-policy_module(cod4, 0.1.31)
+policy_module(cod4, 0.1.33)
# File context for the executable process
type cod4_t;
type cod4_ro_t;
files_type(cod4_ro_t)
+init_domain(cod4_t, cod4_exec_t)
init_daemon_domain(cod4_t, cod4_exec_t)
corenet_udp_sendrecv_generic_port(cod4_t)
-policy_module(q3a, 0.1.24)
+policy_module(q3a, 0.1.25)
# File context for the executable process
type q3a_t;
_sky_files_use_tmp(q3a_t, q3a_tmp_t)
+init_domain(q3a_t, q3a_exec_t)
init_daemon_domain(q3a_t, q3a_exec_t)
corenet_udp_sendrecv_generic_port(q3a_t)
-policy_module(quake2, 0.1.10)
+policy_module(quake2, 0.1.11)
# File context for the executable process
type quake2_t;
_sky_files_use_tmp(quake2_t, quake2_tmp_t)
+init_domain(quake2_t, quake2_exec_t)
init_daemon_domain(quake2_t, quake2_exec_t)
corenet_udp_sendrecv_generic_port(quake2_t)
-policy_module(tesseract, 0.1.4)
+policy_module(tesseract, 0.1.5)
# File context for the executable process
type tesseract_t;
type tesseract_ro_t;
files_type(tesseract_ro_t)
+init_domain(tesseract_t, tesseract_exec_t)
init_daemon_domain(tesseract_t, tesseract_exec_t)
corenet_udp_sendrecv_generic_port(tesseract_t)
-policy_module(tf2, 0.1.25)
+policy_module(tf2, 0.1.28)
require {
type default_t;
files_type(tf2_ro_t)
+init_domain(tf2_t, tf2_exec_t)
init_daemon_domain(tf2_t, tf2_exec_t)
allow tf2_t self:process { setsched signal signull };
dontaudit tf2_t default_t:dir read;
allow init_t tf2_t:process { noatsecure };
+allow tf2_t self:process execmem;
-policy_module(ts3, 0.1.28)
+policy_module(ts3, 0.1.29)
# File context for the executable process
type ts3_t;
type ts3_ro_t;
files_type(ts3_ro_t)
+init_domain(ts3_t, ts3_exec_t)
init_daemon_domain(ts3_t, ts3_exec_t)
corenet_udp_sendrecv_generic_port(ts3_t)
-policy_module(ut2004, 0.1.3)
+policy_module(ut2004, 0.1.4)
require {
type interwise_port_t;
type ut2004_ro_t;
files_type(ut2004_ro_t)
+init_domain(ut2004_t, ut2004_exec_t)
init_daemon_domain(ut2004_t, ut2004_exec_t)
corenet_udp_sendrecv_generic_port(ut2004_t)