diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index 85fde715..ac9e8064 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -40178,7 +40178,7 @@ index db75976..e4eb903 100644
+
+/var/run/user(/.*)? gen_context(system_u:object_r:user_tmp_t,s0)
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 9dc60c6..0deded7 100644
+index 9dc60c6..daee32c 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -43026,7 +43026,7 @@ index 9dc60c6..0deded7 100644
## Create keys for all user domains.
##
##
-@@ -3435,4 +4327,1673 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3435,4 +4327,1671 @@ interface(`userdom_dbus_send_all_users',`
')
allow $1 userdomain:dbus send_msg;
@@ -43756,17 +43756,15 @@ index 9dc60c6..0deded7 100644
+ type texlive_home_t;
+ ')
+
-+ userdom_search_user_home_dirs($1)
-+
-+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2012")
-+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2013")
-+ userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2014")
-+ manage_dirs_pattern($1, texlive_home_t, texlive_home_t)
-+ manage_files_pattern($1, texlive_home_t, texlive_home_t)
++ userdom_search_user_home_dirs($1)
++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2012")
++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2013")
++ userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2014")
++ manage_dirs_pattern($1, texlive_home_t, texlive_home_t)
++ manage_files_pattern($1, texlive_home_t, texlive_home_t)
+ manage_lnk_files_pattern($1, texlive_home_t, texlive_home_t)
+')
+
-+
+########################################
+##
+## Do not audit attempts to write all user home content files.