^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) #ifndef _SELINUX_POLICYCAP_NAMES_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) #define _SELINUX_POLICYCAP_NAMES_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) #include "policycap.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) /* Policy capability names */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) "network_peer_controls",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) "open_perms",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) "extended_socket_class",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) "always_check_network",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) "cgroup_seclabel",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) "nnp_nosuid_transition",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) "genfs_seclabel_symlinks",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) "ioctl_skip_cloexec"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #endif /* _SELINUX_POLICYCAP_NAMES_H_ */