Blame SOURCES/fapolicyd-rules.patch

2e13dd
diff -up ./init/fapolicyd.rules.fix ./init/fapolicyd.rules
2e13dd
--- ./init/fapolicyd.rules.fix	2020-02-11 20:53:48.151150561 +0100
2e13dd
+++ ./init/fapolicyd.rules	2020-02-11 20:55:02.451575384 +0100
2e13dd
@@ -39,6 +39,10 @@ allow exe=/usr/bin/python2.7 : ftype=app
2e13dd
 deny_audit perm=any all : ftype=text/x-python
2e13dd
 #deny_audit perm=any all : ftype=application/octet-stream path=*.pyc
2e13dd
 
2e13dd
+# Allow shell script but block all other languages
2e13dd
+allow perm=execute all : ftype=text/x-shellscript
2e13dd
+allow perm=any all : ftype=text/plain
2e13dd
+
2e13dd
 #
2e13dd
 # In this next optional languages section, choose either to
2e13dd
 # block (default) or allow by commenting or uncommenting the
2e13dd
@@ -66,10 +70,6 @@ deny_audit perm=any exe=/usr/bin/ruby :
2e13dd
 #allow perm=open all : ftype=text/x-ruby trust=1
2e13dd
 #deny_audit perm=any all : ftype=text/x-ruby
2e13dd
 
2e13dd
-# Allow shell script but block all other languages
2e13dd
-allow perm=execute all : ftype=text/x-shellscript trust=1
2e13dd
-allow perm=execute all : ftype=text/plain trust=1
2e13dd
-
2e13dd
 # This is a workaround for kernel thinking this is being executed. We
2e13dd
 # catch actual execution in rule 3.
2e13dd
 allow perm=execute all : path=/usr/lib64/ld-2.30.so trust=1