2021-04-29 22:44:23 +02:00
|
|
|
Index: fedora-policy-20210419/policy/modules/roles/unconfineduser.te
|
2020-03-05 11:13:59 +01:00
|
|
|
===================================================================
|
2021-04-29 22:44:23 +02:00
|
|
|
--- fedora-policy-20210419.orig/policy/modules/roles/unconfineduser.te
|
|
|
|
+++ fedora-policy-20210419/policy/modules/roles/unconfineduser.te
|
2021-03-24 16:08:51 +01:00
|
|
|
@@ -124,6 +124,11 @@ tunable_policy(`unconfined_dyntrans_all'
|
2020-03-17 15:46:20 +01:00
|
|
|
domain_dyntrans(unconfined_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
+# FIXME this is probably caused by some wierd PAM interaction
|
|
|
|
+corecmd_entrypoint_all_executables(unconfined_t)
|
|
|
|
+# FIXME sddm JITs some code, requiring execmod on user_tmp_t. Check how to disable this behaviour in sddm/qtdeclarative
|
|
|
|
+files_execmod_tmp(unconfined_t)
|
|
|
|
+
|
|
|
|
optional_policy(`
|
|
|
|
gen_require(`
|
|
|
|
type unconfined_t;
|
2021-03-24 16:08:51 +01:00
|
|
|
@@ -214,6 +219,10 @@ optional_policy(`
|
2020-03-17 15:46:20 +01:00
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
+ cron_system_spool_entrypoint(unconfined_t)
|
|
|
|
+')
|
|
|
|
+
|
|
|
|
+optional_policy(`
|
|
|
|
chrome_role_notrans(unconfined_r, unconfined_t)
|
|
|
|
|
|
|
|
tunable_policy(`unconfined_chrome_sandbox_transition',`
|
2021-03-24 16:08:51 +01:00
|
|
|
@@ -248,6 +257,18 @@ optional_policy(`
|
2020-03-05 11:13:59 +01:00
|
|
|
dbus_stub(unconfined_t)
|
|
|
|
|
|
|
|
optional_policy(`
|
2020-07-17 16:00:13 +02:00
|
|
|
+ accountsd_dbus_chat(unconfined_dbusd_t)
|
|
|
|
+ ')
|
|
|
|
+
|
|
|
|
+ optional_policy(`
|
2020-06-02 17:31:08 +02:00
|
|
|
+ networkmanager_dbus_chat(unconfined_dbusd_t)
|
|
|
|
+ ')
|
|
|
|
+
|
|
|
|
+ optional_policy(`
|
2020-03-05 11:13:59 +01:00
|
|
|
+ systemd_dbus_chat_logind(unconfined_dbusd_t)
|
|
|
|
+ ')
|
|
|
|
+
|
|
|
|
+ optional_policy(`
|
|
|
|
bluetooth_dbus_chat(unconfined_t)
|
|
|
|
')
|
|
|
|
|
2021-04-29 22:44:23 +02:00
|
|
|
@@ -311,6 +332,10 @@ optional_policy(`
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
+ libs_run_ldconfig(unconfined_t, unconfined_r)
|
|
|
|
+')
|
|
|
|
+
|
|
|
|
+optional_policy(`
|
|
|
|
firstboot_run(unconfined_t, unconfined_r)
|
|
|
|
')
|
|
|
|
|