diff --git a/policy/modules/services/wireguard.te b/policy/modules/services/wireguard.te index 4e6aad641..07c2d71f9 100644 --- a/policy/modules/services/wireguard.te +++ b/policy/modules/services/wireguard.te @@ -42,7 +42,7 @@ allow wireguard_t self:netlink_route_socket r_netlink_socket_perms; allow wireguard_t self:udp_socket create_socket_perms; allow wireguard_t self:unix_stream_socket create_socket_perms; -manage_files_pattern(wireguard_t, wireguard_etc_t, wireguard_etc_t); +manage_files_pattern(wireguard_t, wireguard_etc_t, wireguard_etc_t) files_read_etc_files(wireguard_t) manage_files_pattern(wireguard_t, wireguard_runtime_t, wireguard_runtime_t) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index d039e2a17..f55294e30 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -99,7 +99,7 @@ type systemd_hw_exec_t; init_system_domain(systemd_hw_t, systemd_hw_exec_t) type systemd_hwdb_t; -files_type(systemd_hwdb_t); +files_type(systemd_hwdb_t) type systemd_journal_t; files_type(systemd_journal_t)