Lines Matching refs:process

40 smackaccess - report if a process with one label has access
63 name space. A process must have CAP_MAC_ADMIN to change any of these
71 of the process that created it.
73 The Smack label of a process that execs a program file with
76 Don't allow the file to be mmapped by a process whose Smack
77 label does not allow all of the access permitted to a process
86 creating process. If the object being created is a directory
102 A process can see the Smack label it is running with by
103 reading /proc/self/attr/current. A process with CAP_MAC_ADMIN
104 can set the process Smack by writing there.
184 This interface allows process specific access rules to be
187 restrictions on the process. The format is the same as for
190 This interface allows process specific access rules to be
193 restrictions on the process. The format is the same as for
229 a process with CAP_MAC_ADMIN can write a label into this interface.
354 of a process will usually be assigned by the system initialization
457 access rule that allows a process to create an object in that directory
459 of the directory, not the creating process. This makes it much easier
470 from the signaler to the recipient. Debugging a process requires both reading
475 one process to another requires that the sender have write access to the
489 The Smack label of a process can be read from /proc/<pid>/attr/current. A
490 process can read its own Smack label from /proc/self/attr/current. A
491 privileged process can change its own Smack label by writing to
492 /proc/self/attr/current but not the label of another process.
498 only be changed by a process with privilege.
502 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
503 CAP_MAC_OVERRIDE allows the process access to objects it would
504 be denied otherwise. CAP_MAC_ADMIN allows a process to change
510 transmissions. Every packet sent by a Smack process is tagged with its Smack
515 packet has write access to the receiving process and if that is not the case
617 Smack label associated with the process the only concern likely to arise is
618 whether the process has execute access to the program.
642 process can set the Smack label of a file system object with setxattr(2).
654 A privileged process can set the Smack label of outgoing packets with