Skip to content

Commit 1daa35b

Browse files
authored
networking (#937)
* misc small networking patches Signed-off-by: Russell Coker <[email protected]>
1 parent 9ee1539 commit 1daa35b

File tree

5 files changed

+8
-2
lines changed

5 files changed

+8
-2
lines changed

policy/modules/kernel/corenetwork.te.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ network_port(smtp, tcp,25,s0, tcp,465,s0, tcp,587,s0)
264264
network_port(snmp, udp,161,s0, udp,162,s0, tcp,199,s0, tcp,1161,s0)
265265
network_port(socks) # no defined portcon
266266
network_port(soundd, tcp,8000,s0, tcp,9433,s0, tcp, 16001, s0)
267-
network_port(spamd, tcp,783,s0)
267+
network_port(spamd, tcp,783,s0, tcp,11333,s0)
268268
network_port(speech, tcp,8036,s0)
269269
network_port(squid, udp,3401,s0, tcp,3401,s0, udp,4827,s0, tcp,4827,s0) # snmp and htcp
270270
network_port(ssdp, tcp,1900,s0, udp,1900,s0)

policy/modules/services/avahi.te

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,4 +118,3 @@ optional_policy(`
118118
optional_policy(`
119119
unconfined_dbus_send(avahi_t)
120120
')
121-

policy/modules/services/bind.te

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -224,6 +224,8 @@ allow ndc_t self:capability2 block_suspend;
224224
allow ndc_t self:process { getsched setsched signal_perms };
225225
allow ndc_t self:fifo_file rw_fifo_file_perms;
226226
allow ndc_t self:unix_stream_socket { accept listen };
227+
allow ndc_t self:anon_inode { create map read write };
228+
allow ndc_t self:io_uring sqpoll;
227229

228230
allow ndc_t dnssec_t:file read_file_perms;
229231
allow ndc_t dnssec_t:lnk_file read_lnk_file_perms;

policy/modules/services/networkmanager.te

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,7 @@ allow NetworkManager_t wpa_cli_t:unix_dgram_socket sendto;
6666
allow NetworkManager_t NetworkManager_etc_t:dir list_dir_perms;
6767
allow NetworkManager_t NetworkManager_etc_t:file read_file_perms;
6868
allow NetworkManager_t NetworkManager_etc_t:lnk_file read_lnk_file_perms;
69+
allow NetworkManager_t NetworkManager_etc_t:dir watch;
6970

7071
manage_dirs_pattern(NetworkManager_t, NetworkManager_etc_rw_t, NetworkManager_etc_rw_t)
7172
manage_files_pattern(NetworkManager_t, NetworkManager_etc_rw_t, NetworkManager_etc_rw_t)
@@ -162,7 +163,9 @@ storage_getattr_fixed_disk_dev(NetworkManager_t)
162163
init_read_utmp(NetworkManager_t)
163164
init_dontaudit_write_utmp(NetworkManager_t)
164165
init_domtrans_script(NetworkManager_t)
166+
init_get_generic_units_status(NetworkManager_t)
165167
init_get_system_status(NetworkManager_t)
168+
init_search_units(NetworkManager_t)
166169

167170
auth_use_nsswitch(NetworkManager_t)
168171

@@ -346,6 +349,7 @@ optional_policy(`
346349
systemd_watch_logind_runtime_dirs(NetworkManager_t)
347350
systemd_read_logind_sessions_files(NetworkManager_t)
348351
systemd_watch_logind_sessions_dirs(NetworkManager_t)
352+
systemd_read_networkd_runtime(NetworkManager_t)
349353
systemd_read_machines(NetworkManager_t)
350354
systemd_watch_machines_dirs(NetworkManager_t)
351355
systemd_write_inherited_logind_inhibit_pipes(NetworkManager_t)

policy/modules/services/rpc.fc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
/usr/lib/systemd/system/rpc.*\.service -- gen_context(system_u:object_r:rpcd_unit_t,s0)
2121

2222
/usr/sbin/blkmapd -- gen_context(system_u:object_r:blkmapd_exec_t,s0)
23+
/usr/sbin/fsidd -- gen_context(system_u:object_r:nfsd_exec_t,s0)
2324
/usr/sbin/nfsdcld -- gen_context(system_u:object_r:rpcd_exec_t,s0)
2425
/usr/sbin/rpc\..* -- gen_context(system_u:object_r:rpcd_exec_t,s0)
2526
/usr/sbin/rpc\.idmapd -- gen_context(system_u:object_r:rpcd_exec_t,s0)

0 commit comments

Comments
 (0)