From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 3E27B158086 for ; Thu, 11 Nov 2021 21:27:48 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 20E7D2BC163; Thu, 11 Nov 2021 21:27:42 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 00DDA2BC164 for ; Thu, 11 Nov 2021 21:27:41 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 4B7A33431DE for ; Thu, 11 Nov 2021 21:27:40 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id CA8EB1DA for ; Thu, 11 Nov 2021 21:27:36 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1636666010.459df0bed3a810a10ce4a7276873cb7c878641e3.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/, policy/modules/admin/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/admin/usbguard.te policy/modules/system/userdomain.if X-VCS-Directories: policy/modules/system/ policy/modules/admin/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 459df0bed3a810a10ce4a7276873cb7c878641e3 X-VCS-Branch: master Date: Thu, 11 Nov 2021 21:27:36 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: bdcb2a9e-dac0-490b-89f8-9440d77305ad X-Archives-Hash: 7f94378d5eae0a398bbbe8ac37325a43 commit: 459df0bed3a810a10ce4a7276873cb7c878641e3 Author: Kenton Groombridge concord sh> AuthorDate: Sun Nov 7 01:30:53 2021 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Nov 11 21:26:50 2021 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=459df0be usbguard, sysadm: misc fixes Fixes for usbguard and allow sysadm to connect to usbguard to manage devices at runtime. Signed-off-by: Kenton Groombridge concord.sh> Signed-off-by: Jason Zaman gentoo.org> policy/modules/admin/usbguard.te | 3 +++ policy/modules/system/userdomain.if | 4 ++++ 2 files changed, 7 insertions(+) diff --git a/policy/modules/admin/usbguard.te b/policy/modules/admin/usbguard.te index 9304ef5b..cca00cdb 100644 --- a/policy/modules/admin/usbguard.te +++ b/policy/modules/admin/usbguard.te @@ -40,6 +40,7 @@ files_tmpfs_file(usbguard_tmpfs_t) # allow usbguard_t self:capability { chown dac_read_search fowner }; +allow usbguard_t self:process { getcap signal }; allow usbguard_t self:netlink_kobject_uevent_socket create_socket_perms; allow usbguard_t self:unix_stream_socket rw_stream_socket_perms; @@ -72,6 +73,8 @@ init_search_runtime(usbguard_t) logging_send_audit_msgs(usbguard_t) logging_send_syslog_msg(usbguard_t) +miscfiles_read_localization(usbguard_t) + tunable_policy(`usbguard_user_modify_rule_files',` manage_files_pattern(usbguard_t, usbguard_conf_t, usbguard_rules_t) ') diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 1539477e..958e088f 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1439,6 +1439,10 @@ template(`userdom_admin_user_template',` postgresql_unconfined($1_t) ') + optional_policy(` + usbguard_stream_connect($1_t) + ') + optional_policy(` userhelper_exec($1_t) ')