selinux/
lib.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5pub mod permission_check;
6pub mod policy;
7pub mod security_server;
8
9pub use security_server::SecurityServer;
10
11mod access_vector_cache;
12mod exceptions_config;
13mod fifo_cache;
14mod sid_table;
15mod sync;
16
17use policy::arrays::FsUseType;
18
19use std::num::NonZeroU32;
20
21/// The Security ID (SID) used internally to refer to a security context.
22#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
23pub struct SecurityId(NonZeroU32);
24
25impl SecurityId {
26    /// Returns a `SecurityId` encoding the specified initial Security Context.
27    /// These are used when labeling kernel resources created before policy
28    /// load, allowing the policy to determine the Security Context to use.
29    pub fn initial(initial_sid: InitialSid) -> Self {
30        Self(NonZeroU32::new(initial_sid as u32).unwrap())
31    }
32}
33
34/// A class that may appear in SELinux policy or an access vector cache query.
35#[derive(Clone, Debug, Hash, PartialEq, Eq)]
36pub enum AbstractObjectClass {
37    Unspecified,
38    /// A well-known class used in the SELinux system, such as `process` or `file`.
39    System(ObjectClass),
40    /// A custom class that only has meaning in policies that define class with the given string
41    /// name.
42    Custom(String),
43}
44
45impl Default for AbstractObjectClass {
46    fn default() -> Self {
47        Self::Unspecified
48    }
49}
50
51/// Declares an `enum` and implements an `all_variants()` API for it.
52macro_rules! enumerable_enum {
53    ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
54        $($(#[$variant_meta:meta])* $variant:ident,)*
55    }) => {
56        $(#[$meta])*
57        pub enum $name {
58            $($(#[$variant_meta])* $variant,)*
59            $(Common($common_name),)?
60        }
61
62        impl $name {
63            pub fn all_variants() -> Vec<Self> {
64                let all_variants = vec![$($name::$variant),*];
65                $(let mut all_variants = all_variants; all_variants.extend($common_name::all_variants().into_iter().map(Self::Common));)?
66                all_variants
67            }
68        }
69    }
70}
71
72enumerable_enum! {
73    /// A well-known class in SELinux policy that has a particular meaning in policy enforcement
74    /// hooks.
75    #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)]
76    ObjectClass {
77        // keep-sorted start
78        /// The SELinux "anon_inode" object class.
79        AnonFsNode,
80        /// The SELinux "blk_file" object class.
81        Block,
82        /// The SELinux "bpf" object class.
83        Bpf,
84        /// The SELinux "capability" object class.
85        Capability,
86        /// The SELinux "capability2" object class.
87        Capability2,
88        /// The SELinux "chr_file" object class.
89        Character,
90        /// The SELinux "dir" object class.
91        Dir,
92        /// The SELinux "fd" object class.
93        Fd,
94        /// The SELinux "fifo_file" object class.
95        Fifo,
96        /// The SELinux "file" object class.
97        File,
98        /// The SELinux "filesystem" object class.
99        FileSystem,
100        /// The SELinux "key_socket" object class.
101        KeySocket,
102        /// The SELinux "lnk_file" object class.
103        Link,
104        /// The SELinux "netlink_audit_socket" object class.
105        NetlinkAuditSocket,
106        /// The SELinux "netlink_connector_socket" object class.
107        NetlinkConnectorSocket,
108        /// The SELinux "netlink_crypto_socket" object class.
109        NetlinkCryptoSocket,
110        /// The SELinux "netlink_dnrt_socket" object class.
111        NetlinkDnrtSocket,
112        /// The SELinux "netlink_fib_lookup_socket" object class.
113        NetlinkFibLookupSocket,
114        /// The SELinux "netlink_firewall_socket" object class.
115        NetlinkFirewallSocket,
116        /// The SELinux "netlink_generic_socket" object class.
117        NetlinkGenericSocket,
118        /// The SELinux "netlink_ip6fw_socket" object class.
119        NetlinkIp6FwSocket,
120        /// The SELinux "netlink_iscsi_socket" object class.
121        NetlinkIscsiSocket,
122        /// The SELinux "netlink_kobject_uevent_socket" object class.
123        NetlinkKobjectUeventSocket,
124        /// The SELinux "netlink_netfilter_socket" object class.
125        NetlinkNetfilterSocket,
126        /// The SELinux "netlink_nflog_socket" object class.
127        NetlinkNflogSocket,
128        /// The SELinux "netlink_rdma_socket" object class.
129        NetlinkRdmaSocket,
130        /// The SELinux "netlink_route_socket" object class.
131        NetlinkRouteSocket,
132        /// The SELinux "netlink_scsitransport_socket" object class.
133        NetlinkScsitransportSocket,
134        /// The SELinux "netlink_selinux_socket" object class.
135        NetlinkSelinuxSocket,
136        /// The SELinux "netlink_socket" object class.
137        NetlinkSocket,
138        /// The SELinux "netlink_tcpdiag_socket" object class.
139        NetlinkTcpDiagSocket,
140        /// The SELinux "netlink_xfrm_socket" object class.
141        NetlinkXfrmSocket,
142        /// The SELinux "packet_socket" object class.
143        PacketSocket,
144        /// The SELinux "process" object class.
145        Process,
146        /// The SELinux "rawip_socket" object class.
147        RawIpSocket,
148        /// The SELinux "security" object class.
149        Security,
150        /// The SELinux "sock_file" object class.
151        SockFile,
152        /// The SELinux "socket" object class.
153        Socket,
154        /// The SELinux "tcp_socket" object class.
155        TcpSocket,
156        /// The SELinux "udp_socket" object class.
157        UdpSocket,
158        /// The SELinux "unix_dgram_socket" object class.
159        UnixDgramSocket,
160        /// The SELinux "unix_stream_socket" object class.
161        UnixStreamSocket,
162        /// The SELinux "vsock_socket" object class.
163        VSockSocket,
164        // keep-sorted end
165    }
166}
167
168impl ObjectClass {
169    /// Returns the name used to refer to this object class in the SELinux binary policy.
170    pub fn name(&self) -> &'static str {
171        match self {
172            // keep-sorted start
173            Self::AnonFsNode => "anon_inode",
174            Self::Block => "blk_file",
175            Self::Bpf => "bpf",
176            Self::Capability => "capability",
177            Self::Capability2 => "capability2",
178            Self::Character => "chr_file",
179            Self::Dir => "dir",
180            Self::Fd => "fd",
181            Self::Fifo => "fifo_file",
182            Self::File => "file",
183            Self::FileSystem => "filesystem",
184            Self::KeySocket => "key_socket",
185            Self::Link => "lnk_file",
186            Self::NetlinkAuditSocket => "netlink_audit_socket",
187            Self::NetlinkConnectorSocket => "netlink_connector_socket",
188            Self::NetlinkCryptoSocket => "netlink_crypto_socket",
189            Self::NetlinkDnrtSocket => "netlink_dnrt_socket",
190            Self::NetlinkFibLookupSocket => "netlink_fib_lookup_socket",
191            Self::NetlinkFirewallSocket => "netlink_firewall_socket",
192            Self::NetlinkGenericSocket => "netlink_generic_socket",
193            Self::NetlinkIp6FwSocket => "netlink_ip6fw_socket",
194            Self::NetlinkIscsiSocket => "netlink_iscsi_socket",
195            Self::NetlinkKobjectUeventSocket => "netlink_kobject_uevent_socket",
196            Self::NetlinkNetfilterSocket => "netlink_netfilter_socket",
197            Self::NetlinkNflogSocket => "netlink_nflog_socket",
198            Self::NetlinkRdmaSocket => "netlink_rdma_socket",
199            Self::NetlinkRouteSocket => "netlink_route_socket",
200            Self::NetlinkScsitransportSocket => "netlink_scsitransport_socket",
201            Self::NetlinkSelinuxSocket => "netlink_selinux_socket",
202            Self::NetlinkSocket => "netlink_socket",
203            Self::NetlinkTcpDiagSocket => "netlink_tcpdiag_socket",
204            Self::NetlinkXfrmSocket => "netlink_xfrm_socket",
205            Self::PacketSocket => "packet_socket",
206            Self::Process => "process",
207            Self::RawIpSocket => "rawip_socket",
208            Self::Security => "security",
209            Self::SockFile => "sock_file",
210            Self::Socket => "socket",
211            Self::TcpSocket => "tcp_socket",
212            Self::UdpSocket => "udp_socket",
213            Self::UnixDgramSocket => "unix_dgram_socket",
214            Self::UnixStreamSocket => "unix_stream_socket",
215            Self::VSockSocket => "vsock_socket",
216            // keep-sorted end
217        }
218    }
219}
220
221impl From<ObjectClass> for AbstractObjectClass {
222    fn from(object_class: ObjectClass) -> Self {
223        Self::System(object_class)
224    }
225}
226
227impl From<String> for AbstractObjectClass {
228    fn from(name: String) -> Self {
229        Self::Custom(name)
230    }
231}
232
233enumerable_enum! {
234    /// Covers the set of classes that inherit from the common "cap" symbol (e.g. "capability" for
235    /// now and "cap_userns" after Starnix gains user namespacing support).
236    #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
237    CapClass {
238        // keep-sorted start
239        /// The SELinux "capability" object class.
240        Capability,
241        // keep-sorted end
242    }
243}
244
245impl From<CapClass> for ObjectClass {
246    fn from(cap_class: CapClass) -> Self {
247        match cap_class {
248            // keep-sorted start
249            CapClass::Capability => Self::Capability,
250            // keep-sorted end
251        }
252    }
253}
254
255enumerable_enum! {
256    /// Covers the set of classes that inherit from the common "cap2" symbol (e.g. "capability2" for
257    /// now and "cap2_userns" after Starnix gains user namespacing support).
258    #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
259    Cap2Class {
260        // keep-sorted start
261        /// The SELinux "capability2" object class.
262        Capability2,
263        // keep-sorted end
264    }
265}
266
267impl From<Cap2Class> for ObjectClass {
268    fn from(cap2_class: Cap2Class) -> Self {
269        match cap2_class {
270            // keep-sorted start
271            Cap2Class::Capability2 => Self::Capability2,
272            // keep-sorted end
273        }
274    }
275}
276
277enumerable_enum! {
278    /// A well-known file-like class in SELinux policy that has a particular meaning in policy
279    /// enforcement hooks.
280    #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
281    FileClass {
282        // keep-sorted start
283        /// The SELinux "anon_inode" object class.
284        AnonFsNode,
285        /// The SELinux "blk_file" object class.
286        Block,
287        /// The SELinux "chr_file" object class.
288        Character,
289        /// The SELinux "dir" object class.
290        Dir,
291        /// The SELinux "fifo_file" object class.
292        Fifo,
293        /// The SELinux "file" object class.
294        File,
295        /// The SELinux "lnk_file" object class.
296        Link,
297        /// The SELinux "sock_file" object class.
298        SockFile,
299        // keep-sorted end
300    }
301}
302
303impl From<FileClass> for ObjectClass {
304    fn from(file_class: FileClass) -> Self {
305        match file_class {
306            // keep-sorted start
307            FileClass::AnonFsNode => Self::AnonFsNode,
308            FileClass::Block => Self::Block,
309            FileClass::Character => Self::Character,
310            FileClass::Dir => Self::Dir,
311            FileClass::Fifo => Self::Fifo,
312            FileClass::File => Self::File,
313            FileClass::Link => Self::Link,
314            FileClass::SockFile => Self::SockFile,
315            // keep-sorted end
316        }
317    }
318}
319
320enumerable_enum! {
321    /// Distinguishes socket-like kernel object classes defined in SELinux policy.
322    #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
323    SocketClass {
324        // keep-sorted start
325        Key,
326        Netlink,
327        NetlinkAudit,
328        NetlinkConnector,
329        NetlinkCrypto,
330        NetlinkDnrt,
331        NetlinkFibLookup,
332        NetlinkFirewall,
333        NetlinkGeneric,
334        NetlinkIp6Fw,
335        NetlinkIscsi,
336        NetlinkKobjectUevent,
337        NetlinkNetfilter,
338        NetlinkNflog,
339        NetlinkRdma,
340        NetlinkRoute,
341        NetlinkScsitransport,
342        NetlinkSelinux,
343        NetlinkTcpDiag,
344        NetlinkXfrm,
345        Packet,
346        RawIp,
347        /// Generic socket class applied to all socket-like objects for which no more specific
348        /// class is defined.
349        Socket,
350        Tcp,
351        Udp,
352        UnixDgram,
353        UnixStream,
354        Vsock,
355        // keep-sorted end
356    }
357}
358
359impl From<SocketClass> for ObjectClass {
360    fn from(socket_class: SocketClass) -> Self {
361        match socket_class {
362            // keep-sorted start
363            SocketClass::Key => Self::KeySocket,
364            SocketClass::Netlink => Self::NetlinkSocket,
365            SocketClass::NetlinkAudit => Self::NetlinkAuditSocket,
366            SocketClass::NetlinkConnector => Self::NetlinkConnectorSocket,
367            SocketClass::NetlinkCrypto => Self::NetlinkCryptoSocket,
368            SocketClass::NetlinkDnrt => Self::NetlinkDnrtSocket,
369            SocketClass::NetlinkFibLookup => Self::NetlinkFibLookupSocket,
370            SocketClass::NetlinkFirewall => Self::NetlinkFirewallSocket,
371            SocketClass::NetlinkGeneric => Self::NetlinkGenericSocket,
372            SocketClass::NetlinkIp6Fw => Self::NetlinkIp6FwSocket,
373            SocketClass::NetlinkIscsi => Self::NetlinkIscsiSocket,
374            SocketClass::NetlinkKobjectUevent => Self::NetlinkDnrtSocket,
375            SocketClass::NetlinkNetfilter => Self::NetlinkNetfilterSocket,
376            SocketClass::NetlinkNflog => Self::NetlinkNflogSocket,
377            SocketClass::NetlinkRdma => Self::NetlinkRdmaSocket,
378            SocketClass::NetlinkRoute => Self::NetlinkRouteSocket,
379            SocketClass::NetlinkScsitransport => Self::NetlinkScsitransportSocket,
380            SocketClass::NetlinkSelinux => Self::NetlinkSelinuxSocket,
381            SocketClass::NetlinkTcpDiag => Self::NetlinkTcpDiagSocket,
382            SocketClass::NetlinkXfrm => Self::NetlinkXfrmSocket,
383            SocketClass::Packet => Self::PacketSocket,
384            SocketClass::RawIp => Self::RawIpSocket,
385            SocketClass::Socket => Self::Socket,
386            SocketClass::Tcp => Self::TcpSocket,
387            SocketClass::Udp => Self::UdpSocket,
388            SocketClass::UnixDgram => Self::UnixDgramSocket,
389            SocketClass::UnixStream => Self::UnixStreamSocket,
390            SocketClass::Vsock => Self::VSockSocket,
391            // keep-sorted end
392        }
393    }
394}
395
396/// Container for a security class that could be associated with a [`crate::vfs::FsNode`], to allow
397/// permissions common to both file-like and socket-like classes to be generated easily by hooks.
398#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
399pub enum FsNodeClass {
400    File(FileClass),
401    Socket(SocketClass),
402}
403
404impl From<FsNodeClass> for ObjectClass {
405    fn from(class: FsNodeClass) -> Self {
406        match class {
407            FsNodeClass::File(file_class) => file_class.into(),
408            FsNodeClass::Socket(sock_class) => sock_class.into(),
409        }
410    }
411}
412
413impl From<FileClass> for FsNodeClass {
414    fn from(file_class: FileClass) -> Self {
415        FsNodeClass::File(file_class)
416    }
417}
418
419impl From<SocketClass> for FsNodeClass {
420    fn from(sock_class: SocketClass) -> Self {
421        FsNodeClass::Socket(sock_class)
422    }
423}
424
425/// A permission that may appear in SELinux policy or an access vector cache query.
426#[derive(Clone, Debug, PartialEq)]
427pub enum AbstractPermission {
428    /// A permission that is interpreted directly by the system. These are kernel objects such as
429    /// a "process", "file", etc.
430    System(Permission),
431    /// A permission with an arbitrary string identifier.
432    Custom { class: AbstractObjectClass, permission: String },
433}
434
435impl AbstractPermission {
436    pub fn new_custom(class: AbstractObjectClass, permission: String) -> Self {
437        Self::Custom { class, permission }
438    }
439}
440
441impl From<Permission> for AbstractPermission {
442    fn from(permission: Permission) -> Self {
443        Self::System(permission)
444    }
445}
446
447pub trait ClassPermission {
448    fn class(&self) -> ObjectClass;
449}
450
451macro_rules! permission_enum {
452    ($(#[$meta:meta])* $name:ident {
453        $($(#[$variant_meta:meta])* $variant:ident($inner:ident)),*,
454    }) => {
455        $(#[$meta])*
456        pub enum $name {
457            $($(#[$variant_meta])* $variant($inner)),*
458        }
459
460        $(impl From<$inner> for $name {
461            fn from(v: $inner) -> Self {
462                Self::$variant(v)
463            }
464        })*
465
466        impl ClassPermission for $name {
467            fn class(&self) -> ObjectClass {
468                match self {
469                    $($name::$variant(_) => ObjectClass::$variant),*
470                }
471            }
472        }
473
474        impl $name {
475            pub fn name(&self) -> &'static str {
476                match self {
477                    $($name::$variant(v) => v.name()),*
478                }
479            }
480
481            pub fn all_variants() -> Vec<Self> {
482                let mut all_variants = vec![];
483                $(all_variants.extend($inner::all_variants().into_iter().map($name::from));)*
484                all_variants
485            }
486        }
487    }
488}
489
490permission_enum! {
491    /// A well-known `(class, permission)` pair in SELinux policy that has a particular meaning in
492    /// policy enforcement hooks.
493    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
494    Permission {
495        // keep-sorted start
496        /// Permissions for the well-known SELinux "anon_inode" file-like object class.
497        AnonFsNode(AnonFsNodePermission),
498        /// Permissions for the well-known SELinux "blk_file" file-like object class.
499        Block(BlockFilePermission),
500        /// Permissions for the well-known SELinux "bpf" file-like object class.
501        Bpf(BpfPermission),
502        /// Permissions for the well-known SELinux "capability" object class.
503        Capability(CapabilityPermission),
504        /// Permissions for the well-known SELinux "capability2" object class.
505        Capability2(Capability2Permission),
506        /// Permissions for the well-known SELinux "chr_file" file-like object class.
507        Character(CharacterFilePermission),
508        /// Permissions for the well-known SELinux "dir" file-like object class.
509        Dir(DirPermission),
510        /// Permissions for the well-known SELinux "fd" object class.
511        Fd(FdPermission),
512        /// Permissions for the well-known SELinux "fifo_file" file-like object class.
513        Fifo(FifoFilePermission),
514        /// Permissions for the well-known SELinux "file" object class.
515        File(FilePermission),
516        /// Permissions for the well-known SELinux "filesystem" object class.
517        FileSystem(FileSystemPermission),
518        /// Permissions for the well-known SELinux "packet_socket" object class.
519        KeySocket(KeySocketPermission),
520        /// Permissions for the well-known SELinux "lnk_file" file-like object class.
521        Link(LinkFilePermission),
522        /// Permissions for the well-known SELinux "netlink_audit_socket" file-like object class.
523        NetlinkAuditSocket(NetlinkAuditSocketPermission),
524        /// Permissions for the well-known SELinux "netlink_connector_socket" file-like object class.
525        NetlinkConnectorSocket(NetlinkConnectorSocketPermission),
526        /// Permissions for the well-known SELinux "netlink_crypto_socket" file-like object class.
527        NetlinkCryptoSocket(NetlinkCryptoSocketPermission),
528        /// Permissions for the well-known SELinux "netlink_dnrt_socket" file-like object class.
529        NetlinkDnrtSocket(NetlinkDnrtSocketPermission),
530        /// Permissions for the well-known SELinux "netlink_fib_lookup_socket" file-like object class.
531        NetlinkFibLookupSocket(NetlinkFibLookupSocketPermission),
532        /// Permissions for the well-known SELinux "netlink_firewall_socket" file-like object class.
533        NetlinkFirewallSocket(NetlinkFirewallSocketPermission),
534        /// Permissions for the well-known SELinux "netlink_generic_socket" file-like object class.
535        NetlinkGenericSocket(NetlinkGenericSocketPermission),
536        /// Permissions for the well-known SELinux "netlink_ip6fw_socket" file-like object class.
537        NetlinkIp6FwSocket(NetlinkIp6FwSocketPermission),
538        /// Permissions for the well-known SELinux "netlink_iscsi_socket" file-like object class.
539        NetlinkIscsiSocket(NetlinkIscsiSocketPermission),
540        /// Permissions for the well-known SELinux "netlink_kobject_uevent_socket" file-like object class.
541        NetlinkKobjectUeventSocket(NetlinkKobjectUeventSocketPermission),
542        /// Permissions for the well-known SELinux "netlink_netfilter_socket" file-like object class.
543        NetlinkNetfilterSocket(NetlinkNetfilterSocketPermission),
544        /// Permissions for the well-known SELinux "netlink_nflog_socket" file-like object class.
545        NetlinkNflogSocket(NetlinkNflogSocketPermission),
546        /// Permissions for the well-known SELinux "netlink_rdma_socket" file-like object class.
547        NetlinkRdmaSocket(NetlinkRdmaSocketPermission),
548        /// Permissions for the well-known SELinux "netlink_route_socket" file-like object class.
549        NetlinkRouteSocket(NetlinkRouteSocketPermission),
550        /// Permissions for the well-known SELinux "netlink_scsitransport_socket" file-like object class.
551        NetlinkScsitransportSocket(NetlinkScsitransportSocketPermission),
552        /// Permissions for the well-known SELinux "netlink_selinux_socket" file-like object class.
553        NetlinkSelinuxSocket(NetlinkSelinuxSocketPermission),
554        /// Permissions for the well-known SELinux "netlink_socket" file-like object class.
555        NetlinkSocket(NetlinkSocketPermission),
556        /// Permissions for the well-known SELinux "netlink_tcpdiag_socket" file-like object class.
557        NetlinkTcpDiagSocket(NetlinkTcpDiagSocketPermission),
558        /// Permissions for the well-known SELinux "netlink_xfrm_socket" file-like object class.
559        NetlinkXfrmSocket(NetlinkXfrmSocketPermission),
560        /// Permissions for the well-known SELinux "packet_socket" object class.
561        PacketSocket(PacketSocketPermission),
562        /// Permissions for the well-known SELinux "process" object class.
563        Process(ProcessPermission),
564        /// Permissions for the well-known SELinux "rawip_socket" object class.
565        RawIpSocket(RawIpSocketPermission),
566        /// Permissions for access to parts of the "selinuxfs" used to administer and query SELinux.
567        Security(SecurityPermission),
568        /// Permissions for the well-known SELinux "sock_file" file-like object class.
569        SockFile(SockFilePermission),
570        /// Permissions for the well-known SELinux "socket" object class.
571        Socket(SocketPermission),
572        /// Permissions for the well-known SELinux "tcp_socket" object class.
573        TcpSocket(TcpSocketPermission),
574        /// Permissions for the well-known SELinux "udp_socket" object class.
575        UdpSocket(UdpSocketPermission),
576        /// Permissions for the well-known SELinux "unix_dgram_socket" object class.
577        UnixDgramSocket(UnixDgramSocketPermission),
578        /// Permissions for the well-known SELinux "unix_stream_socket" object class.
579        UnixStreamSocket(UnixStreamSocketPermission),
580        /// Permissions for the well-known SELinux "vsock_socket" object class.
581        VSockSocket(VsockSocketPermission),
582        // keep-sorted end
583    }
584}
585
586/// Helper used to define an enum of permission values, with specified names.
587/// Uses of this macro should not rely on "extends", which is solely for use to express permission
588/// inheritance in `class_permission_enum`.
589macro_rules! common_permission_enum {
590    ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
591        $($(#[$variant_meta:meta])* $variant:ident ($variant_name:literal),)*
592    }) => {
593        enumerable_enum! {
594            $(#[$meta])* $name $(extends $common_name)? {
595                $($(#[$variant_meta])* $variant,)*
596            }
597        }
598
599        impl $name {
600            fn name(&self) -> &'static str {
601                match self {
602                    $($name::$variant => $variant_name,)*
603                    $(Self::Common(v) => {let v:$common_name = v.clone(); v.name()},)?
604                }
605            }
606        }
607    }
608}
609
610/// Helper used to declare the set of named permissions associated with an SELinux class.
611/// The `ClassType` trait is implemented on the declared `enum`, enabling values to be wrapped into
612/// the generic `Permission` container.
613/// If an "extends" type is specified then a `Common` enum case is added, encapsulating the values
614/// of that underlying permission type. This is used to represent e.g. SELinux "dir" class deriving
615/// a basic set of permissions from the common "file" symbol.
616macro_rules! class_permission_enum {
617    ($(#[$meta:meta])* $name:ident $(extends $common_name:ident)? {
618        $($(#[$variant_meta:meta])* $variant:ident ($variant_name:literal),)*
619    }) => {
620        common_permission_enum! {
621            $(#[$meta])* $name $(extends $common_name)? {
622                $($(#[$variant_meta])* $variant ($variant_name),)*
623            }
624        }
625
626        impl ClassPermission for $name {
627            fn class(&self) -> ObjectClass {
628                Permission::from(self.clone()).class()
629            }
630        }
631    }
632}
633
634common_permission_enum! {
635    /// Permissions common to all cap-like object classes (e.g. "capability" for now and
636    /// "cap_userns" after Starnix gains user namespacing support). These are combined with a
637    /// specific `CapabilityClass` by policy enforcement hooks, to obtain class-affine permission
638    /// values to check.
639    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
640    CommonCapPermission {
641        // keep-sorted start
642
643        AuditControl("audit_control"),
644        AuditWrite("audit_write"),
645        Chown("chown"),
646        DacOverride("dac_override"),
647        DacReadSearch("dac_read_search"),
648        Fowner("fowner"),
649        Fsetid("fsetid"),
650        IpcLock("ipc_lock"),
651        IpcOwner("ipc_owner"),
652        Kill("kill"),
653        Lease("lease"),
654        LinuxImmutable("linux_immutable"),
655        Mknod("mknod"),
656        NetAdmin("net_admin"),
657        NetBindService("net_bind_service"),
658        NetBroadcast("net_broadcast"),
659        NetRaw("net_raw"),
660        Setfcap("setfcap"),
661        Setgid("setgid"),
662        Setpcap("setpcap"),
663        Setuid("setuid"),
664        SysAdmin("sys_admin"),
665        SysBoot("sys_boot"),
666        SysChroot("sys_chroot"),
667        SysModule("sys_module"),
668        SysNice("sys_nice"),
669        SysPacct("sys_pacct"),
670        SysPtrace("sys_ptrace"),
671        SysRawio("sys_rawio"),
672        SysResource("sys_resource"),
673        SysTime("sys_time"),
674        SysTtyConfig("sys_tty_config"),
675
676        // keep-sorted end
677    }
678}
679
680class_permission_enum! {
681    /// A well-known "capability" class permission in SELinux policy that has a particular meaning
682    /// in policy enforcement hooks.
683    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
684    CapabilityPermission extends CommonCapPermission {}
685}
686
687impl CommonCapPermission {
688    /// Returns the `class`-affine `Permission` value corresponding to this common permission.
689    /// This is used to allow hooks to resolve e.g. common "sys_nice" permission access based on the
690    /// "allow" rules for the correct target object class.
691    pub fn for_class(&self, class: CapClass) -> Permission {
692        match class {
693            CapClass::Capability => CapabilityPermission::Common(self.clone()).into(),
694        }
695    }
696}
697
698common_permission_enum! {
699    /// Permissions common to all cap2-like object classes (e.g. "capability2" for now and
700    /// "cap2_userns" after Starnix gains user namespacing support). These are combined with a
701    /// specific `Capability2Class` by policy enforcement hooks, to obtain class-affine permission
702    /// values to check.
703    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
704    CommonCap2Permission {
705        // keep-sorted start
706
707        AuditRead("audit_read"),
708        BlockSuspend("block_suspend"),
709        Bpf("bpf"),
710        MacAdmin("mac_admin"),
711        MacOverride("mac_override"),
712        Syslog("syslog"),
713        WakeAlarm("wake_alarm"),
714
715        // keep-sorted end
716    }
717}
718
719class_permission_enum! {
720    /// A well-known "capability2" class permission in SELinux policy that has a particular meaning
721    /// in policy enforcement hooks.
722    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
723    Capability2Permission extends CommonCap2Permission {}
724}
725
726impl CommonCap2Permission {
727    /// Returns the `class`-affine `Permission` value corresponding to this common permission.
728    /// This is used to allow hooks to resolve e.g. common "mac_admin" permission access based on
729    /// the "allow" rules for the correct target object class.
730    pub fn for_class(&self, class: Cap2Class) -> Permission {
731        match class {
732            Cap2Class::Capability2 => Capability2Permission::Common(self.clone()).into(),
733        }
734    }
735}
736
737common_permission_enum! {
738    /// Permissions meaningful for all [`crate::vfs::FsNode`]s, whether file- or socket-like.
739    ///
740    /// This extra layer of common permissions is not reflected in the hierarchy defined by the
741    /// SELinux Reference Policy. Because even common permissions are mapped per-class, by name, to
742    /// the policy equivalents, the implementation and policy notions of common permissions need not
743    /// be identical.
744    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
745    CommonFsNodePermission {
746        // keep-sorted start
747        /// Permission to append to a file or socket.
748        Append("append"),
749        /// Permission to create a file or socket.
750        Create("create"),
751        /// Permission to query attributes, including uid, gid and extended attributes.
752        GetAttr("getattr"),
753        /// Permission to execute ioctls on the file or socket.
754        Ioctl("ioctl"),
755        /// Permission to set and unset file or socket locks.
756        Lock("lock"),
757        /// Permission to map a file.
758        Map("map"),
759        /// Permission to read content from a file or socket, as well as reading or following links.
760        Read("read"),
761        /// Permission checked against the existing label when updating a node's security label.
762        RelabelFrom("relabelfrom"),
763        /// Permission checked against the new label when updating a node's security label.
764        RelabelTo("relabelto"),
765        /// Permission to modify attributes, including uid, gid and extended attributes.
766        SetAttr("setattr"),
767        /// Permission to write contents to the file or socket.
768        Write("write"),
769        // keep-sorted end
770    }
771}
772
773impl CommonFsNodePermission {
774    /// Returns the `class`-affine `Permission` value corresponding to this common permission.
775    /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
776    /// "allow" rules for the correct target object class.
777    pub fn for_class(&self, class: impl Into<FsNodeClass>) -> Permission {
778        match class.into() {
779            FsNodeClass::File(file_class) => {
780                CommonFilePermission::Common(self.clone()).for_class(file_class)
781            }
782            FsNodeClass::Socket(sock_class) => {
783                CommonSocketPermission::Common(self.clone()).for_class(sock_class)
784            }
785        }
786    }
787}
788common_permission_enum! {
789    /// Permissions common to all socket-like object classes. These are combined with a specific
790    /// `SocketClass` by policy enforcement hooks, to obtain class-affine permission values.
791    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
792    CommonSocketPermission extends CommonFsNodePermission {
793        // keep-sorted start
794        /// Permission to bind to a name.
795        Bind("bind"),
796        /// Permission to initiate a connection.
797        Connect("connect"),
798        // keep-sorted end
799    }
800}
801
802impl CommonSocketPermission {
803    /// Returns the `class`-affine `Permission` value corresponding to this common permission.
804    /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
805    /// "allow" rules for the correct target object class.
806    pub fn for_class(&self, class: SocketClass) -> Permission {
807        match class {
808            SocketClass::Key => KeySocketPermission::Common(self.clone()).into(),
809            SocketClass::Netlink => NetlinkSocketPermission::Common(self.clone()).into(),
810            SocketClass::NetlinkAudit => NetlinkAuditSocketPermission::Common(self.clone()).into(),
811            SocketClass::NetlinkConnector => {
812                NetlinkConnectorSocketPermission::Common(self.clone()).into()
813            }
814            SocketClass::NetlinkCrypto => {
815                NetlinkCryptoSocketPermission::Common(self.clone()).into()
816            }
817            SocketClass::NetlinkDnrt => NetlinkDnrtSocketPermission::Common(self.clone()).into(),
818            SocketClass::NetlinkFibLookup => {
819                NetlinkFibLookupSocketPermission::Common(self.clone()).into()
820            }
821            SocketClass::NetlinkFirewall => {
822                NetlinkFirewallSocketPermission::Common(self.clone()).into()
823            }
824            SocketClass::NetlinkGeneric => {
825                NetlinkGenericSocketPermission::Common(self.clone()).into()
826            }
827            SocketClass::NetlinkIp6Fw => NetlinkIp6FwSocketPermission::Common(self.clone()).into(),
828            SocketClass::NetlinkIscsi => NetlinkIscsiSocketPermission::Common(self.clone()).into(),
829            SocketClass::NetlinkKobjectUevent => {
830                NetlinkKobjectUeventSocketPermission::Common(self.clone()).into()
831            }
832            SocketClass::NetlinkNetfilter => {
833                NetlinkNetfilterSocketPermission::Common(self.clone()).into()
834            }
835            SocketClass::NetlinkNflog => NetlinkNflogSocketPermission::Common(self.clone()).into(),
836            SocketClass::NetlinkRdma => NetlinkRdmaSocketPermission::Common(self.clone()).into(),
837            SocketClass::NetlinkRoute => NetlinkRouteSocketPermission::Common(self.clone()).into(),
838            SocketClass::NetlinkScsitransport => {
839                NetlinkScsitransportSocketPermission::Common(self.clone()).into()
840            }
841            SocketClass::NetlinkSelinux => {
842                NetlinkSelinuxSocketPermission::Common(self.clone()).into()
843            }
844            SocketClass::NetlinkTcpDiag => {
845                NetlinkTcpDiagSocketPermission::Common(self.clone()).into()
846            }
847            SocketClass::NetlinkXfrm => NetlinkXfrmSocketPermission::Common(self.clone()).into(),
848            SocketClass::Packet => PacketSocketPermission::Common(self.clone()).into(),
849            SocketClass::RawIp => RawIpSocketPermission::Common(self.clone()).into(),
850            SocketClass::Socket => SocketPermission::Common(self.clone()).into(),
851            SocketClass::Tcp => TcpSocketPermission::Common(self.clone()).into(),
852            SocketClass::Udp => UdpSocketPermission::Common(self.clone()).into(),
853            SocketClass::UnixDgram => UnixDgramSocketPermission::Common(self.clone()).into(),
854            SocketClass::UnixStream => UnixStreamSocketPermission::Common(self.clone()).into(),
855            SocketClass::Vsock => VsockSocketPermission::Common(self.clone()).into(),
856        }
857    }
858}
859
860class_permission_enum! {
861    /// A well-known "key_socket" class permission in SELinux policy that has a particular meaning in
862    /// policy enforcement hooks.
863    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
864    KeySocketPermission extends CommonSocketPermission {
865    }
866}
867class_permission_enum! {
868    /// A well-known "netlink_socket" class permission in SELinux policy that has a particular meaning in
869    /// policy enforcement hooks.
870    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
871    NetlinkSocketPermission extends CommonSocketPermission {
872    }
873}
874
875class_permission_enum! {
876    /// A well-known "netlink_route_socket" class permission in SELinux policy that has a particular meaning in
877    /// policy enforcement hooks.
878    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
879    NetlinkRouteSocketPermission extends CommonSocketPermission {
880    }
881}
882
883class_permission_enum! {
884    /// A well-known "netlink_firewall_socket" class permission in SELinux policy that has a particular meaning in
885    /// policy enforcement hooks.
886    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
887    NetlinkFirewallSocketPermission extends CommonSocketPermission {
888    }
889}
890
891class_permission_enum! {
892    /// A well-known "netlink_tcpdiag_socket" class permission in SELinux policy that has a particular meaning in
893    /// policy enforcement hooks.
894    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
895    NetlinkTcpDiagSocketPermission extends CommonSocketPermission {
896    }
897}
898
899class_permission_enum! {
900    /// A well-known "netlink_nflog_socket" class permission in SELinux policy that has a particular meaning in
901    /// policy enforcement hooks.
902    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
903    NetlinkNflogSocketPermission extends CommonSocketPermission {
904    }
905}
906
907class_permission_enum! {
908    /// A well-known "netlink_xfrm_socket" class permission in SELinux policy that has a particular meaning in
909    /// policy enforcement hooks.
910    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
911    NetlinkXfrmSocketPermission extends CommonSocketPermission {
912    }
913}
914
915class_permission_enum! {
916    /// A well-known "netlink_selinux_socket" class permission in SELinux policy that has a particular meaning in
917    /// policy enforcement hooks.
918    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
919    NetlinkSelinuxSocketPermission extends CommonSocketPermission {
920    }
921}
922
923class_permission_enum! {
924    /// A well-known "netlink_iscsi_socket" class permission in SELinux policy that has a particular meaning in
925    /// policy enforcement hooks.
926    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
927    NetlinkIscsiSocketPermission extends CommonSocketPermission {
928    }
929}
930
931class_permission_enum! {
932    /// A well-known "netlink_audit_socket" class permission in SELinux policy that has a particular meaning in
933    /// policy enforcement hooks.
934    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
935    NetlinkAuditSocketPermission extends CommonSocketPermission {
936    }
937}
938
939class_permission_enum! {
940    /// A well-known "netlink_fib_lookup_socket" class permission in SELinux policy that has a particular meaning in
941    /// policy enforcement hooks.
942    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
943    NetlinkFibLookupSocketPermission extends CommonSocketPermission {
944    }
945}
946
947class_permission_enum! {
948    /// A well-known "netlink_connector_socket" class permission in SELinux policy that has a particular meaning in
949    /// policy enforcement hooks.
950    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
951    NetlinkConnectorSocketPermission extends CommonSocketPermission {
952    }
953}
954
955class_permission_enum! {
956    /// A well-known "netlink_netfilter_socket" class permission in SELinux policy that has a particular meaning in
957    /// policy enforcement hooks.
958    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
959    NetlinkNetfilterSocketPermission extends CommonSocketPermission {
960    }
961}
962
963class_permission_enum! {
964    /// A well-known "netlink_ip6fw_socket" class permission in SELinux policy that has a particular meaning in
965    /// policy enforcement hooks.
966    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
967    NetlinkIp6FwSocketPermission extends CommonSocketPermission {
968    }
969}
970
971class_permission_enum! {
972    /// A well-known "netlink_dnrt_socket" class permission in SELinux policy that has a particular meaning in
973    /// policy enforcement hooks.
974    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
975    NetlinkDnrtSocketPermission extends CommonSocketPermission {
976    }
977}
978
979class_permission_enum! {
980    /// A well-known "netlink_kobject_uevent_socket" class permission in SELinux policy that has a particular meaning in
981    /// policy enforcement hooks.
982    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
983    NetlinkKobjectUeventSocketPermission extends CommonSocketPermission {
984    }
985}
986
987class_permission_enum! {
988    /// A well-known "netlink_generic_socket" class permission in SELinux policy that has a particular meaning in
989    /// policy enforcement hooks.
990    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
991    NetlinkGenericSocketPermission extends CommonSocketPermission {
992    }
993}
994
995class_permission_enum! {
996    /// A well-known "netlink_scsitransport_socket" class permission in SELinux policy that has a particular meaning in
997    /// policy enforcement hooks.
998    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
999    NetlinkScsitransportSocketPermission extends CommonSocketPermission {
1000    }
1001}
1002
1003class_permission_enum! {
1004    /// A well-known "netlink_rdma_socket" class permission in SELinux policy that has a particular meaning in
1005    /// policy enforcement hooks.
1006    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1007    NetlinkRdmaSocketPermission extends CommonSocketPermission {
1008    }
1009}
1010
1011class_permission_enum! {
1012    /// A well-known "netlink_crypto_socket" class permission in SELinux policy that has a particular meaning in
1013    /// policy enforcement hooks.
1014    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1015    NetlinkCryptoSocketPermission extends CommonSocketPermission {
1016    }
1017}
1018
1019class_permission_enum! {
1020    /// A well-known "packet_socket" class permission in SELinux policy that has a particular meaning in
1021    /// policy enforcement hooks.
1022    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1023    PacketSocketPermission extends CommonSocketPermission {
1024    }
1025}
1026
1027class_permission_enum! {
1028    /// A well-known "rawip_socket" class permission in SELinux policy that has a particular meaning in
1029    /// policy enforcement hooks.
1030    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1031    RawIpSocketPermission extends CommonSocketPermission {
1032    }
1033}
1034
1035class_permission_enum! {
1036    /// A well-known "socket" class permission in SELinux policy that has a particular meaning in
1037    /// policy enforcement hooks.
1038    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1039    SocketPermission extends CommonSocketPermission {
1040    }
1041}
1042
1043class_permission_enum! {
1044    /// A well-known "tcp_socket" class permission in SELinux policy that has a particular meaning in
1045    /// policy enforcement hooks.
1046    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1047    TcpSocketPermission extends CommonSocketPermission {
1048    }
1049}
1050
1051class_permission_enum! {
1052    /// A well-known "udp_socket" class permission in SELinux policy that has a particular meaning in
1053    /// policy enforcement hooks.
1054    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1055    UdpSocketPermission extends CommonSocketPermission {
1056    }
1057}
1058
1059class_permission_enum! {
1060    /// A well-known "unix_stream_socket" class permission in SELinux policy that has a particular meaning in
1061    /// policy enforcement hooks.
1062    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1063    UnixStreamSocketPermission extends CommonSocketPermission {
1064    }
1065}
1066
1067class_permission_enum! {
1068    /// A well-known "unix_dgram_socket" class permission in SELinux policy that has a particular meaning in
1069    /// policy enforcement hooks.
1070    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1071    UnixDgramSocketPermission extends CommonSocketPermission {
1072    }
1073}
1074
1075class_permission_enum! {
1076    /// A well-known "vsock_socket" class permission in SELinux policy that has a particular meaning in
1077    /// policy enforcement hooks.
1078    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1079    VsockSocketPermission extends CommonSocketPermission {
1080    }
1081}
1082
1083common_permission_enum! {
1084    /// Permissions common to all file-like object classes (e.g. "lnk_file", "dir"). These are
1085    /// combined with a specific `FileClass` by policy enforcement hooks, to obtain class-affine
1086    /// permission values to check.
1087    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1088    CommonFilePermission extends CommonFsNodePermission {
1089        // keep-sorted start
1090        /// Permission to execute a file with domain transition.
1091        Execute("execute"),
1092        /// Permissions to create hard link.
1093        Link("link"),
1094        /// Permission to use as mount point; only useful for directories and files.
1095        MountOn("mounton"),
1096        /// Permission to open a file.
1097        Open("open"),
1098        /// Permission to rename a file.
1099        Rename("rename"),
1100        /// Permission to delete a file or remove a hard link.
1101        Unlink("unlink"),
1102        // keep-sorted end
1103    }
1104}
1105
1106impl CommonFilePermission {
1107    /// Returns the `class`-affine `Permission` value corresponding to this common permission.
1108    /// This is used to allow hooks to resolve e.g. common "read" permission access based on the
1109    /// "allow" rules for the correct target object class.
1110    pub fn for_class(&self, class: FileClass) -> Permission {
1111        match class {
1112            FileClass::AnonFsNode => AnonFsNodePermission::Common(self.clone()).into(),
1113            FileClass::Block => BlockFilePermission::Common(self.clone()).into(),
1114            FileClass::Character => CharacterFilePermission::Common(self.clone()).into(),
1115            FileClass::Dir => DirPermission::Common(self.clone()).into(),
1116            FileClass::Fifo => FifoFilePermission::Common(self.clone()).into(),
1117            FileClass::File => FilePermission::Common(self.clone()).into(),
1118            FileClass::Link => LinkFilePermission::Common(self.clone()).into(),
1119            FileClass::SockFile => SockFilePermission::Common(self.clone()).into(),
1120        }
1121    }
1122}
1123
1124class_permission_enum! {
1125    /// A well-known "anon_file" class permission used to manage special file-like nodes not linked
1126    /// into any directory structures.
1127    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1128    AnonFsNodePermission extends CommonFilePermission {
1129    }
1130}
1131
1132class_permission_enum! {
1133    /// A well-known "blk_file" class permission in SELinux policy that has a particular meaning in
1134    /// policy enforcement hooks.
1135    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1136    BlockFilePermission extends CommonFilePermission {
1137    }
1138}
1139
1140class_permission_enum! {
1141    /// A well-known "chr_file" class permission in SELinux policy that has a particular meaning in
1142    /// policy enforcement hooks.
1143    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1144    CharacterFilePermission extends CommonFilePermission {
1145    }
1146}
1147
1148class_permission_enum! {
1149    /// A well-known "dir" class permission in SELinux policy that has a particular meaning in
1150    /// policy enforcement hooks.
1151    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1152    DirPermission extends CommonFilePermission {
1153        // keep-sorted start
1154        /// Permission to add a file to the directory.
1155        AddName("add_name"),
1156        /// Permission to remove a directory.
1157        RemoveDir("rmdir"),
1158        /// Permission to remove an entry from a directory.
1159        RemoveName("remove_name"),
1160        /// Permission to change parent directory.
1161        Reparent("reparent"),
1162        /// Search access to the directory.
1163        Search("search"),
1164        // keep-sorted end
1165    }
1166}
1167
1168class_permission_enum! {
1169    /// A well-known "fd" class permission in SELinux policy that has a particular meaning in policy
1170    /// enforcement hooks.
1171    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1172    FdPermission {
1173        // keep-sorted start
1174        /// Permission to use file descriptors copied/retained/inherited from another security
1175        /// context. This permission is generally used to control whether an `exec*()` call from a
1176        /// cloned process that retained a copy of the file descriptor table should succeed.
1177        Use("use"),
1178        // keep-sorted end
1179    }
1180}
1181
1182class_permission_enum! {
1183    /// A well-known "bpf" class permission in SELinux policy that has a particular meaning in
1184    /// policy enforcement hooks.
1185    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1186    BpfPermission {
1187        // keep-sorted start
1188        /// Permission to create a map.
1189        MapCreate("map_create"),
1190        /// Permission to read from a map.
1191        MapRead("map_read"),
1192        /// Permission to write on a map.
1193        MapWrite("map_write"),
1194        /// Permission to load a program.
1195        ProgLoad("prog_load"),
1196        /// Permission to run a program.
1197        ProgRun("prog_run"),
1198        // keep-sorted end
1199    }
1200}
1201
1202class_permission_enum! {
1203    /// A well-known "fifo_file" class permission in SELinux policy that has a particular meaning in
1204    /// policy enforcement hooks.
1205    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1206    FifoFilePermission extends CommonFilePermission {
1207    }
1208}
1209
1210class_permission_enum! {
1211    /// A well-known "file" class permission in SELinux policy that has a particular meaning in
1212    /// policy enforcement hooks.
1213    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1214    FilePermission extends CommonFilePermission {
1215        // keep-sorted start
1216        /// Permission to use a file as an entry point into the new domain on transition.
1217        Entrypoint("entrypoint"),
1218        /// Permission to use a file as an entry point to the calling domain without performing a
1219        /// transition.
1220        ExecuteNoTrans("execute_no_trans"),
1221        // keep-sorted end
1222    }
1223}
1224
1225class_permission_enum! {
1226    /// A well-known "filesystem" class permission in SELinux policy that has a particular meaning in
1227    /// policy enforcement hooks.
1228    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1229    FileSystemPermission {
1230        // keep-sorted start
1231        /// Permission to associate a file to the filesystem.
1232        Associate("associate"),
1233        /// Permission to get filesystem attributes.
1234        GetAttr("getattr"),
1235        /// Permission mount a filesystem.
1236        Mount("mount"),
1237        /// Permission to remount a filesystem with different flags.
1238        Remount("remount"),
1239        /// Permission to unmount a filesystem.
1240        Unmount("unmount"),
1241        // keep-sorted end
1242    }
1243}
1244
1245class_permission_enum! {
1246    /// A well-known "lnk_file" class permission in SELinux policy that has a particular meaning in
1247    /// policy enforcement hooks.
1248    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1249    LinkFilePermission extends CommonFilePermission {
1250    }
1251}
1252
1253class_permission_enum! {
1254    /// A well-known "sock_file" class permission in SELinux policy that has a particular meaning in
1255    /// policy enforcement hooks.
1256    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1257    SockFilePermission extends CommonFilePermission {
1258    }
1259}
1260
1261class_permission_enum! {
1262    /// A well-known "process" class permission in SELinux policy that has a particular meaning in
1263    /// policy enforcement hooks.
1264    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1265    ProcessPermission {
1266        // keep-sorted start
1267        /// Permission to dynamically transition a process to a different security domain.
1268        DynTransition("dyntransition"),
1269        /// Permission to execute arbitrary code from memory.
1270        ExecMem("execmem"),
1271        /// Permission to fork the current running process.
1272        Fork("fork"),
1273        /// Permission to get the process group ID.
1274        GetPgid("getpgid"),
1275        /// Permission to get the resource limits on a process.
1276        GetRlimit("getrlimit"),
1277        /// Permission to get scheduling policy currently applied to a process.
1278        GetSched("getsched"),
1279        /// Permission to get the session ID.
1280        GetSession("getsession"),
1281        /// Permission to trace a process.
1282        Ptrace("ptrace"),
1283        /// Permission to inherit the parent process's resource limits on exec.
1284        RlimitInh("rlimitinh"),
1285        /// Permission to set the calling task's current Security Context.
1286        /// The "dyntransition" permission separately limits which Contexts "setcurrent" may be used to transition to.
1287        SetCurrent("setcurrent"),
1288        /// Permission to set the Security Context used by `exec()`.
1289        SetExec("setexec"),
1290        /// Permission to set the Security Context used when creating filesystem objects.
1291        SetFsCreate("setfscreate"),
1292        /// Permission to set the Security Context used when creating kernel keyrings.
1293        SetKeyCreate("setkeycreate"),
1294        /// Permission to set the process group ID.
1295        SetPgid("setpgid"),
1296        /// Permission to set the resource limits on a process.
1297        SetRlimit("setrlimit"),
1298        /// Permission to set scheduling policy for a process.
1299        SetSched("setsched"),
1300        /// Permission to set the Security Context used when creating new labeled sockets.
1301        SetSockCreate("setsockcreate"),
1302        /// Permission to share resources (e.g. FD table, address-space, etc) with a process.
1303        Share("share"),
1304        /// Permission to send SIGCHLD to a process.
1305        SigChld("sigchld"),
1306        /// Permission to send SIGKILL to a process.
1307        SigKill("sigkill"),
1308        /// Permission to send SIGSTOP to a process.
1309        SigStop("sigstop"),
1310        /// Permission to send a signal other than SIGKILL, SIGSTOP, or SIGCHLD to a process.
1311        Signal("signal"),
1312        /// Permission to transition to a different security domain.
1313        Transition("transition"),
1314        // keep-sorted end
1315    }
1316}
1317
1318class_permission_enum! {
1319    /// A well-known "security" class permission in SELinux policy, used to control access to
1320    /// sensitive administrative and query API surfaces in the "selinuxfs".
1321    #[derive(Clone, Debug, Eq, Hash, PartialEq)]
1322    SecurityPermission {
1323        // keep-sorted start
1324        /// Permission to validate Security Context using the "context" API.
1325        CheckContext("check_context"),
1326        /// Permission to compute access vectors via the "access" API.
1327        ComputeAv("compute_av"),
1328        /// Permission to compute security contexts for newly created objects via "create".
1329        ComputeCreate("compute_create"),
1330        /// Permission to load a new binary policy into the kernel via the "load" API.
1331        LoadPolicy("load_policy"),
1332        /// Permission to commit booleans to control conditional elements of the policy.
1333        SetBool("setbool"),
1334        /// Permission to change the way permissions are validated for `mmap()` operations.
1335        SetCheckReqProt("setcheckreqprot"),
1336        /// Permission to switch the system between permissive and enforcing modes, via "enforce".
1337        SetEnforce("setenforce"),
1338        // keep-sorted end
1339     }
1340}
1341
1342/// Initial Security Identifier (SID) values defined by the SELinux Reference Policy.
1343/// Where the SELinux Reference Policy retains definitions for some deprecated initial SIDs, this
1344/// enum omits deprecated entries for clarity.
1345#[repr(u64)]
1346enum ReferenceInitialSid {
1347    Kernel = 1,
1348    Security = 2,
1349    Unlabeled = 3,
1350    _Fs = 4,
1351    File = 5,
1352    _AnySocket = 6,
1353    _Port = 7,
1354    _Netif = 8,
1355    _Netmsg = 9,
1356    _Node = 10,
1357    _Sysctl = 15,
1358    _Devnull = 25,
1359
1360    FirstUnused,
1361}
1362
1363/// Lowest Security Identifier value guaranteed not to be used by this
1364/// implementation to refer to an initial Security Context.
1365pub const FIRST_UNUSED_SID: u32 = ReferenceInitialSid::FirstUnused as u32;
1366
1367macro_rules! initial_sid_enum {
1368    ($(#[$meta:meta])* $name:ident {
1369        $($(#[$variant_meta:meta])* $variant:ident ($variant_name: literal)),*,
1370    }) => {
1371        $(#[$meta])*
1372        pub enum $name {
1373            $($(#[$variant_meta])* $variant = ReferenceInitialSid::$variant as isize),*
1374        }
1375
1376        impl $name {
1377            pub fn all_variants() -> Vec<Self> {
1378                vec![
1379                    $($name::$variant),*
1380                ]
1381            }
1382
1383            pub fn name(&self) -> &'static str {
1384                match self {
1385                    $($name::$variant => $variant_name),*
1386                }
1387            }
1388        }
1389    }
1390}
1391
1392initial_sid_enum! {
1393/// Initial Security Identifier (SID) values actually used by this implementation.
1394/// These must be present in the policy, for it to be valid.
1395#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)]
1396    InitialSid {
1397        // keep-sorted start
1398        File("file"),
1399        Kernel("kernel"),
1400        Security("security"),
1401        Unlabeled("unlabeled"),
1402        // keep-sorted end
1403    }
1404}
1405
1406/// A borrowed byte slice that contains no `NUL` characters by truncating the input slice at the
1407/// first `NUL` (if any) upon construction.
1408#[derive(Clone, Copy, Debug, PartialEq)]
1409pub struct NullessByteStr<'a>(&'a [u8]);
1410
1411impl<'a> NullessByteStr<'a> {
1412    /// Returns a non-null-terminated representation of the security context string.
1413    pub fn as_bytes(&self) -> &[u8] {
1414        &self.0
1415    }
1416}
1417
1418impl<'a, S: AsRef<[u8]> + ?Sized> From<&'a S> for NullessByteStr<'a> {
1419    /// Any `AsRef<[u8]>` can be processed into a [`NullessByteStr`]. The [`NullessByteStr`] will
1420    /// retain everything up to (but not including) a null character, or else the complete byte
1421    /// string.
1422    fn from(s: &'a S) -> Self {
1423        let value = s.as_ref();
1424        match value.iter().position(|c| *c == 0) {
1425            Some(end) => Self(&value[..end]),
1426            None => Self(value),
1427        }
1428    }
1429}
1430
1431#[derive(Clone, Debug, PartialEq)]
1432pub struct FileSystemMountSids {
1433    pub context: Option<SecurityId>,
1434    pub fs_context: Option<SecurityId>,
1435    pub def_context: Option<SecurityId>,
1436    pub root_context: Option<SecurityId>,
1437}
1438
1439#[derive(Clone, Debug, PartialEq)]
1440pub struct FileSystemLabel {
1441    pub sid: SecurityId,
1442    pub scheme: FileSystemLabelingScheme,
1443    // Sids obtained by parsing the mount options of the FileSystem.
1444    pub mount_sids: FileSystemMountSids,
1445}
1446
1447#[derive(Clone, Debug, PartialEq)]
1448pub enum FileSystemLabelingScheme {
1449    /// This filesystem was mounted with "context=".
1450    Mountpoint { sid: SecurityId },
1451    /// This filesystem has an "fs_use_xattr", "fs_use_task", or "fs_use_trans" entry in the
1452    /// policy. `root_sid` identifies the context for the root of the filesystem and
1453    /// `computed_def_sid`  identifies the context to use for unlabeled files in the filesystem
1454    /// (the "default context").
1455    FsUse { fs_use_type: FsUseType, computed_def_sid: SecurityId },
1456    /// This filesystem has one or more "genfscon" statements associated with it in the policy.
1457    GenFsCon,
1458}
1459
1460/// SELinux security context-related filesystem mount options. These options are documented in the
1461/// `context=context, fscontext=context, defcontext=context, and rootcontext=context` section of
1462/// the `mount(8)` manpage.
1463#[derive(Clone, Debug, Default, PartialEq)]
1464pub struct FileSystemMountOptions {
1465    /// Specifies the effective security context to use for all nodes in the filesystem, and the
1466    /// filesystem itself. If the filesystem already contains security attributes then these are
1467    /// ignored. May not be combined with any of the other options.
1468    pub context: Option<Vec<u8>>,
1469    /// Specifies an effective security context to use for un-labeled nodes in the filesystem,
1470    /// rather than falling-back to the policy-defined "file" context.
1471    pub def_context: Option<Vec<u8>>,
1472    /// The value of the `fscontext=[security-context]` mount option. This option is used to
1473    /// label the filesystem (superblock) itself.
1474    pub fs_context: Option<Vec<u8>>,
1475    /// The value of the `rootcontext=[security-context]` mount option. This option is used to
1476    /// (re)label the inode located at the filesystem mountpoint.
1477    pub root_context: Option<Vec<u8>>,
1478}
1479
1480/// Status information parameter for the [`SeLinuxStatusPublisher`] interface.
1481pub struct SeLinuxStatus {
1482    /// SELinux-wide enforcing vs. permissive mode  bit.
1483    pub is_enforcing: bool,
1484    /// Number of times the policy has been changed since SELinux started.
1485    pub change_count: u32,
1486    /// Bit indicating whether operations unknown SELinux abstractions will be denied.
1487    pub deny_unknown: bool,
1488}
1489
1490/// Interface for security server to interact with selinuxfs status file.
1491pub trait SeLinuxStatusPublisher: Send {
1492    /// Sets the value part of the associated selinuxfs status file.
1493    fn set_status(&mut self, policy_status: SeLinuxStatus);
1494}
1495
1496#[cfg(test)]
1497mod tests {
1498    use super::*;
1499
1500    #[test]
1501    fn object_class_permissions() {
1502        assert_eq!(AbstractObjectClass::Unspecified, AbstractObjectClass::default());
1503        assert_eq!(
1504            AbstractObjectClass::Custom(String::from("my_class")),
1505            String::from("my_class").into()
1506        );
1507        for variant in ProcessPermission::all_variants().into_iter() {
1508            assert_eq!(ObjectClass::Process, variant.class());
1509            assert_eq!("process", variant.class().name());
1510            let permission: Permission = variant.clone().into();
1511            assert_eq!(Permission::Process(variant.clone()), permission);
1512            assert_eq!(
1513                AbstractPermission::System(Permission::Process(variant.clone())),
1514                permission.into()
1515            );
1516            assert_eq!(AbstractObjectClass::System(ObjectClass::Process), variant.class().into());
1517        }
1518    }
1519
1520    #[test]
1521    fn nulless_byte_str_equivalence() {
1522        let unterminated: NullessByteStr<'_> = b"u:object_r:test_valid_t:s0".into();
1523        let nul_terminated: NullessByteStr<'_> = b"u:object_r:test_valid_t:s0\0".into();
1524        let nul_containing: NullessByteStr<'_> =
1525            b"u:object_r:test_valid_t:s0\0IGNORE THIS\0!\0".into();
1526
1527        for context in [nul_terminated, nul_containing] {
1528            assert_eq!(unterminated, context);
1529            assert_eq!(unterminated.as_bytes(), context.as_bytes());
1530        }
1531    }
1532}