|
1 | 1 | # Extended Access Vector Rules
|
2 | 2 |
|
| 3 | +- [Extended Permission Evaluation](#extended-permission-evaluation) |
3 | 4 | - [*ioctl* Operation Rules](#ioctl-operation-rules)
|
4 | 5 | - [*nlmsg* Operation Rules](#nlmsg-operation-rules)
|
5 | 6 |
|
@@ -74,6 +75,29 @@ Conditional Policy Statements
|
74 | 75 | | ----------------------- | ----------------------- | ----------------------- |
|
75 | 76 | | No | No | No |
|
76 | 77 |
|
| 78 | +### Extended Permission Evaluation |
| 79 | + |
| 80 | +Extended permission rules are evaluated as follows: |
| 81 | + |
| 82 | +* If no extended permissions are defined, the standard SELinux checks around AVC |
| 83 | + rules and constraints will be performed. |
| 84 | + |
| 85 | +* If an extended permission rule is defined, the policy is evaluated so that |
| 86 | + both the standard AVC checks and the extended permissions must pass. For example: |
| 87 | + |
| 88 | + * If an *allowxperm* rule is defined, extended permissions will only be |
| 89 | + granted if *allow* is granted to the resource. |
| 90 | + |
| 91 | + * If an *auditallowxperm* rule is defined, extended auditing will only |
| 92 | + be performed if *auditallow* is allowed for the resource. |
| 93 | + |
| 94 | +* If any extended permission rule is defined, the resource and operation are fully |
| 95 | + evaluated according to extended access rules. All unspecified permissions within |
| 96 | + the available *xperm_set* will be automatically denied. |
| 97 | + |
| 98 | +All extended permissions are deny-by-default. If extended permission rules are used, |
| 99 | +any allow permissions must be granted explicitely. |
| 100 | + |
77 | 101 | ### *ioctl* Operation Rules
|
78 | 102 |
|
79 | 103 | Use cases and implementation details for ioctl command allowlists are described
|
|
0 commit comments