Files
linux/security/selinux/include/classmap.h
Thiébaud Weksteen 094e94d13b memfd,selinux: call security_inode_init_security_anon()
Prior to this change, no security hooks were called at the creation of a
memfd file. It means that, for SELinux as an example, it will receive
the default type of the filesystem that backs the in-memory inode. In
most cases, that would be tmpfs, but if MFD_HUGETLB is passed, it will
be hugetlbfs. Both can be considered implementation details of memfd.

It also means that it is not possible to differentiate between a file
coming from memfd_create and a file coming from a standard tmpfs mount
point.

Additionally, no permission is validated at creation, which differs from
the similar memfd_secret syscall.

Call security_inode_init_security_anon during creation. This ensures
that the file is setup similarly to other anonymous inodes. On SELinux,
it means that the file will receive the security context of its task.

The ability to limit fexecve on memfd has been of interest to avoid
potential pitfalls where /proc/self/exe or similar would be executed
[1][2]. Reuse the "execute_no_trans" and "entrypoint" access vectors,
similarly to the file class. These access vectors may not make sense for
the existing "anon_inode" class. Therefore, define and assign a new
class "memfd_file" to support such access vectors.

Guard these changes behind a new policy capability named "memfd_class".

[1] https://crbug.com/1305267
[2] https://lore.kernel.org/lkml/20221215001205.51969-1-jeffxu@google.com/

Signed-off-by: Thiébaud Weksteen <tweek@google.com>
Reviewed-by: Stephen Smalley <stephen.smalley.work@gmail.com>
Tested-by: Stephen Smalley <stephen.smalley.work@gmail.com>
Acked-by: Hugh Dickins <hughd@google.com>
[PM: subj tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2025-10-22 19:28:27 -04:00

194 lines
8.7 KiB
C

/* SPDX-License-Identifier: GPL-2.0 */
#define COMMON_FILE_SOCK_PERMS \
"ioctl", "read", "write", "create", "getattr", "setattr", "lock", \
"relabelfrom", "relabelto", "append", "map"
#define COMMON_FILE_PERMS \
COMMON_FILE_SOCK_PERMS, "unlink", "link", "rename", "execute", \
"quotaon", "mounton", "audit_access", "open", "execmod", \
"watch", "watch_mount", "watch_sb", "watch_with_perm", \
"watch_reads", "watch_mountns"
#define COMMON_SOCK_PERMS \
COMMON_FILE_SOCK_PERMS, "bind", "connect", "listen", "accept", \
"getopt", "setopt", "shutdown", "recvfrom", "sendto", \
"name_bind"
#define COMMON_IPC_PERMS \
"create", "destroy", "getattr", "setattr", "read", "write", \
"associate", "unix_read", "unix_write"
#define COMMON_CAP_PERMS \
"chown", "dac_override", "dac_read_search", "fowner", "fsetid", \
"kill", "setgid", "setuid", "setpcap", "linux_immutable", \
"net_bind_service", "net_broadcast", "net_admin", "net_raw", \
"ipc_lock", "ipc_owner", "sys_module", "sys_rawio", \
"sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \
"sys_boot", "sys_nice", "sys_resource", "sys_time", \
"sys_tty_config", "mknod", "lease", "audit_write", \
"audit_control", "setfcap"
#define COMMON_CAP2_PERMS \
"mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend", \
"audit_read", "perfmon", "bpf", "checkpoint_restore"
#ifdef __KERNEL__ /* avoid this check when building host programs */
#include <linux/capability.h>
#if CAP_LAST_CAP > CAP_CHECKPOINT_RESTORE
#error New capability defined, please update COMMON_CAP2_PERMS.
#endif
#endif
/*
* Note: The name for any socket class should be suffixed by "socket",
* and doesn't contain more than one substr of "socket".
*/
const struct security_class_mapping secclass_map[] = {
{ "security",
{ "compute_av", "compute_create", "compute_member", "check_context",
"load_policy", "compute_relabel", "compute_user", "setenforce",
"setbool", "setsecparam", "setcheckreqprot", "read_policy",
"validate_trans", NULL } },
{ "process",
{ "fork", "transition", "sigchld", "sigkill",
"sigstop", "signull", "signal", "ptrace",
"getsched", "setsched", "getsession", "getpgid",
"setpgid", "getcap", "setcap", "share",
"getattr", "setexec", "setfscreate", "noatsecure",
"siginh", "setrlimit", "rlimitinh", "dyntransition",
"setcurrent", "execmem", "execstack", "execheap",
"setkeycreate", "setsockcreate", "getrlimit", NULL } },
{ "process2", { "nnp_transition", "nosuid_transition", NULL } },
{ "system",
{ "ipc_info", "syslog_read", "syslog_mod", "syslog_console",
"module_request", "module_load", "firmware_load",
"kexec_image_load", "kexec_initramfs_load", "policy_load",
"x509_certificate_load", NULL } },
{ "capability", { COMMON_CAP_PERMS, NULL } },
{ "filesystem",
{ "mount", "remount", "unmount", "getattr", "relabelfrom",
"relabelto", "associate", "quotamod", "quotaget", "watch", NULL } },
{ "file",
{ COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } },
{ "dir",
{ COMMON_FILE_PERMS, "add_name", "remove_name", "reparent", "search",
"rmdir", NULL } },
{ "fd", { "use", NULL } },
{ "lnk_file", { COMMON_FILE_PERMS, NULL } },
{ "chr_file", { COMMON_FILE_PERMS, NULL } },
{ "blk_file", { COMMON_FILE_PERMS, NULL } },
{ "sock_file", { COMMON_FILE_PERMS, NULL } },
{ "fifo_file", { COMMON_FILE_PERMS, NULL } },
{ "socket", { COMMON_SOCK_PERMS, NULL } },
{ "tcp_socket",
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } },
{ "udp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
{ "rawip_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
{ "node", { "recvfrom", "sendto", NULL } },
{ "netif", { "ingress", "egress", NULL } },
{ "netlink_socket", { COMMON_SOCK_PERMS, NULL } },
{ "packet_socket", { COMMON_SOCK_PERMS, NULL } },
{ "key_socket", { COMMON_SOCK_PERMS, NULL } },
{ "unix_stream_socket", { COMMON_SOCK_PERMS, "connectto", NULL } },
{ "unix_dgram_socket", { COMMON_SOCK_PERMS, NULL } },
{ "sem", { COMMON_IPC_PERMS, NULL } },
{ "msg", { "send", "receive", NULL } },
{ "msgq", { COMMON_IPC_PERMS, "enqueue", NULL } },
{ "shm", { COMMON_IPC_PERMS, "lock", NULL } },
{ "ipc", { COMMON_IPC_PERMS, NULL } },
{ "netlink_route_socket",
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
{ "netlink_tcpdiag_socket",
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
{ "netlink_nflog_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_xfrm_socket",
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } },
{ "netlink_selinux_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_iscsi_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_audit_socket",
{ COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg_relay",
"nlmsg_readpriv", "nlmsg_tty_audit", "nlmsg", NULL } },
{ "netlink_fib_lookup_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_connector_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_netfilter_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_dnrt_socket", { COMMON_SOCK_PERMS, NULL } },
{ "association",
{ "sendto", "recvfrom", "setcontext", "polmatch", NULL } },
{ "netlink_kobject_uevent_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_generic_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_scsitransport_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_rdma_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netlink_crypto_socket", { COMMON_SOCK_PERMS, NULL } },
{ "appletalk_socket", { COMMON_SOCK_PERMS, NULL } },
{ "packet",
{ "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
{ "key",
{ "view", "read", "write", "search", "link", "setattr", "create",
NULL } },
{ "memprotect", { "mmap_zero", NULL } },
{ "peer", { "recv", NULL } },
{ "capability2", { COMMON_CAP2_PERMS, NULL } },
{ "kernel_service", { "use_as_override", "create_files_as", NULL } },
{ "tun_socket", { COMMON_SOCK_PERMS, "attach_queue", NULL } },
{ "binder",
{ "impersonate", "call", "set_context_mgr", "transfer", NULL } },
{ "cap_userns", { COMMON_CAP_PERMS, NULL } },
{ "cap2_userns", { COMMON_CAP2_PERMS, NULL } },
{ "sctp_socket",
{ COMMON_SOCK_PERMS, "node_bind", "name_connect", "association",
NULL } },
{ "icmp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } },
{ "ax25_socket", { COMMON_SOCK_PERMS, NULL } },
{ "ipx_socket", { COMMON_SOCK_PERMS, NULL } },
{ "netrom_socket", { COMMON_SOCK_PERMS, NULL } },
{ "atmpvc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "x25_socket", { COMMON_SOCK_PERMS, NULL } },
{ "rose_socket", { COMMON_SOCK_PERMS, NULL } },
{ "decnet_socket", { COMMON_SOCK_PERMS, NULL } },
{ "atmsvc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "rds_socket", { COMMON_SOCK_PERMS, NULL } },
{ "irda_socket", { COMMON_SOCK_PERMS, NULL } },
{ "pppox_socket", { COMMON_SOCK_PERMS, NULL } },
{ "llc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "can_socket", { COMMON_SOCK_PERMS, NULL } },
{ "tipc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "bluetooth_socket", { COMMON_SOCK_PERMS, NULL } },
{ "iucv_socket", { COMMON_SOCK_PERMS, NULL } },
{ "rxrpc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "isdn_socket", { COMMON_SOCK_PERMS, NULL } },
{ "phonet_socket", { COMMON_SOCK_PERMS, NULL } },
{ "ieee802154_socket", { COMMON_SOCK_PERMS, NULL } },
{ "caif_socket", { COMMON_SOCK_PERMS, NULL } },
{ "alg_socket", { COMMON_SOCK_PERMS, NULL } },
{ "nfc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "vsock_socket", { COMMON_SOCK_PERMS, NULL } },
{ "kcm_socket", { COMMON_SOCK_PERMS, NULL } },
{ "qipcrtr_socket", { COMMON_SOCK_PERMS, NULL } },
{ "smc_socket", { COMMON_SOCK_PERMS, NULL } },
{ "infiniband_pkey", { "access", NULL } },
{ "infiniband_endport", { "manage_subnet", NULL } },
{ "bpf",
{ "map_create", "map_read", "map_write", "prog_load", "prog_run",
NULL } },
{ "xdp_socket", { COMMON_SOCK_PERMS, NULL } },
{ "mctp_socket", { COMMON_SOCK_PERMS, NULL } },
{ "perf_event",
{ "open", "cpu", "kernel", "tracepoint", "read", "write", NULL } },
{ "anon_inode", { COMMON_FILE_PERMS, NULL } },
{ "io_uring", { "override_creds", "sqpoll", "cmd", "allowed", NULL } },
{ "user_namespace", { "create", NULL } },
{ "memfd_file",
{ COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } },
/* last one */ { NULL, {} }
};
#ifdef __KERNEL__ /* avoid this check when building host programs */
#include <linux/socket.h>
#if PF_MAX > 46
#error New address family defined, please update secclass_map.
#endif
#endif