public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/, policy/modules/services/, policy/modules/admin/, ...
@ 2019-12-24 10:00 Jason Zaman
  0 siblings, 0 replies; only message in thread
From: Jason Zaman @ 2019-12-24 10:00 UTC (permalink / raw
  To: gentoo-commits

commit:     0fc88387bdc52d40b6388336d655a4374271b049
Author:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
AuthorDate: Mon Dec 16 17:45:34 2019 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Tue Dec 24 09:58:27 2019 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0fc88387

Rename gentoo-specific *_var_run_t types to *_runtime_t.

Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 policy/modules/admin/puppet.te            |  2 +-
 policy/modules/apps/qemu.if               |  4 +--
 policy/modules/apps/qemu.te               |  4 +--
 policy/modules/contrib/at.fc              |  4 +--
 policy/modules/contrib/at.te              | 10 +++---
 policy/modules/contrib/bitcoin.if         |  4 +--
 policy/modules/contrib/bitcoin.te         |  4 +--
 policy/modules/contrib/ceph.fc            | 10 +++---
 policy/modules/contrib/ceph.if            | 13 ++++----
 policy/modules/contrib/ceph.te            | 10 +++---
 policy/modules/contrib/dirsrv.fc          |  4 +--
 policy/modules/contrib/dirsrv.if          | 18 +++++------
 policy/modules/contrib/dirsrv.te          | 22 ++++++-------
 policy/modules/contrib/nginx.if           |  4 +--
 policy/modules/contrib/nginx.te           | 10 +++---
 policy/modules/contrib/phpfpm.fc          |  4 +--
 policy/modules/contrib/phpfpm.if          |  8 ++---
 policy/modules/contrib/phpfpm.te          | 10 +++---
 policy/modules/contrib/resolvconf.fc      |  2 +-
 policy/modules/contrib/resolvconf.if      |  4 +--
 policy/modules/contrib/resolvconf.te      | 10 +++---
 policy/modules/contrib/salt.fc            | 10 +++---
 policy/modules/contrib/salt.if            |  8 ++---
 policy/modules/contrib/salt.rst           |  6 ++--
 policy/modules/contrib/salt.te            | 52 +++++++++++++++----------------
 policy/modules/contrib/vde.fc             |  2 +-
 policy/modules/contrib/vde.if             |  6 ++--
 policy/modules/contrib/vde.te             | 12 +++----
 policy/modules/services/apache.te         |  4 +--
 policy/modules/services/clamav.te         |  2 +-
 policy/modules/services/courier.te        |  2 +-
 policy/modules/services/cron.fc           |  4 +--
 policy/modules/services/cron.rst          |  2 +-
 policy/modules/services/dbus.if           |  8 ++---
 policy/modules/services/fail2ban.te       |  4 +--
 policy/modules/services/ldap.te           |  2 +-
 policy/modules/services/munin.rst         |  2 +-
 policy/modules/services/mysql.if          |  8 ++---
 policy/modules/services/networkmanager.fc |  2 +-
 policy/modules/services/networkmanager.te |  8 ++---
 policy/modules/services/ntp.fc            |  2 +-
 policy/modules/system/authlogin.te        |  2 +-
 policy/modules/system/init.te             |  4 +--
 policy/modules/system/lvm.te              |  2 +-
 policy/modules/system/modutils.te         |  4 +--
 policy/modules/system/sysnetwork.fc       |  4 +--
 policy/modules/system/sysnetwork.te       | 10 +++---
 policy/modules/system/tmpfiles.fc         |  2 +-
 policy/modules/system/tmpfiles.if         | 32 +++++++++----------
 policy/modules/system/tmpfiles.rst        |  2 +-
 policy/modules/system/tmpfiles.te         |  8 ++---
 51 files changed, 188 insertions(+), 189 deletions(-)

diff --git a/policy/modules/admin/puppet.te b/policy/modules/admin/puppet.te
index 85c4ac40..75d03e76 100644
--- a/policy/modules/admin/puppet.te
+++ b/policy/modules/admin/puppet.te
@@ -355,7 +355,7 @@ ifdef(`distro_gentoo',`
 
 	rw_files_pattern(puppetmaster_t, puppet_log_t, puppet_log_t)
 
-	manage_files_pattern(puppetmaster_t, puppet_var_run_t, puppet_var_run_t)
+	manage_files_pattern(puppetmaster_t, puppet_runtime_t, puppet_runtime_t)
 
 	optional_policy(`
 		usermanage_check_exec_passwd(puppetmaster_t)

diff --git a/policy/modules/apps/qemu.if b/policy/modules/apps/qemu.if
index e373c4d9..413e1347 100644
--- a/policy/modules/apps/qemu.if
+++ b/policy/modules/apps/qemu.if
@@ -427,8 +427,8 @@ interface(`qemu_entry_type',`
 #
 interface(`qemu_rw_pid_sock_files',`
 	gen_require(`
-		type qemu_var_run_t;
+		type qemu_runtime_t;
 	')
 
-	allow $1 qemu_var_run_t:sock_file rw_sock_file_perms;
+	allow $1 qemu_runtime_t:sock_file rw_sock_file_perms;
 ')

diff --git a/policy/modules/apps/qemu.te b/policy/modules/apps/qemu.te
index f99f2161..6188d362 100644
--- a/policy/modules/apps/qemu.te
+++ b/policy/modules/apps/qemu.te
@@ -90,9 +90,9 @@ ifdef(`distro_gentoo',`
 	allow qemu_t self:udp_socket create_socket_perms;
 
 	# Network related socket
-	allow qemu_t qemu_var_run_t:sock_file manage_sock_file_perms;
+	allow qemu_t qemu_runtime_t:sock_file manage_sock_file_perms;
 
-	files_pid_filetrans(qemu_t, qemu_var_run_t, sock_file)
+	files_pid_filetrans(qemu_t, qemu_runtime_t, sock_file)
 
 	optional_policy(`
 		vde_connect(qemu_t)

diff --git a/policy/modules/contrib/at.fc b/policy/modules/contrib/at.fc
index b3cf1863..39c83a99 100644
--- a/policy/modules/contrib/at.fc
+++ b/policy/modules/contrib/at.fc
@@ -1,9 +1,9 @@
 /etc/rc\.d/init\.d/atd	--	gen_context(system_u:object_r:atd_initrc_exec_t,s0)
 
 /usr/bin/at	--	gen_context(system_u:object_r:at_exec_t,s0)
-/usr/sbin/atd	--	gen_context(system_u:object_r:atd_exec_t,s0)
+/usr/bin/atd	--	gen_context(system_u:object_r:atd_exec_t,s0)
 
-/run/atd\.pid	--	gen_context(system_u:object_r:atd_var_run_t,s0)
+/run/atd\.pid	--	gen_context(system_u:object_r:atd_runtime_t,s0)
 
 /var/spool/at(/.*)?	gen_context(system_u:object_r:at_spool_t,s0)
 /var/spool/at/atjobs(/.*)?	gen_context(system_u:object_r:at_job_t,s0)

diff --git a/policy/modules/contrib/at.te b/policy/modules/contrib/at.te
index c28a9e7b..b0900cbf 100644
--- a/policy/modules/contrib/at.te
+++ b/policy/modules/contrib/at.te
@@ -21,8 +21,8 @@ init_daemon_domain(atd_t, atd_exec_t)
 type atd_initrc_exec_t;
 init_script_file(atd_initrc_exec_t)
 
-type atd_var_run_t;
-files_pid_file(atd_var_run_t)
+type atd_runtime_t alias atd_var_run_t;
+files_pid_file(atd_runtime_t)
 
 ########################################
 #
@@ -39,8 +39,8 @@ list_dirs_pattern(atd_t, at_spool_t, at_job_t)
 
 manage_files_pattern(atd_t, at_job_log_t, at_job_log_t)
 
-manage_files_pattern(atd_t, atd_var_run_t, atd_var_run_t)
-files_pid_filetrans(atd_t, atd_var_run_t, file)
+manage_files_pattern(atd_t, atd_runtime_t, atd_runtime_t)
+files_pid_filetrans(atd_t, atd_runtime_t, file)
 
 kernel_read_kernel_sysctls(atd_t)
 
@@ -81,7 +81,7 @@ allow at_t at_spool_t:dir search_dir_perms;
 
 allow at_t atd_t:process signal;
 
-allow at_t atd_var_run_t:file read_file_perms;
+allow at_t atd_runtime_t:file read_file_perms;
 
 domain_use_interactive_fds(at_t)
 

diff --git a/policy/modules/contrib/bitcoin.if b/policy/modules/contrib/bitcoin.if
index 9c7ca8da..7e00c963 100644
--- a/policy/modules/contrib/bitcoin.if
+++ b/policy/modules/contrib/bitcoin.if
@@ -19,7 +19,7 @@ interface(`bitcoin_admin',`
 	gen_require(`
 		type bitcoin_t;
 		type bitcoin_etc_t, bitcoin_tmp_t, bitcoin_log_t;
-		type bitcoin_var_lib_t, bitcoin_var_run_t;
+		type bitcoin_var_lib_t, bitcoin_runtime_t;
 		type bitcoin_initrc_exec_t;
 	')
 
@@ -41,5 +41,5 @@ interface(`bitcoin_admin',`
 	admin_pattern($1, bitcoin_var_lib_t)
 
 	files_list_pids($1)
-	admin_pattern($1, bitcoin_var_run_t)
+	admin_pattern($1, bitcoin_runtime_t)
 ')

diff --git a/policy/modules/contrib/bitcoin.te b/policy/modules/contrib/bitcoin.te
index 672516e9..c5667519 100644
--- a/policy/modules/contrib/bitcoin.te
+++ b/policy/modules/contrib/bitcoin.te
@@ -31,8 +31,8 @@ type bitcoin_var_lib_t;
 files_type(bitcoin_var_lib_t)
 init_script_readable_type(bitcoin_var_lib_t)
 
-type bitcoin_var_run_t;
-files_pid_file(bitcoin_var_run_t)
+type bitcoin_runtime_t alias bitcoin_var_run_t;
+files_pid_file(bitcoin_runtime_t)
 
 type bitcoin_tmp_t;
 files_tmp_file(bitcoin_tmp_t)

diff --git a/policy/modules/contrib/ceph.fc b/policy/modules/contrib/ceph.fc
index 8e2e1799..4d1db681 100644
--- a/policy/modules/contrib/ceph.fc
+++ b/policy/modules/contrib/ceph.fc
@@ -23,8 +23,8 @@
 
 /var/log/ceph(/.*)?		gen_context(system_u:object_r:ceph_log_t,s0)
 
-/run/ceph		-d	gen_context(system_u:object_r:ceph_var_run_t,s0)
-/run/ceph/ceph-osd.*		gen_context(system_u:object_r:ceph_osd_var_run_t,s0)
-/run/ceph/ceph-mon.*		gen_context(system_u:object_r:ceph_mon_var_run_t,s0)
-/run/ceph/ceph-mds.*		gen_context(system_u:object_r:ceph_mds_var_run_t,s0)
-/run/ceph/mds.*		--	gen_context(system_u:object_r:ceph_mds_var_run_t,s0)
+/run/ceph		-d	gen_context(system_u:object_r:ceph_runtime_t,s0)
+/run/ceph/ceph-osd.*		gen_context(system_u:object_r:ceph_osd_runtime_t,s0)
+/run/ceph/ceph-mon.*		gen_context(system_u:object_r:ceph_mon_runtime_t,s0)
+/run/ceph/ceph-mds.*		gen_context(system_u:object_r:ceph_mds_runtime_t,s0)
+/run/ceph/mds.*		--	gen_context(system_u:object_r:ceph_mds_runtime_t,s0)

diff --git a/policy/modules/contrib/ceph.if b/policy/modules/contrib/ceph.if
index c922531b..9ff98e6f 100644
--- a/policy/modules/contrib/ceph.if
+++ b/policy/modules/contrib/ceph.if
@@ -17,7 +17,7 @@ template(`ceph_domain_template',`
 		attribute cephpidfile;
 		attribute_role ceph_roles;
 		
-		type ceph_var_run_t;
+		type ceph_runtime_t;
 	')
 
 	type ceph_$1_t, cephdomain;
@@ -28,8 +28,9 @@ template(`ceph_domain_template',`
 	type ceph_$1_data_t, cephdata;
 	files_type(ceph_$1_data_t)
 
-	type ceph_$1_var_run_t, cephpidfile;
-	files_pid_file(ceph_$1_var_run_t)
+	type ceph_$1_runtime_t, cephpidfile;
+	typealias ceph_$1_runtime_t alias ceph_$1_var_run_t;
+	files_pid_file(ceph_$1_runtime_t)
 
 	########################################
 	#
@@ -37,12 +38,12 @@ template(`ceph_domain_template',`
 	#
 	# Rules which cannot be made part of the domain
 
-	allow ceph_$1_t ceph_$1_var_run_t:file manage_file_perms;
-	allow ceph_$1_t ceph_$1_var_run_t:sock_file manage_file_perms;
+	allow ceph_$1_t ceph_$1_runtime_t:file manage_file_perms;
+	allow ceph_$1_t ceph_$1_runtime_t:sock_file manage_file_perms;
 	allow ceph_$1_t ceph_$1_data_t:dir manage_dir_perms;
 	allow ceph_$1_t ceph_$1_data_t:file manage_file_perms;
 
-	filetrans_pattern(ceph_$1_t, ceph_var_run_t, ceph_$1_var_run_t, { file sock_file })
+	filetrans_pattern(ceph_$1_t, ceph_runtime_t, ceph_$1_runtime_t, { file sock_file })
 
 	files_var_lib_filetrans(ceph_$1_t, ceph_$1_data_t, { file dir })
 ')

diff --git a/policy/modules/contrib/ceph.te b/policy/modules/contrib/ceph.te
index 9704dd41..94ebe44f 100644
--- a/policy/modules/contrib/ceph.te
+++ b/policy/modules/contrib/ceph.te
@@ -28,8 +28,8 @@ logging_log_file(ceph_log_t)
 type ceph_var_lib_t;
 files_type(ceph_var_lib_t)
 
-type ceph_var_run_t;
-files_pid_file(ceph_var_run_t)
+type ceph_runtime_t alias ceph_var_run_t;
+files_pid_file(ceph_runtime_t)
 
 #########################################
 #
@@ -48,8 +48,8 @@ allow cephdomain ceph_log_t:file { create_file_perms rw_file_perms };
 allow cephdomain ceph_var_lib_t:dir search_dir_perms;
 allow cephdomain self:netlink_route_socket { rw_netlink_socket_perms };
 allow cephdomain self:tcp_socket { create_socket_perms listen accept }; 
-allow cephdomain ceph_var_run_t:file manage_file_perms;
-allow cephdomain ceph_var_run_t:dir manage_dir_perms;
+allow cephdomain ceph_runtime_t:file manage_file_perms;
+allow cephdomain ceph_runtime_t:dir manage_dir_perms;
 
 kernel_read_system_state(cephdomain)
 
@@ -60,7 +60,7 @@ corenet_tcp_connect_all_unreserved_ports(cephdomain)
 files_read_etc_files(cephdomain)
 files_search_pids(cephdomain)
 files_search_var_lib(cephdomain)
-files_pid_filetrans(cephdomain, ceph_var_run_t, dir)
+files_pid_filetrans(cephdomain, ceph_runtime_t, dir)
 
 fs_getattr_all_fs(cephdomain)
 

diff --git a/policy/modules/contrib/dirsrv.fc b/policy/modules/contrib/dirsrv.fc
index 88b1a6eb..3a33d632 100644
--- a/policy/modules/contrib/dirsrv.fc
+++ b/policy/modules/contrib/dirsrv.fc
@@ -6,7 +6,7 @@
 /var/lock/dirsrv(/.*)?	gen_context(system_u:object_r:dirsrv_var_lock_t,s0)
 /var/log/dirsrv(/.*)?	gen_context(system_u:object_r:dirsrv_var_log_t,s0)
 /var/log/dirsrv/ldap-agent.log	gen_context(system_u:object_r:dirsrv_snmp_var_log_t,s0)
-/run/dirsrv(/.*)?	gen_context(system_u:object_r:dirsrv_var_run_t,s0)
-/run/ldap-agent.pid	gen_context(system_u:object_r:dirsrv_snmp_var_run_t,s0)
+/run/dirsrv(/.*)?	gen_context(system_u:object_r:dirsrv_runtime_t,s0)
+/run/ldap-agent.pid	gen_context(system_u:object_r:dirsrv_snmp_runtime_t,s0)
 
 /etc/dirsrv(/.*)?	gen_context(system_u:object_r:dirsrv_config_t,s0)

diff --git a/policy/modules/contrib/dirsrv.if b/policy/modules/contrib/dirsrv.if
index cbe9ecaf..8c697fc9 100644
--- a/policy/modules/contrib/dirsrv.if
+++ b/policy/modules/contrib/dirsrv.if
@@ -112,11 +112,11 @@ interface(`dirsrv_manage_var_lib',`
 #
 interface(`dirsrv_manage_var_run',`
 	gen_require(`
-		type dirsrv_var_run_t;
+		type dirsrv_runtime_t;
 	')
-	allow $1 dirsrv_var_run_t:dir manage_dir_perms;
-	allow $1 dirsrv_var_run_t:file manage_file_perms;
-	allow $1 dirsrv_var_run_t:sock_file manage_file_perms;
+	allow $1 dirsrv_runtime_t:dir manage_dir_perms;
+	allow $1 dirsrv_runtime_t:file manage_file_perms;
+	allow $1 dirsrv_runtime_t:sock_file manage_file_perms;
 ')
 
 ######################################
@@ -131,10 +131,10 @@ interface(`dirsrv_manage_var_run',`
 #
 interface(`dirsrv_pid_filetrans',`
 	gen_require(`
-		type dirsrv_var_run_t;
+		type dirsrv_runtime_t;
 	')
 	# Allow creating a dir in /var/run with this type
-	files_pid_filetrans($1, dirsrv_var_run_t, dir)
+	files_pid_filetrans($1, dirsrv_runtime_t, dir)
 ')
 
 #######################################
@@ -149,10 +149,10 @@ interface(`dirsrv_pid_filetrans',`
 #
 interface(`dirsrv_read_var_run',`
 	gen_require(`
-		type dirsrv_var_run_t;
+		type dirsrv_runtime_t;
 	')
-	allow $1 dirsrv_var_run_t:dir list_dir_perms;
-	allow $1 dirsrv_var_run_t:file read_file_perms;
+	allow $1 dirsrv_runtime_t:dir list_dir_perms;
+	allow $1 dirsrv_runtime_t:file read_file_perms;
 ')
 
 ########################################

diff --git a/policy/modules/contrib/dirsrv.te b/policy/modules/contrib/dirsrv.te
index 1a8b77a1..e7c8d06e 100644
--- a/policy/modules/contrib/dirsrv.te
+++ b/policy/modules/contrib/dirsrv.te
@@ -32,12 +32,12 @@ type dirsrv_snmp_var_log_t;
 logging_log_file(dirsrv_snmp_var_log_t)
 
 # pid files
-type dirsrv_var_run_t;
-files_pid_file(dirsrv_var_run_t)
+type dirsrv_runtime_t alias dirsrv_var_run_t;
+files_pid_file(dirsrv_runtime_t)
 
 # snmp pid file
-type dirsrv_snmp_var_run_t;
-files_pid_file(dirsrv_snmp_var_run_t)
+type dirsrv_snmp_runtime_t alias dirsrv_snmp_var_run_t;
+files_pid_file(dirsrv_snmp_runtime_t)
 
 # lock files
 type dirsrv_var_lock_t;
@@ -95,11 +95,11 @@ allow dirsrv_t dirsrv_var_log_t:dir { setattr };
 logging_log_filetrans(dirsrv_t,dirsrv_var_log_t,{ sock_file file dir })
 
 # pid files
-manage_files_pattern(dirsrv_t, dirsrv_var_run_t, dirsrv_var_run_t)
-files_pid_filetrans(dirsrv_t, dirsrv_var_run_t, { file sock_file })
+manage_files_pattern(dirsrv_t, dirsrv_runtime_t, dirsrv_runtime_t)
+files_pid_filetrans(dirsrv_t, dirsrv_runtime_t, { file sock_file })
 
 # ldapi socket
-manage_sock_files_pattern(dirsrv_t, dirsrv_var_run_t, dirsrv_var_run_t)
+manage_sock_files_pattern(dirsrv_t, dirsrv_runtime_t, dirsrv_runtime_t)
 
 # lock files
 manage_files_pattern(dirsrv_t, dirsrv_var_lock_t, dirsrv_var_lock_t)
@@ -175,7 +175,7 @@ files_manage_var_files(dirsrv_snmp_t)
 rw_files_pattern(dirsrv_snmp_t, dirsrv_tmpfs_t, dirsrv_tmpfs_t)
 
 # stats file
-read_files_pattern(dirsrv_snmp_t, dirsrv_var_run_t, dirsrv_var_run_t)
+read_files_pattern(dirsrv_snmp_t, dirsrv_runtime_t, dirsrv_runtime_t)
 
 # process stuff
 allow dirsrv_snmp_t self:capability { dac_override dac_read_search };
@@ -184,9 +184,9 @@ allow dirsrv_snmp_t self:capability { dac_override dac_read_search };
 read_files_pattern(dirsrv_snmp_t, dirsrv_config_t, dirsrv_config_t)
 
 # pid file
-manage_files_pattern(dirsrv_snmp_t, dirsrv_snmp_var_run_t, dirsrv_snmp_var_run_t)
-files_pid_filetrans(dirsrv_snmp_t, dirsrv_snmp_var_run_t, { file sock_file })
-search_dirs_pattern(dirsrv_snmp_t, dirsrv_var_run_t, dirsrv_var_run_t)
+manage_files_pattern(dirsrv_snmp_t, dirsrv_snmp_runtime_t, dirsrv_snmp_runtime_t)
+files_pid_filetrans(dirsrv_snmp_t, dirsrv_snmp_runtime_t, { file sock_file })
+search_dirs_pattern(dirsrv_snmp_t, dirsrv_runtime_t, dirsrv_runtime_t)
 
 # log file
 manage_files_pattern(dirsrv_snmp_t, dirsrv_var_log_t, dirsrv_snmp_var_log_t);

diff --git a/policy/modules/contrib/nginx.if b/policy/modules/contrib/nginx.if
index ebef6e75..dbd9bcbe 100644
--- a/policy/modules/contrib/nginx.if
+++ b/policy/modules/contrib/nginx.if
@@ -81,7 +81,7 @@ interface(`nginx_domtrans',`
 #
 interface(`nginx_admin',`
 	gen_require(`
-		type nginx_t, nginx_conf_t, nginx_log_t, nginx_var_lib_t, nginx_var_run_t;
+		type nginx_t, nginx_conf_t, nginx_log_t, nginx_var_lib_t, nginx_runtime_t;
 		type nginx_exec_t;
 	')
 
@@ -100,5 +100,5 @@ interface(`nginx_admin',`
 	admin_pattern($1, nginx_log_t)
 
 	files_list_pids($1)
-	admin_pattern($1, nginx_var_run_t)
+	admin_pattern($1, nginx_runtime_t)
 ')

diff --git a/policy/modules/contrib/nginx.te b/policy/modules/contrib/nginx.te
index be59babb..1818be85 100644
--- a/policy/modules/contrib/nginx.te
+++ b/policy/modules/contrib/nginx.te
@@ -69,8 +69,8 @@ type nginx_var_lib_t;
 files_type(nginx_var_lib_t)
 
 # pid files
-type nginx_var_run_t;
-files_pid_file(nginx_var_run_t)
+type nginx_runtime_t alias nginx_var_run_t;
+files_pid_file(nginx_runtime_t)
 
 ########################################
 #
@@ -92,9 +92,9 @@ logging_log_filetrans(nginx_t, nginx_log_t, { file dir })
 
 
 # pid file
-manage_dirs_pattern(nginx_t, nginx_var_run_t, nginx_var_run_t)
-manage_files_pattern(nginx_t, nginx_var_run_t, nginx_var_run_t)
-files_pid_filetrans(nginx_t, nginx_var_run_t, file)
+manage_dirs_pattern(nginx_t, nginx_runtime_t, nginx_runtime_t)
+manage_files_pattern(nginx_t, nginx_runtime_t, nginx_runtime_t)
+files_pid_filetrans(nginx_t, nginx_runtime_t, file)
 
 # tmp files
 manage_files_pattern(nginx_t, nginx_tmp_t, nginx_tmp_t)

diff --git a/policy/modules/contrib/phpfpm.fc b/policy/modules/contrib/phpfpm.fc
index f43358d7..da28e772 100644
--- a/policy/modules/contrib/phpfpm.fc
+++ b/policy/modules/contrib/phpfpm.fc
@@ -1,5 +1,5 @@
 /usr/lib/php.*/bin/php-fpm		gen_context(system_u:object_r:phpfpm_exec_t,s0)
-/run/php*-fpm/*.sock			gen_context(system_u:object_r:phpfpm_var_run_t,s0)
+/run/php*-fpm/*.sock			gen_context(system_u:object_r:phpfpm_runtime_t,s0)
 
 /var/log/php-fpm.log			gen_context(system_u:object_r:phpfpm_log_t,s0)
-/run/php-fpm.pid			gen_context(system_u:object_r:phpfpm_var_run_t,s0)
+/run/php-fpm.pid			gen_context(system_u:object_r:phpfpm_runtime_t,s0)

diff --git a/policy/modules/contrib/phpfpm.if b/policy/modules/contrib/phpfpm.if
index fee2c174..38f7c3e7 100644
--- a/policy/modules/contrib/phpfpm.if
+++ b/policy/modules/contrib/phpfpm.if
@@ -13,7 +13,7 @@
 interface(`phpfpm_admin',`
 	gen_require(`
 		type phpfpm_t;
-		type phpfpm_log_t, phpfpm_tmp_t, phpfpm_var_run_t;
+		type phpfpm_log_t, phpfpm_tmp_t, phpfpm_runtime_t;
 	')
 
 	allow $1 phpfpm_t:process { ptrace signal_perms };
@@ -26,7 +26,7 @@ interface(`phpfpm_admin',`
 	admin_pattern($1, phpfpm_tmp_t)
 
 	files_list_pids($1)
-	admin_pattern($1, phpfpm_var_run_t)
+	admin_pattern($1, phpfpm_runtime_t)
 ')
 
 ########################################
@@ -42,7 +42,7 @@ interface(`phpfpm_admin',`
 #
 interface(`phpfpm_stream_connect',`
 	gen_require(`
-		type phpfpm_t, phpfpm_var_run_t;
+		type phpfpm_t, phpfpm_runtime_t;
 	')
-	stream_connect_pattern($1, phpfpm_var_run_t, phpfpm_var_run_t, phpfpm_t)
+	stream_connect_pattern($1, phpfpm_runtime_t, phpfpm_runtime_t, phpfpm_t)
 ')

diff --git a/policy/modules/contrib/phpfpm.te b/policy/modules/contrib/phpfpm.te
index 826ba859..aefad850 100644
--- a/policy/modules/contrib/phpfpm.te
+++ b/policy/modules/contrib/phpfpm.te
@@ -19,8 +19,8 @@ init_daemon_domain(phpfpm_t, phpfpm_exec_t)
 type phpfpm_tmp_t;
 files_tmp_file(phpfpm_tmp_t)
 
-type phpfpm_var_run_t;
-files_pid_file(phpfpm_var_run_t)
+type phpfpm_runtime_t alias phpfpm_var_run_t;
+files_pid_file(phpfpm_runtime_t)
 
 type phpfpm_log_t;
 logging_log_file(phpfpm_log_t)
@@ -45,10 +45,10 @@ manage_files_pattern(phpfpm_t, phpfpm_tmp_t, phpfpm_tmp_t)
 manage_dirs_pattern(phpfpm_t, phpfpm_tmp_t, phpfpm_tmp_t)
 files_tmp_filetrans(phpfpm_t, phpfpm_tmp_t, {file dir})
 
-manage_files_pattern(phpfpm_t, phpfpm_var_run_t, phpfpm_var_run_t)
-files_pid_filetrans(phpfpm_t, phpfpm_var_run_t, { file sock_file })
+manage_files_pattern(phpfpm_t, phpfpm_runtime_t, phpfpm_runtime_t)
+files_pid_filetrans(phpfpm_t, phpfpm_runtime_t, { file sock_file })
 
-manage_sock_files_pattern(phpfpm_t, phpfpm_var_run_t, phpfpm_var_run_t)
+manage_sock_files_pattern(phpfpm_t, phpfpm_runtime_t, phpfpm_runtime_t)
 
 kernel_read_kernel_sysctls(phpfpm_t)
 

diff --git a/policy/modules/contrib/resolvconf.fc b/policy/modules/contrib/resolvconf.fc
index 651bbe0a..4e5df895 100644
--- a/policy/modules/contrib/resolvconf.fc
+++ b/policy/modules/contrib/resolvconf.fc
@@ -4,4 +4,4 @@
 
 /usr/sbin/resolvconf	--	gen_context(system_u:object_r:resolvconf_exec_t,s0)
 
-/run/resolvconf(/.*)?       gen_context(system_u:object_r:resolvconf_var_run_t,s0)
+/run/resolvconf(/.*)?       gen_context(system_u:object_r:resolvconf_runtime_t,s0)

diff --git a/policy/modules/contrib/resolvconf.if b/policy/modules/contrib/resolvconf.if
index 7a93eb6c..c6e53fb9 100644
--- a/policy/modules/contrib/resolvconf.if
+++ b/policy/modules/contrib/resolvconf.if
@@ -95,8 +95,8 @@ interface(`resolvconf_exec',`
 #
 interface(`resolvconf_generic_run_filetrans_run',`
 	gen_require(`
-		type resolvconf_var_run_t;
+		type resolvconf_runtime_t;
 	')
 
-	files_pid_filetrans($1, resolvconf_var_run_t, $2, $3)
+	files_pid_filetrans($1, resolvconf_runtime_t, $2, $3)
 ')

diff --git a/policy/modules/contrib/resolvconf.te b/policy/modules/contrib/resolvconf.te
index 58bb165d..18738a1f 100644
--- a/policy/modules/contrib/resolvconf.te
+++ b/policy/modules/contrib/resolvconf.te
@@ -11,8 +11,8 @@ attribute resolvconf_client;
 type resolvconf_conf_t;
 files_config_file(resolvconf_conf_t)
 
-type resolvconf_var_run_t;
-files_pid_file(resolvconf_var_run_t)
+type resolvconf_runtime_t alias resolvconf_var_run_t;
+files_pid_file(resolvconf_runtime_t)
 
 #########################################
 #
@@ -22,13 +22,13 @@ files_pid_file(resolvconf_var_run_t)
 allow resolvconf_t self:fifo_file manage_fifo_file_perms;
 allow resolvconf_t resolvconf_conf_t:file read_file_perms;
 
-manage_dirs_pattern(resolvconf_t, resolvconf_var_run_t, resolvconf_var_run_t)
-manage_files_pattern(resolvconf_t, resolvconf_var_run_t, resolvconf_var_run_t)
+manage_dirs_pattern(resolvconf_t, resolvconf_runtime_t, resolvconf_runtime_t)
+manage_files_pattern(resolvconf_t, resolvconf_runtime_t, resolvconf_runtime_t)
 
 corecmd_exec_bin(resolvconf_t)
 corecmd_exec_shell(resolvconf_t)
 
-files_pid_filetrans(resolvconf_t, resolvconf_var_run_t, { dir file })
+files_pid_filetrans(resolvconf_t, resolvconf_runtime_t, { dir file })
 files_read_etc_files(resolvconf_t)
 
 miscfiles_read_localization(resolvconf_t)

diff --git a/policy/modules/contrib/salt.fc b/policy/modules/contrib/salt.fc
index ccc8028f..1dbef661 100644
--- a/policy/modules/contrib/salt.fc
+++ b/policy/modules/contrib/salt.fc
@@ -16,11 +16,11 @@
 /var/log/salt/master	--	gen_context(system_u:object_r:salt_master_log_t,s0)
 /var/log/salt/minion	--	gen_context(system_u:object_r:salt_minion_log_t,s0)
 
-/run/salt	-d	gen_context(system_u:object_r:salt_var_run_t,s0)
-/run/salt/master(/.*)?	gen_context(system_u:object_r:salt_master_var_run_t,s0)
-/run/salt/minion(/.*)?	gen_context(system_u:object_r:salt_minion_var_run_t,s0)
-/run/salt-master\.pid	--	gen_context(system_u:object_r:salt_master_var_run_t,s0)
-/run/salt-minion\.pid	--	gen_context(system_u:object_r:salt_minion_var_run_t,s0)
+/run/salt	-d	gen_context(system_u:object_r:salt_runtime_t,s0)
+/run/salt/master(/.*)?	gen_context(system_u:object_r:salt_master_runtime_t,s0)
+/run/salt/minion(/.*)?	gen_context(system_u:object_r:salt_minion_runtime_t,s0)
+/run/salt-master\.pid	--	gen_context(system_u:object_r:salt_master_runtime_t,s0)
+/run/salt-minion\.pid	--	gen_context(system_u:object_r:salt_minion_runtime_t,s0)
 
 /var/cache/salt	-d	gen_context(system_u:object_r:salt_cache_t,s0)
 /var/cache/salt/master(/.*)?	gen_context(system_u:object_r:salt_master_cache_t,s0)

diff --git a/policy/modules/contrib/salt.if b/policy/modules/contrib/salt.if
index 27fefaef..a26d6380 100644
--- a/policy/modules/contrib/salt.if
+++ b/policy/modules/contrib/salt.if
@@ -21,8 +21,8 @@ interface(`salt_admin_master',`
 		type salt_master_initrc_exec_t;
 		type salt_master_exec_t;
 		type salt_etc_t;
-		type salt_var_run_t;
-		type salt_master_var_run_t;
+		type salt_runtime_t;
+		type salt_master_runtime_t;
 		attribute_role salt_master_roles;
 	')
 
@@ -40,8 +40,8 @@ interface(`salt_admin_master',`
 	files_list_etc($1)
 	admin_pattern($1, salt_etc_t, salt_etc_t)
 
-	allow $1 salt_var_run_t:dir search_dir_perms;
-	stream_connect_pattern($1, salt_master_var_run_t, salt_master_var_run_t, salt_master_t)
+	allow $1 salt_runtime_t:dir search_dir_perms;
+	stream_connect_pattern($1, salt_master_runtime_t, salt_master_runtime_t, salt_master_t)
 ')
 
 #########################################

diff --git a/policy/modules/contrib/salt.rst b/policy/modules/contrib/salt.rst
index 0268b95f..ad4ce7d6 100644
--- a/policy/modules/contrib/salt.rst
+++ b/policy/modules/contrib/salt.rst
@@ -124,13 +124,13 @@ salt_master_log_t
 salt_minion_log_t
   is used for the Salt minion log file (*/var/log/salt/minion*)
 
-salt_var_run_t
+salt_runtime_t
   is used for the parent directory for Salt run-time files (*/var/run/salt*)
 
-salt_master_var_run_t
+salt_master_runtime_t
   is used for the Salt master variable run-time files (*/var/run/salt/master*)
 
-salt_minion_var_run_t
+salt_minion_runtime_t
   is used for the Salt minion variable run-time files (*/var/run/salt/minion*)
 
 CONFIGURATION FILES

diff --git a/policy/modules/contrib/salt.te b/policy/modules/contrib/salt.te
index 2eb7b7db..5741c27a 100644
--- a/policy/modules/contrib/salt.te
+++ b/policy/modules/contrib/salt.te
@@ -48,9 +48,9 @@ files_tmp_file(salt_master_tmp_t)
 type salt_master_tmpfs_t;
 files_tmpfs_file(salt_master_tmpfs_t)
 
-type salt_master_var_run_t;
-init_daemon_pid_file(salt_master_var_run_t, file, "salt-master.pid")
-files_pid_file(salt_master_var_run_t)
+type salt_master_runtime_t alias salt_master_var_run_t;
+init_daemon_pid_file(salt_master_runtime_t, file, "salt-master.pid")
+files_pid_file(salt_master_runtime_t)
 
 type salt_minion_t;
 type salt_minion_exec_t;
@@ -75,9 +75,9 @@ files_tmp_file(salt_minion_tmp_t)
 type salt_minion_tmpfs_t;
 files_tmpfs_file(salt_minion_tmpfs_t)
 
-type salt_minion_var_run_t;
-init_daemon_pid_file(salt_minion_var_run_t, file, "salt-minion.pid")
-files_pid_file(salt_minion_var_run_t)
+type salt_minion_runtime_t alias salt_minion_var_run_t;
+init_daemon_pid_file(salt_minion_runtime_t, file, "salt-minion.pid")
+files_pid_file(salt_minion_runtime_t)
 
 type salt_cache_t;
 files_type(salt_cache_t)
@@ -94,8 +94,8 @@ files_type(salt_sls_t)
 type salt_pki_t;
 files_type(salt_pki_t)
 
-type salt_var_run_t;
-files_pid_file(salt_var_run_t)
+type salt_runtime_t alias salt_var_run_t;
+files_pid_file(salt_runtime_t)
 
 #########################################
 #
@@ -150,11 +150,11 @@ can_exec(salt_master_t, salt_master_tmp_t)
 allow salt_master_t salt_master_tmpfs_t:file { manage_file_perms map };
 fs_tmpfs_filetrans(salt_master_t, salt_master_tmpfs_t, file)
 
-# salt_master_var_run_t
-allow salt_master_t salt_master_var_run_t:file manage_file_perms;
-allow salt_master_t salt_master_var_run_t:sock_file manage_sock_file_perms;
-manage_dirs_pattern(salt_master_t, salt_var_run_t, salt_master_var_run_t)
-filetrans_pattern(salt_master_t, salt_var_run_t, salt_master_var_run_t, dir)
+# salt_master_runtime_t
+allow salt_master_t salt_master_runtime_t:file manage_file_perms;
+allow salt_master_t salt_master_runtime_t:sock_file manage_sock_file_perms;
+manage_dirs_pattern(salt_master_t, salt_runtime_t, salt_master_runtime_t)
+filetrans_pattern(salt_master_t, salt_runtime_t, salt_master_runtime_t, dir)
 
 # salt_pki_t
 create_dirs_pattern(salt_master_t, salt_etc_t, salt_pki_t)
@@ -164,10 +164,10 @@ filetrans_pattern(salt_master_t, salt_etc_t, salt_pki_t, dir, "pki")
 read_files_pattern(salt_master_t, salt_sls_t, salt_sls_t)
 allow salt_master_t salt_sls_t:dir list_dir_perms;
 
-# salt_var_run_t
-allow salt_master_t salt_var_run_t:dir create_dir_perms;
-files_pid_filetrans(salt_master_t, salt_var_run_t, dir)
-files_pid_filetrans(salt_master_t, salt_master_var_run_t, file, "salt-master.pid")
+# salt_runtime_t
+allow salt_master_t salt_runtime_t:dir create_dir_perms;
+files_pid_filetrans(salt_master_t, salt_runtime_t, dir)
+files_pid_filetrans(salt_master_t, salt_master_runtime_t, file, "salt-master.pid")
 
 kernel_read_network_state(salt_master_t)
 kernel_read_software_raid_state(salt_master_t)
@@ -269,20 +269,20 @@ can_exec(salt_minion_t, salt_minion_tmp_t)
 allow salt_minion_t salt_minion_tmpfs_t:file { manage_file_perms map };
 fs_tmpfs_filetrans(salt_minion_t, salt_minion_tmpfs_t, file)
 
-# salt_minion_var_run_t
-allow salt_minion_t salt_minion_var_run_t:file manage_file_perms;
-allow salt_minion_t salt_minion_var_run_t:sock_file manage_sock_file_perms;
-manage_dirs_pattern(salt_minion_t, salt_var_run_t, salt_minion_var_run_t)
-filetrans_pattern(salt_minion_t, salt_var_run_t, salt_minion_var_run_t, dir)
+# salt_minion_runtime_t
+allow salt_minion_t salt_minion_runtime_t:file manage_file_perms;
+allow salt_minion_t salt_minion_runtime_t:sock_file manage_sock_file_perms;
+manage_dirs_pattern(salt_minion_t, salt_runtime_t, salt_minion_runtime_t)
+filetrans_pattern(salt_minion_t, salt_runtime_t, salt_minion_runtime_t, dir)
 
 # salt_pki_t
 create_dirs_pattern(salt_minion_t, salt_etc_t, salt_pki_t)
 filetrans_pattern(salt_minion_t, salt_etc_t, salt_pki_t, dir, "pki")
 
-# salt_var_run_t
-allow salt_minion_t salt_var_run_t:dir create_dir_perms;
-files_pid_filetrans(salt_minion_t, salt_var_run_t, dir)
-files_pid_filetrans(salt_minion_t, salt_minion_var_run_t, file, "salt-minion.pid")
+# salt_runtime_t
+allow salt_minion_t salt_runtime_t:dir create_dir_perms;
+files_pid_filetrans(salt_minion_t, salt_runtime_t, dir)
+files_pid_filetrans(salt_minion_t, salt_minion_runtime_t, file, "salt-minion.pid")
 
 kernel_read_network_state(salt_minion_t)
 kernel_read_software_raid_state(salt_minion_t)

diff --git a/policy/modules/contrib/vde.fc b/policy/modules/contrib/vde.fc
index fa0b6b28..bea4fd72 100644
--- a/policy/modules/contrib/vde.fc
+++ b/policy/modules/contrib/vde.fc
@@ -1,5 +1,5 @@
 /etc/rc\.d/init\.d/vde	--	gen_context(system_u:object_r:vde_initrc_exec_t,s0)
 /usr/bin/vde_switch	--	gen_context(system_u:object_r:vde_exec_t,s0)
 /usr/sbin/vde_tunctl	--	gen_context(system_u:object_r:vde_exec_t,s0)
-/run/vde\.ctl(/.*)?		gen_context(system_u:object_r:vde_var_run_t,s0)
+/run/vde\.ctl(/.*)?		gen_context(system_u:object_r:vde_runtime_t,s0)
 /tmp/vde.[0-9-]*	-s	gen_context(system_u:object_r:vde_tmp_t,s0)

diff --git a/policy/modules/contrib/vde.if b/policy/modules/contrib/vde.if
index 00b31b4c..24bc31a9 100644
--- a/policy/modules/contrib/vde.if
+++ b/policy/modules/contrib/vde.if
@@ -19,7 +19,7 @@
 interface(`vde_role',`
 	gen_require(`
 		type vde_t, vde_tmp_t;
-		type vde_var_run_t;
+		type vde_runtime_t;
 		type vde_initrc_exec_t, vde_exec_t;
 	')
 
@@ -49,10 +49,10 @@ interface(`vde_role',`
 #
 interface(`vde_connect',`
 	gen_require(`
-		type vde_t, vde_var_run_t, vde_tmp_t;
+		type vde_t, vde_runtime_t, vde_tmp_t;
 	')
 	
-	allow $1 vde_var_run_t:sock_file write_sock_file_perms;
+	allow $1 vde_runtime_t:sock_file write_sock_file_perms;
 	allow $1 vde_t:unix_stream_socket { connectto };
 	allow $1 vde_t:unix_dgram_socket { sendto };
 	allow vde_t $1:unix_dgram_socket { sendto };

diff --git a/policy/modules/contrib/vde.te b/policy/modules/contrib/vde.te
index 56f668d7..8e935560 100644
--- a/policy/modules/contrib/vde.te
+++ b/policy/modules/contrib/vde.te
@@ -15,8 +15,8 @@ init_script_file(vde_initrc_exec_t)
 type vde_var_lib_t;
 files_type(vde_var_lib_t)
 
-type vde_var_run_t;
-files_pid_file(vde_var_run_t)
+type vde_runtime_t alias vde_var_run_t;
+files_pid_file(vde_runtime_t)
 
 type vde_tmp_t;
 files_tmp_file(vde_tmp_t)
@@ -34,10 +34,10 @@ allow vde_t self:unix_stream_socket {  create_stream_socket_perms connectto };
 allow vde_t self:unix_dgram_socket create_socket_perms;
 files_tmp_filetrans(vde_t, vde_tmp_t, sock_file)
 
-manage_dirs_pattern(vde_t, vde_var_run_t, vde_var_run_t)
-manage_files_pattern(vde_t, vde_var_run_t, vde_var_run_t)
-manage_sock_files_pattern(vde_t, vde_var_run_t, vde_var_run_t)
-files_pid_filetrans(vde_t, vde_var_run_t, { dir file sock_file unix_dgram_socket })
+manage_dirs_pattern(vde_t, vde_runtime_t, vde_runtime_t)
+manage_files_pattern(vde_t, vde_runtime_t, vde_runtime_t)
+manage_sock_files_pattern(vde_t, vde_runtime_t, vde_runtime_t)
+files_pid_filetrans(vde_t, vde_runtime_t, { dir file sock_file unix_dgram_socket })
 
 files_read_etc_files(vde_t)
 

diff --git a/policy/modules/services/apache.te b/policy/modules/services/apache.te
index 715cc2d6..bda92f4a 100644
--- a/policy/modules/services/apache.te
+++ b/policy/modules/services/apache.te
@@ -1487,8 +1487,8 @@ ifdef(`distro_gentoo',`
 ## </desc>
 gen_tunable(hiawatha_httpd, false)
 
-init_daemon_pid_file(httpd_var_run_t, dir, "apache_ssl_mutex")
-init_daemon_pid_file(httpd_var_run_t, dir, "apache2")
+init_daemon_pid_file(httpd_runtime_t, dir, "apache_ssl_mutex")
+init_daemon_pid_file(httpd_runtime_t, dir, "apache2")
 
 tunable_policy(`hiawatha_httpd',`
 	# bug 513362

diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te
index 6ceaf130..334ae633 100644
--- a/policy/modules/services/clamav.te
+++ b/policy/modules/services/clamav.te
@@ -330,5 +330,5 @@ optional_policy(`
 ')
 
 ifdef(`distro_gentoo',`
-	init_daemon_pid_file(clamd_var_run_t, dir, "clamav")
+	init_daemon_pid_file(clamd_runtime_t, dir, "clamav")
 ')

diff --git a/policy/modules/services/courier.te b/policy/modules/services/courier.te
index dce1451b..5a4c7ea7 100644
--- a/policy/modules/services/courier.te
+++ b/policy/modules/services/courier.te
@@ -201,7 +201,7 @@ ifdef(`distro_gentoo',`
 	#
 
 	# Startup of courier-imapd creates /var/run/imapd.pid.lock and imapd.lock (bug 534030)
-	files_pid_filetrans(courier_tcpd_t, courier_var_run_t, file)
+	files_pid_filetrans(courier_tcpd_t, courier_runtime_t, file)
 
 	########################################
 	#

diff --git a/policy/modules/services/cron.fc b/policy/modules/services/cron.fc
index 6fdcdb78..ee64e81e 100644
--- a/policy/modules/services/cron.fc
+++ b/policy/modules/services/cron.fc
@@ -5,7 +5,7 @@
 
 /usr/bin/anacron	--	gen_context(system_u:object_r:anacron_exec_t,s0)
 #/usr/bin/at	--	gen_context(system_u:object_r:crontab_exec_t,s0)
-/usr/bin/atd	--	gen_context(system_u:object_r:crond_exec_t,s0)
+#/usr/bin/atd	--	gen_context(system_u:object_r:crond_exec_t,s0)
 /usr/bin/cron(d)?	--	gen_context(system_u:object_r:crond_exec_t,s0)
 /usr/bin/fcron	--	gen_context(system_u:object_r:crond_exec_t,s0)
 /usr/bin/fcronsighup	--	gen_context(system_u:object_r:crontab_exec_t,s0)
@@ -29,7 +29,6 @@
 /var/log/rpmpkgs.*	--	gen_context(system_u:object_r:cron_log_t,s0)
 
 /run/anacron\.pid	--	gen_context(system_u:object_r:crond_runtime_t,s0)
-/run/atd\.pid	--	gen_context(system_u:object_r:crond_runtime_t,s0)
 /run/cron(d)?\.pid	--	gen_context(system_u:object_r:crond_runtime_t,s0)
 /run/cron(d)?\.reboot	--	gen_context(system_u:object_r:crond_runtime_t,s0)
 /run/fcron\.fifo	-s	gen_context(system_u:object_r:crond_runtime_t,s0)
@@ -37,7 +36,6 @@
 /run/.*cron.*	--	gen_context(system_u:object_r:crond_runtime_t,s0)
 
 /var/spool/anacron(/.*)?	gen_context(system_u:object_r:system_cron_spool_t,s0)
-/var/spool/at(/.*)?	gen_context(system_u:object_r:user_cron_spool_t,s0)
 
 /var/spool/cron	-d	gen_context(system_u:object_r:cron_spool_t,s0)
 #/var/spool/cron/root	--	gen_context(system_u:object_r:sysadm_cron_spool_t,s0)

diff --git a/policy/modules/services/cron.rst b/policy/modules/services/cron.rst
index a35c26a4..773af37b 100644
--- a/policy/modules/services/cron.rst
+++ b/policy/modules/services/cron.rst
@@ -208,7 +208,7 @@ cron_var_lib_t
 crond_tmp_t
   is used for the temporary files created/managed by the cron daemon
 
-crond_var_run_t
+crond_runtime_t
   is used for the variable runtime information of the cron daemon
 
 POLICY

diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if
index 7337fcd3..6169143e 100644
--- a/policy/modules/services/dbus.if
+++ b/policy/modules/services/dbus.if
@@ -607,7 +607,7 @@ interface(`dbus_unconfined',`
 
 ########################################
 ## <summary>
-##	Create resources in /run or /var/run with the system_dbusd_var_run_t
+##	Create resources in /run or /var/run with the system_dbusd_runtime_t
 ##	label. This method is deprecated in favor of the init_daemon_run_dir
 ##	call.
 ## </summary>
@@ -633,7 +633,7 @@ interface(`dbus_generic_pid_filetrans_system_dbusd_var_run',`
 
 ########################################
 ## <summary>
-##	Create directories with the system_dbusd_var_run_t label
+##	Create directories with the system_dbusd_runtime_t label
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -643,10 +643,10 @@ interface(`dbus_generic_pid_filetrans_system_dbusd_var_run',`
 #
 interface(`dbus_create_system_dbusd_var_run_dirs',`
 	gen_require(`
-		type system_dbusd_var_run_t;
+		type system_dbusd_runtime_t;
 	')
 
-	create_dirs_pattern($1, system_dbusd_var_run_t, system_dbusd_var_run_t)
+	create_dirs_pattern($1, system_dbusd_runtime_t, system_dbusd_runtime_t)
 ')
 
 

diff --git a/policy/modules/services/fail2ban.te b/policy/modules/services/fail2ban.te
index 50264730..067d5caf 100644
--- a/policy/modules/services/fail2ban.te
+++ b/policy/modules/services/fail2ban.te
@@ -163,9 +163,9 @@ ifdef(`distro_gentoo',`
 	files_dontaudit_write_usr_dirs(fail2ban_t)
 
 	# Fix bug 534256 - Startup fails without these
-	allow fail2ban_client_t fail2ban_var_run_t:dir write;
+	allow fail2ban_client_t fail2ban_runtime_t:dir write;
 
-	init_daemon_pid_file(fail2ban_var_run_t, dir, "fail2ban")
+	init_daemon_pid_file(fail2ban_runtime_t, dir, "fail2ban")
 	init_use_script_ptys(fail2ban_client_t)
 ')
 

diff --git a/policy/modules/services/ldap.te b/policy/modules/services/ldap.te
index 50d7769d..31b895d7 100644
--- a/policy/modules/services/ldap.te
+++ b/policy/modules/services/ldap.te
@@ -154,7 +154,7 @@ optional_policy(`
 ')
 
 ifdef(`distro_gentoo',`
-	init_daemon_pid_file(slapd_var_run_t, dir, "openldap")
+	init_daemon_pid_file(slapd_runtime_t, dir, "openldap")
 
 	########################################
 	#

diff --git a/policy/modules/services/munin.rst b/policy/modules/services/munin.rst
index 220c75e1..207c2f19 100644
--- a/policy/modules/services/munin.rst
+++ b/policy/modules/services/munin.rst
@@ -71,7 +71,7 @@ munin_plugin_state_t
 munin_var_lib_t
   is used for the variable information used by munin
 
-munin_var_run_t
+munin_runtime_t
   is used for the variable runtime state information of munin
 
 POLICY

diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if
index 82b5f1e2..bf5c0b70 100644
--- a/policy/modules/services/mysql.if
+++ b/policy/modules/services/mysql.if
@@ -449,10 +449,10 @@ interface(`mysql_admin',`
 #
 interface(`mysql_setattr_run_dirs',`
 	gen_require(`
-		type mysqld_var_run_t;
+		type mysqld_runtime_t;
 	')
 
-	setattr_dirs_pattern($1, mysqld_var_run_t, mysqld_var_run_t)
+	setattr_dirs_pattern($1, mysqld_runtime_t, mysqld_runtime_t)
 ')
 
 #######################################
@@ -467,10 +467,10 @@ interface(`mysql_setattr_run_dirs',`
 #
 interface(`mysql_create_run_dirs',`
 	gen_require(`
-		type mysqld_var_run_t;
+		type mysqld_runtime_t;
 	')
 
-	create_dirs_pattern($1, mysqld_var_run_t, mysqld_var_run_t)
+	create_dirs_pattern($1, mysqld_runtime_t, mysqld_runtime_t)
 ')
 
 #######################################

diff --git a/policy/modules/services/networkmanager.fc b/policy/modules/services/networkmanager.fc
index d37b86de..e7c1b89e 100644
--- a/policy/modules/services/networkmanager.fc
+++ b/policy/modules/services/networkmanager.fc
@@ -47,4 +47,4 @@
 /run/nm-dns-dnsmasq\.conf	--	gen_context(system_u:object_r:NetworkManager_runtime_t,s0)
 /run/wpa_supplicant(/.*)?	gen_context(system_u:object_r:NetworkManager_runtime_t,s0)
 /run/wpa_supplicant-global	-s	gen_context(system_u:object_r:NetworkManager_runtime_t,s0)
-/run/wpa_cli-.*		--	gen_context(system_u:object_r:wpa_cli_var_run_t,s0)
+/run/wpa_cli-.*		--	gen_context(system_u:object_r:wpa_cli_runtime_t,s0)

diff --git a/policy/modules/services/networkmanager.te b/policy/modules/services/networkmanager.te
index 309e3363..e3af7618 100644
--- a/policy/modules/services/networkmanager.te
+++ b/policy/modules/services/networkmanager.te
@@ -38,8 +38,8 @@ type wpa_cli_exec_t;
 init_system_domain(wpa_cli_t, wpa_cli_exec_t)
 
 ifdef(`distro_gentoo',`
-	type wpa_cli_var_run_t;
-	files_pid_file(wpa_cli_var_run_t)
+	type wpa_cli_runtime_t alias wpa_cli_var_run_t;
+	files_pid_file(wpa_cli_runtime_t)
 ')
 
 ########################################
@@ -425,8 +425,8 @@ ifdef(`distro_gentoo',`
 	#
 	# wpa_cli_t policy
 	#
-	manage_files_pattern(wpa_cli_t, wpa_cli_var_run_t, wpa_cli_var_run_t)
-	files_pid_filetrans(wpa_cli_t, wpa_cli_var_run_t, file)
+	manage_files_pattern(wpa_cli_t, wpa_cli_runtime_t, wpa_cli_runtime_t)
+	files_pid_filetrans(wpa_cli_t, wpa_cli_runtime_t, file)
 
 	corecmd_exec_bin(wpa_cli_t)
 	corecmd_exec_shell(wpa_cli_t)

diff --git a/policy/modules/services/ntp.fc b/policy/modules/services/ntp.fc
index 623451cf..b16c5739 100644
--- a/policy/modules/services/ntp.fc
+++ b/policy/modules/services/ntp.fc
@@ -39,7 +39,7 @@
 /var/log/ntp.*				--	gen_context(system_u:object_r:ntpd_log_t,s0)
 /var/log/ntpstats(/.*)?				gen_context(system_u:object_r:ntpd_log_t,s0)
 /var/log/xntpd.*			--	gen_context(system_u:object_r:ntpd_log_t,s0)
-/run/ntpd\.sock	-s	gen_context(system_u:object_r:ntpd_var_run_t,s0)
+/run/ntpd\.sock	-s	gen_context(system_u:object_r:ntpd_pid_t,s0)
 
 ifdef(`distro_gentoo',`
 /var/lib/openntpd/ntpd.drift	--	gen_context(system_u:object_r:ntp_drift_t,s0)

diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
index 2bf22f72..2b34a4f9 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -477,5 +477,5 @@ optional_policy(`
 ')
 
 ifdef(`distro_gentoo',`
-	init_daemon_pid_file(pam_var_run_t, dir, "sepermit")
+	init_daemon_pid_file(pam_runtime_t, dir, "sepermit")
 ')

diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index fe9b8535..4d152ee1 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -1383,8 +1383,8 @@ ifdef(`distro_gentoo',`
 	read_files_pattern(initrc_t, init_script_readable, init_script_readable)
 	read_lnk_files_pattern(initrc_t, init_script_readable, init_script_readable)
 
-	manage_dirs_pattern(initrc_t, initrc_var_run_t, initrc_var_run_t)
-	files_pid_filetrans(initrc_t, initrc_var_run_t, dir)
+	manage_dirs_pattern(initrc_t, initrc_runtime_t, initrc_runtime_t)
+	files_pid_filetrans(initrc_t, initrc_runtime_t, dir)
 
 	kernel_write_proc_files(initrc_t)
 

diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
index 857c6f23..6b705bfe 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -401,7 +401,7 @@ ifdef(`distro_gentoo',`
 	# Bug 529430 comment 6
 	create_dirs_pattern(lvm_t, lvm_etc_t, lvm_etc_t)
 	# Bug 529430 comment 8
-	manage_fifo_files_pattern(lvm_t, lvm_var_run_t, lvm_var_run_t)
+	manage_fifo_files_pattern(lvm_t, lvm_runtime_t, lvm_runtime_t)
 
 	# Bug 615300
 	init_read_script_pipes(lvm_t)

diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
index df4193d6..33729a23 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -216,6 +216,6 @@ ifdef(`distro_gentoo',`
 	files_manage_kernel_modules(kmod_t)
 
 	# for /run/tmpfiles.d/kmod.conf
-	tmpfiles_create_var_run_files(kmod_t)
-	filetrans_add_pattern(kmod_t, tmpfiles_var_run_t, kmod_tmpfiles_conf_t, file)
+	tmpfiles_create_runtime_files(kmod_t)
+	filetrans_add_pattern(kmod_t, tmpfiles_runtime_t, kmod_tmpfiles_conf_t, file)
 ')

diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
index 69b6ce88..1a8f7281 100644
--- a/policy/modules/system/sysnetwork.fc
+++ b/policy/modules/system/sysnetwork.fc
@@ -93,6 +93,6 @@ ifdef(`distro_debian',`
 
 ifdef(`distro_gentoo',`
 /usr/lib/dhcpcd/dhcpcd-run-hooks	--	gen_context(system_u:object_r:dhcpc_script_exec_t,s0)
-/run/dhcpcd\.sock			-s	gen_context(system_u:object_r:dhcpc_var_run_t,s0)
-/run/dhcpcd\.unpriv\.sock		-s	gen_context(system_u:object_r:dhcpc_var_run_t,s0)
+/run/dhcpcd\.sock			-s	gen_context(system_u:object_r:dhcpc_runtime_t,s0)
+/run/dhcpcd\.unpriv\.sock		-s	gen_context(system_u:object_r:dhcpc_runtime_t,s0)
 ')

diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index bacb3794..bb54a544 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -434,14 +434,14 @@ ifdef(`distro_gentoo',`
 	allow dhcpc_t self:netlink_socket client_stream_socket_perms;
 
 	# Allow dhcpcd to set its control sockets
-	allow dhcpc_t dhcpc_var_run_t:sock_file manage_sock_file_perms;
+	allow dhcpc_t dhcpc_runtime_t:sock_file manage_sock_file_perms;
 
 	# Allow dhcpc to set hostname (/proc/sys/kernel/hostname)
 	allow dhcpc_t self:capability sys_admin;
 	kernel_rw_kernel_sysctl(dhcpc_t)
 
 	# Fixes bug 468878
-	files_pid_filetrans(dhcpc_t, dhcpc_var_run_t, sock_file)
+	files_pid_filetrans(dhcpc_t, dhcpc_runtime_t, sock_file)
 	allow dhcpc_t self:unix_stream_socket { create_stream_socket_perms connectto };
 
 	optional_policy(`
@@ -479,9 +479,9 @@ ifdef(`distro_gentoo',`
 	manage_files_pattern(dhcpc_script_t, dhcpc_script_tmp_t, dhcpc_script_tmp_t)
 	files_tmp_filetrans(dhcpc_script_t, dhcpc_script_tmp_t, { file dir })
 
-	manage_files_pattern(dhcpc_script_t, dhcpc_var_run_t, dhcpc_var_run_t)
-	create_dirs_pattern(dhcpc_script_t, dhcpc_var_run_t, dhcpc_var_run_t)
-	files_pid_filetrans(dhcpc_script_t, dhcpc_var_run_t, { file dir })
+	manage_files_pattern(dhcpc_script_t, dhcpc_runtime_t, dhcpc_runtime_t)
+	create_dirs_pattern(dhcpc_script_t, dhcpc_runtime_t, dhcpc_runtime_t)
+	files_pid_filetrans(dhcpc_script_t, dhcpc_runtime_t, { file dir })
 
 	kernel_read_network_state(dhcpc_script_t)
 	kernel_read_system_state(dhcpc_script_t)

diff --git a/policy/modules/system/tmpfiles.fc b/policy/modules/system/tmpfiles.fc
index 16d821a8..5a13949c 100644
--- a/policy/modules/system/tmpfiles.fc
+++ b/policy/modules/system/tmpfiles.fc
@@ -1,7 +1,7 @@
 
 ifndef(`init_systemd',`
 /etc/tmpfiles.d(/.*)?				gen_context(system_u:object_r:tmpfiles_conf_t,s0)
-/run/tmpfiles.d(/.*)?				gen_context(system_u:object_r:tmpfiles_var_run_t,s0)
+/run/tmpfiles.d(/.*)?				gen_context(system_u:object_r:tmpfiles_runtime_t,s0)
 ')
 
 /usr/bin/tmpfiles				--	gen_context(system_u:object_r:tmpfiles_exec_t,s0)

diff --git a/policy/modules/system/tmpfiles.if b/policy/modules/system/tmpfiles.if
index 09897fc0..361dc8c4 100644
--- a/policy/modules/system/tmpfiles.if
+++ b/policy/modules/system/tmpfiles.if
@@ -10,14 +10,14 @@
 ##	</summary>
 ## </param>
 #
-interface(`tmpfiles_read_var_run',`
+interface(`tmpfiles_read_runtime',`
 	gen_require(`
-		type tmpfiles_var_run_t;
+		type tmpfiles_runtime_t;
 	')
 
 	files_search_pids($1)
-	allow $1 tmpfiles_var_run_t:dir list_dir_perms;
-	allow $1 tmpfiles_var_run_t:file read_file_perms;
+	allow $1 tmpfiles_runtime_t:dir list_dir_perms;
+	allow $1 tmpfiles_runtime_t:file read_file_perms;
 ')
 
 ########################################
@@ -30,14 +30,14 @@ interface(`tmpfiles_read_var_run',`
 ##	</summary>
 ## </param>
 #
-interface(`tmpfiles_create_var_run_files',`
+interface(`tmpfiles_create_runtime_files',`
 	gen_require(`
-		type tmpfiles_var_run_t;
+		type tmpfiles_runtime_t;
 	')
 
-	create_files_pattern($1, tmpfiles_var_run_t, tmpfiles_var_run_t)
+	create_files_pattern($1, tmpfiles_runtime_t, tmpfiles_runtime_t)
 
-	tmpfiles_read_var_run($1)
+	tmpfiles_read_runtime($1)
 ')
 
 ########################################
@@ -50,14 +50,14 @@ interface(`tmpfiles_create_var_run_files',`
 ##	</summary>
 ## </param>
 #
-interface(`tmpfiles_write_var_run_files',`
+interface(`tmpfiles_write_runtime_files',`
 	gen_require(`
-		type tmpfiles_var_run_t;
+		type tmpfiles_runtime_t;
 	')
 
-	write_files_pattern($1, tmpfiles_var_run_t, tmpfiles_var_run_t)
+	write_files_pattern($1, tmpfiles_runtime_t, tmpfiles_runtime_t)
 
-	tmpfiles_read_var_run($1)
+	tmpfiles_read_runtime($1)
 ')
 
 ########################################
@@ -70,14 +70,14 @@ interface(`tmpfiles_write_var_run_files',`
 ##	</summary>
 ## </param>
 #
-interface(`tmpfiles_manage_var_run_files',`
+interface(`tmpfiles_manage_runtime_files',`
 	gen_require(`
-		type tmpfiles_var_run_t;
+		type tmpfiles_runtime_t;
 	')
 
-	tmpfiles_read_var_run($1)
+	tmpfiles_read_runtime($1)
 
-	manage_files_pattern($1, tmpfiles_var_run_t, tmpfiles_var_run_t)
+	manage_files_pattern($1, tmpfiles_runtime_t, tmpfiles_runtime_t)
 ')
 
 ########################################

diff --git a/policy/modules/system/tmpfiles.rst b/policy/modules/system/tmpfiles.rst
index 748032b4..a445072a 100644
--- a/policy/modules/system/tmpfiles.rst
+++ b/policy/modules/system/tmpfiles.rst
@@ -49,7 +49,7 @@ tmpfiles_conf_t
 tmpfiles_exec_t
   is used as entrypoint for the tmpfiles application
 
-tmpfiles_var_run_t
+tmpfiles_runtime_t
   is used as the variable run-time data used by the tmpfiles application
 
 POLICY

diff --git a/policy/modules/system/tmpfiles.te b/policy/modules/system/tmpfiles.te
index 9063ca3e..57be1edc 100644
--- a/policy/modules/system/tmpfiles.te
+++ b/policy/modules/system/tmpfiles.te
@@ -23,8 +23,8 @@ init_daemon_domain(tmpfiles_t, tmpfiles_exec_t)
 type tmpfiles_conf_t;
 files_config_file(tmpfiles_conf_t)
 
-type tmpfiles_var_run_t;
-files_pid_file(tmpfiles_var_run_t)
+type tmpfiles_runtime_t alias tmpfiles_var_run_t;
+files_pid_file(tmpfiles_runtime_t)
 
 
 ########################################
@@ -42,8 +42,8 @@ allow tmpfiles_t tmpfiles_exec_t:file execute_no_trans;
 list_dirs_pattern(tmpfiles_t, tmpfiles_conf_t, tmpfiles_conf_t)
 read_files_pattern(tmpfiles_t, tmpfiles_conf_t, tmpfiles_conf_t)
 
-manage_files_pattern(tmpfiles_t, tmpfiles_var_run_t, tmpfiles_var_run_t)
-manage_dirs_pattern(tmpfiles_t, tmpfiles_var_run_t, tmpfiles_var_run_t)
+manage_files_pattern(tmpfiles_t, tmpfiles_runtime_t, tmpfiles_runtime_t)
+manage_dirs_pattern(tmpfiles_t, tmpfiles_runtime_t, tmpfiles_runtime_t)
 
 corecmd_exec_bin(tmpfiles_t)
 corecmd_exec_shell(tmpfiles_t)


^ permalink raw reply related	[flat|nested] only message in thread

only message in thread, other threads:[~2019-12-24 10:00 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-12-24 10:00 [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/, policy/modules/services/, policy/modules/admin/, Jason Zaman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox