From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 7D04715827B for ; Tue, 02 Sep 2025 22:15:26 +0000 (UTC) Received: from lists.gentoo.org (bobolink.gentoo.org [140.211.166.189]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (No client certificate requested) (Authenticated sender: relay-lists.gentoo.org@gentoo.org) by smtp.gentoo.org (Postfix) with ESMTPSA id 67FEA340DE1 for ; Tue, 02 Sep 2025 22:15:26 +0000 (UTC) Received: from bobolink.gentoo.org (localhost [127.0.0.1]) by bobolink.gentoo.org (Postfix) with ESMTP id 7E835110572; Tue, 02 Sep 2025 22:15:19 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (No client certificate requested) by bobolink.gentoo.org (Postfix) with ESMTPS id 740CC110572 for ; Tue, 02 Sep 2025 22:15:19 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 2D03834096C for ; Tue, 02 Sep 2025 22:15:19 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id B98653515 for ; Tue, 02 Sep 2025 22:15:17 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1756850348.624ea0197fb2d059bfc884bbd1f06ab5d2e9898b.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/services/fprintd.te X-VCS-Directories: policy/modules/services/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 624ea0197fb2d059bfc884bbd1f06ab5d2e9898b X-VCS-Branch: master Date: Tue, 02 Sep 2025 22:15:17 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: e8a5b81c-6924-477a-9051-51cbe439c283 X-Archives-Hash: 375bb1144388be822de71f4fd1537e48 commit: 624ea0197fb2d059bfc884bbd1f06ab5d2e9898b Author: Russell Coker coker com au> AuthorDate: Wed Jul 23 00:02:11 2025 +0000 Commit: Jason Zaman gentoo org> CommitDate: Tue Sep 2 21:59:08 2025 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=624ea019 Some small fixes for the fingerprint daemon Signed-off-by: Russell Coker coker.com.au> Signed-off-by: Jason Zaman gentoo.org> policy/modules/services/fprintd.te | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/policy/modules/services/fprintd.te b/policy/modules/services/fprintd.te index 11fe51ae8..4108f137c 100644 --- a/policy/modules/services/fprintd.te +++ b/policy/modules/services/fprintd.te @@ -17,9 +17,12 @@ files_type(fprintd_var_lib_t) # Local policy # +dontaudit fprintd_t self:capability net_admin; allow fprintd_t self:capability sys_nice; allow fprintd_t self:process { getsched setsched sigkill signal }; allow fprintd_t self:fifo_file rw_fifo_file_perms; +allow fprintd_t self:netlink_kobject_uevent_socket { create bind getopt setopt getattr read }; +allow fprintd_t self:unix_dgram_socket { create write }; manage_dirs_pattern(fprintd_t, fprintd_var_lib_t, fprintd_var_lib_t) manage_files_pattern(fprintd_t, fprintd_var_lib_t, fprintd_var_lib_t) @@ -36,6 +39,7 @@ fs_getattr_all_fs(fprintd_t) auth_use_nsswitch(fprintd_t) +logging_send_syslog_msg(fprintd_t) miscfiles_read_localization(fprintd_t) userdom_use_user_ptys(fprintd_t) @@ -55,3 +59,12 @@ optional_policy(` policykit_read_reload(fprintd_t) policykit_read_lib(fprintd_t) ') + +optional_policy(` + systemd_dbus_chat_logind(fprintd_t) + systemd_write_inherited_logind_inhibit_pipes(fprintd_t) +') + +optional_policy(` + udev_read_runtime_files(fprintd_t) +')