_socket" object class.
579 UnixStreamSocket(UnixStreamSocketPermission),
580 /// Permissions for the well-known SELinux "vsock_socket" object class.
581 VSockSocket(VsockSocketPermission),
582 // keep-sorted end
583 }
584}
585
586/// Helper used to define an enum of permission values, with specified names.
587/// Uses of this macro should not rely on "extends", which is solely for use to express permission
588/// inheritance in `class_permission_enum`.
589macro_rules! common_permission_enum {
590 ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
591 $($(#[$variant_meta:meta])* $variant:ident ($variant_name:literal),)*
592 }) => {
593 enumerable_enum! {
594 $(#[$meta])* $name $(extends $common_name)? {
595 $($(#[$variant_meta])* $variant,)*
596 }
597 }
598
599 impl $name {
600 fn name(&self) -> &'static str {
601 match self {
602 $($name::$variant => $variant_name,)*
603 $(Self::Common(v) => {let v:$common_name = v.clone(); v.name()},)?
604 }
605 }
606 }
607 }
608}
609
610/// Helper used to declare the set of named permissions associated with an SELinux class.
611/// The `ClassType` trait is implemented on the declared `enum`, enabling values to be wrapped into
612/// the generic `Permission` container.
613/// If an "extends" type is specified then a `Common` enum case is added, encapsulating the values
614/// of that underlying permission type. This is used to represent e.g. SELinux "dir" class deriving
615/// a basic set of permissions from the common "file" symbol.
616macro_rules! class_permission_enum {
617 ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
618 $($(#[$variant_meta:meta])* $variant:ident ($variant_name:literal),)*
619 }) => {
620 common_permission_enum! {
621 $(#[$meta])* $name $(extends $common_name)? {
622 $($(#[$variant_meta])* $variant ($variant_name),)*
623 }
624 }
625
626 impl ClassPermission for $name {
627 fn class(&self) -> ObjectClass {
628 Permission::from(self.clone()).class()
629 }
630 }
631 }
632}
633
634common_permission_enum! {
635 /// Permissions common to all cap-like object classes (e.g. "capability" for now and
636 /// "cap_userns" after Starnix gains user namespacing support). These are combined with a
637 /// specific `CapabilityClass` by policy enforcement hooks, to obtain class-affine permission
638 /// values to check.
639 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
640 CommonCapPermission {
641 // keep-sorted start
642
643 AuditControl("audit_control"),
644 AuditWrite("audit_write"),
645 Chown("chown"),
646 DacOverride("dac_override"),
647 DacReadSearch("dac_read_search"),
648 Fowner("fowner"),
649 Fsetid("fsetid"),
650 IpcLock("ipc_lock"),
651 IpcOwner("ipc_owner"),
652 Kill("kill"),
653 Lease("lease"),
654 LinuxImmutable("linux_immutable"),
655 Mknod("mknod"),
656 NetAdmin("net_admin"),
657 NetBindService("net_bind_service"),
658 NetBroadcast("net_broadcast"),
659 NetRaw("net_raw"),
660 Setfcap("setfcap"),
661 Setgid("setgid"),
662 Setpcap("setpcap"),
663 Setuid("setuid"),
664 SysAdmin("sys_admin"),
665 SysBoot("sys_boot"),
666 SysChroot("sys_chroot"),
667 SysModule("sys_module"),
668 SysNice("sys_nice"),
669 SysPacct("sys_pacct"),
670 SysPtrace("sys_ptrace"),
671 SysRawio("sys_rawio"),
672 SysResource("sys_resource"),
673 SysTime("sys_time"),
674 SysTtyConfig("sys_tty_config"),
675
676 // keep-sorted end
677 }
678}
679
680class_permission_enum! {
681 /// A well-known "capability" class permission in SELinux policy that has a particular meaning
682 /// in policy enforcement hooks.
683 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
684 CapabilityPermission extends CommonCapPermission {}
685}
686
687impl CommonCapPermission {
688 /// Returns the `class`-affine `Permission` value corresponding to this common permission.
689 /// This is used to allow hooks to resolve e.g. common "sys_nice" permission access based on the
690 /// "allow" rules for the correct target object class.
691 pub fn for_class(&self, class: CapClass) -> Permission {
692 match class {
693 CapClass::Capability => CapabilityPermission::Common(self.clone()).into(),
694 }
695 }
696}
697
698common_permission_enum! {
699 /// Permissions common to all cap2-like object classes (e.g. "capability2" for now and
700 /// "cap2_userns" after Starnix gains user namespacing support). These are combined with a
701 /// specific `Capability2Class` by policy enforcement hooks, to obtain class-affine permission
702 /// values to check.
703 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
704 CommonCap2Permission {
705 // keep-sorted start
706
707 AuditRead("audit_read"),
708 BlockSuspend("block_suspend"),
709 Bpf("bpf"),
710 MacAdmin("mac_admin"),
711 MacOverride("mac_override"),
712 Syslog("syslog"),
713 WakeAlarm("wake_alarm"),
714
715 // keep-sorted end
716 }
717}
718
719class_permission_enum! {
720 /// A well-known "capability2" class permission in SELinux policy that has a particular meaning
721 /// in policy enforcement hooks.
722 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
723 Capability2Permission extends CommonCap2Permission {}
724}
725
726impl CommonCap2Permission {
727 /// Returns the `class`-affine `Permission` value corresponding to this common permission.
728 /// This is used to allow hooks to resolve e.g. common "mac_admin" permission access based on
729 /// the "allow" rules for the correct target object class.
730 pub fn for_class(&self, class: Cap2Class) -> Permission {
731 match class {
732 Cap2Class::Capability2 => Capability2Permission::Common(self.clone()).into(),
733 }
734 }
735}
736
737common_permission_enum! {
738 /// Permissions meaningful for all [`crate::vfs::FsNode`]s, whether file- or socket-like.
739 ///
740 /// This extra layer of common permissions is not reflected in the hierarchy defined by the
741 /// SELinux Reference Policy. Because even common permissions are mapped per-class, by name, to
742 /// the policy equivalents, the implementation and policy notions of common permissions need not
743 /// be identical.
744 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
745 CommonFsNodePermission {
746 // keep-sorted start
747 /// Permission to append to a file or socket.
748 Append("append"),
749 /// Permission to create a file or socket.
750 Create("create"),
751 /// Permission to query attributes, including uid, gid and extended attributes.
752 GetAttr("getattr"),
753 /// Permission to execute ioctls on the file or socket.
754 Ioctl("ioctl"),
755 /// Permission to set and unset file or socket locks.
756 Lock("lock"),
757 /// Permission to map a file.
758 Map("map"),
759 /// Permission to read content from a file or socket, as well as reading or following links.
760 Read("read"),
761 /// Permission checked against the existing label when updating a node's security label.
762 RelabelFrom("relabelfrom"),
763 /// Permission checked against the new label when updating a node's security label.
764 RelabelTo("relabelto"),
765 /// Permission to modify attributes, including uid, gid and extended attributes.
766 SetAttr("setattr"),
767 /// Permission to write contents to the file or socket.
768 Write("write"),
769 // keep-sorted end
770 }
771}
772
773impl CommonFsNodePermission {
774 /// Returns the `class`-affine `Permission` value corresponding to this common permission.
775 /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
776 /// "allow" rules for the correct target object class.
777 pub fn for_class(&self, class: impl Into<FsNodeClass>) -> Permission {
778 match class.into() {
779 FsNodeClass::File(file_class) => {
780 CommonFilePermission::Common(self.clone()).for_class(file_class)
781 }
782 FsNodeClass::Socket(sock_class) => {
783 CommonSocketPermission::Common(self.clone()).for_class(sock_class)
784 }
785 }
786 }
787}
788common_permission_enum! {
789 /// Permissions common to all socket-like object classes. These are combined with a specific
790 /// `SocketClass` by policy enforcement hooks, to obtain class-affine permission values.
791 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
792 CommonSocketPermission extends CommonFsNodePermission {
793 // keep-sorted start
794 /// Permission to bind to a name.
795 Bind("bind"),
796 /// Permission to initiate a connection.
797 Connect("connect"),
798 // keep-sorted end
799 }
800}
801
802impl CommonSocketPermission {
803 /// Returns the `class`-affine `Permission` value corresponding to this common permission.
804 /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
805 /// "allow" rules for the correct target object class.
806 pub fn for_class(&self, class: SocketClass) -> Permission {
807 match class {
808 SocketClass::Key => KeySocketPermission::Common(self.clone()).into(),
809 SocketClass::Netlink => NetlinkSocketPermission::Common(self.clone()).into(),
810 SocketClass::NetlinkAudit => NetlinkAuditSocketPermission::Common(self.clone()).into(),
811 SocketClass::NetlinkConnector => {
812 NetlinkConnectorSocketPermission::Common(self.clone()).into()
813 }
814 SocketClass::NetlinkCrypto => {
815 NetlinkCryptoSocketPermission::Common(self.clone()).into()
816 }
817 SocketClass::NetlinkDnrt => NetlinkDnrtSocketPermission::Common(self.clone()).into(),
818 SocketClass::NetlinkFibLookup => {
819 NetlinkFibLookupSocketPermission::Common(self.clone()).into()
820 }
821 SocketClass::NetlinkFirewall => {
822 NetlinkFirewallSocketPermission::Common(self.clone()).into()
823 }
824 SocketClass::NetlinkGeneric => {
825 NetlinkGenericSocketPermission::Common(self.clone()).into()
826 }
827 SocketClass::NetlinkIp6Fw => NetlinkIp6FwSocketPermission::Common(self.clone()).into(),
828 SocketClass::NetlinkIscsi => NetlinkIscsiSocketPermission::Common(self.clone()).into(),
829 SocketClass::NetlinkKobjectUevent => {
830 NetlinkKobjectUeventSocketPermission::Common(self.clone()).into()
831 }
832 SocketClass::NetlinkNetfilter => {
833 NetlinkNetfilterSocketPermission::Common(self.clone()).into()
834 }
835 SocketClass::NetlinkNflog => NetlinkNflogSocketPermission::Common(self.clone()).into(),
836 SocketClass::NetlinkRdma => NetlinkRdmaSocketPermission::Common(self.clone()).into(),
837 SocketClass::NetlinkRoute => NetlinkRouteSocketPermission::Common(self.clone()).into(),
838 SocketClass::NetlinkScsitransport => {
839 NetlinkScsitransportSocketPermission::Common(self.clone()).into()
840 }
841 SocketClass::NetlinkSelinux => {
842 NetlinkSelinuxSocketPermission::Common(self.clone()).into()
843 }
844 SocketClass::NetlinkTcpDiag => {
845 NetlinkTcpDiagSocketPermission::Common(self.clone()).into()
846 }
847 SocketClass::NetlinkXfrm => NetlinkXfrmSocketPermission::Common(self.clone()).into(),
848 SocketClass::Packet => PacketSocketPermission::Common(self.clone()).into(),
849 SocketClass::RawIp => RawIpSocketPermission::Common(self.clone()).into(),
850 SocketClass::Socket => SocketPermission::Common(self.clone()).into(),
851 SocketClass::Tcp => TcpSocketPermission::Common(self.clone()).into(),
852 SocketClass::Udp => UdpSocketPermission::Common(self.clone()).into(),
853 SocketClass::UnixDgram => UnixDgramSocketPermission::Common(self.clone()).into(),
854 SocketClass::UnixStream => UnixStreamSocketPermission::Common(self.clone()).into(),
855 SocketClass::Vsock => VsockSocketPermission::Common(self.clone()).into(),
856 }
857 }
858}
859
860class_permission_enum! {
861 /// A well-known "key_socket" class permission in SELinux policy that has a particular meaning in
862 /// policy enforcement hooks.
863 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
864 KeySocketPermission extends CommonSocketPermission {
865 }
866}
867class_permission_enum! {
868 /// A well-known "netlink_socket" class permission in SELinux policy that has a particular meaning in
869 /// policy enforcement hooks.
870 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
871 NetlinkSocketPermission extends CommonSocketPermission {
872 }
873}
874
875class_permission_enum! {
876 /// A well-known "netlink_route_socket" class permission in SELinux policy that has a particular meaning in
877 /// policy enforcement hooks.
878 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
879 NetlinkRouteSocketPermission extends CommonSocketPermission {
880 }
881}
882
883class_permission_enum! {
884 /// A well-known "netlink_firewall_socket" class permission in SELinux policy that has a particular meaning in
885 /// policy enforcement hooks.
886 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
887 NetlinkFirewallSocketPermission extends CommonSocketPermission {
888 }
889}
890
891class_permission_enum! {
892 /// A well-known "netlink_tcpdiag_socket" class permission in SELinux policy that has a particular meaning in
893 /// policy enforcement hooks.
894 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
895 NetlinkTcpDiagSocketPermission extends CommonSocketPermission {
896 }
897}
898
899class_permission_enum! {
900 /// A well-known "netlink_nflog_socket" class permission in SELinux policy that has a particular meaning in
901 /// policy enforcement hooks.
902 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
903 NetlinkNflogSocketPermission extends CommonSocketPermission {
904 }
905}
906
907class_permission_enum! {
908 /// A well-known "netlink_xfrm_socket" class permission in SELinux policy that has a particular meaning in
909 /// policy enforcement hooks.
910 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
911 NetlinkXfrmSocketPermission extends CommonSocketPermission {
912 }
913}
914
915class_permission_enum! {
916 /// A well-known "netlink_selinux_socket" class permission in SELinux policy that has a particular meaning in
917 /// policy enforcement hooks.
918 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
919 NetlinkSelinuxSocketPermission extends CommonSocketPermission {
920 }
921}
922
923class_permission_enum! {
924 /// A well-known "netlink_iscsi_socket" class permission in SELinux policy that has a particular meaning in
925 /// policy enforcement hooks.
926 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
927 NetlinkIscsiSocketPermission extends CommonSocketPermission {
928 }
929}
930
931class_permission_enum! {
932 /// A well-known "netlink_audit_socket" class permission in SELinux policy that has a particular meaning in
933 /// policy enforcement hooks.
934 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
935 NetlinkAuditSocketPermission extends CommonSocketPermission {
936 }
937}
938
939class_permission_enum! {
940 /// A well-known "netlink_fib_lookup_socket" class permission in SELinux policy that has a particular meaning in
941 /// policy enforcement hooks.
942 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
943 NetlinkFibLookupSocketPermission extends CommonSocketPermission {
944 }
945}
946
947class_permission_enum! {
948 /// A well-known "netlink_connector_socket" class permission in SELinux policy that has a particular meaning in
949 /// policy enforcement hooks.
950 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
951 NetlinkConnectorSocketPermission extends CommonSocketPermission {
952 }
953}
954
955class_permission_enum! {
956 /// A well-known "netlink_netfilter_socket" class permission in SELinux policy that has a particular meaning in
957 /// policy enforcement hooks.
958 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
959 NetlinkNetfilterSocketPermission extends CommonSocketPermission {
960 }
961}
962
963class_permission_enum! {
964 /// A well-known "netlink_ip6fw_socket" class permission in SELinux policy that has a particular meaning in
965 /// policy enforcement hooks.
966 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
967 NetlinkIp6FwSocketPermission extends CommonSocketPermission {
968 }
969}
970
971class_permission_enum! {
972 /// A well-known "netlink_dnrt_socket" class permission in SELinux policy that has a particular meaning in
973 /// policy enforcement hooks.
974 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
975 NetlinkDnrtSocketPermission extends CommonSocketPermission {
976 }
977}
978
979class_permission_enum! {
980 /// A well-known "netlink_kobject_uevent_socket" class permission in SELinux policy that has a particular meaning in
981 /// policy enforcement hooks.
982 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
983 NetlinkKobjectUeventSocketPermission extends CommonSocketPermission {
984 }
985}
986
987class_permission_enum! {
988 /// A well-known "netlink_generic_socket" class permission in SELinux policy that has a particular meaning in
989 /// policy enforcement hooks.
990 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
991 NetlinkGenericSocketPermission extends CommonSocketPermission {
992 }
993}
994
995class_permission_enum! {
996 /// A well-known "netlink_scsitransport_socket" class permission in SELinux policy that has a particular meaning in
997 /// policy enforcement hooks.
998 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
999 NetlinkScsitransportSocketPermission extends CommonSocketPermission {
1000 }
1001}
1002
1003class_permission_enum! {
1004 /// A well-known "netlink_rdma_socket" class permission in SELinux policy that has a particular meaning in
1005 /// policy enforcement hooks.
1006 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1007 NetlinkRdmaSocketPermission extends CommonSocketPermission {
1008 }
1009}
1010
1011class_permission_enum! {
1012 /// A well-known "netlink_crypto_socket" class permission in SELinux policy that has a particular meaning in
1013 /// policy enforcement hooks.
1014 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1015 NetlinkCryptoSocketPermission extends CommonSocketPermission {
1016 }
1017}
1018
1019class_permission_enum! {
1020 /// A well-known "packet_socket" class permission in SELinux policy that has a particular meaning in
1021 /// policy enforcement hooks.
1022 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1023 PacketSocketPermission extends CommonSocketPermission {
1024 }
1025}
1026
1027class_permission_enum! {
1028 /// A well-known "rawip_socket" class permission in SELinux policy that has a particular meaning in
1029 /// policy enforcement hooks.
1030 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1031 RawIpSocketPermission extends CommonSocketPermission {
1032 }
1033}
1034
1035class_permission_enum! {
1036 /// A well-known "socket" class permission in SELinux policy that has a particular meaning in
1037 /// policy enforcement hooks.
1038 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1039 SocketPermission extends CommonSocketPermission {
1040 }
1041}
1042
1043class_permission_enum! {
1044 /// A well-known "tcp_socket" class permission in SELinux policy that has a particular meaning in
1045 /// policy enforcement hooks.
1046 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1047 TcpSocketPermission extends CommonSocketPermission {
1048 }
1049}
1050
1051class_permission_enum! {
1052 /// A well-known "udp_socket" class permission in SELinux policy that has a particular meaning in
1053 /// policy enforcement hooks.
1054 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1055 UdpSocketPermission extends CommonSocketPermission {
1056 }
1057}
1058
1059class_permission_enum! {
1060 /// A well-known "unix_stream_socket" class permission in SELinux policy that has a particular meaning in
1061 /// policy enforcement hooks.
1062 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1063 UnixStreamSocketPermission extends CommonSocketPermission {
1064 }
1065}
1066
1067class_permission_enum! {
1068 /// A well-known "unix_dgram_socket" class permission in SELinux policy that has a particular meaning in
1069 /// policy enforcement hooks.
1070 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1071 UnixDgramSocketPermission extends CommonSocketPermission {
1072 }
1073}
1074
1075class_permission_enum! {
1076 /// A well-known "vsock_socket" class permission in SELinux policy that has a particular meaning in
1077 /// policy enforcement hooks.
1078 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1079 VsockSocketPermission extends CommonSocketPermission {
1080 }
1081}
1082
1083common_permission_enum! {
1084 /// Permissions common to all file-like object classes (e.g. "lnk_file", "dir"). These are
1085 /// combined with a specific `FileClass` by policy enforcement hooks, to obtain class-affine
1086 /// permission values to check.
1087 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1088 CommonFilePermission extends CommonFsNodePermission {
1089 // keep-sorted start
1090 /// Permission to execute a file with domain transition.
1091 Execute("execute"),
1092 /// Permissions to create hard link.
1093 Link("link"),
1094 /// Permission to use as mount point; only useful for directories and files.
1095 MountOn("mounton"),
1096 /// Permission to open a file.
1097 Open("open"),
1098 /// Permission to rename a file.
1099 Rename("rename"),
1100 /// Permission to delete a file or remove a hard link.
1101 Unlink("unlink"),
1102 // keep-sorted end
1103 }
1104}
1105
1106impl CommonFilePermission {
1107 /// Returns the `class`-affine `Permission` value corresponding to this common permission.
1108 /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
1109 /// "allow" rules for the correct target object class.
1110 pub fn for_class(&self, class: FileClass) -> Permission {
1111 match class {
1112 FileClass::AnonFsNode => AnonFsNodePermission::Common(self.clone()).into(),
1113 FileClass::Block => BlockFilePermission::Common(self.clone()).into(),
1114 FileClass::Character => CharacterFilePermission::Common(self.clone()).into(),
1115 FileClass::Dir => DirPermission::Common(self.clone()).into(),
1116 FileClass::Fifo => FifoFilePermission::Common(self.clone()).into(),
1117 FileClass::File => FilePermission::Common(self.clone()).into(),
1118 FileClass::Link => LinkFilePermission::Common(self.clone()).into(),
1119 FileClass::SockFile => SockFilePermission::Common(self.clone()).into(),
1120 }
1121 }
1122}
1123
1124class_permission_enum! {
1125 /// A well-known "anon_file" class permission used to manage special file-like nodes not linked
1126 /// into any directory structures.
1127 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1128 AnonFsNodePermission extends CommonFilePermission {
1129 }
1130}
1131
1132class_permission_enum! {
1133 /// A well-known "blk_file" class permission in SELinux policy that has a particular meaning in
1134 /// policy enforcement hooks.
1135 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1136 BlockFilePermission extends CommonFilePermission {
1137 }
1138}
1139
1140class_permission_enum! {
1141 /// A well-known "chr_file" class permission in SELinux policy that has a particular meaning in
1142 /// policy enforcement hooks.
1143 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1144 CharacterFilePermission extends CommonFilePermission {
1145 }
1146}
1147
1148class_permission_enum! {
1149 /// A well-known "dir" class permission in SELinux policy that has a particular meaning in
1150 /// policy enforcement hooks.
1151 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1152 DirPermission extends CommonFilePermission {
1153 // keep-sorted start
1154 /// Permission to add a file to the directory.
1155 AddName("add_name"),
1156 /// Permission to remove a directory.
1157 RemoveDir("rmdir"),
1158 /// Permission to remove an entry from a directory.
1159 RemoveName("remove_name"),
1160 /// Permission to change parent directory.
1161 Reparent("reparent"),
1162 /// Search access to the directory.
1163 Search("search"),
1164 // keep-sorted end
1165 }
1166}
1167
1168class_permission_enum! {
1169 /// A well-known "fd" class permission in SELinux policy that has a particular meaning in policy
1170 /// enforcement hooks.
1171 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1172 FdPermission {
1173 // keep-sorted start
1174 /// Permission to use file descriptors copied/retained/inherited from another security
1175 /// context. This permission is generally used to control whether an `exec*()` call from a
1176 /// cloned process that retained a copy of the file descriptor table should succeed.
1177 Use("use"),
1178 // keep-sorted end
1179 }
1180}
1181
1182class_permission_enum! {
1183 /// A well-known "bpf" class permission in SELinux policy that has a particular meaning in
1184 /// policy enforcement hooks.
1185 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1186 BpfPermission {
1187 // keep-sorted start
1188 /// Permission to create a map.
1189 MapCreate("map_create"),
1190 /// Permission to read from a map.
1191 MapRead("map_read"),
1192 /// Permission to write on a map.
1193 MapWrite("map_write"),
1194 /// Permission to load a program.
1195 ProgLoad("prog_load"),
1196 /// Permission to run a program.
1197 ProgRun("prog_run"),
1198 // keep-sorted end
1199 }
1200}
1201
1202class_permission_enum! {
1203 /// A well-known "fifo_file" class permission in SELinux policy that has a particular meaning in
1204 /// policy enforcement hooks.
1205 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1206 FifoFilePermission extends CommonFilePermission {
1207 }
1208}
1209
1210class_permission_enum! {
1211 /// A well-known "file" class permission in SELinux policy that has a particular meaning in
1212 /// policy enforcement hooks.
1213 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1214 FilePermission extends CommonFilePermission {
1215 // keep-sorted start
1216 /// Permission to use a file as an entry point into the new domain on transition.
1217 Entrypoint("entrypoint"),
1218 /// Permission to use a file as an entry point to the calling domain without performing a
1219 /// transition.
1220 ExecuteNoTrans("execute_no_trans"),
1221 // keep-sorted end
1222 }
1223}
1224
1225class_permission_enum! {
1226 /// A well-known "filesystem" class permission in SELinux policy that has a particular meaning in
1227 /// policy enforcement hooks.
1228 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1229 FileSystemPermission {
1230 // keep-sorted start
1231 /// Permission to associate a file to the filesystem.
1232 Associate("associate"),
1233 /// Permission to get filesystem attributes.
1234 GetAttr("getattr"),
1235 /// Permission mount a filesystem.
1236 Mount("mount"),
1237 /// Permission to remount a filesystem with different flags.
1238 Remount("remount"),
1239 /// Permission to unmount a filesystem.
1240 Unmount("unmount"),
1241 // keep-sorted end
1242 }
1243}
1244
1245class_permission_enum! {
1246 /// A well-known "lnk_file" class permission in SELinux policy that has a particular meaning in
1247 /// policy enforcement hooks.
1248 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1249 LinkFilePermission extends CommonFilePermission {
1250 }
1251}
1252
1253class_permission_enum! {
1254 /// A well-known "sock_file" class permission in SELinux policy that has a particular meaning in
1255 /// policy enforcement hooks.
1256 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1257 SockFilePermission extends CommonFilePermission {
1258 }
1259}
1260
1261class_permission_enum! {
1262 /// A well-known "process" class permission in SELinux policy that has a particular meaning in
1263 /// policy enforcement hooks.
1264 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1265 ProcessPermission {
1266 // keep-sorted start
1267 /// Permission to dynamically transition a process to a different security domain.
1268 DynTransition("dyntransition"),
1269 /// Permission to execute arbitrary code from memory.
1270 ExecMem("execmem"),
1271 /// Permission to fork the current running process.
1272 Fork("fork"),
1273 /// Permission to get the process group ID.
1274 GetPgid("getpgid"),
1275 /// Permission to get the resource limits on a process.
1276 GetRlimit("getrlimit"),
1277 /// Permission to get scheduling policy currently applied to a process.
1278 GetSched("getsched"),
1279 /// Permission to get the session ID.
1280 GetSession("getsession"),
1281 /// Permission to trace a process.
1282 Ptrace("ptrace"),
1283 /// Permission to inherit the parent process's resource limits on exec.
1284 RlimitInh("rlimitinh"),
1285 /// Permission to set the calling task's current Security Context.
1286 /// The "dyntransition" permission separately limits which Contexts "setcurrent" may be used to transition to.
1287 SetCurrent("setcurrent"),
1288 /// Permission to set the Security Context used by `exec()`.
1289 SetExec("setexec"),
1290 /// Permission to set the Security Context used when creating filesystem objects.
1291 SetFsCreate("setfscreate"),
1292 /// Permission to set the Security Context used when creating kernel keyrings.
1293 SetKeyCreate("setkeycreate"),
1294 /// Permission to set the process group ID.
1295 SetPgid("setpgid"),
1296 /// Permission to set the resource limits on a process.
1297 SetRlimit("setrlimit"),
1298 /// Permission to set scheduling policy for a process.
1299 SetSched("setsched"),
1300 /// Permission to set the Security Context used when creating new labeled sockets.
1301 SetSockCreate("setsockcreate"),
1302 /// Permission to share resources (e.g. FD table, address-space, etc) with a process.
1303 Share("share"),
1304 /// Permission to send SIGCHLD to a process.
1305 SigChld("sigchld"),
1306 /// Permission to send SIGKILL to a process.
1307 SigKill("sigkill"),
1308 /// Permission to send SIGSTOP to a process.
1309 SigStop("sigstop"),
1310 /// Permission to send a signal other than SIGKILL, SIGSTOP, or SIGCHLD to a process.
1311 Signal("signal"),
1312 /// Permission to transition to a different security domain.
1313 Transition("transition"),
1314 // keep-sorted end
1315 }
1316}
1317
1318class_permission_enum! {
1319 /// A well-known "security" class permission in SELinux policy, used to control access to
1320 /// sensitive administrative and query API surfaces in the "selinuxfs".
1321 #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1322 SecurityPermission {
1323 // keep-sorted start
1324 /// Permission to validate Security Context using the "context" API.
1325 CheckContext("check_context"),
1326 /// Permission to compute access vectors via the "access" API.
1327 ComputeAv("compute_av"),
1328 /// Permission to compute security contexts for newly created objects via "create".
1329 ComputeCreate("compute_create"),
1330 /// Permission to load a new binary policy into the kernel via the "load" API.
1331 LoadPolicy("load_policy"),
1332 /// Permission to commit booleans to control conditional elements of the policy.
1333 SetBool("setbool"),
1334 /// Permission to change the way permissions are validated for `mmap()` operations.
1335 SetCheckReqProt("setcheckreqprot"),
1336 /// Permission to switch the system between permissive and enforcing modes, via "enforce".
1337 SetEnforce("setenforce"),
1338 // keep-sorted end
1339 }
1340}
1341
1342/// Initial Security Identifier (SID) values defined by the SELinux Reference Policy.
1343/// Where the SELinux Reference Policy retains definitions for some deprecated initial SIDs, this
1344/// enum omits deprecated entries for clarity.
1345#[repr(u64)]
1346enum ReferenceInitialSid {
1347 Kernel = 1,
1348 Security = 2,
1349 Unlabeled = 3,
1350 _Fs = 4,
1351 File = 5,
1352 _AnySocket = 6,
1353 _Port = 7,
1354 _Netif = 8,
1355 _Netmsg = 9,
1356 _Node = 10,
1357 _Sysctl = 15,
1358 _Devnull = 25,
1359
1360 FirstUnused,
1361}
1362
1363/// Lowest Security Identifier value guaranteed not to be used by this
1364/// implementation to refer to an initial Security Context.
1365pub const FIRST_UNUSED_SID: u32 = ReferenceInitialSid::FirstUnused as u32;
1366
1367macro_rules! initial_sid_enum {
1368 ($(#[$meta:meta])* $name:ident {
1369 $($(#[$variant_meta:meta])* $variant:ident ($variant_name: literal)),*,
1370 }) => {
1371 $(#[$meta])*
1372 pub enum $name {
1373 $($(#[$variant_meta])* $variant = ReferenceInitialSid::$variant as isize),*
1374 }
1375
1376 impl $name {
1377 pub fn all_variants() -> Vec<Self> {
1378 vec![
1379 $($name::$variant),*
1380 ]
1381 }
1382
1383 pub fn name(&self) -> &'static str {
1384 match self {
1385 $($name::$variant => $variant_name),*
1386 }
1387 }
1388 }
1389 }
1390}
1391
1392initial_sid_enum! {
1393/// Initial Security Identifier (SID) values actually used by this implementation.
1394/// These must be present in the policy, for it to be valid.
1395#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
1396 InitialSid {
1397 // keep-sorted start
1398 File("file"),
1399 Kernel("kernel"),
1400 Security("security"),
1401 Unlabeled("unlabeled"),
1402 // keep-sorted end
1403 }
1404}
1405
1406/// A borrowed byte slice that contains no `NUL` characters by truncating the input slice at the
1407/// first `NUL` (if any) upon construction.
1408#[derive(Clone, Copy, Debug, PartialEq)]
1409pub struct NullessByteStr<'a>(&'a [u8]);
1410
1411impl<'a> NullessByteStr<'a> {
1412 /// Returns a non-null-terminated representation of the security context string.
1413 pub fn as_bytes(&self) -> &[u8] {
1414 &self.0
1415 }
1416}
1417
1418impl<'a, S: AsRef<[u8]> + ?Sized> From<&'a S> for NullessByteStr<'a> {
1419 /// Any `AsRef<[u8]>` can be processed into a [`NullessByteStr`]. The [`NullessByteStr`] will
1420 /// retain everything up to (but not including) a null character, or else the complete byte
1421 /// string.
1422 fn from(s: &'a S) -> Self {
1423 let value = s.as_ref();
1424 match value.iter().position(|c| *c == 0) {
1425 Some(end) => Self(&value[..end]),
1426 None => Self(value),
1427 }
1428 }
1429}
1430
1431#[derive(Clone, Debug, PartialEq)]
1432pub struct FileSystemMountSids {
1433 pub context: Option<SecurityId>,
1434 pub fs_context: Option<SecurityId>,
1435 pub def_context: Option<SecurityId>,
1436 pub root_context: Option<SecurityId>,
1437}
1438
1439#[derive(Clone, Debug, PartialEq)]
1440pub struct FileSystemLabel {
1441 pub sid: SecurityId,
1442 pub scheme: FileSystemLabelingScheme,
1443 // Sids obtained by parsing the mount options of the FileSystem.
1444 pub mount_sids: FileSystemMountSids,
1445}
1446
1447#[derive(Clone, Debug, PartialEq)]
1448pub enum FileSystemLabelingScheme {
1449 /// This filesystem was mounted with "context=".
1450 Mountpoint { sid: SecurityId },
1451 /// This filesystem has an "fs_use_xattr", "fs_use_task", or "fs_use_trans" entry in the
1452 /// policy. `root_sid` identifies the context for the root of the filesystem and
1453 /// `computed_def_sid` identifies the context to use for unlabeled files in the filesystem
1454 /// (the "default context").
1455 FsUse { fs_use_type: FsUseType, computed_def_sid: SecurityId },
1456 /// This filesystem has one or more "genfscon" statements associated with it in the policy.
1457 GenFsCon,
1458}
1459
1460/// SELinux security context-related filesystem mount options. These options are documented in the
1461/// `context=context, fscontext=context, defcontext=context, and rootcontext=context` section of
1462/// the `mount(8)` manpage.
1463#[derive(Clone, Debug, Default, PartialEq)]
1464pub struct FileSystemMountOptions {
1465 /// Specifies the effective security context to use for all nodes in the filesystem, and the
1466 /// filesystem itself. If the filesystem already contains security attributes then these are
1467 /// ignored. May not be combined with any of the other options.
1468 pub context: Option<Vec<u8>>,
1469 /// Specifies an effective security context to use for un-labeled nodes in the filesystem,
1470 /// rather than falling-back to the policy-defined "file" context.
1471 pub def_context: Option<Vec<u8>>,
1472 /// The value of the `fscontext=[security-context]` mount option. This option is used to
1473 /// label the filesystem (superblock) itself.
1474 pub fs_context: Option<Vec<u8>>,
1475 /// The value of the `rootcontext=[security-context]` mount option. This option is used to
1476 /// (re)label the inode located at the filesystem mountpoint.
1477 pub root_context: Option<Vec<u8>>,
1478}
1479
1480/// Status information parameter for the [`SeLinuxStatusPublisher`] interface.
1481pub struct SeLinuxStatus {
1482 /// SELinux-wide enforcing vs. permissive mode bit.
1483 pub is_enforcing: bool,
1484 /// Number of times the policy has been changed since SELinux started.
1485 pub change_count: u32,
1486 /// Bit indicating whether operations unknown SELinux abstractions will be denied.
1487 pub deny_unknown: bool,
1488}
1489
1490/// Interface for security server to interact with selinuxfs status file.
1491pub trait SeLinuxStatusPublisher: Send {
1492 /// Sets the value part of the associated selinuxfs status file.
1493 fn set_status(&mut self, policy_status: SeLinuxStatus);
1494}
1495
1496#[cfg(test)]
1497mod tests {
1498 use super::*;
1499
1500 #[test]
1501 fn object_class_permissions() {
1502 assert_eq!(AbstractObjectClass::Unspecified, AbstractObjectClass::default());
1503 assert_eq!(
1504 AbstractObjectClass::Custom(String::from("my_class")),
1505 String::from("my_class").into()
1506 );
1507 for variant in ProcessPermission::all_variants().into_iter() {
1508 assert_eq!(ObjectClass::Process, variant.class());
1509 assert_eq!("process", variant.class().name());
1510 let permission: Permission = variant.clone().into();
1511 assert_eq!(Permission::Process(variant.clone()), permission);
1512 assert_eq!(
1513 AbstractPermission::System(Permission::Process(variant.clone())),
1514 permission.into()
1515 );
1516 assert_eq!(AbstractObjectClass::System(ObjectClass::Process), variant.class().into());
1517 }
1518 }
1519
1520 #[test]
1521 fn nulless_byte_str_equivalence() {
1522 let unterminated: NullessByteStr<'_> = b"u:object_r:test_valid_t:s0".into();
1523 let nul_terminated: NullessByteStr<'_> = b"u:object_r:test_valid_t:s0\0".into();
1524 let nul_containing: NullessByteStr<'_> =
1525 b"u:object_r:test_valid_t:s0\0IGNORE THIS\0!\0".into();
1526
1527 for context in [nul_terminated, nul_containing] {
1528 assert_eq!(unterminated, context);
1529 assert_eq!(unterminated.as_bytes(), context.as_bytes());
1530 }
1531 }
1532}