Call init_domain() in addition to init_daemon_domain(), this adds permissions needed...
[selinux.git] / ts3 / ts3.te
1 policy_module(ts3, 0.1.29)
2
3 # File context for the executable process
4 type ts3_t;
5 type ts3_exec_t;
6
7 type ts3_rw_t;
8 files_type(ts3_rw_t)
9
10 type ts3_ro_t;
11 files_type(ts3_ro_t)
12
13 init_domain(ts3_t, ts3_exec_t)
14 init_daemon_domain(ts3_t, ts3_exec_t)
15
16 corenet_udp_sendrecv_generic_port(ts3_t)
17 corenet_udp_bind_generic_port(ts3_t)
18 corenet_udp_bind_generic_node(ts3_t)
19 corenet_tcp_sendrecv_generic_port(ts3_t)
20 corenet_tcp_bind_generic_port(ts3_t)
21 corenet_tcp_bind_generic_node(ts3_t)
22
23 allow ts3_t self:tcp_socket { create_stream_socket_perms connected_stream_socket_perms };
24
25 read_files_pattern(ts3_t, ts3_ro_t, ts3_ro_t)
26 list_dirs_pattern(ts3_t, ts3_ro_t, ts3_ro_t)
27 mmap_exec_files_pattern(ts3_t, ts3_ro_t, ts3_ro_t)
28
29 manage_files_pattern(ts3_t, ts3_rw_t, ts3_rw_t)
30 manage_dirs_pattern(ts3_t, ts3_rw_t, ts3_rw_t)
31 mmap_exec_files_pattern(ts3_t, ts3_rw_t, ts3_rw_t)
32 setattr_files_pattern(ts3_t, ts3_rw_t, ts3_rw_t)
33
34 mmap_exec_files_pattern(ts3_t, tmpfs_t, tmpfs_t)
35
36 sysnet_dns_name_resolve(ts3_t)
37
38 # Needed to load shared libraries
39 allow ts3_t ts3_exec_t:file execmod;
40
41 dev_read_urand(ts3_t)
42
43 fs_getattr_tmpfs(ts3_t)
44 fs_manage_tmpfs_files(ts3_t)
45
46 allow init_t ts3_t:process { noatsecure };