Skip to content

Commit 199b94d

Browse files
committed
Clarify extended permission evaluation
Adding documentation to clarify the automatic-deny evaluation when extended permissions are defined, as well as the overall evaluation logic. Signed-off-by: Liz Prucka <[email protected]>
1 parent 8cfd893 commit 199b94d

File tree

1 file changed

+21
-0
lines changed

1 file changed

+21
-0
lines changed

src/xperm_rules.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# Extended Access Vector Rules
22

3+
- [Extended Permission Evaluation](#extended-permission-evaluation)
34
- [*ioctl* Operation Rules](#ioctl-operation-rules)
45
- [*nlmsg* Operation Rules](#nlmsg-operation-rules)
56

@@ -74,6 +75,26 @@ Conditional Policy Statements
7475
| ----------------------- | ----------------------- | ----------------------- |
7576
| No | No | No |
7677

78+
### Extended Permission Evaluation
79+
80+
Extended permission rules are evaluated as follows:
81+
82+
* If no extended permissions are defined, only the resource-level policy is
83+
considered.
84+
85+
* If an extended permission rule is defined, the policy is first evaluated
86+
according to the high-level resource policy. For example:
87+
88+
* If an *allowxperm* rule is defined, extended permissions will only be
89+
granted if *allow* is granted to the resource.
90+
91+
* If an *auditallowxperm* rule is defined, extended audit permissions will only
92+
be granted if *auditallow* is granted to the resource.
93+
94+
* If any extended permission rule is defined, the resource and operation are fully
95+
evaluated according to extended access rules. All undefined permissions within
96+
the available *xperm_set* will be automatically denied.
97+
7798
### *ioctl* Operation Rules
7899

79100
Use cases and implementation details for ioctl command allowlists are described

0 commit comments

Comments
 (0)