diff options
Diffstat (limited to 'Documentation/security/Smack.txt')
-rw-r--r-- | Documentation/security/Smack.txt | 27 |
1 files changed, 26 insertions, 1 deletions
diff --git a/Documentation/security/Smack.txt b/Documentation/security/Smack.txt index de5e1aeca7fb..5e6d07fbed07 100644 --- a/Documentation/security/Smack.txt +++ b/Documentation/security/Smack.txt | |||
@@ -28,6 +28,10 @@ Smack kernels use the CIPSO IP option. Some network | |||
28 | configurations are intolerant of IP options and can impede | 28 | configurations are intolerant of IP options and can impede |
29 | access to systems that use them as Smack does. | 29 | access to systems that use them as Smack does. |
30 | 30 | ||
31 | Smack is used in the Tizen operating system. Please | ||
32 | go to http://wiki.tizen.org for information about how | ||
33 | Smack is used in Tizen. | ||
34 | |||
31 | The current git repository for Smack user space is: | 35 | The current git repository for Smack user space is: |
32 | 36 | ||
33 | git://github.com/smack-team/smack.git | 37 | git://github.com/smack-team/smack.git |
@@ -108,6 +112,8 @@ in the smackfs filesystem. This pseudo-filesystem is mounted | |||
108 | on /sys/fs/smackfs. | 112 | on /sys/fs/smackfs. |
109 | 113 | ||
110 | access | 114 | access |
115 | Provided for backward compatibility. The access2 interface | ||
116 | is preferred and should be used instead. | ||
111 | This interface reports whether a subject with the specified | 117 | This interface reports whether a subject with the specified |
112 | Smack label has a particular access to an object with a | 118 | Smack label has a particular access to an object with a |
113 | specified Smack label. Write a fixed format access rule to | 119 | specified Smack label. Write a fixed format access rule to |
@@ -136,6 +142,8 @@ change-rule | |||
136 | those in the fourth string. If there is no such rule it will be | 142 | those in the fourth string. If there is no such rule it will be |
137 | created using the access specified in the third and the fourth strings. | 143 | created using the access specified in the third and the fourth strings. |
138 | cipso | 144 | cipso |
145 | Provided for backward compatibility. The cipso2 interface | ||
146 | is preferred and should be used instead. | ||
139 | This interface allows a specific CIPSO header to be assigned | 147 | This interface allows a specific CIPSO header to be assigned |
140 | to a Smack label. The format accepted on write is: | 148 | to a Smack label. The format accepted on write is: |
141 | "%24s%4d%4d"["%4d"]... | 149 | "%24s%4d%4d"["%4d"]... |
@@ -157,7 +165,19 @@ direct | |||
157 | doi | 165 | doi |
158 | This contains the CIPSO domain of interpretation used in | 166 | This contains the CIPSO domain of interpretation used in |
159 | network packets. | 167 | network packets. |
168 | ipv6host | ||
169 | This interface allows specific IPv6 internet addresses to be | ||
170 | treated as single label hosts. Packets are sent to single | ||
171 | label hosts only from processes that have Smack write access | ||
172 | to the host label. All packets received from single label hosts | ||
173 | are given the specified label. The format accepted on write is: | ||
174 | "%h:%h:%h:%h:%h:%h:%h:%h label" or | ||
175 | "%h:%h:%h:%h:%h:%h:%h:%h/%d label". | ||
176 | The "::" address shortcut is not supported. | ||
177 | If label is "-DELETE" a matched entry will be deleted. | ||
160 | load | 178 | load |
179 | Provided for backward compatibility. The load2 interface | ||
180 | is preferred and should be used instead. | ||
161 | This interface allows access control rules in addition to | 181 | This interface allows access control rules in addition to |
162 | the system defined rules to be specified. The format accepted | 182 | the system defined rules to be specified. The format accepted |
163 | on write is: | 183 | on write is: |
@@ -181,6 +201,8 @@ load2 | |||
181 | permissions that are not allowed. The string "r-x--" would | 201 | permissions that are not allowed. The string "r-x--" would |
182 | specify read and execute access. | 202 | specify read and execute access. |
183 | load-self | 203 | load-self |
204 | Provided for backward compatibility. The load-self2 interface | ||
205 | is preferred and should be used instead. | ||
184 | This interface allows process specific access rules to be | 206 | This interface allows process specific access rules to be |
185 | defined. These rules are only consulted if access would | 207 | defined. These rules are only consulted if access would |
186 | otherwise be permitted, and are intended to provide additional | 208 | otherwise be permitted, and are intended to provide additional |
@@ -205,6 +227,8 @@ netlabel | |||
205 | received from single label hosts are given the specified | 227 | received from single label hosts are given the specified |
206 | label. The format accepted on write is: | 228 | label. The format accepted on write is: |
207 | "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label". | 229 | "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label". |
230 | If the label specified is "-CIPSO" the address is treated | ||
231 | as a host that supports CIPSO headers. | ||
208 | onlycap | 232 | onlycap |
209 | This contains labels processes must have for CAP_MAC_ADMIN | 233 | This contains labels processes must have for CAP_MAC_ADMIN |
210 | and CAP_MAC_OVERRIDE to be effective. If this file is empty | 234 | and CAP_MAC_OVERRIDE to be effective. If this file is empty |
@@ -232,7 +256,8 @@ unconfined | |||
232 | is dangerous and can ruin the proper labeling of your system. | 256 | is dangerous and can ruin the proper labeling of your system. |
233 | It should never be used in production. | 257 | It should never be used in production. |
234 | 258 | ||
235 | You can add access rules in /etc/smack/accesses. They take the form: | 259 | If you are using the smackload utility |
260 | you can add access rules in /etc/smack/accesses. They take the form: | ||
236 | 261 | ||
237 | subjectlabel objectlabel access | 262 | subjectlabel objectlabel access |
238 | 263 | ||