Searched refs:CAP_SYS_ADMIN (Results 1 – 7 of 7) sorted by relevance
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | policy.c | 91 return (priv_policy(cr, CAP_SYS_ADMIN, EPERM)); in secpolicy_nfs() 100 return (priv_policy(cr, CAP_SYS_ADMIN, EPERM)); in secpolicy_sys_config() 239 return (priv_policy(cr, CAP_SYS_ADMIN, EACCES)); in secpolicy_zinject() 249 return (priv_policy(cr, CAP_SYS_ADMIN, EACCES)); in secpolicy_zfs() 260 if (!has_capability(proc, CAP_SYS_ADMIN)) in secpolicy_zfs_proc()
|
H A D | zpl_xattr.c | 819 return (capable(CAP_SYS_ADMIN)); in __zpl_xattr_trusted_list() 830 if (!capable(CAP_SYS_ADMIN)) in __zpl_xattr_trusted_get() 850 if (!capable(CAP_SYS_ADMIN)) in __zpl_xattr_trusted_set()
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | capability.h | 42 #define CAP_SYS_ADMIN PRIV_DRIVER macro
|
/freebsd/sys/contrib/openzfs/config/ |
H A D | kernel-userns-capabilities.m4 | 9 ns_capable((struct user_namespace *)NULL, CAP_SYS_ADMIN);
|
/freebsd/sys/dev/drm2/ |
H A D | drm_os_freebsd.h | 423 CAP_SYS_ADMIN enumerator 431 case CAP_SYS_ADMIN: in capable()
|
/freebsd/contrib/capsicum-test/ |
H A D | linux.cc | 1023 data[0].effective &= ~(1 << CAP_SYS_ADMIN); in FORK_TEST() 1024 data[0].permitted &= ~(1 << CAP_SYS_ADMIN); in FORK_TEST() 1025 data[0].inheritable &= ~(1 << CAP_SYS_ADMIN); in FORK_TEST()
|
/freebsd/sys/dev/pms/freebsd/driver/common/ |
H A D | lxencrypt.c | 90 if(!capable(CAP_SYS_ADMIN)) in set_dek_table_entry()
|