public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/admin/, policy/modules/system/, ...
@ 2025-09-02 22:15 Jason Zaman
  0 siblings, 0 replies; only message in thread
From: Jason Zaman @ 2025-09-02 22:15 UTC (permalink / raw
  To: gentoo-commits

commit:     adcdead0e14e1c7efd8c70698930e6f5d1ff441a
Author:     Russell Coker <russell <AT> coker <DOT> com <DOT> au>
AuthorDate: Tue Jul 29 14:10:51 2025 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Tue Sep  2 22:04:48 2025 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=adcdead0

misc-kernel-system (#1003)

* A set of small changes for kernel and system related policy

Signed-off-by: Russell Coker <russell <AT> coker.com.au>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 policy/modules/admin/netutils.te          |  2 +-
 policy/modules/admin/usermanage.te        |  4 +++-
 policy/modules/kernel/corecommands.fc     |  3 +++
 policy/modules/kernel/domain.if           |  2 +-
 policy/modules/kernel/filesystem.if       | 19 +++++++++++++++++++
 policy/modules/kernel/filesystem.te       |  1 +
 policy/modules/kernel/kernel.te           |  1 +
 policy/modules/kernel/storage.fc          |  1 +
 policy/modules/services/iiosensorproxy.te |  5 ++++-
 policy/modules/system/fstools.fc          |  2 ++
 policy/modules/system/init.te             |  7 +++++++
 policy/modules/system/iptables.te         |  4 ++++
 policy/modules/system/logging.te          |  5 +++--
 policy/modules/system/lvm.if              |  1 +
 policy/modules/system/lvm.te              |  2 ++
 policy/modules/system/miscfiles.fc        |  2 ++
 policy/modules/system/modutils.te         |  5 ++++-
 policy/modules/system/mount.te            |  4 ++++
 policy/modules/system/sysnetwork.te       |  5 +++++
 policy/modules/system/systemd.te          |  4 ++--
 policy/modules/system/udev.te             |  3 +++
 policy/modules/system/unconfined.te       |  4 ++++
 policy/modules/system/xen.te              |  1 +
 23 files changed, 78 insertions(+), 9 deletions(-)

diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te
index 63d2f9cb8..d3e372717 100644
--- a/policy/modules/admin/netutils.te
+++ b/policy/modules/admin/netutils.te
@@ -184,7 +184,7 @@ userdom_use_inherited_user_terminals(ss_t)
 
 allow traceroute_t self:capability { net_admin net_raw setgid setuid };
 allow traceroute_t self:fifo_file rw_inherited_fifo_file_perms;
-allow traceroute_t self:process signal;
+allow traceroute_t self:process { signal getsched };
 allow traceroute_t self:netlink_generic_socket create_socket_perms;
 allow traceroute_t self:rawip_socket create_socket_perms;
 allow traceroute_t self:packet_socket { create_socket_perms map };

diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
index 230f4dfd8..a91b61bf9 100644
--- a/policy/modules/admin/usermanage.te
+++ b/policy/modules/admin/usermanage.te
@@ -69,7 +69,7 @@ role useradd_roles types useradd_t;
 # Chfn local policy
 #
 
-allow chfn_t self:capability { chown dac_override fsetid setgid setuid sys_resource };
+allow chfn_t self:capability { chown dac_override fsetid setgid setuid sys_ptrace sys_resource };
 allow chfn_t self:process { dyntransition getattr getcap getpgid getrlimit getsched getsession noatsecure rlimitinh setcap setfscreate setkeycreate setpgid setrlimit setsched setsockcreate share siginh sigkill signal signull sigstop transition };
 allow chfn_t self:fd use;
 allow chfn_t self:fifo_file rw_fifo_file_perms;
@@ -206,6 +206,8 @@ kernel_getattr_proc(groupadd_t)
 # for getting the number of groups
 kernel_read_kernel_sysctls(groupadd_t)
 
+kernel_search_fs_sysctls(groupadd_t)
+
 fs_getattr_xattr_fs(groupadd_t)
 fs_search_auto_mountpoints(groupadd_t)
 

diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
index 1720a525b..572dcca78 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
@@ -52,6 +52,8 @@ ifdef(`distro_redhat',`
 /etc/kde/env(/.*)?			gen_context(system_u:object_r:bin_t,s0)
 /etc/kde/shutdown(/.*)?			gen_context(system_u:object_r:bin_t,s0)
 
+/etc/letsencrypt/renewal-hooks/.* --	gen_context(system_u:object_r:bin_t,s0)
+
 /etc/mail/make			--	gen_context(system_u:object_r:bin_t,s0)
 
 /etc/mcelog/.*-trigger		--	gen_context(system_u:object_r:bin_t,s0)
@@ -377,6 +379,7 @@ ifdef(`distro_debian',`
 /usr/share/texmf/web2c/mktexdir	--	gen_context(system_u:object_r:bin_t,s0)
 /usr/share/texmf-dist/scripts(/.*)?	gen_context(system_u:object_r:bin_t,s0)
 /usr/share/turboprint/lib(/.*)?	--	gen_context(system_u:object_r:bin_t,s0)
+/usr/share/unattended-upgrades/.* --	gen_context(system_u:object_r:bin_t,s0)
 /usr/share/vhostmd/scripts(/.*)?	gen_context(system_u:object_r:bin_t,s0)
 
 /usr/X11R6/lib(64)?/X11/xkb/xkbcomp --	gen_context(system_u:object_r:bin_t,s0)

diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
index a2b90e87f..52a7caf55 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -631,7 +631,7 @@ interface(`domain_read_all_domains_state',`
 
 ########################################
 ## <summary>
-##	Get the attributes of all domains of all domains.
+##	Get the attributes of all domains
 ## </summary>
 ## <param name="domain">
 ##	<summary>

diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
index 46961c7b8..6249f70c8 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -2326,6 +2326,25 @@ interface(`fs_dontaudit_getattr_configfs',`
 	dontaudit $1 configfs_t:filesystem getattr;
 ')
 
+#######################################
+## <summary>
+##	Create, read, write, and delete dirs
+##	on a configfs filesystem.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`fs_getattr_configfs_dirs',`
+	gen_require(`
+		type configfs_t;
+	')
+
+	allow $1 configfs_t:dir getattr;
+')
+
 #######################################
 ## <summary>
 ##	Create, read, write, and delete dirs

diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
index 2fcbd3d95..0c3bba4e7 100644
--- a/policy/modules/kernel/filesystem.te
+++ b/policy/modules/kernel/filesystem.te
@@ -283,6 +283,7 @@ type dosfs_t;
 fs_noxattr_type(dosfs_t)
 files_mountpoint(dosfs_t)
 allow dosfs_t fs_t:filesystem associate;
+genfscon exfat / gen_context(system_u:object_r:dosfs_t,s0)
 genfscon fat / gen_context(system_u:object_r:dosfs_t,s0)
 genfscon hfs / gen_context(system_u:object_r:dosfs_t,s0)
 genfscon hfsplus / gen_context(system_u:object_r:dosfs_t,s0)

diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
index d54ecb18b..3751b3082 100644
--- a/policy/modules/kernel/kernel.te
+++ b/policy/modules/kernel/kernel.te
@@ -235,6 +235,7 @@ sid tcp_socket		gen_context(system_u:object_r:unlabeled_t,mls_systemhigh)
 #
 
 allow kernel_t self:capability { audit_control audit_write chown dac_override dac_read_search fowner fsetid ipc_lock ipc_owner kill lease linux_immutable mknod net_admin net_bind_service net_broadcast net_raw setfcap setgid setpcap setuid sys_admin sys_boot sys_chroot sys_nice sys_pacct sys_ptrace sys_rawio sys_resource sys_time sys_tty_config };
+allow kernel_t self:capability2 checkpoint_restore;
 allow kernel_t self:process { dyntransition getattr getcap getpgid getrlimit getsched getsession noatsecure rlimitinh setcap setkeycreate setpgid setsched setsockcreate share siginh signal_perms transition };
 allow kernel_t self:shm create_shm_perms;
 allow kernel_t self:sem create_sem_perms;

diff --git a/policy/modules/kernel/storage.fc b/policy/modules/kernel/storage.fc
index 9cd280c25..5045fde75 100644
--- a/policy/modules/kernel/storage.fc
+++ b/policy/modules/kernel/storage.fc
@@ -33,6 +33,7 @@
 /dev/mmcblk.*		-b	gen_context(system_u:object_r:removable_device_t,s0)
 /dev/mmcblk.*		-c	gen_context(system_u:object_r:removable_device_t,s0)
 /dev/mspblk.*		-b	gen_context(system_u:object_r:removable_device_t,s0)
+/dev/mpt[23]?ctl	-c	gen_context(system_u:object_r:fixed_disk_device_t,mls_systemhigh)
 /dev/mtd.*		-b	gen_context(system_u:object_r:fixed_disk_device_t,mls_systemhigh)
 /dev/mtd.*		-c	gen_context(system_u:object_r:fixed_disk_device_t,mls_systemhigh)
 /dev/nb[^/]+		-b	gen_context(system_u:object_r:fixed_disk_device_t,mls_systemhigh)

diff --git a/policy/modules/services/iiosensorproxy.te b/policy/modules/services/iiosensorproxy.te
index 4868cdfc5..baac2fece 100644
--- a/policy/modules/services/iiosensorproxy.te
+++ b/policy/modules/services/iiosensorproxy.te
@@ -37,7 +37,8 @@ init_daemon_domain(iiosensorproxy_t, iiosensorproxy_exec_t)
 # Local policy
 #
 
-allow iiosensorproxy_t self:netlink_kobject_uevent_socket { bind create getattr read setopt };
+dontaudit iiosensorproxy_t self:capability net_admin;
+allow iiosensorproxy_t self:netlink_kobject_uevent_socket { getopt bind create getattr read setopt };
 allow iiosensorproxy_t self:process { getsched setsched };
 allow iiosensorproxy_t self:unix_dgram_socket { create write };
 
@@ -48,6 +49,8 @@ dev_read_iio(iiosensorproxy_t)
 # for /sys/bus/iio/devices/* (which links to /sys/devices/pci*)
 dev_read_sysfs(iiosensorproxy_t)
 
+dev_write_sysfs_dirs(iiosensorproxy_t)
+
 # for writing to current_trigger and to enable devices
 # /sys/devices/pci0000:00/0000:00:13.0/{33AECD58-B679-4E54-9BD9-A04D34F0C226}/001F:8087:0AC2.0005/HID-SENSOR-200083.21.auto/iio:device8/buffer/enable
 dev_write_sysfs(iiosensorproxy_t)

diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc
index 1f0e104aa..92a7722ae 100644
--- a/policy/modules/system/fstools.fc
+++ b/policy/modules/system/fstools.fc
@@ -2,6 +2,7 @@
 /usr/bin/badblocks		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/bin/blkid			--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/bin/blockdev		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
+/usr/bin/btrfs			--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/bin/cfdisk			--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/bin/clubufflush		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/bin/delpart		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
@@ -71,6 +72,7 @@
 /usr/sbin/fatsort		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/sbin/fdisk			--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/sbin/findfs		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
+/usr/sbin/fstrim		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/sbin/fsck.*		--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/sbin/gdisk			--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 /usr/sbin/hdparm		--	gen_context(system_u:object_r:fsadm_exec_t,s0)

diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 854a36056..7a20a5140 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -179,6 +179,9 @@ allow init_t self:capability2 { block_suspend wake_alarm };
 
 allow init_t self:fifo_file rw_fifo_file_perms;
 
+# for /run/systemd/unit-root/proc/$PID/loginuid
+allow init_t self:file mounton;
+
 # Re-exec itself
 can_exec(init_t, init_exec_t)
 
@@ -334,6 +337,9 @@ ifdef(`init_systemd',`
 	# slices when containers are started and stopped
 	domain_setpriority_all_domains(init_t)
 
+	# init opens device nodes for getty and needs to be inherited everywhere
+	domain_interactive_fd(init_t)
+
 	allow init_t init_runtime_t:{ dir file } watch;
 	manage_files_pattern(init_t, init_runtime_t, init_runtime_t)
 	manage_lnk_files_pattern(init_t, init_runtime_t, init_runtime_t)
@@ -1202,6 +1208,7 @@ ifdef(`init_systemd',`
 	init_get_all_units_status(initrc_t)
 	init_manage_var_lib_files(initrc_t)
 	init_rw_stream_sockets(initrc_t)
+	init_stop_system(initrc_t)
 
 	# Create /etc/audit.rules.prev after firstboot remediation
 	logging_manage_audit_config(initrc_t)

diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
index 639052f88..73f38109c 100644
--- a/policy/modules/system/iptables.te
+++ b/policy/modules/system/iptables.te
@@ -168,3 +168,7 @@ optional_policy(`
 	# this is for iptables_t to inherit a file handle from xen vif-bridge
 	udev_manage_runtime_files(iptables_t)
 ')
+
+optional_policy(`
+	unconfined_use_fds(iptables_t)
+')

diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
index 4f7041910..64e3a7c59 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -507,10 +507,10 @@ userdom_dontaudit_search_user_home_dirs(syslogd_t)
 
 ifdef(`init_systemd',`
 	# for systemd-journal
-	allow syslogd_t self:capability audit_control;
 	allow syslogd_t self:netlink_audit_socket connected_socket_perms;
 	allow syslogd_t self:capability2 audit_read;
-	allow syslogd_t self:capability { chown setgid setuid sys_ptrace };
+	allow syslogd_t self:capability { chown setgid setuid sys_ptrace audit_control };
+	allow syslogd_t self:cap_userns sys_ptrace;
 	allow syslogd_t self:netlink_audit_socket { getattr getopt nlmsg_write read setopt write };
 
 	# remove /run/log/journal when switching to permanent storage
@@ -529,6 +529,7 @@ ifdef(`init_systemd',`
 
 	domain_getattr_all_domains(syslogd_t)
 	domain_read_all_domains_state(syslogd_t)
+	domain_signull_all_domains(syslogd_t)
 
 	fs_list_cgroup_dirs(syslogd_t)
 	fs_getattr_nsfs_files(syslogd_t)

diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if
index a80a1b532..0c15f951f 100644
--- a/policy/modules/system/lvm.if
+++ b/policy/modules/system/lvm.if
@@ -61,6 +61,7 @@ interface(`lvm_run',`
 
 	lvm_domtrans($1)
 	role $2 types lvm_t;
+	allow $1 lvm_t:sem rw_sem_perms;
 ')
 
 ########################################

diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
index 7794e587e..853a4c519 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -254,6 +254,8 @@ optional_policy(`
 ')
 
 optional_policy(`
+	apt_use_fds(lvm_t)
+
 	dpkg_script_rw_pipes(lvm_t)
 ')
 

diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc
index c446607ff..6e81adb82 100644
--- a/policy/modules/system/miscfiles.fc
+++ b/policy/modules/system/miscfiles.fc
@@ -12,6 +12,8 @@ ifdef(`distro_gentoo',`
 /etc/httpd/alias/[^/]*\.db(\.[^/]*)* -- gen_context(system_u:object_r:cert_t,s0)
 /etc/httpd/conf/ssl(/.*)?	--	gen_context(system_u:object_r:tls_privkey_t,s0)
 /etc/httpd/conf/ssl/.*\.crt	--	gen_context(system_u:object_r:cert_t,s0)
+/etc/letsencrypt/archive/[^/]+/privkey.* --	gen_context(system_u:object_r:tls_privkey_t,s0)
+/etc/letsencrypt/keys(/.*)?	gen_context(system_u:object_r:tls_privkey_t,s0)
 /etc/localtime		--	gen_context(system_u:object_r:locale_t,s0)
 /etc/pki(/.*)?			gen_context(system_u:object_r:cert_t,s0)
 /etc/pki/.*/private(/.*)?	gen_context(system_u:object_r:tls_privkey_t,s0)

diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
index 5132d15ef..f50f40f2a 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -34,7 +34,7 @@ ifdef(`init_systemd',`
 # insmod local policy
 #
 
-allow kmod_t self:capability { dac_override net_raw sys_nice sys_tty_config };
+allow kmod_t self:capability { dac_override dac_read_search net_raw sys_nice sys_tty_config };
 allow kmod_t self:process { execmem sigchld sigkill signal signull sigstop };
 # for the radeon/amdgpu modules
 dontaudit kmod_t self:capability sys_admin;
@@ -112,6 +112,7 @@ init_use_script_ptys(kmod_t)
 logging_send_syslog_msg(kmod_t)
 logging_search_logs(kmod_t)
 
+miscfiles_read_generic_certs(kmod_t)
 miscfiles_read_localization(kmod_t)
 
 seutil_read_file_contexts(kmod_t)
@@ -141,6 +142,8 @@ optional_policy(`
 	dpkg_manage_script_tmp_files(kmod_t)
 	dpkg_map_script_tmp_files(kmod_t)
 	dpkg_read_script_tmp_symlinks(kmod_t)
+	apt_use_fds(kmod_t)
+	apt_use_ptys(kmod_t)
 ')
 
 optional_policy(`

diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index 6cedcd456..473626e15 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -247,6 +247,10 @@ optional_policy(`
 	samba_run_smbmount(mount_t, mount_roles)
 ')
 
+optional_policy(`
+	ssh_rw_pipes(mount_t)
+')
+
 ########################################
 #
 # Unconfined mount local policy

diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index 7c52fc109..8a7fd31ca 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -138,6 +138,7 @@ corenet_sendrecv_icmp_packets(dhcpc_t)
 
 dev_read_sysfs(dhcpc_t)
 # for SSP:
+dev_read_rand(dhcpc_t)
 dev_read_urand(dhcpc_t)
 
 domain_use_interactive_fds(dhcpc_t)
@@ -163,6 +164,7 @@ term_dontaudit_use_unallocated_ttys(dhcpc_t)
 term_dontaudit_use_generic_ptys(dhcpc_t)
 
 init_rw_utmp(dhcpc_t)
+init_get_system_status(dhcpc_t)
 
 logging_send_syslog_msg(dhcpc_t)
 
@@ -190,7 +192,10 @@ ifdef(`init_systemd',`
 	init_read_state(dhcpc_t)
 	init_stream_connect(dhcpc_t)
 	init_get_all_units_status(dhcpc_t)
+	init_getattr_generic_units_files(dhcpc_t)
 	init_search_units(dhcpc_t)
+	systemd_list_resolved_runtime(dhcpc_t)
+	systemd_read_networkd_runtime(dhcpc_t)
 
 	optional_policy(`
 		systemd_dbus_chat_resolved(dhcpc_t)

diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index 334d2c5fc..548e2cbd0 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -588,8 +588,6 @@ allow systemd_generator_t self:vsock_socket create;
 
 allow systemd_generator_t self:netlink_route_socket { create read bind getattr write nlmsg_read };
 
-init_getattr_generic_units_files(systemd_generator_t)
-
 allow systemd_generator_t systemd_user_runtime_unit_t:dir manage_dir_perms;
 allow systemd_generator_t systemd_user_runtime_unit_t:file manage_file_perms;
 allow systemd_generator_t systemd_user_runtime_unit_t:lnk_file create;
@@ -608,6 +606,8 @@ kernel_dontaudit_search_unlabeled(systemd_generator_t)
 # vmware_vsock
 kernel_request_load_module(systemd_generator_t)
 
+init_getattr_generic_units_files(systemd_generator_t)
+
 corecmd_exec_shell(systemd_generator_t)
 corecmd_exec_bin(systemd_generator_t)
 

diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index b7864d240..e99a72a0a 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -458,7 +458,10 @@ domain_use_interactive_fds(udevadm_t)
 files_read_etc_files(udevadm_t)
 files_read_usr_files(udevadm_t)
 
+fs_getattr_cgroup(udevadm_t)
+fs_getattr_tmpfs(udevadm_t)
 fs_getattr_xattr_fs(udevadm_t)
+fs_search_cgroup_dirs(udevadm_t)
 
 init_list_runtime(udevadm_t)
 init_read_state(udevadm_t)

diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
index b9c8173ae..4de7860d9 100644
--- a/policy/modules/system/unconfined.te
+++ b/policy/modules/system/unconfined.te
@@ -97,6 +97,10 @@ optional_policy(`
 	container_unconfined_role(unconfined, unconfined_t, unconfined_application_exec_domain, unconfined_r)
 ')
 
+optional_policy(`
+	certbot_run(unconfined_t, unconfined_r)
+')
+
 optional_policy(`
 	cron_unconfined_role(unconfined, unconfined_t, unconfined_application_exec_domain, unconfined_r)
 ')

diff --git a/policy/modules/system/xen.te b/policy/modules/system/xen.te
index c2cba693e..a930d32e0 100644
--- a/policy/modules/system/xen.te
+++ b/policy/modules/system/xen.te
@@ -55,6 +55,7 @@ files_type(xen_devpts_t)
 type xen_image_t; # customizable
 files_type(xen_image_t)
 dev_node(xen_image_t)
+fs_image_file(xen_image_t)
 
 optional_policy(`
 	virt_image(xen_image_t)


^ permalink raw reply related	[flat|nested] only message in thread

only message in thread, other threads:[~2025-09-02 22:15 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-09-02 22:15 [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/, policy/modules/admin/, policy/modules/system/, Jason Zaman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox