@@ -28,6 +28,10 @@ Smack kernels use the CIPSO IP option. Some network
2828configurations are intolerant of IP options and can impede
2929access to systems that use them as Smack does.
3030
31+ Smack is used in the Tizen operating system. Please
32+ go to http://wiki.tizen.org for information about how
33+ Smack is used in Tizen.
34+
3135The current git repository for Smack user space is:
3236
3337 git://github.com/smack-team/smack.git
@@ -108,6 +112,8 @@ in the smackfs filesystem. This pseudo-filesystem is mounted
108112on /sys/fs/smackfs.
109113
110114access
115+ Provided for backward compatibility. The access2 interface
116+ is preferred and should be used instead.
111117 This interface reports whether a subject with the specified
112118 Smack label has a particular access to an object with a
113119 specified Smack label. Write a fixed format access rule to
@@ -136,6 +142,8 @@ change-rule
136142 those in the fourth string. If there is no such rule it will be
137143 created using the access specified in the third and the fourth strings.
138144cipso
145+ Provided for backward compatibility. The cipso2 interface
146+ is preferred and should be used instead.
139147 This interface allows a specific CIPSO header to be assigned
140148 to a Smack label. The format accepted on write is:
141149 "%24s%4d%4d"["%4d"]...
@@ -157,7 +165,19 @@ direct
157165doi
158166 This contains the CIPSO domain of interpretation used in
159167 network packets.
168+ ipv6host
169+ This interface allows specific IPv6 internet addresses to be
170+ treated as single label hosts. Packets are sent to single
171+ label hosts only from processes that have Smack write access
172+ to the host label. All packets received from single label hosts
173+ are given the specified label. The format accepted on write is:
174+ "%h:%h:%h:%h:%h:%h:%h:%h label" or
175+ "%h:%h:%h:%h:%h:%h:%h:%h/%d label".
176+ The "::" address shortcut is not supported.
177+ If label is "-DELETE" a matched entry will be deleted.
160178load
179+ Provided for backward compatibility. The load2 interface
180+ is preferred and should be used instead.
161181 This interface allows access control rules in addition to
162182 the system defined rules to be specified. The format accepted
163183 on write is:
@@ -181,6 +201,8 @@ load2
181201 permissions that are not allowed. The string "r-x--" would
182202 specify read and execute access.
183203load-self
204+ Provided for backward compatibility. The load-self2 interface
205+ is preferred and should be used instead.
184206 This interface allows process specific access rules to be
185207 defined. These rules are only consulted if access would
186208 otherwise be permitted, and are intended to provide additional
@@ -205,6 +227,8 @@ netlabel
205227 received from single label hosts are given the specified
206228 label. The format accepted on write is:
207229 "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label".
230+ If the label specified is "-CIPSO" the address is treated
231+ as a host that supports CIPSO headers.
208232onlycap
209233 This contains labels processes must have for CAP_MAC_ADMIN
210234 and CAP_MAC_OVERRIDE to be effective. If this file is empty
@@ -232,7 +256,8 @@ unconfined
232256 is dangerous and can ruin the proper labeling of your system.
233257 It should never be used in production.
234258
235- You can add access rules in /etc/smack/accesses. They take the form:
259+ If you are using the smackload utility
260+ you can add access rules in /etc/smack/accesses. They take the form:
236261
237262 subjectlabel objectlabel access
238263
0 commit comments