summaryrefslogtreecommitdiffstats
path: root/templates/man5/proc_pid_attr.5.pot
diff options
context:
space:
mode:
Diffstat (limited to 'templates/man5/proc_pid_attr.5.pot')
-rw-r--r--templates/man5/proc_pid_attr.5.pot289
1 files changed, 289 insertions, 0 deletions
diff --git a/templates/man5/proc_pid_attr.5.pot b/templates/man5/proc_pid_attr.5.pot
new file mode 100644
index 00000000..eab06908
--- /dev/null
+++ b/templates/man5/proc_pid_attr.5.pot
@@ -0,0 +1,289 @@
+# SOME DESCRIPTIVE TITLE
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the PACKAGE package.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: PACKAGE VERSION\n"
+"POT-Creation-Date: 2024-06-01 06:10+0200\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: TH
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "proc_pid_attr"
+msgstr ""
+
+#. type: TH
+#: archlinux debian-unstable opensuse-tumbleweed
+#, no-wrap
+msgid "2024-05-02"
+msgstr ""
+
+#. type: TH
+#: archlinux debian-unstable
+#, no-wrap
+msgid "Linux man-pages 6.8"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "NAME"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid "/proc/pid/attr/ - security-related attributes"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "DESCRIPTION"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/>"
+msgstr ""
+
+#
+#. https://lwn.net/Articles/28222/
+#. From: Stephen Smalley <sds@epoch.ncsc.mil>
+#. To: LKML and others
+#. Subject: [RFC][PATCH] Process Attribute API for Security Modules
+#. Date: 08 Apr 2003 16:17:52 -0400
+#. http://www.nsa.gov/research/_files/selinux/papers/module/x362.shtml
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The files in this directory provide an API for security modules. The "
+"contents of this directory are files that can be read and written in order "
+"to set security-related attributes. This directory was added to support "
+"SELinux, but the intention was that the API be general enough to support "
+"other security modules. For the purpose of explanation, examples of how "
+"SELinux uses these files are provided below."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"This directory is present only if the kernel was configured with "
+"B<CONFIG_SECURITY>."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/current> (since Linux 2.6.0)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The contents of this file represent the current security attributes of the "
+"process."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"In SELinux, this file is used to get the security context of a process. "
+"Prior to Linux 2.6.11, this file could not be used to set the security "
+"context (a write was always denied), since SELinux limited process security "
+"transitions to B<execve>(2) (see the description of I</proc/>pidI</attr/"
+"exec>, below). Since Linux 2.6.11, SELinux lifted this restriction and "
+"began supporting \"set\" operations via writes to this node if authorized by "
+"policy, although use of this operation is only suitable for applications "
+"that are trusted to maintain any desired separation between the old and new "
+"security contexts."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"Prior to Linux 2.6.28, SELinux did not allow threads within a multithreaded "
+"process to set their security context via this node as it would yield an "
+"inconsistency among the security contexts of the threads sharing the same "
+"memory space. Since Linux 2.6.28, SELinux lifted this restriction and began "
+"supporting \"set\" operations for threads within a multithreaded process if "
+"the new security context is bounded by the old security context, where the "
+"bounded relation is defined in policy and guarantees that the new security "
+"context has a subset of the permissions of the old security context."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"Other security modules may choose to support \"set\" operations via writes "
+"to this node."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/exec> (since Linux 2.6.0)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"This file represents the attributes to assign to the process upon a "
+"subsequent B<execve>(2)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"In SELinux, this is needed to support role/domain transitions, and "
+"B<execve>(2) is the preferred point to make such transitions because it "
+"offers better control over the initialization of the process in the new "
+"security label and the inheritance of state. In SELinux, this attribute is "
+"reset on B<execve>(2) so that the new program reverts to the default "
+"behavior for any B<execve>(2) calls that it may make. In SELinux, a "
+"process can set only its own I</proc/>pidI</attr/exec> attribute."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/fscreate> (since Linux 2.6.0)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"This file represents the attributes to assign to files created by subsequent "
+"calls to B<open>(2), B<mkdir>(2), B<symlink>(2), and B<mknod>(2)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"SELinux employs this file to support creation of a file (using the "
+"aforementioned system calls) in a secure state, so that there is no risk of "
+"inappropriate access being obtained between the time of creation and the "
+"time that attributes are set. In SELinux, this attribute is reset on "
+"B<execve>(2), so that the new program reverts to the default behavior for "
+"any file creation calls it may make, but the attribute will persist across "
+"multiple file creation calls within a program unless it is explicitly "
+"reset. In SELinux, a process can set only its own I</proc/>pidI</attr/"
+"fscreate> attribute."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/keycreate> (since Linux 2.6.18)"
+msgstr ""
+
+#. commit 4eb582cf1fbd7b9e5f466e3718a59c957e75254e
+#. commit b68101a1e8f0263dbc7b8375d2a7c57c6216fb76
+#. commit d410fa4ef99112386de5f218dd7df7b4fca910b4
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"If a process writes a security context into this file, all subsequently "
+"created keys (B<add_key>(2)) will be labeled with this context. For "
+"further information, see the kernel source file I<Documentation/security/"
+"keys/core.rst> (or file I<Documentation/security/keys.txt> between Linux 3.0 "
+"and Linux 4.13, or I<Documentation/keys.txt> before Linux 3.0)."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/prev> (since Linux 2.6.0)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"This file contains the security context of the process before the last "
+"B<execve>(2); that is, the previous value of I</proc/>pidI</attr/current>."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I</proc/>pidI</attr/socketcreate> (since Linux 2.6.18)"
+msgstr ""
+
+#. commit 42c3e03ef6b298813557cdb997bd6db619cd65a2
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"If a process writes a security context into this file, all subsequently "
+"created sockets will be labeled with this context."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "SEE ALSO"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid "B<proc>(5)"
+msgstr ""
+
+#. type: TH
+#: fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "2023-08-15"
+msgstr ""
+
+#. type: TH
+#: fedora-40 mageia-cauldron
+#, no-wrap
+msgid "Linux man-pages 6.06"
+msgstr ""
+
+#. type: TH
+#: fedora-rawhide
+#, no-wrap
+msgid "Linux man-pages 6.7"
+msgstr ""
+
+#. type: TH
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "Linux man-pages (unreleased)"
+msgstr ""