2005-04-16 15:20:36 -07:00
/* This file is automatically generated. Do not edit. */
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__MOUNT , " mount " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__REMOUNT , " remount " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__UNMOUNT , " unmount " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__GETATTR , " getattr " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__RELABELFROM , " relabelfrom " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__RELABELTO , " relabelto " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__TRANSITION , " transition " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__ASSOCIATE , " associate " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__QUOTAMOD , " quotamod " )
S_ ( SECCLASS_FILESYSTEM , FILESYSTEM__QUOTAGET , " quotaget " )
S_ ( SECCLASS_DIR , DIR__ADD_NAME , " add_name " )
S_ ( SECCLASS_DIR , DIR__REMOVE_NAME , " remove_name " )
S_ ( SECCLASS_DIR , DIR__REPARENT , " reparent " )
S_ ( SECCLASS_DIR , DIR__SEARCH , " search " )
S_ ( SECCLASS_DIR , DIR__RMDIR , " rmdir " )
S_ ( SECCLASS_FILE , FILE__EXECUTE_NO_TRANS , " execute_no_trans " )
S_ ( SECCLASS_FILE , FILE__ENTRYPOINT , " entrypoint " )
S_ ( SECCLASS_FILE , FILE__EXECMOD , " execmod " )
S_ ( SECCLASS_CHR_FILE , CHR_FILE__EXECUTE_NO_TRANS , " execute_no_trans " )
S_ ( SECCLASS_CHR_FILE , CHR_FILE__ENTRYPOINT , " entrypoint " )
S_ ( SECCLASS_CHR_FILE , CHR_FILE__EXECMOD , " execmod " )
S_ ( SECCLASS_FD , FD__USE , " use " )
S_ ( SECCLASS_TCP_SOCKET , TCP_SOCKET__CONNECTTO , " connectto " )
S_ ( SECCLASS_TCP_SOCKET , TCP_SOCKET__NEWCONN , " newconn " )
S_ ( SECCLASS_TCP_SOCKET , TCP_SOCKET__ACCEPTFROM , " acceptfrom " )
S_ ( SECCLASS_TCP_SOCKET , TCP_SOCKET__NODE_BIND , " node_bind " )
S_ ( SECCLASS_TCP_SOCKET , TCP_SOCKET__NAME_CONNECT , " name_connect " )
S_ ( SECCLASS_UDP_SOCKET , UDP_SOCKET__NODE_BIND , " node_bind " )
S_ ( SECCLASS_RAWIP_SOCKET , RAWIP_SOCKET__NODE_BIND , " node_bind " )
S_ ( SECCLASS_NODE , NODE__TCP_RECV , " tcp_recv " )
S_ ( SECCLASS_NODE , NODE__TCP_SEND , " tcp_send " )
S_ ( SECCLASS_NODE , NODE__UDP_RECV , " udp_recv " )
S_ ( SECCLASS_NODE , NODE__UDP_SEND , " udp_send " )
S_ ( SECCLASS_NODE , NODE__RAWIP_RECV , " rawip_recv " )
S_ ( SECCLASS_NODE , NODE__RAWIP_SEND , " rawip_send " )
S_ ( SECCLASS_NODE , NODE__ENFORCE_DEST , " enforce_dest " )
S_ ( SECCLASS_NETIF , NETIF__TCP_RECV , " tcp_recv " )
S_ ( SECCLASS_NETIF , NETIF__TCP_SEND , " tcp_send " )
S_ ( SECCLASS_NETIF , NETIF__UDP_RECV , " udp_recv " )
S_ ( SECCLASS_NETIF , NETIF__UDP_SEND , " udp_send " )
S_ ( SECCLASS_NETIF , NETIF__RAWIP_RECV , " rawip_recv " )
S_ ( SECCLASS_NETIF , NETIF__RAWIP_SEND , " rawip_send " )
S_ ( SECCLASS_UNIX_STREAM_SOCKET , UNIX_STREAM_SOCKET__CONNECTTO , " connectto " )
S_ ( SECCLASS_UNIX_STREAM_SOCKET , UNIX_STREAM_SOCKET__NEWCONN , " newconn " )
S_ ( SECCLASS_UNIX_STREAM_SOCKET , UNIX_STREAM_SOCKET__ACCEPTFROM , " acceptfrom " )
S_ ( SECCLASS_PROCESS , PROCESS__FORK , " fork " )
S_ ( SECCLASS_PROCESS , PROCESS__TRANSITION , " transition " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGCHLD , " sigchld " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGKILL , " sigkill " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGSTOP , " sigstop " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGNULL , " signull " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGNAL , " signal " )
S_ ( SECCLASS_PROCESS , PROCESS__PTRACE , " ptrace " )
S_ ( SECCLASS_PROCESS , PROCESS__GETSCHED , " getsched " )
S_ ( SECCLASS_PROCESS , PROCESS__SETSCHED , " setsched " )
S_ ( SECCLASS_PROCESS , PROCESS__GETSESSION , " getsession " )
S_ ( SECCLASS_PROCESS , PROCESS__GETPGID , " getpgid " )
S_ ( SECCLASS_PROCESS , PROCESS__SETPGID , " setpgid " )
S_ ( SECCLASS_PROCESS , PROCESS__GETCAP , " getcap " )
S_ ( SECCLASS_PROCESS , PROCESS__SETCAP , " setcap " )
S_ ( SECCLASS_PROCESS , PROCESS__SHARE , " share " )
S_ ( SECCLASS_PROCESS , PROCESS__GETATTR , " getattr " )
S_ ( SECCLASS_PROCESS , PROCESS__SETEXEC , " setexec " )
S_ ( SECCLASS_PROCESS , PROCESS__SETFSCREATE , " setfscreate " )
S_ ( SECCLASS_PROCESS , PROCESS__NOATSECURE , " noatsecure " )
S_ ( SECCLASS_PROCESS , PROCESS__SIGINH , " siginh " )
S_ ( SECCLASS_PROCESS , PROCESS__SETRLIMIT , " setrlimit " )
S_ ( SECCLASS_PROCESS , PROCESS__RLIMITINH , " rlimitinh " )
S_ ( SECCLASS_PROCESS , PROCESS__DYNTRANSITION , " dyntransition " )
S_ ( SECCLASS_PROCESS , PROCESS__SETCURRENT , " setcurrent " )
S_ ( SECCLASS_PROCESS , PROCESS__EXECMEM , " execmem " )
2005-06-25 14:54:34 -07:00
S_ ( SECCLASS_PROCESS , PROCESS__EXECSTACK , " execstack " )
2005-06-25 14:54:35 -07:00
S_ ( SECCLASS_PROCESS , PROCESS__EXECHEAP , " execheap " )
2006-06-26 00:24:57 -07:00
S_ ( SECCLASS_PROCESS , PROCESS__SETKEYCREATE , " setkeycreate " )
2006-06-26 00:26:03 -07:00
S_ ( SECCLASS_PROCESS , PROCESS__SETSOCKCREATE , " setsockcreate " )
2005-04-16 15:20:36 -07:00
S_ ( SECCLASS_MSGQ , MSGQ__ENQUEUE , " enqueue " )
S_ ( SECCLASS_MSG , MSG__SEND , " send " )
S_ ( SECCLASS_MSG , MSG__RECEIVE , " receive " )
S_ ( SECCLASS_SHM , SHM__LOCK , " lock " )
S_ ( SECCLASS_SECURITY , SECURITY__COMPUTE_AV , " compute_av " )
S_ ( SECCLASS_SECURITY , SECURITY__COMPUTE_CREATE , " compute_create " )
S_ ( SECCLASS_SECURITY , SECURITY__COMPUTE_MEMBER , " compute_member " )
S_ ( SECCLASS_SECURITY , SECURITY__CHECK_CONTEXT , " check_context " )
S_ ( SECCLASS_SECURITY , SECURITY__LOAD_POLICY , " load_policy " )
S_ ( SECCLASS_SECURITY , SECURITY__COMPUTE_RELABEL , " compute_relabel " )
S_ ( SECCLASS_SECURITY , SECURITY__COMPUTE_USER , " compute_user " )
S_ ( SECCLASS_SECURITY , SECURITY__SETENFORCE , " setenforce " )
S_ ( SECCLASS_SECURITY , SECURITY__SETBOOL , " setbool " )
S_ ( SECCLASS_SECURITY , SECURITY__SETSECPARAM , " setsecparam " )
S_ ( SECCLASS_SECURITY , SECURITY__SETCHECKREQPROT , " setcheckreqprot " )
S_ ( SECCLASS_SYSTEM , SYSTEM__IPC_INFO , " ipc_info " )
S_ ( SECCLASS_SYSTEM , SYSTEM__SYSLOG_READ , " syslog_read " )
S_ ( SECCLASS_SYSTEM , SYSTEM__SYSLOG_MOD , " syslog_mod " )
S_ ( SECCLASS_SYSTEM , SYSTEM__SYSLOG_CONSOLE , " syslog_console " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__CHOWN , " chown " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__DAC_OVERRIDE , " dac_override " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__DAC_READ_SEARCH , " dac_read_search " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__FOWNER , " fowner " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__FSETID , " fsetid " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__KILL , " kill " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SETGID , " setgid " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SETUID , " setuid " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SETPCAP , " setpcap " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__LINUX_IMMUTABLE , " linux_immutable " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__NET_BIND_SERVICE , " net_bind_service " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__NET_BROADCAST , " net_broadcast " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__NET_ADMIN , " net_admin " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__NET_RAW , " net_raw " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__IPC_LOCK , " ipc_lock " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__IPC_OWNER , " ipc_owner " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_MODULE , " sys_module " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_RAWIO , " sys_rawio " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_CHROOT , " sys_chroot " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_PTRACE , " sys_ptrace " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_PACCT , " sys_pacct " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_ADMIN , " sys_admin " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_BOOT , " sys_boot " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_NICE , " sys_nice " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_RESOURCE , " sys_resource " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_TIME , " sys_time " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__SYS_TTY_CONFIG , " sys_tty_config " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__MKNOD , " mknod " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__LEASE , " lease " )
2005-04-16 15:24:13 -07:00
S_ ( SECCLASS_CAPABILITY , CAPABILITY__AUDIT_WRITE , " audit_write " )
S_ ( SECCLASS_CAPABILITY , CAPABILITY__AUDIT_CONTROL , " audit_control " )
2005-04-16 15:20:36 -07:00
S_ ( SECCLASS_PASSWD , PASSWD__PASSWD , " passwd " )
S_ ( SECCLASS_PASSWD , PASSWD__CHFN , " chfn " )
S_ ( SECCLASS_PASSWD , PASSWD__CHSH , " chsh " )
S_ ( SECCLASS_PASSWD , PASSWD__ROOTOK , " rootok " )
S_ ( SECCLASS_PASSWD , PASSWD__CRONTAB , " crontab " )
S_ ( SECCLASS_DRAWABLE , DRAWABLE__CREATE , " create " )
S_ ( SECCLASS_DRAWABLE , DRAWABLE__DESTROY , " destroy " )
S_ ( SECCLASS_DRAWABLE , DRAWABLE__DRAW , " draw " )
S_ ( SECCLASS_DRAWABLE , DRAWABLE__COPY , " copy " )
S_ ( SECCLASS_DRAWABLE , DRAWABLE__GETATTR , " getattr " )
S_ ( SECCLASS_GC , GC__CREATE , " create " )
S_ ( SECCLASS_GC , GC__FREE , " free " )
S_ ( SECCLASS_GC , GC__GETATTR , " getattr " )
S_ ( SECCLASS_GC , GC__SETATTR , " setattr " )
S_ ( SECCLASS_WINDOW , WINDOW__ADDCHILD , " addchild " )
S_ ( SECCLASS_WINDOW , WINDOW__CREATE , " create " )
S_ ( SECCLASS_WINDOW , WINDOW__DESTROY , " destroy " )
S_ ( SECCLASS_WINDOW , WINDOW__MAP , " map " )
S_ ( SECCLASS_WINDOW , WINDOW__UNMAP , " unmap " )
S_ ( SECCLASS_WINDOW , WINDOW__CHSTACK , " chstack " )
S_ ( SECCLASS_WINDOW , WINDOW__CHPROPLIST , " chproplist " )
S_ ( SECCLASS_WINDOW , WINDOW__CHPROP , " chprop " )
S_ ( SECCLASS_WINDOW , WINDOW__LISTPROP , " listprop " )
S_ ( SECCLASS_WINDOW , WINDOW__GETATTR , " getattr " )
S_ ( SECCLASS_WINDOW , WINDOW__SETATTR , " setattr " )
S_ ( SECCLASS_WINDOW , WINDOW__SETFOCUS , " setfocus " )
S_ ( SECCLASS_WINDOW , WINDOW__MOVE , " move " )
S_ ( SECCLASS_WINDOW , WINDOW__CHSELECTION , " chselection " )
S_ ( SECCLASS_WINDOW , WINDOW__CHPARENT , " chparent " )
S_ ( SECCLASS_WINDOW , WINDOW__CTRLLIFE , " ctrllife " )
S_ ( SECCLASS_WINDOW , WINDOW__ENUMERATE , " enumerate " )
S_ ( SECCLASS_WINDOW , WINDOW__TRANSPARENT , " transparent " )
S_ ( SECCLASS_WINDOW , WINDOW__MOUSEMOTION , " mousemotion " )
S_ ( SECCLASS_WINDOW , WINDOW__CLIENTCOMEVENT , " clientcomevent " )
S_ ( SECCLASS_WINDOW , WINDOW__INPUTEVENT , " inputevent " )
S_ ( SECCLASS_WINDOW , WINDOW__DRAWEVENT , " drawevent " )
S_ ( SECCLASS_WINDOW , WINDOW__WINDOWCHANGEEVENT , " windowchangeevent " )
S_ ( SECCLASS_WINDOW , WINDOW__WINDOWCHANGEREQUEST , " windowchangerequest " )
S_ ( SECCLASS_WINDOW , WINDOW__SERVERCHANGEEVENT , " serverchangeevent " )
S_ ( SECCLASS_WINDOW , WINDOW__EXTENSIONEVENT , " extensionevent " )
S_ ( SECCLASS_FONT , FONT__LOAD , " load " )
S_ ( SECCLASS_FONT , FONT__FREE , " free " )
S_ ( SECCLASS_FONT , FONT__GETATTR , " getattr " )
S_ ( SECCLASS_FONT , FONT__USE , " use " )
S_ ( SECCLASS_COLORMAP , COLORMAP__CREATE , " create " )
S_ ( SECCLASS_COLORMAP , COLORMAP__FREE , " free " )
S_ ( SECCLASS_COLORMAP , COLORMAP__INSTALL , " install " )
S_ ( SECCLASS_COLORMAP , COLORMAP__UNINSTALL , " uninstall " )
S_ ( SECCLASS_COLORMAP , COLORMAP__LIST , " list " )
S_ ( SECCLASS_COLORMAP , COLORMAP__READ , " read " )
S_ ( SECCLASS_COLORMAP , COLORMAP__STORE , " store " )
S_ ( SECCLASS_COLORMAP , COLORMAP__GETATTR , " getattr " )
S_ ( SECCLASS_COLORMAP , COLORMAP__SETATTR , " setattr " )
S_ ( SECCLASS_PROPERTY , PROPERTY__CREATE , " create " )
S_ ( SECCLASS_PROPERTY , PROPERTY__FREE , " free " )
S_ ( SECCLASS_PROPERTY , PROPERTY__READ , " read " )
S_ ( SECCLASS_PROPERTY , PROPERTY__WRITE , " write " )
S_ ( SECCLASS_CURSOR , CURSOR__CREATE , " create " )
S_ ( SECCLASS_CURSOR , CURSOR__CREATEGLYPH , " createglyph " )
S_ ( SECCLASS_CURSOR , CURSOR__FREE , " free " )
S_ ( SECCLASS_CURSOR , CURSOR__ASSIGN , " assign " )
S_ ( SECCLASS_CURSOR , CURSOR__SETATTR , " setattr " )
S_ ( SECCLASS_XCLIENT , XCLIENT__KILL , " kill " )
S_ ( SECCLASS_XINPUT , XINPUT__LOOKUP , " lookup " )
S_ ( SECCLASS_XINPUT , XINPUT__GETATTR , " getattr " )
S_ ( SECCLASS_XINPUT , XINPUT__SETATTR , " setattr " )
S_ ( SECCLASS_XINPUT , XINPUT__SETFOCUS , " setfocus " )
S_ ( SECCLASS_XINPUT , XINPUT__WARPPOINTER , " warppointer " )
S_ ( SECCLASS_XINPUT , XINPUT__ACTIVEGRAB , " activegrab " )
S_ ( SECCLASS_XINPUT , XINPUT__PASSIVEGRAB , " passivegrab " )
S_ ( SECCLASS_XINPUT , XINPUT__UNGRAB , " ungrab " )
S_ ( SECCLASS_XINPUT , XINPUT__BELL , " bell " )
S_ ( SECCLASS_XINPUT , XINPUT__MOUSEMOTION , " mousemotion " )
S_ ( SECCLASS_XINPUT , XINPUT__RELABELINPUT , " relabelinput " )
S_ ( SECCLASS_XSERVER , XSERVER__SCREENSAVER , " screensaver " )
S_ ( SECCLASS_XSERVER , XSERVER__GETHOSTLIST , " gethostlist " )
S_ ( SECCLASS_XSERVER , XSERVER__SETHOSTLIST , " sethostlist " )
S_ ( SECCLASS_XSERVER , XSERVER__GETFONTPATH , " getfontpath " )
S_ ( SECCLASS_XSERVER , XSERVER__SETFONTPATH , " setfontpath " )
S_ ( SECCLASS_XSERVER , XSERVER__GETATTR , " getattr " )
S_ ( SECCLASS_XSERVER , XSERVER__GRAB , " grab " )
S_ ( SECCLASS_XSERVER , XSERVER__UNGRAB , " ungrab " )
S_ ( SECCLASS_XEXTENSION , XEXTENSION__QUERY , " query " )
S_ ( SECCLASS_XEXTENSION , XEXTENSION__USE , " use " )
S_ ( SECCLASS_PAX , PAX__PAGEEXEC , " pageexec " )
S_ ( SECCLASS_PAX , PAX__EMUTRAMP , " emutramp " )
S_ ( SECCLASS_PAX , PAX__MPROTECT , " mprotect " )
S_ ( SECCLASS_PAX , PAX__RANDMMAP , " randmmap " )
S_ ( SECCLASS_PAX , PAX__RANDEXEC , " randexec " )
S_ ( SECCLASS_PAX , PAX__SEGMEXEC , " segmexec " )
S_ ( SECCLASS_NETLINK_ROUTE_SOCKET , NETLINK_ROUTE_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_ROUTE_SOCKET , NETLINK_ROUTE_SOCKET__NLMSG_WRITE , " nlmsg_write " )
S_ ( SECCLASS_NETLINK_FIREWALL_SOCKET , NETLINK_FIREWALL_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_FIREWALL_SOCKET , NETLINK_FIREWALL_SOCKET__NLMSG_WRITE , " nlmsg_write " )
S_ ( SECCLASS_NETLINK_TCPDIAG_SOCKET , NETLINK_TCPDIAG_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_TCPDIAG_SOCKET , NETLINK_TCPDIAG_SOCKET__NLMSG_WRITE , " nlmsg_write " )
S_ ( SECCLASS_NETLINK_XFRM_SOCKET , NETLINK_XFRM_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_XFRM_SOCKET , NETLINK_XFRM_SOCKET__NLMSG_WRITE , " nlmsg_write " )
S_ ( SECCLASS_NETLINK_AUDIT_SOCKET , NETLINK_AUDIT_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_AUDIT_SOCKET , NETLINK_AUDIT_SOCKET__NLMSG_WRITE , " nlmsg_write " )
[PATCH] SELinux: add finer grained permissions to Netlink audit processing
This patch provides finer grained permissions for the audit family of
Netlink sockets under SELinux.
1. We need a way to differentiate between privileged and unprivileged
reads of kernel data maintained by the audit subsystem. The AUDIT_GET
operation is unprivileged: it returns the current status of the audit
subsystem (e.g. whether it's enabled etc.). The AUDIT_LIST operation
however returns a list of the current audit ruleset, which is considered
privileged by the audit folk. To deal with this, a new SELinux
permission has been implemented and applied to the operation:
nlmsg_readpriv, which can be allocated to appropriately privileged
domains. Unprivileged domains would only be allocated nlmsg_read.
2. There is a requirement for certain domains to generate audit events
from userspace. These events need to be collected by the kernel,
collated and transmitted sequentially back to the audit daemon. An
example is user level login, an auditable event under CAPP, where
login-related domains generate AUDIT_USER messages via PAM which are
relayed back to auditd via the kernel. To prevent handing out
nlmsg_write permissions to such domains, a new permission has been
added, nlmsg_relay, which is intended for this type of purpose: data is
passed via the kernel back to userspace but no privileged information is
written to the kernel.
Also, AUDIT_LOGIN messages are now valid only for kernel->user messaging,
so this value has been removed from the SELinux nlmsgtab (which is only
used to check user->kernel messages).
Signed-off-by: James Morris <jmorris@redhat.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-05-01 08:58:40 -07:00
S_ ( SECCLASS_NETLINK_AUDIT_SOCKET , NETLINK_AUDIT_SOCKET__NLMSG_RELAY , " nlmsg_relay " )
S_ ( SECCLASS_NETLINK_AUDIT_SOCKET , NETLINK_AUDIT_SOCKET__NLMSG_READPRIV , " nlmsg_readpriv " )
2005-04-16 15:20:36 -07:00
S_ ( SECCLASS_NETLINK_IP6FW_SOCKET , NETLINK_IP6FW_SOCKET__NLMSG_READ , " nlmsg_read " )
S_ ( SECCLASS_NETLINK_IP6FW_SOCKET , NETLINK_IP6FW_SOCKET__NLMSG_WRITE , " nlmsg_write " )
S_ ( SECCLASS_DBUS , DBUS__ACQUIRE_SVC , " acquire_svc " )
S_ ( SECCLASS_DBUS , DBUS__SEND_MSG , " send_msg " )
S_ ( SECCLASS_NSCD , NSCD__GETPWD , " getpwd " )
S_ ( SECCLASS_NSCD , NSCD__GETGRP , " getgrp " )
S_ ( SECCLASS_NSCD , NSCD__GETHOST , " gethost " )
S_ ( SECCLASS_NSCD , NSCD__GETSTAT , " getstat " )
S_ ( SECCLASS_NSCD , NSCD__ADMIN , " admin " )
S_ ( SECCLASS_NSCD , NSCD__SHMEMPWD , " shmempwd " )
S_ ( SECCLASS_NSCD , NSCD__SHMEMGRP , " shmemgrp " )
S_ ( SECCLASS_NSCD , NSCD__SHMEMHOST , " shmemhost " )
2005-04-16 15:24:13 -07:00
S_ ( SECCLASS_ASSOCIATION , ASSOCIATION__SENDTO , " sendto " )
S_ ( SECCLASS_ASSOCIATION , ASSOCIATION__RECVFROM , " recvfrom " )
2006-01-06 13:22:39 -08:00
S_ ( SECCLASS_ASSOCIATION , ASSOCIATION__SETCONTEXT , " setcontext " )
2006-06-09 00:27:28 -07:00
S_ ( SECCLASS_PACKET , PACKET__SEND , " send " )
S_ ( SECCLASS_PACKET , PACKET__RECV , " recv " )
S_ ( SECCLASS_PACKET , PACKET__RELABELTO , " relabelto " )
2006-06-22 14:47:17 -07:00
S_ ( SECCLASS_KEY , KEY__VIEW , " view " )
S_ ( SECCLASS_KEY , KEY__READ , " read " )
S_ ( SECCLASS_KEY , KEY__WRITE , " write " )
S_ ( SECCLASS_KEY , KEY__SEARCH , " search " )
S_ ( SECCLASS_KEY , KEY__LINK , " link " )
S_ ( SECCLASS_KEY , KEY__SETATTR , " setattr " )
2006-06-26 00:24:57 -07:00
S_ ( SECCLASS_KEY , KEY__CREATE , " create " )