Add tests for CAP_MAC_ADMIN/mac_admin and its effect on setting/getting security contexts unknown to the currently loaded policy. A process with CAP_MAC_ADMIN + SELinux :capability2 mac_admin permission can set a label that is unknown to the currently loaded policy on a file, and can get that label from the file without having it be remapped to unlabeled_t. Used for livecd creation, building labeled filesystem images on a build host with a different policy, etc. Originally intended to be used by rpm to support setting file labels before installing policy modules from packages but not presently used AFAIK.
Add tests for CAP_MAC_ADMIN/mac_admin and its effect on setting/getting security contexts unknown to the currently loaded policy. A process with CAP_MAC_ADMIN + SELinux :capability2 mac_admin permission can set a label that is unknown to the currently loaded policy on a file, and can get that label from the file without having it be remapped to unlabeled_t. Used for livecd creation, building labeled filesystem images on a build host with a different policy, etc. Originally intended to be used by rpm to support setting file labels before installing policy modules from packages but not presently used AFAIK.