ftp://ftp.kernel.org/pub/linux/kernel/v2.6/linux-2.6.6.tar.bz2
[linux-2.6.git] / security / selinux / include / av_perm_to_string.h
1 /* This file is automatically generated.  Do not edit. */
2 /* FLASK */
3
4 struct av_perm_to_string
5 {
6     u16 tclass;
7     u32 value;
8     char *name;
9 };
10
11 static struct av_perm_to_string av_perm_to_string[] = {
12    { SECCLASS_FILESYSTEM, FILESYSTEM__MOUNT, "mount" },
13    { SECCLASS_FILESYSTEM, FILESYSTEM__REMOUNT, "remount" },
14    { SECCLASS_FILESYSTEM, FILESYSTEM__UNMOUNT, "unmount" },
15    { SECCLASS_FILESYSTEM, FILESYSTEM__GETATTR, "getattr" },
16    { SECCLASS_FILESYSTEM, FILESYSTEM__RELABELFROM, "relabelfrom" },
17    { SECCLASS_FILESYSTEM, FILESYSTEM__RELABELTO, "relabelto" },
18    { SECCLASS_FILESYSTEM, FILESYSTEM__TRANSITION, "transition" },
19    { SECCLASS_FILESYSTEM, FILESYSTEM__ASSOCIATE, "associate" },
20    { SECCLASS_FILESYSTEM, FILESYSTEM__QUOTAMOD, "quotamod" },
21    { SECCLASS_FILESYSTEM, FILESYSTEM__QUOTAGET, "quotaget" },
22    { SECCLASS_DIR, DIR__ADD_NAME, "add_name" },
23    { SECCLASS_DIR, DIR__REMOVE_NAME, "remove_name" },
24    { SECCLASS_DIR, DIR__REPARENT, "reparent" },
25    { SECCLASS_DIR, DIR__SEARCH, "search" },
26    { SECCLASS_DIR, DIR__RMDIR, "rmdir" },
27    { SECCLASS_FILE, FILE__EXECUTE_NO_TRANS, "execute_no_trans" },
28    { SECCLASS_FILE, FILE__ENTRYPOINT, "entrypoint" },
29    { SECCLASS_FD, FD__USE, "use" },
30    { SECCLASS_TCP_SOCKET, TCP_SOCKET__CONNECTTO, "connectto" },
31    { SECCLASS_TCP_SOCKET, TCP_SOCKET__NEWCONN, "newconn" },
32    { SECCLASS_TCP_SOCKET, TCP_SOCKET__ACCEPTFROM, "acceptfrom" },
33    { SECCLASS_NODE, NODE__TCP_RECV, "tcp_recv" },
34    { SECCLASS_NODE, NODE__TCP_SEND, "tcp_send" },
35    { SECCLASS_NODE, NODE__UDP_RECV, "udp_recv" },
36    { SECCLASS_NODE, NODE__UDP_SEND, "udp_send" },
37    { SECCLASS_NODE, NODE__RAWIP_RECV, "rawip_recv" },
38    { SECCLASS_NODE, NODE__RAWIP_SEND, "rawip_send" },
39    { SECCLASS_NODE, NODE__ENFORCE_DEST, "enforce_dest" },
40    { SECCLASS_NETIF, NETIF__TCP_RECV, "tcp_recv" },
41    { SECCLASS_NETIF, NETIF__TCP_SEND, "tcp_send" },
42    { SECCLASS_NETIF, NETIF__UDP_RECV, "udp_recv" },
43    { SECCLASS_NETIF, NETIF__UDP_SEND, "udp_send" },
44    { SECCLASS_NETIF, NETIF__RAWIP_RECV, "rawip_recv" },
45    { SECCLASS_NETIF, NETIF__RAWIP_SEND, "rawip_send" },
46    { SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__CONNECTTO, "connectto" },
47    { SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__NEWCONN, "newconn" },
48    { SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__ACCEPTFROM, "acceptfrom" },
49    { SECCLASS_TCP_SOCKET, TCP_SOCKET__NODE_BIND, "node_bind" },
50    { SECCLASS_UDP_SOCKET, UDP_SOCKET__NODE_BIND, "node_bind" },
51    { SECCLASS_RAWIP_SOCKET, RAWIP_SOCKET__NODE_BIND, "node_bind" },
52    { SECCLASS_PROCESS, PROCESS__FORK, "fork" },
53    { SECCLASS_PROCESS, PROCESS__TRANSITION, "transition" },
54    { SECCLASS_PROCESS, PROCESS__SIGCHLD, "sigchld" },
55    { SECCLASS_PROCESS, PROCESS__SIGKILL, "sigkill" },
56    { SECCLASS_PROCESS, PROCESS__SIGSTOP, "sigstop" },
57    { SECCLASS_PROCESS, PROCESS__SIGNULL, "signull" },
58    { SECCLASS_PROCESS, PROCESS__SIGNAL, "signal" },
59    { SECCLASS_PROCESS, PROCESS__PTRACE, "ptrace" },
60    { SECCLASS_PROCESS, PROCESS__GETSCHED, "getsched" },
61    { SECCLASS_PROCESS, PROCESS__SETSCHED, "setsched" },
62    { SECCLASS_PROCESS, PROCESS__GETSESSION, "getsession" },
63    { SECCLASS_PROCESS, PROCESS__GETPGID, "getpgid" },
64    { SECCLASS_PROCESS, PROCESS__SETPGID, "setpgid" },
65    { SECCLASS_PROCESS, PROCESS__GETCAP, "getcap" },
66    { SECCLASS_PROCESS, PROCESS__SETCAP, "setcap" },
67    { SECCLASS_PROCESS, PROCESS__SHARE, "share" },
68    { SECCLASS_PROCESS, PROCESS__GETATTR, "getattr" },
69    { SECCLASS_PROCESS, PROCESS__SETEXEC, "setexec" },
70    { SECCLASS_PROCESS, PROCESS__SETFSCREATE, "setfscreate" },
71    { SECCLASS_PROCESS, PROCESS__NOATSECURE, "noatsecure" },
72    { SECCLASS_PROCESS, PROCESS__SIGINH, "siginh" },
73    { SECCLASS_PROCESS, PROCESS__SETRLIMIT, "setrlimit" },
74    { SECCLASS_PROCESS, PROCESS__RLIMITINH, "rlimitinh" },
75    { SECCLASS_MSGQ, MSGQ__ENQUEUE, "enqueue" },
76    { SECCLASS_MSG, MSG__SEND, "send" },
77    { SECCLASS_MSG, MSG__RECEIVE, "receive" },
78    { SECCLASS_SHM, SHM__LOCK, "lock" },
79    { SECCLASS_SECURITY, SECURITY__COMPUTE_AV, "compute_av" },
80    { SECCLASS_SECURITY, SECURITY__COMPUTE_CREATE, "compute_create" },
81    { SECCLASS_SECURITY, SECURITY__COMPUTE_MEMBER, "compute_member" },
82    { SECCLASS_SECURITY, SECURITY__CHECK_CONTEXT, "check_context" },
83    { SECCLASS_SECURITY, SECURITY__LOAD_POLICY, "load_policy" },
84    { SECCLASS_SECURITY, SECURITY__COMPUTE_RELABEL, "compute_relabel" },
85    { SECCLASS_SECURITY, SECURITY__COMPUTE_USER, "compute_user" },
86    { SECCLASS_SECURITY, SECURITY__SETENFORCE, "setenforce" },
87    { SECCLASS_SECURITY, SECURITY__SETBOOL, "setbool" },
88    { SECCLASS_SYSTEM, SYSTEM__IPC_INFO, "ipc_info" },
89    { SECCLASS_SYSTEM, SYSTEM__SYSLOG_READ, "syslog_read" },
90    { SECCLASS_SYSTEM, SYSTEM__SYSLOG_MOD, "syslog_mod" },
91    { SECCLASS_SYSTEM, SYSTEM__SYSLOG_CONSOLE, "syslog_console" },
92    { SECCLASS_CAPABILITY, CAPABILITY__CHOWN, "chown" },
93    { SECCLASS_CAPABILITY, CAPABILITY__DAC_OVERRIDE, "dac_override" },
94    { SECCLASS_CAPABILITY, CAPABILITY__DAC_READ_SEARCH, "dac_read_search" },
95    { SECCLASS_CAPABILITY, CAPABILITY__FOWNER, "fowner" },
96    { SECCLASS_CAPABILITY, CAPABILITY__FSETID, "fsetid" },
97    { SECCLASS_CAPABILITY, CAPABILITY__KILL, "kill" },
98    { SECCLASS_CAPABILITY, CAPABILITY__SETGID, "setgid" },
99    { SECCLASS_CAPABILITY, CAPABILITY__SETUID, "setuid" },
100    { SECCLASS_CAPABILITY, CAPABILITY__SETPCAP, "setpcap" },
101    { SECCLASS_CAPABILITY, CAPABILITY__LINUX_IMMUTABLE, "linux_immutable" },
102    { SECCLASS_CAPABILITY, CAPABILITY__NET_BIND_SERVICE, "net_bind_service" },
103    { SECCLASS_CAPABILITY, CAPABILITY__NET_BROADCAST, "net_broadcast" },
104    { SECCLASS_CAPABILITY, CAPABILITY__NET_ADMIN, "net_admin" },
105    { SECCLASS_CAPABILITY, CAPABILITY__NET_RAW, "net_raw" },
106    { SECCLASS_CAPABILITY, CAPABILITY__IPC_LOCK, "ipc_lock" },
107    { SECCLASS_CAPABILITY, CAPABILITY__IPC_OWNER, "ipc_owner" },
108    { SECCLASS_CAPABILITY, CAPABILITY__SYS_MODULE, "sys_module" },
109    { SECCLASS_CAPABILITY, CAPABILITY__SYS_RAWIO, "sys_rawio" },
110    { SECCLASS_CAPABILITY, CAPABILITY__SYS_CHROOT, "sys_chroot" },
111    { SECCLASS_CAPABILITY, CAPABILITY__SYS_PTRACE, "sys_ptrace" },
112    { SECCLASS_CAPABILITY, CAPABILITY__SYS_PACCT, "sys_pacct" },
113    { SECCLASS_CAPABILITY, CAPABILITY__SYS_ADMIN, "sys_admin" },
114    { SECCLASS_CAPABILITY, CAPABILITY__SYS_BOOT, "sys_boot" },
115    { SECCLASS_CAPABILITY, CAPABILITY__SYS_NICE, "sys_nice" },
116    { SECCLASS_CAPABILITY, CAPABILITY__SYS_RESOURCE, "sys_resource" },
117    { SECCLASS_CAPABILITY, CAPABILITY__SYS_TIME, "sys_time" },
118    { SECCLASS_CAPABILITY, CAPABILITY__SYS_TTY_CONFIG, "sys_tty_config" },
119    { SECCLASS_CAPABILITY, CAPABILITY__MKNOD, "mknod" },
120    { SECCLASS_CAPABILITY, CAPABILITY__LEASE, "lease" },
121    { SECCLASS_PASSWD, PASSWD__PASSWD, "passwd" },
122    { SECCLASS_PASSWD, PASSWD__CHFN, "chfn" },
123    { SECCLASS_PASSWD, PASSWD__CHSH, "chsh" },
124 };
125
126
127 /* FLASK */