diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch index 85fde715..ac9e8064 100644 --- a/policy-rawhide-base.patch +++ b/policy-rawhide-base.patch @@ -40178,7 +40178,7 @@ index db75976..e4eb903 100644 + +/var/run/user(/.*)? gen_context(system_u:object_r:user_tmp_t,s0) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if -index 9dc60c6..0deded7 100644 +index 9dc60c6..daee32c 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -30,9 +30,11 @@ template(`userdom_base_user_template',` @@ -43026,7 +43026,7 @@ index 9dc60c6..0deded7 100644 ## Create keys for all user domains. ## ## -@@ -3435,4 +4327,1673 @@ interface(`userdom_dbus_send_all_users',` +@@ -3435,4 +4327,1671 @@ interface(`userdom_dbus_send_all_users',` ') allow $1 userdomain:dbus send_msg; @@ -43756,17 +43756,15 @@ index 9dc60c6..0deded7 100644 + type texlive_home_t; + ') + -+ userdom_search_user_home_dirs($1) -+ -+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2012") -+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2013") -+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2014") -+ manage_dirs_pattern($1, texlive_home_t, texlive_home_t) -+ manage_files_pattern($1, texlive_home_t, texlive_home_t) ++ userdom_search_user_home_dirs($1) ++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2012") ++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2013") ++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2014") ++ manage_dirs_pattern($1, texlive_home_t, texlive_home_t) ++ manage_files_pattern($1, texlive_home_t, texlive_home_t) + manage_lnk_files_pattern($1, texlive_home_t, texlive_home_t) +') + -+ +######################################## +## +## Do not audit attempts to write all user home content files.