Lines Matching full:process
318 behalf of a process, and running in that process's context, and that includes a
320 because the files in the cache are inaccessible to that process, or because if
321 the process creates a file in the cache, that file may be inaccessible to other
325 fsgid and actor security label) that the process acts as - without changing the
326 security context of the process when it the target of an operation performed by
327 some other process (so signalling and suchlike still work correctly).
338 (2) Finds the security label of the process which issued the bind request
351 type_transition <daemon's-ID> kernel_t : process <module's-ID>;
355 type_transition cachefilesd_t kernel_t : process cachefiles_kernel_t;
411 when it acts on behalf of another process, in that process's context.
417 process issued the original syscall on the netfs.
421 derived from that process that issued the system call, thus potentially
425 What is required is to temporarily override the security of the process that
427 security data as that affects the process as an object, not just as a subject.
429 the process looks like in /proc.
433 The objective security holds the intrinsic security properties of a process and
435 process is the target of an operation by some other process (SIGKILL for
438 The subjective security holds the active security properties of a process, and
439 may be overridden. This is not seen externally, and is used whan a process
440 acts upon another object, for example SIGKILLing another process or opening a