Blame SOURCES/selinux.patch

2ceba8
diff -up ./fapolicyd-selinux-0.2/fapolicyd.te.selinux ./fapolicyd-selinux-0.2/fapolicyd.te
2ceba8
--- ./fapolicyd-selinux-0.2/fapolicyd.te.selinux	2019-11-05 14:17:08.000000000 +0100
2ceba8
+++ ./fapolicyd-selinux-0.2/fapolicyd.te	2020-05-25 15:02:37.196991039 +0200
2ceba8
@@ -30,6 +30,7 @@ files_pid_file(fapolicyd_var_run_t)
2ceba8
 # fapolicyd local policy
2ceba8
 #
2ceba8
 allow fapolicyd_t self:capability { audit_write chown dac_override setgid setuid sys_admin sys_nice sys_ptrace };
2ceba8
+allow fapolicyd_t self:cap_userns sys_ptrace;
2ceba8
 allow fapolicyd_t self:fifo_file rw_fifo_file_perms;
2ceba8
 allow fapolicyd_t self:process { setcap setsched };
2ceba8
 allow fapolicyd_t self:unix_stream_socket create_stream_socket_perms;
2ceba8
@@ -48,7 +49,7 @@ manage_dirs_pattern(fapolicyd_t, fapolic
2ceba8
 manage_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
2ceba8
 manage_fifo_files_pattern(fapolicyd_t, fapolicyd_var_run_t,fapolicyd_var_run_t)
2ceba8
 manage_lnk_files_pattern(fapolicyd_t, fapolicyd_var_run_t, fapolicyd_var_run_t)
2ceba8
-files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file lnk_file })
2ceba8
+files_pid_filetrans(fapolicyd_t, fapolicyd_var_run_t, { dir file fifo_file lnk_file })
2ceba8
 
2ceba8
 kernel_dgram_send(fapolicyd_t)
2ceba8