Lines Matching full:process

53 	report if a process with one label has access
79 name space. A process must have ``CAP_MAC_ADMIN`` to change any of these
87 of the process that created it.
90 The Smack label of a process that execs a program file with
94 Don't allow the file to be mmapped by a process whose Smack
95 label does not allow all of the access permitted to a process
105 creating process. If the object being created is a directory
123 A process can see the Smack label it is running with by
124 reading ``/proc/self/attr/current``. A process with ``CAP_MAC_ADMIN``
125 can set the process Smack by writing there.
248 This interface allows process specific access rules to be
251 restrictions on the process. The format is the same as for
255 This interface allows process specific access rules to be
258 restrictions on the process. The format is the same as for
311 a process with ``CAP_MAC_ADMIN`` can write a label into this interface.
318 This interface contains a list of labels to which the process can
320 Normally a process can change its own label to any legal value, but only
321 if it has ``CAP_MAC_ADMIN``. This interface allows a process without
323 A process without ``CAP_MAC_ADMIN`` can change its label only once. When it
460 of a process will usually be assigned by the system initialization
570 access rule that allows a process to create an object in that directory
572 of the directory, not the creating process. This makes it much easier
580 Process objects reflect tasks on the system and the Smack label used to access
583 from the signaler to the recipient. Debugging a process requires both reading
588 one process to another requires that the sender have write access to the
604 The Smack label of a process can be read from /proc/<pid>/attr/current. A
605 process can read its own Smack label from /proc/self/attr/current. A
606 privileged process can change its own Smack label by writing to
607 /proc/self/attr/current but not the label of another process.
614 only be changed by a process with privilege.
619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
620 CAP_MAC_OVERRIDE allows the process access to objects it would
621 be denied otherwise. CAP_MAC_ADMIN allows a process to change
628 transmissions. Every packet sent by a Smack process is tagged with its Smack
633 packet has write access to the receiving process and if that is not the case
745 Smack label associated with the process the only concern likely to arise is
746 whether the process has execute access to the program.
773 process can set the Smack label of a file system object with setxattr(2)::
786 A privileged process can set the Smack label of outgoing packets with