Blame SOURCES/selinux.patch

037a42
diff -up ./fapolicyd-selinux-0.2/fapolicyd.te.selinux ./fapolicyd-selinux-0.2/fapolicyd.te
037a42
--- ./fapolicyd-selinux-0.2/fapolicyd.te.selinux	2019-11-05 14:17:08.000000000 +0100
037a42
+++ ./fapolicyd-selinux-0.2/fapolicyd.te	2020-05-25 15:02:37.196991039 +0200
037a42
@@ -30,6 +30,7 @@ files_pid_file(fapolicyd_var_run_t)
037a42
 # fapolicyd local policy
037a42
 #
037a42
 allow fapolicyd_t self:capability { audit_write chown dac_override setgid setuid sys_admin sys_nice sys_ptrace };
037a42
+allow fapolicyd_t self:cap_userns sys_ptrace;
037a42
 allow fapolicyd_t self:fifo_file rw_fifo_file_perms;
037a42
 allow fapolicyd_t self:process { setcap setsched };
037a42
 allow fapolicyd_t self:unix_stream_socket create_stream_socket_perms;
037a42
@@ -48,7 +49,7 @@ manage_dirs_pattern(fapolicyd_t, fapolic
037a42
 manage_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
037a42
 manage_fifo_files_pattern(fapolicyd_t, fapolicyd_var_run_t,fapolicyd_var_run_t)
037a42
 manage_lnk_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
037a42
-files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file lnk_file })
037a42
+files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file fifo_file lnk_file })
037a42
 
037a42
 kernel_dgram_send(fapolicyd_t)
037a42