Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:coolo:alp:hostos
selinux-policy
fix_unconfineduser.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File fix_unconfineduser.patch of Package selinux-policy
Index: fedora-policy-20220509/policy/modules/roles/unconfineduser.te =================================================================== --- fedora-policy-20220509.orig/policy/modules/roles/unconfineduser.te +++ fedora-policy-20220509/policy/modules/roles/unconfineduser.te @@ -124,6 +124,11 @@ tunable_policy(`unconfined_dyntrans_all' domain_dyntrans(unconfined_t) ') +# FIXME this is probably caused by some wierd PAM interaction +corecmd_entrypoint_all_executables(unconfined_t) +# FIXME sddm JITs some code, requiring execmod on user_tmp_t. Check how to disable this behaviour in sddm/qtdeclarative +files_execmod_tmp(unconfined_t) + optional_policy(` gen_require(` type unconfined_t; @@ -210,6 +215,10 @@ optional_policy(` ') optional_policy(` + cron_system_spool_entrypoint(unconfined_t) +') + +optional_policy(` chrome_role_notrans(unconfined_r, unconfined_t) tunable_policy(`unconfined_chrome_sandbox_transition',` @@ -244,6 +253,18 @@ optional_policy(` dbus_stub(unconfined_t) optional_policy(` + accountsd_dbus_chat(unconfined_dbusd_t) + ') + + optional_policy(` + networkmanager_dbus_chat(unconfined_dbusd_t) + ') + + optional_policy(` + systemd_dbus_chat_logind(unconfined_dbusd_t) + ') + + optional_policy(` bluetooth_dbus_chat(unconfined_t) ')
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor