Skip to content

Commit 7da6d49

Browse files
cgzonespcmoore
authored andcommitted
xperm_rules: add two notes
Signed-off-by: Christian Göttsche <[email protected]> Signed-off-by: Paul Moore <[email protected]>
1 parent 38b9a05 commit 7da6d49

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

src/xperm_rules.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
- [*ioctl* Operation Rules](#ioctl-operation-rules)
44

5-
There are three extended AV rules implemented from Policy version 30
5+
There are four extended AV rules implemented from Policy version 30
66
with the target platform 'selinux' that expand the permission sets from
77
a fixed 32 bits to permission sets in 256 bit increments: *allowxperm*,
88
*dontauditxperm*, *auditallowxperm* and *neverallowxperm*.
@@ -129,6 +129,12 @@ Notes:
129129
class/permission is required.
130130
3. To deny all ioctl requests for a specific source/target/class the
131131
*xperm_set* should be set to *0* or *0x0*.
132+
4. From the 32-bit ioctl request parameter value only the least significant
133+
16 bits are used. Thus *0x8927*, *0x00008927* and *0xabcd8927*
134+
are the same extended permission.
135+
5. To decode a numeric ioctl request parameter into the corresponding
136+
textual identifier see
137+
<https://www.kernel.org/doc/html/latest/userspace-api/ioctl/ioctl-decoding.html>
132138

133139
<!-- %CUTHERE% -->
134140

0 commit comments

Comments
 (0)