diff --git a/file.te b/file.te index b1a1e24e9c9ed27bdb8c3df084825cc1007add79..4f75d379d65d2dd85190948273b56bdcef27dda0 100644 --- a/file.te +++ b/file.te @@ -14,7 +14,7 @@ type proc_net, fs_type; type proc_sysrq, fs_type; type selinuxfs, fs_type; type cgroup, fs_type, mlstrustedobject; -type sysfs, fs_type, mlstrustedobject; +type sysfs, fs_type, sysfs_type, mlstrustedobject; type sysfs_writable, fs_type, sysfs_type, mlstrustedobject; type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject; type sysfs_nfc_power_writable, fs_type, sysfs_type, mlstrustedobject; diff --git a/ueventd.te b/ueventd.te index 66e70e874db43de0a771c5bbfe3676f9b78f6323..f02b899df72eca0856026464293b42262634f848 100644 --- a/ueventd.te +++ b/ueventd.te @@ -11,10 +11,8 @@ allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio da allow ueventd device:file create_file_perms; allow ueventd device:chr_file rw_file_perms; allow ueventd sysfs:file rw_file_perms; -allow ueventd sysfs:file setattr; -allow ueventd sysfs:file relabelfrom; -allow ueventd sysfs_type:file { relabelfrom relabelto }; -allow ueventd sysfs_devices_system_cpu:file {rw_file_perms setattr}; +allow ueventd sysfs_type:file { relabelfrom relabelto setattr }; +allow ueventd sysfs_devices_system_cpu:file rw_file_perms; allow ueventd tmpfs:chr_file rw_file_perms; allow ueventd dev_type:dir create_dir_perms; allow ueventd dev_type:lnk_file { create unlink };