diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index e8a0f00..48aad36 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -9454,7 +9454,7 @@ index b876c48..27f60c6 100644
+/nsr(/.*)? gen_context(system_u:object_r:var_t,s0)
+/nsr/logs(/.*)? gen_context(system_u:object_r:var_log_t,s0)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
-index f962f76..42fc031 100644
+index f962f76..ae94e80 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -19,6 +19,136 @@
@@ -10060,7 +10060,32 @@ index f962f76..42fc031 100644
')
#############################################
-@@ -1691,6 +2043,24 @@ interface(`files_dontaudit_list_all_mountpoints',`
+@@ -1601,6 +1953,24 @@ interface(`files_setattr_all_mountpoints',`
+
+ ########################################
+ ##
++## Set the attributes of all mount points.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`files_relabelto_all_mountpoints',`
++ gen_require(`
++ attribute mountpoint;
++ ')
++
++ allow $1 mountpoint:dir relabelto;
++')
++
++########################################
++##
+ ## Do not audit attempts to set the attributes on all mount points.
+ ##
+ ##
+@@ -1691,6 +2061,24 @@ interface(`files_dontaudit_list_all_mountpoints',`
########################################
##
@@ -10085,7 +10110,7 @@ index f962f76..42fc031 100644
## Do not audit attempts to write to mount points.
##
##
-@@ -1709,6 +2079,42 @@ interface(`files_dontaudit_write_all_mountpoints',`
+@@ -1709,6 +2097,42 @@ interface(`files_dontaudit_write_all_mountpoints',`
########################################
##
@@ -10128,7 +10153,7 @@ index f962f76..42fc031 100644
## List the contents of the root directory.
##
##
-@@ -1725,6 +2131,23 @@ interface(`files_list_root',`
+@@ -1725,6 +2149,23 @@ interface(`files_list_root',`
allow $1 root_t:dir list_dir_perms;
allow $1 root_t:lnk_file { read_lnk_file_perms ioctl lock };
')
@@ -10152,7 +10177,7 @@ index f962f76..42fc031 100644
########################################
##
-@@ -1765,6 +2188,26 @@ interface(`files_dontaudit_rw_root_dir',`
+@@ -1765,6 +2206,26 @@ interface(`files_dontaudit_rw_root_dir',`
########################################
##
@@ -10179,7 +10204,7 @@ index f962f76..42fc031 100644
## Create an object in the root directory, with a private
## type using a type transition.
##
-@@ -1892,25 +2335,25 @@ interface(`files_delete_root_dir_entry',`
+@@ -1892,25 +2353,25 @@ interface(`files_delete_root_dir_entry',`
########################################
##
@@ -10211,7 +10236,7 @@ index f962f76..42fc031 100644
##
##
##
-@@ -1923,7 +2366,7 @@ interface(`files_relabel_rootfs',`
+@@ -1923,7 +2384,7 @@ interface(`files_relabel_rootfs',`
type root_t;
')
@@ -10220,7 +10245,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -1946,6 +2389,24 @@ interface(`files_unmount_rootfs',`
+@@ -1946,6 +2407,24 @@ interface(`files_unmount_rootfs',`
########################################
##
@@ -10245,7 +10270,7 @@ index f962f76..42fc031 100644
## Get attributes of the /boot directory.
##
##
-@@ -2181,6 +2642,24 @@ interface(`files_relabelfrom_boot_files',`
+@@ -2181,6 +2660,24 @@ interface(`files_relabelfrom_boot_files',`
relabelfrom_files_pattern($1, boot_t, boot_t)
')
@@ -10270,7 +10295,7 @@ index f962f76..42fc031 100644
######################################
##
## Read symbolic links in the /boot directory.
-@@ -2645,6 +3124,24 @@ interface(`files_rw_etc_dirs',`
+@@ -2645,6 +3142,24 @@ interface(`files_rw_etc_dirs',`
allow $1 etc_t:dir rw_dir_perms;
')
@@ -10295,7 +10320,7 @@ index f962f76..42fc031 100644
##########################################
##
## Manage generic directories in /etc
-@@ -2716,6 +3213,7 @@ interface(`files_read_etc_files',`
+@@ -2716,6 +3231,7 @@ interface(`files_read_etc_files',`
allow $1 etc_t:dir list_dir_perms;
read_files_pattern($1, etc_t, etc_t)
read_lnk_files_pattern($1, etc_t, etc_t)
@@ -10303,7 +10328,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -2724,7 +3222,7 @@ interface(`files_read_etc_files',`
+@@ -2724,7 +3240,7 @@ interface(`files_read_etc_files',`
##
##
##
@@ -10312,7 +10337,7 @@ index f962f76..42fc031 100644
##
##
#
-@@ -2780,6 +3278,25 @@ interface(`files_manage_etc_files',`
+@@ -2780,6 +3296,25 @@ interface(`files_manage_etc_files',`
########################################
##
@@ -10338,7 +10363,7 @@ index f962f76..42fc031 100644
## Delete system configuration files in /etc.
##
##
-@@ -2798,6 +3315,24 @@ interface(`files_delete_etc_files',`
+@@ -2798,6 +3333,24 @@ interface(`files_delete_etc_files',`
########################################
##
@@ -10363,7 +10388,7 @@ index f962f76..42fc031 100644
## Execute generic files in /etc.
##
##
-@@ -2963,24 +3498,6 @@ interface(`files_delete_boot_flag',`
+@@ -2963,24 +3516,6 @@ interface(`files_delete_boot_flag',`
########################################
##
@@ -10388,7 +10413,7 @@ index f962f76..42fc031 100644
## Read files in /etc that are dynamically
## created on boot, such as mtab.
##
-@@ -3021,9 +3538,7 @@ interface(`files_read_etc_runtime_files',`
+@@ -3021,9 +3556,7 @@ interface(`files_read_etc_runtime_files',`
########################################
##
@@ -10399,7 +10424,7 @@ index f962f76..42fc031 100644
##
##
##
-@@ -3031,18 +3546,17 @@ interface(`files_read_etc_runtime_files',`
+@@ -3031,18 +3564,17 @@ interface(`files_read_etc_runtime_files',`
##
##
#
@@ -10421,16 +10446,18 @@ index f962f76..42fc031 100644
##
##
##
-@@ -3060,6 +3574,26 @@ interface(`files_dontaudit_write_etc_runtime_files',`
+@@ -3060,12 +3592,32 @@ interface(`files_dontaudit_write_etc_runtime_files',`
########################################
##
+-## Read and write files in /etc that are dynamically
+## Do not audit attempts to read files
+## in /etc that are dynamically
-+## created on boot, such as mtab.
-+##
-+##
-+##
+ ## created on boot, such as mtab.
+ ##
+ ##
+ ##
+-## Domain allowed access.
+## Domain to not audit.
+##
+##
@@ -10445,10 +10472,16 @@ index f962f76..42fc031 100644
+
+########################################
+##
- ## Read and write files in /etc that are dynamically
- ## created on boot, such as mtab.
- ##
-@@ -3077,6 +3611,7 @@ interface(`files_rw_etc_runtime_files',`
++## Read and write files in /etc that are dynamically
++## created on boot, such as mtab.
++##
++##
++##
++## Domain allowed access.
+ ##
+ ##
+ ##
+@@ -3077,6 +3629,7 @@ interface(`files_rw_etc_runtime_files',`
allow $1 etc_t:dir list_dir_perms;
rw_files_pattern($1, etc_t, etc_runtime_t)
@@ -10456,7 +10489,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3098,6 +3633,7 @@ interface(`files_manage_etc_runtime_files',`
+@@ -3098,6 +3651,7 @@ interface(`files_manage_etc_runtime_files',`
')
manage_files_pattern($1, { etc_t etc_runtime_t }, etc_runtime_t)
@@ -10464,7 +10497,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3142,10 +3678,48 @@ interface(`files_etc_filetrans_etc_runtime',`
+@@ -3142,10 +3696,48 @@ interface(`files_etc_filetrans_etc_runtime',`
#
interface(`files_getattr_isid_type_dirs',`
gen_require(`
@@ -10489,9 +10522,8 @@ index f962f76..42fc031 100644
+interface(`files_getattr_isid_type',`
+ gen_require(`
+ type unlabeled_t;
- ')
-
-- allow $1 file_t:dir getattr;
++ ')
++
+ allow $1 unlabeled_t:dir_file_class_set getattr;
+')
+
@@ -10509,13 +10541,14 @@ index f962f76..42fc031 100644
+interface(`files_setattr_isid_type_dirs',`
+ gen_require(`
+ type unlabeled_t;
-+ ')
-+
+ ')
+
+- allow $1 file_t:dir getattr;
+ allow $1 unlabeled_t:dir setattr;
')
########################################
-@@ -3161,10 +3735,10 @@ interface(`files_getattr_isid_type_dirs',`
+@@ -3161,10 +3753,10 @@ interface(`files_getattr_isid_type_dirs',`
#
interface(`files_dontaudit_search_isid_type_dirs',`
gen_require(`
@@ -10528,7 +10561,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3180,10 +3754,10 @@ interface(`files_dontaudit_search_isid_type_dirs',`
+@@ -3180,10 +3772,10 @@ interface(`files_dontaudit_search_isid_type_dirs',`
#
interface(`files_list_isid_type_dirs',`
gen_require(`
@@ -10541,7 +10574,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3199,10 +3773,10 @@ interface(`files_list_isid_type_dirs',`
+@@ -3199,10 +3791,10 @@ interface(`files_list_isid_type_dirs',`
#
interface(`files_rw_isid_type_dirs',`
gen_require(`
@@ -10554,7 +10587,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3218,10 +3792,66 @@ interface(`files_rw_isid_type_dirs',`
+@@ -3218,10 +3810,66 @@ interface(`files_rw_isid_type_dirs',`
#
interface(`files_delete_isid_type_dirs',`
gen_require(`
@@ -10597,8 +10630,9 @@ index f962f76..42fc031 100644
+interface(`files_mounton_isid',`
+ gen_require(`
+ type unlabeled_t;
-+ ')
-+
+ ')
+
+- delete_dirs_pattern($1, file_t, file_t)
+ allow $1 unlabeled_t:dir mounton;
+')
+
@@ -10616,14 +10650,13 @@ index f962f76..42fc031 100644
+interface(`files_relabelfrom_isid_type',`
+ gen_require(`
+ type unlabeled_t;
- ')
-
-- delete_dirs_pattern($1, file_t, file_t)
++ ')
++
+ dontaudit $1 unlabeled_t:dir_file_class_set relabelfrom;
')
########################################
-@@ -3237,10 +3867,10 @@ interface(`files_delete_isid_type_dirs',`
+@@ -3237,10 +3885,10 @@ interface(`files_delete_isid_type_dirs',`
#
interface(`files_manage_isid_type_dirs',`
gen_require(`
@@ -10636,7 +10669,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3256,10 +3886,29 @@ interface(`files_manage_isid_type_dirs',`
+@@ -3256,10 +3904,29 @@ interface(`files_manage_isid_type_dirs',`
#
interface(`files_mounton_isid_type_dirs',`
gen_require(`
@@ -10668,7 +10701,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3275,10 +3924,10 @@ interface(`files_mounton_isid_type_dirs',`
+@@ -3275,10 +3942,10 @@ interface(`files_mounton_isid_type_dirs',`
#
interface(`files_read_isid_type_files',`
gen_require(`
@@ -10681,7 +10714,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3294,10 +3943,10 @@ interface(`files_read_isid_type_files',`
+@@ -3294,10 +3961,10 @@ interface(`files_read_isid_type_files',`
#
interface(`files_delete_isid_type_files',`
gen_require(`
@@ -10694,7 +10727,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3313,10 +3962,10 @@ interface(`files_delete_isid_type_files',`
+@@ -3313,10 +3980,10 @@ interface(`files_delete_isid_type_files',`
#
interface(`files_delete_isid_type_symlinks',`
gen_require(`
@@ -10707,7 +10740,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3332,10 +3981,10 @@ interface(`files_delete_isid_type_symlinks',`
+@@ -3332,10 +3999,10 @@ interface(`files_delete_isid_type_symlinks',`
#
interface(`files_delete_isid_type_fifo_files',`
gen_require(`
@@ -10720,7 +10753,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3351,10 +4000,10 @@ interface(`files_delete_isid_type_fifo_files',`
+@@ -3351,10 +4018,10 @@ interface(`files_delete_isid_type_fifo_files',`
#
interface(`files_delete_isid_type_sock_files',`
gen_require(`
@@ -10733,7 +10766,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3370,10 +4019,10 @@ interface(`files_delete_isid_type_sock_files',`
+@@ -3370,10 +4037,10 @@ interface(`files_delete_isid_type_sock_files',`
#
interface(`files_delete_isid_type_blk_files',`
gen_require(`
@@ -10746,7 +10779,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3389,10 +4038,10 @@ interface(`files_delete_isid_type_blk_files',`
+@@ -3389,10 +4056,10 @@ interface(`files_delete_isid_type_blk_files',`
#
interface(`files_dontaudit_write_isid_chr_files',`
gen_require(`
@@ -10759,7 +10792,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3408,10 +4057,10 @@ interface(`files_dontaudit_write_isid_chr_files',`
+@@ -3408,10 +4075,10 @@ interface(`files_dontaudit_write_isid_chr_files',`
#
interface(`files_delete_isid_type_chr_files',`
gen_require(`
@@ -10772,7 +10805,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3427,10 +4076,10 @@ interface(`files_delete_isid_type_chr_files',`
+@@ -3427,10 +4094,10 @@ interface(`files_delete_isid_type_chr_files',`
#
interface(`files_manage_isid_type_files',`
gen_require(`
@@ -10785,7 +10818,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3446,10 +4095,10 @@ interface(`files_manage_isid_type_files',`
+@@ -3446,10 +4113,10 @@ interface(`files_manage_isid_type_files',`
#
interface(`files_manage_isid_type_symlinks',`
gen_require(`
@@ -10798,7 +10831,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3465,10 +4114,29 @@ interface(`files_manage_isid_type_symlinks',`
+@@ -3465,10 +4132,29 @@ interface(`files_manage_isid_type_symlinks',`
#
interface(`files_rw_isid_type_blk_files',`
gen_require(`
@@ -10830,7 +10863,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3484,10 +4152,10 @@ interface(`files_rw_isid_type_blk_files',`
+@@ -3484,10 +4170,10 @@ interface(`files_rw_isid_type_blk_files',`
#
interface(`files_manage_isid_type_blk_files',`
gen_require(`
@@ -10843,7 +10876,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3503,10 +4171,10 @@ interface(`files_manage_isid_type_blk_files',`
+@@ -3503,10 +4189,10 @@ interface(`files_manage_isid_type_blk_files',`
#
interface(`files_manage_isid_type_chr_files',`
gen_require(`
@@ -10856,7 +10889,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -3814,20 +4482,38 @@ interface(`files_list_mnt',`
+@@ -3814,20 +4500,38 @@ interface(`files_list_mnt',`
######################################
##
@@ -10900,7 +10933,7 @@ index f962f76..42fc031 100644
')
########################################
-@@ -4217,6 +4903,172 @@ interface(`files_read_world_readable_sockets',`
+@@ -4217,6 +4921,172 @@ interface(`files_read_world_readable_sockets',`
allow $1 readable_t:sock_file read_sock_file_perms;
')
@@ -11073,7 +11106,7 @@ index f962f76..42fc031 100644
########################################
##
## Allow the specified type to associate
-@@ -4239,6 +5091,26 @@ interface(`files_associate_tmp',`
+@@ -4239,6 +5109,26 @@ interface(`files_associate_tmp',`
########################################
##
@@ -11100,7 +11133,7 @@ index f962f76..42fc031 100644
## Get the attributes of the tmp directory (/tmp).
##
##
-@@ -4252,17 +5124,37 @@ interface(`files_getattr_tmp_dirs',`
+@@ -4252,17 +5142,37 @@ interface(`files_getattr_tmp_dirs',`
type tmp_t;
')
@@ -11139,7 +11172,7 @@ index f962f76..42fc031 100644
##
##
#
-@@ -4289,6 +5181,7 @@ interface(`files_search_tmp',`
+@@ -4289,6 +5199,7 @@ interface(`files_search_tmp',`
type tmp_t;
')
@@ -11147,7 +11180,7 @@ index f962f76..42fc031 100644
allow $1 tmp_t:dir search_dir_perms;
')
-@@ -4325,6 +5218,7 @@ interface(`files_list_tmp',`
+@@ -4325,6 +5236,7 @@ interface(`files_list_tmp',`
type tmp_t;
')
@@ -11155,7 +11188,7 @@ index f962f76..42fc031 100644
allow $1 tmp_t:dir list_dir_perms;
')
-@@ -4334,7 +5228,7 @@ interface(`files_list_tmp',`
+@@ -4334,7 +5246,7 @@ interface(`files_list_tmp',`
##
##
##
@@ -11164,20 +11197,26 @@ index f962f76..42fc031 100644
##
##
#
-@@ -4346,6 +5240,25 @@ interface(`files_dontaudit_list_tmp',`
+@@ -4346,21 +5258,41 @@ interface(`files_dontaudit_list_tmp',`
dontaudit $1 tmp_t:dir list_dir_perms;
')
+-########################################
+#######################################
-+##
+ ##
+-## Remove entries from the tmp directory.
+## Allow read and write to the tmp directory (/tmp).
-+##
-+##
+ ##
+ ##
+-##
+-## Domain allowed access.
+-##
+##
+## Domain not to audit.
+##
-+##
-+#
+ ##
+ #
+-interface(`files_delete_tmp_dir_entry',`
+interface(`files_rw_generic_tmp_dir',`
+ gen_require(`
+ type tmp_t;
@@ -11187,10 +11226,18 @@ index f962f76..42fc031 100644
+ allow $1 tmp_t:dir rw_dir_perms;
+')
+
- ########################################
- ##
- ## Remove entries from the tmp directory.
-@@ -4361,6 +5274,7 @@ interface(`files_delete_tmp_dir_entry',`
++########################################
++##
++## Remove entries from the tmp directory.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`files_delete_tmp_dir_entry',`
+ gen_require(`
type tmp_t;
')
@@ -11198,13 +11245,12 @@ index f962f76..42fc031 100644
allow $1 tmp_t:dir del_entry_dir_perms;
')
-@@ -4402,25 +5316,33 @@ interface(`files_manage_generic_tmp_dirs',`
+@@ -4402,6 +5334,32 @@ interface(`files_manage_generic_tmp_dirs',`
########################################
##
--## Manage temporary files and directories in /tmp.
+## Allow shared library text relocations in tmp files.
- ##
++##
+##
+##
+## Allow shared library text relocations in tmp files.
@@ -11213,70 +11259,26 @@ index f962f76..42fc031 100644
+## This is added to support java policy.
+##