diff --git a/file.te b/file.te
index b1a1e24e9c9ed27bdb8c3df084825cc1007add79..4f75d379d65d2dd85190948273b56bdcef27dda0 100644
--- a/file.te
+++ b/file.te
@@ -14,7 +14,7 @@ type proc_net, fs_type;
 type proc_sysrq, fs_type;
 type selinuxfs, fs_type;
 type cgroup, fs_type, mlstrustedobject;
-type sysfs, fs_type, mlstrustedobject;
+type sysfs, fs_type, sysfs_type, mlstrustedobject;
 type sysfs_writable, fs_type, sysfs_type, mlstrustedobject;
 type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject;
 type sysfs_nfc_power_writable, fs_type, sysfs_type, mlstrustedobject;
diff --git a/ueventd.te b/ueventd.te
index 66e70e874db43de0a771c5bbfe3676f9b78f6323..f02b899df72eca0856026464293b42262634f848 100644
--- a/ueventd.te
+++ b/ueventd.te
@@ -11,10 +11,8 @@ allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio da
 allow ueventd device:file create_file_perms;
 allow ueventd device:chr_file rw_file_perms;
 allow ueventd sysfs:file rw_file_perms;
-allow ueventd sysfs:file setattr;
-allow ueventd sysfs:file relabelfrom;
-allow ueventd sysfs_type:file { relabelfrom relabelto };
-allow ueventd sysfs_devices_system_cpu:file {rw_file_perms setattr};
+allow ueventd sysfs_type:file { relabelfrom relabelto setattr };
+allow ueventd sysfs_devices_system_cpu:file rw_file_perms;
 allow ueventd tmpfs:chr_file rw_file_perms;
 allow ueventd dev_type:dir create_dir_perms;
 allow ueventd dev_type:lnk_file { create unlink };