path: refpolicy_2:2.20250213-11/policy/modules/system/udev.te domain_read_all_domains_state(udev_t) domain_dontaudit_ptrace_all_domains(udev_t) #pidof triggers these files_read_usr_files(udev_t) path: refpolicy_2:2.20250213-11/policy/modules/services/acpi.te dontaudit acpid_t self:capability { dac_override dac_read_search setuid sys_ptrace sys_tty_config }; allow acpid_t self:process { getsession signal_perms getsched }; # for pidof and pgrep allow acpid_t self:cap_userns sys_ptrace; path: refpolicy_2:2.20250213-11/debian/patches/0027-services -allow acpid_t self:process { getsession signal_perms }; +allow acpid_t self:process { getsession signal_perms getsched }; +# for pidof and pgrep +allow acpid_t self:cap_userns sys_ptrace; + path: refpolicy_2:2.20250213-11/policy/modules/admin/fapolicyd.te corecmd_exec_shell(fagenrules_t) # fagenpolicy uses 'pidof' to find running fapolicyd domain_dontaudit_read_all_domains_state(fagenrules_t) domain_use_interactive_fds(fagenrules_t)