diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te index 6a77b5501..e6b9a5e23 100644 --- a/policy/modules/kernel/devices.te +++ b/policy/modules/kernel/devices.te @@ -23,7 +23,7 @@ fs_xattr_type(device_t) fs_use_trans devtmpfs gen_context(system_u:object_r:device_t,s0); optional_policy(` - systemd_tmpfilesd_managed(device_t, fifo_file) + systemd_tmpfilesd_managed(device_t) ') # diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te index a2788f076..cfbebf14d 100644 --- a/policy/modules/kernel/files.te +++ b/policy/modules/kernel/files.te @@ -183,7 +183,7 @@ files_runtime_file(var_run_t) files_mountpoint(var_run_t) optional_policy(` - systemd_tmpfilesd_managed(var_run_t, lnk_file) + systemd_tmpfilesd_managed(var_run_t) ') # diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te index b09674442..c931497e3 100644 --- a/policy/modules/services/dbus.te +++ b/policy/modules/services/dbus.te @@ -192,7 +192,7 @@ optional_policy(` systemd_use_inherited_machined_ptys(system_dbusd_t) # allow populating of /var/lib/dbus by systemd-tmpfilesd - systemd_tmpfilesd_managed(system_dbusd_var_lib_t, dir) + systemd_tmpfilesd_managed(system_dbusd_var_lib_t) ') optional_policy(` diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te index fc37c9423..db2680661 100644 --- a/policy/modules/system/authlogin.te +++ b/policy/modules/system/authlogin.te @@ -97,8 +97,8 @@ type wtmp_t; logging_log_file(wtmp_t) optional_policy(` - systemd_tmpfilesd_managed(faillog_t, { dir file }) - systemd_tmpfilesd_managed(var_auth_t, dir) + systemd_tmpfilesd_managed(faillog_t) + systemd_tmpfilesd_managed(var_auth_t) ') ######################################## diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te index 99b50e25c..f89b789d9 100644 --- a/policy/modules/system/lvm.te +++ b/policy/modules/system/lvm.te @@ -20,7 +20,7 @@ files_type(lvm_etc_t) type lvm_lock_t; files_lock_file(lvm_lock_t) optional_policy(` - systemd_tmpfilesd_managed(lvm_lock_t, dir) + systemd_tmpfilesd_managed(lvm_lock_t) ') type lvm_metadata_t; diff --git a/policy/modules/system/miscfiles.te b/policy/modules/system/miscfiles.te index ee3998678..291999585 100644 --- a/policy/modules/system/miscfiles.te +++ b/policy/modules/system/miscfiles.te @@ -43,7 +43,7 @@ type man_t alias catman_t; files_type(man_t) optional_policy(` - systemd_tmpfilesd_managed(man_t, dir) + systemd_tmpfilesd_managed(man_t) ') type man_cache_t; diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if index 8462a1420..724aacfc4 100644 --- a/policy/modules/system/systemd.if +++ b/policy/modules/system/systemd.if @@ -1710,16 +1710,11 @@ interface(`systemd_relabelto_tmpfiles_conf_files',` ####################################### ## -## Allow systemd_tmpfiles_t to manage filesystem objects +## Allow systemd_tmpfiles_t to manage filesystem objects ## ## ## -## type of object to manage -## -## -## -## -## object class to manage +## Type of object to manage ## ## # @@ -1728,8 +1723,15 @@ interface(`systemd_tmpfilesd_managed',` type systemd_tmpfiles_t; ') - allow systemd_tmpfiles_t $1:dir list_dir_perms; - allow systemd_tmpfiles_t $1:$2 { setattr relabelfrom relabelto create }; + allow systemd_tmpfiles_t $1:dir { manage_dir_perms relabel_dir_perms }; + allow systemd_tmpfiles_t $1:file { create setattr unlink write_file_perms relabel_file_perms }; + allow systemd_tmpfiles_t $1:lnk_file { create setattr unlink relabel_lnk_file_perms }; + allow systemd_tmpfiles_t $1:fifo_file { create setattr unlink relabel_fifo_file_perms }; + + ifelse(`$2',`',`',` + refpolicywarn(`$0($*) second parameter is deprecated.') + allow systemd_tmpfiles_t $1:$2 { setattr relabelfrom relabelto create }; + ') ') ########################################