From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B2BAC433E0 for ; Mon, 3 Aug 2020 20:52:02 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3EC7D22BF3 for ; Mon, 3 Aug 2020 20:52:02 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="T/0TnGY/" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728608AbgHCUwB (ORCPT ); Mon, 3 Aug 2020 16:52:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727003AbgHCUwB (ORCPT ); Mon, 3 Aug 2020 16:52:01 -0400 Received: from mail-oi1-x242.google.com (mail-oi1-x242.google.com [IPv6:2607:f8b0:4864:20::242]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4E2EDC06174A for ; Mon, 3 Aug 2020 13:52:01 -0700 (PDT) Received: by mail-oi1-x242.google.com with SMTP id k4so34486602oik.2 for ; Mon, 03 Aug 2020 13:52:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=F+cAs6wMtQOgvWx4dfL6ocC2SSKvZRwp1PJZmt29S50=; b=T/0TnGY/3QuEQEz6CJt6JH0Vk9mwgmpLsCijdbcmRsbOPLzU2CBqZ7sb6Oyck1ZrIu U2Bra+aiSd6hKqGzycNw9xc1fEEKosoiAYgRkNJpK1jXEbjJhofjCVWu8X37esVjOGCx osFH+1u9SCh8V6h5edaU97g/YZjb2/mE1hgNSiBSN+ij1z7yDfK6mLSYH/TrOGNtksJU 7M7IMdUoJidc7bwGKY0zLXhglRmlQYOVvLVHcUKGNPj2JnZe8uyWGTRMXddf7rbC+nMq 6MmYlaNQdnSt56KAn7xkimCiUYkgNk2t+29jAOoeNM7U+TvicfNkIMoayYOYFtSUPZKG 9Ang== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=F+cAs6wMtQOgvWx4dfL6ocC2SSKvZRwp1PJZmt29S50=; b=RDyJ8hiMWP5wUXx49gtHJmkd4hLduhx0iaRDsKjbVOlpa4Y/q/ENwWcDOgIh4z8Yeb 1qMqx3V8k9i9lUb0/L7wvCbU3tiHuTrPrhxUA2zy/Q4ZYHayj73aULfVis2BrZoRDZuV ROk0XoTGMILiX9iYuVuxWwWh7wN+DhjqHtmLGqDXzd7yB/arKsV7lY20cq9d/MOJuO5J kOfKKzkf67mqrBjzeQYOhID8k83c2XEfrofzALOoGTfX/1AM4tjwJOFJQJ4LICq4AG8o QpzSgGMXb7t8rZpQhn4OvK/8Px/7XjePCGXRDsxgkBM7rO4cfh0u5VMxpcOzRhcDaA7f lcrw== X-Gm-Message-State: AOAM532UCliXpJX9z9491XYQ7+FBdWGy3I80BkOi3S739YnUq8j/pEER lO0uxr1vwUV/L01AEQkU6EANL2hVMwzBZmgqebaG9w== X-Google-Smtp-Source: ABdhPJyUq57+PqZy5lnl2RILjxOxqRV0yjfwF/44Mb6v42oweaiL+KlQbChhjEteMU2sMg8PlUvYAmh5xp/mL/sgrGw= X-Received: by 2002:aca:cd05:: with SMTP id d5mr925984oig.138.1596487920331; Mon, 03 Aug 2020 13:52:00 -0700 (PDT) MIME-Version: 1.0 References: <20200802120847.218916-1-dominick.grift@defensec.nl> In-Reply-To: <20200802120847.218916-1-dominick.grift@defensec.nl> From: James Carter Date: Mon, 3 Aug 2020 16:51:46 -0400 Message-ID: Subject: Re: [SELinux-notebook PATCH v4] type_statements: document expandattribute To: Dominick Grift Cc: SElinux list Content-Type: text/plain; charset="UTF-8" Sender: selinux-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org On Sun, Aug 2, 2020 at 8:23 AM Dominick Grift wrote: > > This functionality was added for Androids Treble in 2017. > > Signed-off-by: Dominick Grift > --- > v2: change expandtypeattribute to expandattribute > v3: overriden is overridden > v4: convert to markdown > > src/type_statements.md | 686 ++++++++++++++++++----------------------- > 1 file changed, 295 insertions(+), 391 deletions(-) > > diff --git a/src/type_statements.md b/src/type_statements.md > index 61c7191..0d7c7c7 100644 > --- a/src/type_statements.md > +++ b/src/type_statements.md > @@ -1,7 +1,7 @@ > # Type Statements > > These statements share the same namespace, therefore the general > -convention is to use `_t` as the final two characters of a type > +convention is to use *_t* as the final two characters of a type > identifier to differentiate it from an attribute identifier as shown in > the following examples: > > @@ -13,12 +13,10 @@ type bin_t; # A type identifier generally ends with _t > attribute file_type; # An attribute identifier generally ends with _type > ``` > > -
> +## *type* > > -## `type` > - > -The `type` statement declares the type identifier and any optional > -associated `alias` or `attribute` identifiers. Type identifiers are a > +The *type* statement declares the type identifier and any optional > +associated *alias* or *attribute* identifiers. Type identifiers are a > component of the [**Security Context**](security_context.md#security-context). > > **The statement definition is:** > @@ -27,57 +25,44 @@ component of the [**Security Context**](security_context.md#security-context). > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
typeThe type keyword.
type_idThe type identifier.
aliasOptional alias keyword that signifies alternate identifiers for the type_id that are declared in the alias_id list.
alias_idOne or more alias identifiers that have been previously declared by the typealias statement. Multiple entries consist of a space separated list enclosed in braces '{}'.
attribute_idOne or more optional attribute identifiers that have been previously declared by the attribute statement. Multiple entries consist of a comma ',' separated list, also note the lead comma.
> +*type* > + > +The *type* keyword. > + > +*type_id* > + > +The *type* identifier. > + > +*alias* > + > +Optional *alias* keyword that signifies alternate identifiers for the *type_id* > +that are declared in the *alias_id* list. > + > +*alias_id* > + > +One or more *alias* identifiers that have been previously declared by the > +[*typealias*](#typealias) statement. Multiple entries consist of a space > +separated list enclosed in braces '{}'. > + > +*attribute_id* > + > +One or more optional *attribute* identifiers that have been previously declared > +by the [*attribute*](#attribute) statement. Multiple entries consist of a comma > +',' separated list, also note the lead comma. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
NoYesYes
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | Yes | > > **Examples:** > > @@ -134,12 +119,10 @@ attribute server_packet_type; # declare attribute 2 > type ssh_server_packet_t, packet_type, server_packet_type; > ``` > > -
> - > -## `attribute` > +## *attribute* > > -An `attribute` statement declares an identifier that can then be used to > -refer to a group of `type` identifiers. > +An *attribute* statement declares an identifier that can then be used to > +refer to a group of *type* identifiers. > > **The statement definition is:** > > @@ -147,45 +130,27 @@ refer to a group of `type` identifiers. > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > -
attributeThe attribute keyword.
attribute_idThe attribute identifier.
> +*attribute* > + > +The *attribute* keyword. > + > +*attribute_id* > + > +The *attribute* identifier. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
NoYesYes
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | Yes | > > **Examples:** > > @@ -199,11 +164,61 @@ attribute file_type; > attribute non_security_file_type; > ``` > > -
> +## *expandattribute* > + > +The *expandattribute* statement allows type attribute expansion > +compiler defaults to be overridden. I think this should say something like: The *expandattribute* statement gives more control over type attribute expansion and removal. When the value is true, all rules involving the type attribute will be expanded and the type attribute will be removed from the policy. When the value is false, the type attribute will not be removed from the policy, even if the default expand rules cause the rules involving the type attribute to be expanded. > + > +**The statement definition is:** > + > +`expandattribute attribute_id default_value;` > + I don't think "default_value" iis a good name. We talk about default expand rules above and this value is not related to those. How about "expand_value"? Thanks, Jim > +**Where:** > + > +*expandattribute* > + > +The *expandattribute* keyword. > > -## `typeattribute` > +*attribute_id* > > -The `typeattribute` statement allows the association of previously > +One or more *attribute* identifiers that have been previously declared by the > +[*attribute*](#attribute) statement. Multiple entries consist of a space > +separated list enclosed in braces '{}'. > + > +*default_value* > + > +Either true or false. > + > +**The statement is valid in:** > + > +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | No | > + > +**Examples:** > + > +``` > +# Using the expandattribute statement to forcibly expand a > +# previously declared domain attribute. > + > +# The previously declared attribute: > +attribute domain; > + > +# The attribute stripping using the expandattribute statement: > +expandattribute domain true; > +``` > + > +## *typeattribute* > + > +The *typeattribute* statement allows the association of previously > declared types to one or more previously declared attributes. > > **The statement definition is:** > @@ -212,49 +227,32 @@ declared types to one or more previously declared attributes. > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
typeattributeThe typeattribute keyword.
type_idThe identifier of a previously declared type.
attribute_idOne or more previously declared attribute identifiers. Multiple entries consist of a comma ',' separated list.
> +*typeattribute* > + > +The *typeattribute* keyword. > + > +*type_id* > + > +The identifier of a previously declared *type*. > + > +*attribute_id* > + > +One or more previously declared *attribute* identifiers. Multiple entries > +consist of a comma ',' separated list. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
NoYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | No | > > **Examples:** > > @@ -289,13 +287,11 @@ type setroubleshootd_exec_t; > typeattribute setroubleshootd_exec_t file_type, non_security_file_type; > ``` > > -
> +## *typealias* > > -## `typealias` > - > -The `typealias` statement allows the association of a previously declared > -`type` to one or more `alias` identifiers (an alternative way is to use the > -`type` statement. > +The *typealias* statement allows the association of a previously declared > +*type* to one or more *alias* identifiers (an alternative way is to use the > +*type* statement. > > **The statement definition is:** > > @@ -303,53 +299,36 @@ The `typealias` statement allows the association of a previously declared > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
typealiasThe typealias keyword.
type_idThe identifier of a previously declared type.
aliasThe alias keyword.
alias_idOne or more alias identifiers. Multiple entries consist of a space separated list enclosed in braces '{}'.
> +*typealias* > + > +The *typealias* keyword. > + > +*type_id* > + > +The identifier of a previously declared *type*. > + > +*alias* > + > +The *alias* keyword. > + > +*alias_id* > + > +One or more *alias* identifiers. Multiple entries consist of a space separated > +list enclosed in braces '{}'. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
NoYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | No | > > **Examples:** > > @@ -374,14 +353,12 @@ type netif_t; > typealias netif_t alias { lo_netif_t netif_lo_t }; > ``` > > -
> +## *permissive* > > -## `permissive` > - > -Policy version 23 introduced the `permissive` statement to allow the named > +Policy version 23 introduced the *permissive* statement to allow the named > domain to run in permissive mode instead of running all SELinux domains > in permissive mode (that was the only option prior to version 23). Note > -that the `permissive` statement only tests the source context for any > +that the *permissive* statement only tests the source context for any > policy denial. > > **The statement definition is:** > @@ -390,45 +367,27 @@ policy denial. > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > -
permissiveThe permissive keyword.
type_idThe type identifier of the domain that will be run in permissive mode.
> +*permissive* > + > +The *permissive* keyword. > + > +*type_id* > + > +The *type* identifier of the domain that will be run in permissive mode. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
NoYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| No | Yes | No | > > **Examples:** > > @@ -463,16 +422,13 @@ require { > permissive unconfined_t; > ``` > > -
> - > - > -## `type_transition` > +## *type_transition* > > The type_transition rule specifies the default type to be used for > domain transistion or object creation. Kernels from 2.6.39 with Policy > versions from 25 also support the 'name transition rule' extension. See the > [**Computing Security Contexts**](computing_security_contexts.md#computing-security-contexts) > -section for more details. Note than an `allow` rule must be used to authorise > +section for more details. Note than an *allow* rule must be used to authorise > the transition. > > **The statement definitions are:** > @@ -486,59 +442,46 @@ however, this is only appropriate for the file classes: > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
type_transitionThe type_transition rule keyword.

source_type

> -

target_type

One or more source / target type, typealias or attribute identifiers. Multiple entries consist of a space separated list enclosed in braces '{}'.

> -

Entries can be excluded from the list by using the negative operator '-'.

classOne or more object classes. Multiple entries consist of a space separated list enclosed in braces '{}'.
default_typeA single type or typealias identifier that will become the default process type for a domain transition or the type for object transitions.
object_nameFor the 'name transition' rule this is matched against the objects name (i.e. the last component of a path). If object_name exactly matches the object name, then use default_type for the type.
> +*type_transition* > + > +The *type_transition* rule keyword. > + > +*source_type* > +*target_type* > + > +One or more source / target *type*, *typealias* or *attribute* identifiers. > +Multiple entries consist of a space separated list enclosed in braces '{}'. > +Entries can be excluded from the list by using the negative operator '-'. > + > +*class* > + > +One or more object classes. Multiple entries consist of a space separated list > +enclosed in braces '{}'. > + > +*default_type* > + > +A single *type* or *typealias* identifier that will become the default process > +*type* for a domain transition or the *type* for object transitions. > + > +*object_name* > + > +For the 'name transition' rule this is matched against the objects name > +(i.e. the last component of a path). If *object_name* exactly matches the > +object name, then use *default_type* for the *type*. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
YesYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | No | > > **Example - Domain Transition:** > > @@ -607,14 +550,12 @@ type_transition unconfined_t etc_t : file system_conf_t eric; > # an exact strcmp) it should be labeled system_conf_t. > ``` > > -
> +## *type_change* > > -## `type_change` > - > -The `type_change` rule specifies a default `type` when relabeling an > +The *type_change* rule specifies a default *type* when relabeling an > existing object. For example userspace SELinux-aware applications would > -use ***security_compute_relabel**(3)* and `type_change` rules in > -policy to determine the new context to be applied. Note that an `allow` > +use ***security_compute_relabel**(3)* and *type_change* rules in > +policy to determine the new context to be applied. Note that an *allow* > rule must be used to authorise access. See the > [**Computing Security Contexts**](computing_security_contexts.md#computing-security-contexts) > section for more details. > @@ -625,55 +566,38 @@ section for more details. > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
type_changeThe type_change rule keyword.

source_type

> -

target_type

One or more source / target type, typealias or attribute identifiers. Multiple entries consist of a space separated list enclosed in braces '{}'.

> -

Entries can be excluded from the list by using the negative operator '-'.

classOne or more object classes. Multiple entries consist of a space separated list enclosed in braces '{}'.
change_typeA single type or typealias identifier that will become the new type.
> +*type_change* > + > +The *type_change* rule keyword. > + > +*source_type* > +*target_type* > + > +One or more source / target *type*, *typealias* or *attribute* identifiers. > +Multiple entries consist of a space separated list enclosed in braces '{}'. > +Entries can be excluded from the list by using the negative operator '-'. > + > +*class* > + > +One or more object classes. Multiple entries consist of a space separated list > +enclosed in braces '{}'. > + > +*change_type* > +A single *type* or *typealias* identifier that will become the new *type*. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
YesYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | No | > > **Examples:** > > @@ -694,15 +618,13 @@ type_change auditadm_t sysadm_devpts_t:chr_file auditadm_devpts_t; > type_change staff_t server_ptynode:chr_file staff_devpts_t; > ``` > > -
> +## *type_member* > > -## `type_member` > - > -The `type_member` rule specifies a default type when creating a > +The *type_member* rule specifies a default type when creating a > polyinstantiated object. For example a userspace SELinux-aware > application would use ***avc_compute_member**(3)* or > -***security_compute_member**(3)* with `type_member` rules in policy > -to determine the context to be applied. Note that an `allow` rule must > +***security_compute_member**(3)* with *type_member* rules in policy > +to determine the context to be applied. Note that an *allow* rule must > be used to authorise access. See the > [**Computing Security Contexts**](computing_security_contexts.md#computing-security-contexts) > section for more details. > @@ -713,55 +635,40 @@ section for more details. > > **Where:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
type_memberThe type_member rule keyword.

source_type

> -

target_type

One or more source / target type, typealias or attribute identifiers. Multiple entries consist of a space separated list enclosed in braces '{}'.

> -

Entries can be excluded from the list by using the negative operator '-'.

classOne or more object classes. Multiple entries consist of a space separated list enclosed in braces '{}'.
member_typeA single type or typealias identifier that will become the polyinstantiated type.
> +*type_member* > + > +The *type_member* rule keyword. > + > +*source_type* > +*target_type* > + > +One or more source / target *type*, *typealias* or *attribute* identifiers. > +Multiple entries consist of a space separated list enclosed in braces '{}'. > +Entries can be excluded from the list by using the negative operator '-'. > + > +*class* > + > +One or more object classes. Multiple entries consist of a space separated list > +enclosed in braces '{}'. > + > +*member_type* > + > +A single *type* or *typealias* identifier that will become the polyinstantiated > +*type*. > > **The statement is valid in:** > > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > - > -
Monolithic PolicyBase PolicyModule Policy
YesYesYes
Conditional Policy if Statementoptional Statementrequire Statement
YesYesNo
> +Policy Type > + > +| Monolithic Policy | Base Policy | Module Policy | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | Yes | > + > +Conditional Policy Statements > + > +| *if* statement | *optional* Statement | *require* Statement | > +| ----------------------- | ----------------------- | ----------------------- | > +| Yes | Yes | No | > > **Example:** > > @@ -774,9 +681,6 @@ section for more details. > type_member sysadm_t user_home_dir_t:dir user_home_dir_t; > ``` > > - > -
> - > > > --- > -- > 2.28.0 >