Home
last modified time | relevance | path

Searched refs:CAP_MAC_ADMIN (Results 1 – 7 of 7) sorted by relevance

/linux/security/ipe/
H A Dfs.c38 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setaudit()
86 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setenforce()
144 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in new_policy()
H A Dpolicy_fs.c211 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setactive()
295 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in update_policy()
338 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in delete_policy()
/linux/include/uapi/linux/
H A Dcapability.h358 #define CAP_MAC_ADMIN 33 macro
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst79 name space. A process must have ``CAP_MAC_ADMIN`` to change any of these
124 reading ``/proc/self/attr/current``. A process with ``CAP_MAC_ADMIN``
282 This contains labels processes must have for CAP_MAC_ADMIN
311 a process with ``CAP_MAC_ADMIN`` can write a label into this interface.
321 if it has ``CAP_MAC_ADMIN``. This interface allows a process without
322 ``CAP_MAC_ADMIN`` to relabel itself to one of labels from predefined list.
323 A process without ``CAP_MAC_ADMIN`` can change its label only once. When it
619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
621 be denied otherwise. CAP_MAC_ADMIN allows a process to change
H A Dipe.rst311 writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``.
328 all writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``.
508 all writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``.
/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst49 CAP_MAC_ADMIN, since we really are trying to lock down root.
/linux/security/selinux/
H A Dhooks.c3171 if (cap_capable(cred, &init_user_ns, CAP_MAC_ADMIN, opts)) in has_cap_mac_admin()
3173 if (cred_has_capability(cred, CAP_MAC_ADMIN, opts, true)) in has_cap_mac_admin()