Table B-1 summarizes SELinux operations, identifying their related object classes and giving an approximate description of them. In future SELinux releases, SELinux developers may change the roster of operations, associate operations with object classes differently, or modify the function performed by an operation. The table is sorted alphabetically by the name of the operation. The SELinux file src/policy/flask/access_vectors shows the relationship between object classes and operations and is sorted by object class.
Operation
Object classes
Description
key_socket , netlink_socket , packet_socket , raw_ipsocket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Accept a connection.
tcp_socket , unix_stream_socket
Accept connection from client socket.
dir
Add a name.
blk_file , chr_file , dir , fifo_file , file , key_socket , lnk_file , netlink_socket , packet_socket , rawip_socket , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Write or append file or socket contents.
filesystem , ipc , msgq , sem , shm
Associate a file or key with a filesystem, queue, semaphore set, or memory segment.
system
Toggle between permissive and enforcing modes.
system
Control the buffer-dirty-flush daemon.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Bind name to socket.
security
Determine the SID of an object during relabeling.
security
Write context in selinuxfs filesystem.
passwd
Change user account information (real name, work room and phone, and home phone).
capability
Change file ownership and group ownership.
passwd
Change login shell.
security
Compute an access vector given a source, target, and class.
security
Set create information in selinuxfs filesystem.
security
Set member information in selinuxfs filesystem.
security
Set relabel information in selinuxfs filesystem.
security
Set user information in selinuxfs filesystem.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Initiate connection.
tcp_socket , unix_stream_socket
Connect to server socket.
security
Convert a context to an SID.
blk_file , chr_file , dir , fifo_file , file , ipc , key_socket , lnk_file , msgq , netlink_socket , packet_socket , rawip_socket , sem , shm , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Create new file, IPC object, queue, semaphore set, or shared memory segment.
capability
Override discretionary access control except LINUX_IMMUTABLE .
capability
Overrides all discretionary access control.
ipc , msgq , sem , shm
Destroy IPC object, message queue, semaphore set, or shared memory segment.
node
Destination node can enforce restrictions on the destination socket.
msgq
Message may reside on queue.
file
Enter a new domain via this program.
blk_file , chr_file , dir , fifo_file , file , lnk_file , sock_file
Execute.
file
Execute file without a domain transition.
process
Fork into two processes.
capability
Grant file operations otherwise restricted due to ownership.
capability
overrides effective user ID checks for set user ID and set group ID files
security
Get the list of active SIDs.
blk_file , chr_file , dir , fifo_file , file , filesystem , ipc , key_socket , lnk_file , msgq , netlink_socket , packet_socket , process , rawip_socket , sem , shm , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Get file, process, message queue, or shared memory segment attributes.
process
Get process capabilities.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Get socket options.
process
Get process group ID.
process
Get process priority.
process
Get session ID.
blk_file , chr_file , dir , fifo_file , file , key_socket , lnk_file , netlink_socket , packet_socket , rawip_socket , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
I/O control system call requests not addressed by other permissions.
system
Get information for an IPC socket.
capability
Lock nonshared and shared memory segments.
capability
Ignore IPC ownership checks.
capability
Raise signal any process.
capability
Take fcntl( ) leases on a file.
blk_file , chr_file , dir , fifo_file , file , lnk_file , sock_file
Create hard link to file.
capability
Modify S_IMMUTABLE and S_APPEND file attributes on supporting filesystems.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Listen for connections.
security
Load the security policy.
blk_file , chr_file , dir , fifo_file , file , key_socket , lnk_file , netlink_socket , packet_socket , rawip_socket , sh , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket, unix_stream_socket
Set and unset file or memory page locks.
security
Determine SID to use when selecting a member of a polyinstantiated object .
capability
Create character or block device nodes.
filesystem
Mount a filesystem.
blk_file , chr_file , dir , fifo_file , file , lnk_file , sock_file
Use as filesystem mount point.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Bind port to IP or file to Unix socket.
capability
Network configuration changes.
capability
Bind to privileged port.
capability
Open raw socket or packet socket.
capability
Send network broadcast or listen to incoming multicasts.
tcp_socket , unix_stream_socket
Create new socket for connection.
system
Control the NFS server.
process
Allow GLibc secure mode.
rawip_socket , tcp_socket , udp_socket
Bind socket.
passwd
Change user password.
process
Trace program execution of parent or child.
filesystem
Get quota information.
filesystem
Modify quota information.
blk_file , chr_file , dir , fifo_file , file , lnk_file , sock_file
Enable quotas.
netif , node
Receive raw IP packet.
netif , node
Send raw IP packet.
blk_file , chr_file , dir , fifo_file , file , ipc , key_socket , lnk_file , msgq , netlink_socket , packet_socket , rawip_socket , sem , shm , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Read file, IPC, message queue, or shared memory segment contents.
msg
Remove message from a queue.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Receive datagram message having SID unequal to socket.
key_socket , netlink_socket , packet_socket , rawip-socket , socket , tcp_socket , udp-socket , unix_dgram_socket , unix_stream_socket
Receive datagrams from socket.
blk_file , chr_file , dir , fifo_file , file , filesystem , key_socket , lnk_file , netlink_socket , packet_socket , rawip_socket , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Change the security context based on existing type.
blk_file , chr_file , dir , fifo_file , file , filesystem , key_socket , lnk_file , netlink_socket , packet_socket , rawip_socket , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Change the security context based on the new type.
filesystem
Change mounted filesystem options.
dir
Remove a name.
blk_file, chr_file , dir , fifo_file , lnk_file , sock_file
Rename a hard link.
dir
Change parent directory.
process
Inherit resource limits from old SID.
dir
Remove directory.
passwd
Update password if the user is root and the process has the rootok permission.
dir
Search directory.
msg
Add message to a queue.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Send datagram message having SID unequal to that of sending socket.
key_socket, netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Send datagrams to socket.
blk_file , chr_file , dir , fifo_file , file , ipc , key_socket , lnk_file , msgq , netlink_socket , packet_socket , rawip_socket , sem , shm , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Change attributes of file, shared memory segment, or message queue.
security
Set a boolean value.
process
Set process capabilities.
security
Change the SELinux enforcement mode.
process
Set fscreate context.
capability
Allow setgid( ) calls, and fake group IDs on credentials passed over a socket.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Set IPSec or socket options socket.
capability
Transfer process capability map.
process
Set process group ID.
process
Change process hard limits.
process
Set process priority.
capability
Allow setsuid( ) and fake UIDs on credentials passed over a socket.
process
Allow state sharing with cloned or forked process.
key_socket , netlink_socket , packet_socket , rawip_socket , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Shutdown connection.
security
Convert a SID to a context.
process
Send SIGCHLD signal.
process
Inherit signal state from old SID.
process
Send SIGKILL signal.
process
Send a signal other than SIGKILL , SIGSTOP , or SIGCHLD .
process
Test for existence of another process without sending a signal.
process
Send SIGSTOP signal.
blk_file , chr_file , dir , fifo_file , lnk_file , sock_file
Allow file to be used for swap space.
capability
Various system capabilities (see /usr/include/linux/capability.h).
capability
Reboot the system.
capability
Use chroot( ) .
capability
Load and remove kernel modules and otherwise modify kernel.
capability
Change process priority and scheduling options.
capability
Change process accounting state.
capability
Trace any process.
capability
Perform raw I/O.
capability
Various capabilities (see /usr/include/linux/capability.h).
capability
Set system time and real-time clock.
capability
Configure tty devices.
system
Log to syslog console.
system
Perform syslog operation other than reading syslog or logging to console.
system
Read syslog
netif , node
Receive TCP packet.
netif , node
Send TCP packet.
filesystem , process
Transition to a new SID.
security
Determine SID for a new object.
netif , node
Receive UDP packet.
netif , node
Send UDP packet.
ipc , msgq , sem , shm
Perform IPC read.
ipc , msgq , sem , shm
Perform IPC write or append.
blk_file , chr_file , dir , fifo_file , file , lnk_file , sock_file
Remove (delete) hard link.
filesystem
Unmount filesystem.
fd
Use an inherited file descriptor.
blk_file , chr_file , dir , fifo_file , file , ipc , key_socket , lnk_file , msgq , netlink_socket , packet_socket , rawip_socket , sem , shm , sock_file , socket , tcp_socket , udp_socket , unix_dgram_socket , unix_stream_socket
Write or append file or IPC object contents.