summaryrefslogtreecommitdiffstats
path: root/Documentation/security/Smack.txt
diff options
context:
space:
mode:
Diffstat (limited to 'Documentation/security/Smack.txt')
-rw-r--r--Documentation/security/Smack.txt27
1 files changed, 26 insertions, 1 deletions
diff --git a/Documentation/security/Smack.txt b/Documentation/security/Smack.txt
index de5e1aeca7fb..5e6d07fbed07 100644
--- a/Documentation/security/Smack.txt
+++ b/Documentation/security/Smack.txt
@@ -28,6 +28,10 @@ Smack kernels use the CIPSO IP option. Some network
28configurations are intolerant of IP options and can impede 28configurations are intolerant of IP options and can impede
29access to systems that use them as Smack does. 29access to systems that use them as Smack does.
30 30
31Smack is used in the Tizen operating system. Please
32go to http://wiki.tizen.org for information about how
33Smack is used in Tizen.
34
31The current git repository for Smack user space is: 35The current git repository for Smack user space is:
32 36
33 git://github.com/smack-team/smack.git 37 git://github.com/smack-team/smack.git
@@ -108,6 +112,8 @@ in the smackfs filesystem. This pseudo-filesystem is mounted
108on /sys/fs/smackfs. 112on /sys/fs/smackfs.
109 113
110access 114access
115 Provided for backward compatibility. The access2 interface
116 is preferred and should be used instead.
111 This interface reports whether a subject with the specified 117 This interface reports whether a subject with the specified
112 Smack label has a particular access to an object with a 118 Smack label has a particular access to an object with a
113 specified Smack label. Write a fixed format access rule to 119 specified Smack label. Write a fixed format access rule to
@@ -136,6 +142,8 @@ change-rule
136 those in the fourth string. If there is no such rule it will be 142 those in the fourth string. If there is no such rule it will be
137 created using the access specified in the third and the fourth strings. 143 created using the access specified in the third and the fourth strings.
138cipso 144cipso
145 Provided for backward compatibility. The cipso2 interface
146 is preferred and should be used instead.
139 This interface allows a specific CIPSO header to be assigned 147 This interface allows a specific CIPSO header to be assigned
140 to a Smack label. The format accepted on write is: 148 to a Smack label. The format accepted on write is:
141 "%24s%4d%4d"["%4d"]... 149 "%24s%4d%4d"["%4d"]...
@@ -157,7 +165,19 @@ direct
157doi 165doi
158 This contains the CIPSO domain of interpretation used in 166 This contains the CIPSO domain of interpretation used in
159 network packets. 167 network packets.
168ipv6host
169 This interface allows specific IPv6 internet addresses to be
170 treated as single label hosts. Packets are sent to single
171 label hosts only from processes that have Smack write access
172 to the host label. All packets received from single label hosts
173 are given the specified label. The format accepted on write is:
174 "%h:%h:%h:%h:%h:%h:%h:%h label" or
175 "%h:%h:%h:%h:%h:%h:%h:%h/%d label".
176 The "::" address shortcut is not supported.
177 If label is "-DELETE" a matched entry will be deleted.
160load 178load
179 Provided for backward compatibility. The load2 interface
180 is preferred and should be used instead.
161 This interface allows access control rules in addition to 181 This interface allows access control rules in addition to
162 the system defined rules to be specified. The format accepted 182 the system defined rules to be specified. The format accepted
163 on write is: 183 on write is:
@@ -181,6 +201,8 @@ load2
181 permissions that are not allowed. The string "r-x--" would 201 permissions that are not allowed. The string "r-x--" would
182 specify read and execute access. 202 specify read and execute access.
183load-self 203load-self
204 Provided for backward compatibility. The load-self2 interface
205 is preferred and should be used instead.
184 This interface allows process specific access rules to be 206 This interface allows process specific access rules to be
185 defined. These rules are only consulted if access would 207 defined. These rules are only consulted if access would
186 otherwise be permitted, and are intended to provide additional 208 otherwise be permitted, and are intended to provide additional
@@ -205,6 +227,8 @@ netlabel
205 received from single label hosts are given the specified 227 received from single label hosts are given the specified
206 label. The format accepted on write is: 228 label. The format accepted on write is:
207 "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label". 229 "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label".
230 If the label specified is "-CIPSO" the address is treated
231 as a host that supports CIPSO headers.
208onlycap 232onlycap
209 This contains labels processes must have for CAP_MAC_ADMIN 233 This contains labels processes must have for CAP_MAC_ADMIN
210 and CAP_MAC_OVERRIDE to be effective. If this file is empty 234 and CAP_MAC_OVERRIDE to be effective. If this file is empty
@@ -232,7 +256,8 @@ unconfined
232 is dangerous and can ruin the proper labeling of your system. 256 is dangerous and can ruin the proper labeling of your system.
233 It should never be used in production. 257 It should never be used in production.
234 258
235You can add access rules in /etc/smack/accesses. They take the form: 259If you are using the smackload utility
260you can add access rules in /etc/smack/accesses. They take the form:
236 261
237 subjectlabel objectlabel access 262 subjectlabel objectlabel access
238 263