Searched refs:CAP_MAC_ADMIN (Results 1 – 7 of 7) sorted by relevance
/linux/security/ipe/ |
H A D | fs.c | 38 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setaudit() 86 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setenforce() 144 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in new_policy()
|
H A D | policy_fs.c | 211 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setactive() 295 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in update_policy() 338 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in delete_policy()
|
/linux/include/uapi/linux/ |
H A D | capability.h | 358 #define CAP_MAC_ADMIN 33 macro
|
/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 79 name space. A process must have ``CAP_MAC_ADMIN`` to change any of these 124 reading ``/proc/self/attr/current``. A process with ``CAP_MAC_ADMIN`` 282 This contains labels processes must have for CAP_MAC_ADMIN 311 a process with ``CAP_MAC_ADMIN`` can write a label into this interface. 321 if it has ``CAP_MAC_ADMIN``. This interface allows a process without 322 ``CAP_MAC_ADMIN`` to relabel itself to one of labels from predefined list. 323 A process without ``CAP_MAC_ADMIN`` can change its label only once. When it 619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 621 be denied otherwise. CAP_MAC_ADMIN allows a process to change
|
H A D | ipe.rst | 311 writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``. 328 all writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``. 508 all writes to ipe's securityfs nodes require ``CAP_MAC_ADMIN``.
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 49 CAP_MAC_ADMIN, since we really are trying to lock down root.
|
/linux/security/selinux/ |
H A D | hooks.c | 3171 if (cap_capable(cred, &init_user_ns, CAP_MAC_ADMIN, opts)) in has_cap_mac_admin() 3173 if (cred_has_capability(cred, CAP_MAC_ADMIN, opts, true)) in has_cap_mac_admin()
|