diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index 85fde71..ac9e806 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -40178,7 +40178,7 @@ index db75976..e4eb903 100644
 +
 +/var/run/user(/.*)?	gen_context(system_u:object_r:user_tmp_t,s0)
 diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 9dc60c6..0deded7 100644
+index 9dc60c6..daee32c 100644
 --- a/policy/modules/system/userdomain.if
 +++ b/policy/modules/system/userdomain.if
 @@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -43026,7 +43026,7 @@ index 9dc60c6..0deded7 100644
  ##	Create keys for all user domains.
  ## </summary>
  ## <param name="domain">
-@@ -3435,4 +4327,1673 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3435,4 +4327,1671 @@ interface(`userdom_dbus_send_all_users',`
  	')
  
  	allow $1 userdomain:dbus send_msg;
@@ -43756,17 +43756,15 @@ index 9dc60c6..0deded7 100644
 +                type texlive_home_t;
 +        ')
 +
-+        userdom_search_user_home_dirs($1)
-+
-+	userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2012")
-+	userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2013")
-+	userdom_user_home_dir_filetrans($1, texlive_cert_t, dir, ".texlive2014")
-+        manage_dirs_pattern($1, texlive_home_t, texlive_home_t)
-+        manage_files_pattern($1, texlive_home_t, texlive_home_t)
++    userdom_search_user_home_dirs($1)
++	userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2012")
++	userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2013")
++	userdom_user_home_dir_filetrans($1, texlive_home_t, dir, ".texlive2014")
++    manage_dirs_pattern($1, texlive_home_t, texlive_home_t)
++    manage_files_pattern($1, texlive_home_t, texlive_home_t)
 +	manage_lnk_files_pattern($1, texlive_home_t, texlive_home_t)
 +')
 +
-+
 +########################################
 +## <summary>
 +##	Do not audit attempts to write all user home content files.