diff --git a/docker-selinux.tgz b/docker-selinux.tgz
index fbd45dc..1029221 100644
Binary files a/docker-selinux.tgz and b/docker-selinux.tgz differ
diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index 0efa0d7..9d3eadc 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -57,6 +57,16 @@ index 313d837..ef3c532 100644
  	@echo "Success."
  
  ########################################
+diff --git a/config/appconfig-mcs/default_contexts b/config/appconfig-mcs/default_contexts
+index 801d97b..698d54c 100644
+--- a/config/appconfig-mcs/default_contexts
++++ b/config/appconfig-mcs/default_contexts
+@@ -1,4 +1,4 @@
+-system_r:crond_t:s0		user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
++system_r:crond_t:s0		user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
+ system_r:local_login_t:s0	user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
+ system_r:remote_login_t:s0	user_r:user_t:s0 staff_r:staff_t:s0 unconfined_r:unconfined_t:s0
+ system_r:sshd_t:s0		user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
 diff --git a/config/appconfig-mcs/openssh_contexts b/config/appconfig-mcs/openssh_contexts
 new file mode 100644
 index 0000000..6de0b01
@@ -65,7 +75,7 @@ index 0000000..6de0b01
 @@ -0,0 +1 @@
 +privsep_preauth=sshd_net_t
 diff --git a/config/appconfig-mcs/staff_u_default_contexts b/config/appconfig-mcs/staff_u_default_contexts
-index 881a292..80110a4 100644
+index 881a292..5606c4e 100644
 --- a/config/appconfig-mcs/staff_u_default_contexts
 +++ b/config/appconfig-mcs/staff_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -73,7 +83,7 @@ index 881a292..80110a4 100644
  system_r:remote_login_t:s0	staff_r:staff_t:s0
  system_r:sshd_t:s0		staff_r:staff_t:s0 sysadm_r:sysadm_t:s0
 -system_r:crond_t:s0		staff_r:cronjob_t:s0
-+system_r:crond_t:s0		staff_r:staff_t:s0
++system_r:crond_t:s0		staff_r:staff_t:s0 staff_r:cronjob_t:s0
  system_r:xdm_t:s0		staff_r:staff_t:s0
  staff_r:staff_su_t:s0		staff_r:staff_t:s0
  staff_r:staff_sudo_t:s0		staff_r:staff_t:s0
@@ -103,7 +113,7 @@ index 0000000..ff32acc
 @@ -0,0 +1 @@
 +runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
 diff --git a/config/appconfig-mcs/user_u_default_contexts b/config/appconfig-mcs/user_u_default_contexts
-index cacbc93..4f59f94 100644
+index cacbc93..56d6071 100644
 --- a/config/appconfig-mcs/user_u_default_contexts
 +++ b/config/appconfig-mcs/user_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -111,7 +121,7 @@ index cacbc93..4f59f94 100644
  system_r:remote_login_t:s0	user_r:user_t:s0
  system_r:sshd_t:s0		user_r:user_t:s0
 -system_r:crond_t:s0		user_r:cronjob_t:s0
-+system_r:crond_t:s0		user_r:user_t:s0
++system_r:crond_t:s0		user_r:user_t:s0 user_r:cronjob_t:s0
  system_r:xdm_t:s0		user_r:user_t:s0
  user_r:user_su_t:s0		user_r:user_t:s0
  user_r:user_sudo_t:s0		user_r:user_t:s0
@@ -122,6 +132,16 @@ index d387b42..150f281 100644
 @@ -1 +1,2 @@
  system_u:system_r:svirt_t:s0
 +system_u:system_r:svirt_tcg_t:s0
+diff --git a/config/appconfig-mls/default_contexts b/config/appconfig-mls/default_contexts
+index 801d97b..698d54c 100644
+--- a/config/appconfig-mls/default_contexts
++++ b/config/appconfig-mls/default_contexts
+@@ -1,4 +1,4 @@
+-system_r:crond_t:s0		user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
++system_r:crond_t:s0		user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
+ system_r:local_login_t:s0	user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
+ system_r:remote_login_t:s0	user_r:user_t:s0 staff_r:staff_t:s0 unconfined_r:unconfined_t:s0
+ system_r:sshd_t:s0		user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
 diff --git a/config/appconfig-mls/openssh_contexts b/config/appconfig-mls/openssh_contexts
 new file mode 100644
 index 0000000..6de0b01
@@ -130,7 +150,7 @@ index 0000000..6de0b01
 @@ -0,0 +1 @@
 +privsep_preauth=sshd_net_t
 diff --git a/config/appconfig-mls/staff_u_default_contexts b/config/appconfig-mls/staff_u_default_contexts
-index 881a292..80110a4 100644
+index 881a292..5606c4e 100644
 --- a/config/appconfig-mls/staff_u_default_contexts
 +++ b/config/appconfig-mls/staff_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -138,7 +158,7 @@ index 881a292..80110a4 100644
  system_r:remote_login_t:s0	staff_r:staff_t:s0
  system_r:sshd_t:s0		staff_r:staff_t:s0 sysadm_r:sysadm_t:s0
 -system_r:crond_t:s0		staff_r:cronjob_t:s0
-+system_r:crond_t:s0		staff_r:staff_t:s0
++system_r:crond_t:s0		staff_r:staff_t:s0 staff_r:cronjob_t:s0
  system_r:xdm_t:s0		staff_r:staff_t:s0
  staff_r:staff_su_t:s0		staff_r:staff_t:s0
  staff_r:staff_sudo_t:s0		staff_r:staff_t:s0
@@ -150,7 +170,7 @@ index 0000000..ff32acc
 @@ -0,0 +1 @@
 +runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
 diff --git a/config/appconfig-mls/user_u_default_contexts b/config/appconfig-mls/user_u_default_contexts
-index cacbc93..4f59f94 100644
+index cacbc93..56d6071 100644
 --- a/config/appconfig-mls/user_u_default_contexts
 +++ b/config/appconfig-mls/user_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -158,10 +178,20 @@ index cacbc93..4f59f94 100644
  system_r:remote_login_t:s0	user_r:user_t:s0
  system_r:sshd_t:s0		user_r:user_t:s0
 -system_r:crond_t:s0		user_r:cronjob_t:s0
-+system_r:crond_t:s0		user_r:user_t:s0
++system_r:crond_t:s0		user_r:user_t:s0 user_r:cronjob_t:s0
  system_r:xdm_t:s0		user_r:user_t:s0
  user_r:user_su_t:s0		user_r:user_t:s0
  user_r:user_sudo_t:s0		user_r:user_t:s0
+diff --git a/config/appconfig-standard/default_contexts b/config/appconfig-standard/default_contexts
+index 64a0a90..25ee341 100644
+--- a/config/appconfig-standard/default_contexts
++++ b/config/appconfig-standard/default_contexts
+@@ -1,4 +1,4 @@
+-system_r:crond_t	user_r:cronjob_t staff_r:cronjob_t sysadm_r:cronjob_t system_r:system_cronjob_t unconfined_r:unconfined_cronjob_t
++system_r:crond_t	user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t user_r:cronjob_t staff_r:cronjob_t sysadm_r:cronjob_t system_r:system_cronjob_t unconfined_r:unconfined_cronjob_t
+ system_r:local_login_t	user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t
+ system_r:remote_login_t	user_r:user_t staff_r:staff_t unconfined_r:unconfined_t
+ system_r:sshd_t		user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t
 diff --git a/config/appconfig-standard/openssh_contexts b/config/appconfig-standard/openssh_contexts
 new file mode 100644
 index 0000000..6de0b01
@@ -170,7 +200,7 @@ index 0000000..6de0b01
 @@ -0,0 +1 @@
 +privsep_preauth=sshd_net_t
 diff --git a/config/appconfig-standard/staff_u_default_contexts b/config/appconfig-standard/staff_u_default_contexts
-index c2a5ea8..f63999e 100644
+index c2a5ea8..300694c 100644
 --- a/config/appconfig-standard/staff_u_default_contexts
 +++ b/config/appconfig-standard/staff_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -178,7 +208,7 @@ index c2a5ea8..f63999e 100644
  system_r:remote_login_t		staff_r:staff_t
  system_r:sshd_t			staff_r:staff_t sysadm_r:sysadm_t
 -system_r:crond_t		staff_r:cronjob_t
-+system_r:crond_t		staff_r:staff_t
++system_r:crond_t		staff_r:staff_t staff_r:cronjob_t
  system_r:xdm_t			staff_r:staff_t
  staff_r:staff_su_t		staff_r:staff_t
  staff_r:staff_sudo_t		staff_r:staff_t
@@ -208,7 +238,7 @@ index 0000000..ff32acc
 @@ -0,0 +1 @@
 +runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
 diff --git a/config/appconfig-standard/user_u_default_contexts b/config/appconfig-standard/user_u_default_contexts
-index f5bfac3..639555b 100644
+index f5bfac3..63b7eec 100644
 --- a/config/appconfig-standard/user_u_default_contexts
 +++ b/config/appconfig-standard/user_u_default_contexts
 @@ -1,7 +1,7 @@
@@ -216,7 +246,7 @@ index f5bfac3..639555b 100644
  system_r:remote_login_t		user_r:user_t
  system_r:sshd_t			user_r:user_t
 -system_r:crond_t		user_r:cronjob_t
-+system_r:crond_t		user_r:user_t
++system_r:crond_t		user_r:user_t user_r:cronjob_t
  system_r:xdm_t			user_r:user_t
  user_r:user_su_t		user_r:user_t
  user_r:user_sudo_t		user_r:user_t
@@ -3465,7 +3495,7 @@ index 7590165..d81185e 100644
 +	fs_mounton_fusefs(seunshare_domain)
  ')
 diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
-index 33e0f8d..e16fba2 100644
+index 33e0f8d..9502a72 100644
 --- a/policy/modules/kernel/corecommands.fc
 +++ b/policy/modules/kernel/corecommands.fc
 @@ -1,9 +1,10 @@
@@ -3497,7 +3527,7 @@ index 33e0f8d..e16fba2 100644
  /etc/dhcp/dhclient\.d(/.*)?		gen_context(system_u:object_r:bin_t,s0)
  
  /etc/hotplug/.*agent		--	gen_context(system_u:object_r:bin_t,s0)
-@@ -67,18 +71,28 @@ ifdef(`distro_redhat',`
+@@ -67,18 +71,33 @@ ifdef(`distro_redhat',`
  /etc/hotplug\.d/default/default.*	gen_context(system_u:object_r:bin_t,s0)
  
  /etc/kde/env(/.*)?			gen_context(system_u:object_r:bin_t,s0)
@@ -3511,6 +3541,11 @@ index 33e0f8d..e16fba2 100644
 +/etc/lxdm/Pre.*			--	gen_context(system_u:object_r:bin_t,s0)
 +/etc/lxdm/Xsession		--	gen_context(system_u:object_r:bin_t,s0)
 +
++/etc/sddm/Xsession		--	gen_context(system_u:object_r:bin_t,s0)
++/etc/sddm/wayland-session		--	gen_context(system_u:object_r:bin_t,s0)
++/etc/sddm/Xsetup		--	gen_context(system_u:object_r:bin_t,s0)
++/etc/sddm/Xstop		--	gen_context(system_u:object_r:bin_t,s0)
++
  /etc/mail/make			--	gen_context(system_u:object_r:bin_t,s0)
  
  /etc/mcelog/.*-error-trigger	--	gen_context(system_u:object_r:bin_t,s0)
@@ -3526,7 +3561,7 @@ index 33e0f8d..e16fba2 100644
  
  /etc/netplug\.d(/.*)? 	 		gen_context(system_u:object_r:bin_t,s0)
  
-@@ -101,8 +115,6 @@ ifdef(`distro_redhat',`
+@@ -101,8 +120,6 @@ ifdef(`distro_redhat',`
  
  /etc/rc\.d/init\.d/functions	--	gen_context(system_u:object_r:bin_t,s0)
  
@@ -3535,7 +3570,7 @@ index 33e0f8d..e16fba2 100644
  /etc/sysconfig/crond		--	gen_context(system_u:object_r:bin_t,s0)
  /etc/sysconfig/init		--	gen_context(system_u:object_r:bin_t,s0)
  /etc/sysconfig/libvirtd		--	gen_context(system_u:object_r:bin_t,s0)
-@@ -116,6 +128,9 @@ ifdef(`distro_redhat',`
+@@ -116,6 +133,9 @@ ifdef(`distro_redhat',`
  
  /etc/vmware-tools(/.*)?			gen_context(system_u:object_r:bin_t,s0)
  
@@ -3545,7 +3580,7 @@ index 33e0f8d..e16fba2 100644
  /etc/X11/xdm/GiveConsole	--	gen_context(system_u:object_r:bin_t,s0)
  /etc/X11/xdm/TakeConsole	--	gen_context(system_u:object_r:bin_t,s0)
  /etc/X11/xdm/Xsetup_0		--	gen_context(system_u:object_r:bin_t,s0)
-@@ -135,10 +150,12 @@ ifdef(`distro_debian',`
+@@ -135,10 +155,12 @@ ifdef(`distro_debian',`
  /lib/nut/.*			--	gen_context(system_u:object_r:bin_t,s0)
  /lib/readahead(/.*)?			gen_context(system_u:object_r:bin_t,s0)
  /lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
@@ -3559,7 +3594,7 @@ index 33e0f8d..e16fba2 100644
  
  ifdef(`distro_gentoo',`
  /lib/dhcpcd/dhcpcd-run-hooks	--	gen_context(system_u:object_r:bin_t,s0)
-@@ -149,10 +166,12 @@ ifdef(`distro_gentoo',`
+@@ -149,10 +171,12 @@ ifdef(`distro_gentoo',`
  /lib/rcscripts/net\.modules\.d/helpers\.d/udhcpc-.* -- gen_context(system_u:object_r:bin_t,s0)
  ')
  
@@ -3573,7 +3608,7 @@ index 33e0f8d..e16fba2 100644
  /sbin/.*				gen_context(system_u:object_r:bin_t,s0)
  /sbin/insmod_ksymoops_clean	--	gen_context(system_u:object_r:bin_t,s0)
  /sbin/mkfs\.cramfs		--	gen_context(system_u:object_r:bin_t,s0)
-@@ -168,6 +187,7 @@ ifdef(`distro_gentoo',`
+@@ -168,6 +192,7 @@ ifdef(`distro_gentoo',`
  /opt/(.*/)?sbin(/.*)?			gen_context(system_u:object_r:bin_t,s0)
  
  /opt/google/talkplugin(/.*)?		gen_context(system_u:object_r:bin_t,s0)
@@ -3581,7 +3616,7 @@ index 33e0f8d..e16fba2 100644
  
  /opt/gutenprint/cups/lib/filter(/.*)?	gen_context(system_u:object_r:bin_t,s0)
  
-@@ -179,34 +199,50 @@ ifdef(`distro_gentoo',`
+@@ -179,34 +204,50 @@ ifdef(`distro_gentoo',`
  /opt/vmware/workstation/lib/lib/wrapper-gtk24\.sh -- gen_context(system_u:object_r:bin_t,s0)
  ')
  
@@ -3641,7 +3676,7 @@ index 33e0f8d..e16fba2 100644
  /usr/lib/dpkg/.+		--	gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/emacsen-common/.*		gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/gimp/.*/plug-ins(/.*)?		gen_context(system_u:object_r:bin_t,s0)
-@@ -218,19 +254,32 @@ ifdef(`distro_gentoo',`
+@@ -218,19 +259,32 @@ ifdef(`distro_gentoo',`
  /usr/lib/mailman/mail(/.*)?		gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/mediawiki/math/texvc.*		gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/misc/sftp-server	--	gen_context(system_u:object_r:bin_t,s0)
@@ -3681,7 +3716,7 @@ index 33e0f8d..e16fba2 100644
  /usr/lib/xfce4/exo-1/exo-compose-mail-1 -- gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/xfce4/exo-1/exo-helper-1 --	gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/xfce4/panel/migrate	--	gen_context(system_u:object_r:bin_t,s0)
-@@ -245,26 +294,40 @@ ifdef(`distro_gentoo',`
+@@ -245,26 +299,40 @@ ifdef(`distro_gentoo',`
  /usr/lib/debug/sbin(/.*)?	--	gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/debug/usr/bin(/.*)?	--	gen_context(system_u:object_r:bin_t,s0)
  /usr/lib/debug/usr/sbin(/.*)?	--	gen_context(system_u:object_r:bin_t,s0)
@@ -3727,7 +3762,7 @@ index 33e0f8d..e16fba2 100644
  /usr/sbin/scponlyc		--	gen_context(system_u:object_r:shell_exec_t,s0)
  /usr/sbin/sesh			--	gen_context(system_u:object_r:shell_exec_t,s0)
  /usr/sbin/smrsh			--	gen_context(system_u:object_r:shell_exec_t,s0)
-@@ -280,10 +343,14 @@ ifdef(`distro_gentoo',`
+@@ -280,10 +348,14 @@ ifdef(`distro_gentoo',`
  /usr/share/cluster/.*\.sh		gen_context(system_u:object_r:bin_t,s0)
  /usr/share/cluster/ocf-shellfuncs --	gen_context(system_u:object_r:bin_t,s0)
  /usr/share/cluster/svclib_nfslock --	gen_context(system_u:object_r:bin_t,s0)
@@ -3742,7 +3777,7 @@ index 33e0f8d..e16fba2 100644
  /usr/share/gnucash/finance-quote-check -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/gnucash/finance-quote-helper -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/hal/device-manager/hal-device-manager -- gen_context(system_u:object_r:bin_t,s0)
-@@ -298,16 +365,22 @@ ifdef(`distro_gentoo',`
+@@ -298,16 +370,22 @@ ifdef(`distro_gentoo',`
  /usr/share/selinux/devel/policygentool -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/smolt/client(/.*)?		gen_context(system_u:object_r:bin_t,s0)
  /usr/share/shorewall/compiler\.pl --	gen_context(system_u:object_r:bin_t,s0)
@@ -3767,7 +3802,7 @@ index 33e0f8d..e16fba2 100644
  
  ifdef(`distro_debian',`
  /usr/lib/ConsoleKit/.*		--	gen_context(system_u:object_r:bin_t,s0)
-@@ -325,20 +398,27 @@ ifdef(`distro_redhat', `
+@@ -325,20 +403,27 @@ ifdef(`distro_redhat', `
  /etc/gdm/[^/]+			-d	gen_context(system_u:object_r:bin_t,s0)
  /etc/gdm/[^/]+/.*			gen_context(system_u:object_r:bin_t,s0)
  
@@ -3796,7 +3831,7 @@ index 33e0f8d..e16fba2 100644
  /usr/share/pwlib/make/ptlib-config --	gen_context(system_u:object_r:bin_t,s0)
  /usr/share/pydict/pydict\.py	--	gen_context(system_u:object_r:bin_t,s0)
  /usr/share/rhn/rhn_applet/applet\.py -- gen_context(system_u:object_r:bin_t,s0)
-@@ -346,6 +426,7 @@ ifdef(`distro_redhat', `
+@@ -346,6 +431,7 @@ ifdef(`distro_redhat', `
  /usr/share/ssl/misc(/.*)?		gen_context(system_u:object_r:bin_t,s0)
  /usr/share/switchdesk/switchdesk-gui\.py -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/system-config-date/system-config-date\.py -- gen_context(system_u:object_r:bin_t,s0)
@@ -3804,7 +3839,7 @@ index 33e0f8d..e16fba2 100644
  /usr/share/system-config-selinux/polgen\.py -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/system-config-selinux/system-config-selinux\.py -- gen_context(system_u:object_r:bin_t,s0)
  /usr/share/system-config-display/system-config-display -- gen_context(system_u:object_r:bin_t,s0)
-@@ -387,17 +468,34 @@ ifdef(`distro_suse', `
+@@ -387,17 +473,34 @@ ifdef(`distro_suse', `
  #
  # /var
  #
@@ -36131,7 +36166,7 @@ index c42fbc3..bf211db 100644
 +	files_pid_filetrans($1, iptables_var_run_t, file, "xtables.lock")
 +')
 diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
-index be8ed1e..3c2729f 100644
+index be8ed1e..660ef80 100644
 --- a/policy/modules/system/iptables.te
 +++ b/policy/modules/system/iptables.te
 @@ -16,15 +16,18 @@ role iptables_roles types iptables_t;
@@ -36244,11 +36279,12 @@ index be8ed1e..3c2729f 100644
  ')
  
  optional_policy(`
-@@ -110,6 +125,11 @@ optional_policy(`
+@@ -110,6 +125,12 @@ optional_policy(`
  ')
  
  optional_policy(`
 +	firewalld_read_config(iptables_t)
++	firewalld_read_pid_files(iptables_t)
 +	firewalld_dontaudit_write_tmp_files(iptables_t)
 +')
 +
@@ -36256,7 +36292,7 @@ index be8ed1e..3c2729f 100644
  	modutils_run_insmod(iptables_t, iptables_roles)
  ')
  
-@@ -124,6 +144,16 @@ optional_policy(`
+@@ -124,6 +145,16 @@ optional_policy(`
  
  optional_policy(`
  	psad_rw_tmp_files(iptables_t)
@@ -36273,7 +36309,7 @@ index be8ed1e..3c2729f 100644
  ')
  
  optional_policy(`
-@@ -135,9 +165,9 @@ optional_policy(`
+@@ -135,9 +166,9 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -45222,10 +45258,10 @@ index 0000000..c253b33
 +')
 diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
 new file mode 100644
-index 0000000..decb7c3
+index 0000000..56ba5a6
 --- /dev/null
 +++ b/policy/modules/system/systemd.te
-@@ -0,0 +1,822 @@
+@@ -0,0 +1,824 @@
 +policy_module(systemd, 1.0.0)
 +
 +#######################################
@@ -45892,6 +45928,7 @@ index 0000000..decb7c3
 +#
 +
 +allow systemd_rfkill_t self:capability net_admin;
++allow systemd_rfkill_t self:netlink_kobject_uevent_socket create_socket_perms;
 +
 +manage_files_pattern(systemd_rfkill_t, systemd_rfkill_var_lib_t, systemd_rfkill_var_lib_t)
 +
@@ -46021,6 +46058,7 @@ index 0000000..decb7c3
 +dev_read_urand(systemd_domain)
 +
 +fs_search_all(systemd_domain)
++fs_getattr_all_fs(systemd_domain)
 +
 +files_read_etc_files(systemd_domain)
 +files_read_etc_runtime_files(systemd_domain)
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index e71fc66..d1ed53e 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -3166,10 +3166,10 @@ index 0000000..36251b9
 +')
 diff --git a/antivirus.te b/antivirus.te
 new file mode 100644
-index 0000000..12349f3
+index 0000000..d8b04b5
 --- /dev/null
 +++ b/antivirus.te
-@@ -0,0 +1,272 @@
+@@ -0,0 +1,273 @@
 +policy_module(antivirus, 1.0.0)
 +
 +########################################
@@ -3284,6 +3284,7 @@ index 0000000..12349f3
 +
 +corenet_all_recvfrom_netlabel(antivirus_t)
 +corenet_tcp_bind_all_unreserved_ports(antivirus_t)
++corenet_dontaudit_tcp_bind_all_reserved_ports(antivirus_t)
 +corenet_tcp_sendrecv_generic_if(antivirus_t)
 +corenet_udp_sendrecv_generic_if(antivirus_t)
 +corenet_tcp_sendrecv_generic_node(antivirus_domain)
@@ -28268,7 +28269,7 @@ index 21d7b84..0e272bd 100644
  
  /etc/firewalld(/.*)?	gen_context(system_u:object_r:firewalld_etc_rw_t,s0)
 diff --git a/firewalld.if b/firewalld.if
-index c62c567..6460877 100644
+index c62c567..2d9e254 100644
 --- a/firewalld.if
 +++ b/firewalld.if
 @@ -2,7 +2,7 @@
@@ -28349,7 +28350,7 @@ index c62c567..6460877 100644
  ## </summary>
  ## <param name="domain">
  ##	<summary>
-@@ -51,18 +93,18 @@ interface(`firewalld_dbus_chat',`
+@@ -51,18 +93,37 @@ interface(`firewalld_dbus_chat',`
  ##	</summary>
  ## </param>
  #
@@ -28367,12 +28368,31 @@ index c62c567..6460877 100644
  ## <summary>
 -##	All of the rules required to
 -##	administrate an firewalld environment.
++##	Read firewalld PID files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`firewalld_read_pid_files',`
++	gen_require(`
++		type firewalld_var_run_t;
++	')
++
++	files_search_pids($1)
++	allow $1 firewalld_var_run_t:file read_file_perms;
++')
++
++########################################
++## <summary>
 +##	All of the rules required to administrate
 +##	an firewalld environment
  ## </summary>
  ## <param name="domain">
  ##	<summary>
-@@ -79,14 +121,18 @@ interface(`firewalld_dontaudit_rw_tmp_files',`
+@@ -79,14 +140,18 @@ interface(`firewalld_dontaudit_rw_tmp_files',`
  interface(`firewalld_admin',`
  	gen_require(`
  		type firewalld_t, firewalld_initrc_exec_t;
@@ -28394,7 +28414,7 @@ index c62c567..6460877 100644
  	domain_system_change_exemption($1)
  	role_transition $2 firewalld_initrc_exec_t system_r;
  	allow $2 system_r;
-@@ -97,6 +143,9 @@ interface(`firewalld_admin',`
+@@ -97,6 +162,9 @@ interface(`firewalld_admin',`
  	logging_search_logs($1)
  	admin_pattern($1, firewalld_var_log_t)
  
@@ -28407,7 +28427,7 @@ index c62c567..6460877 100644
 +	allow $1 firewalld_unit_file_t:service all_service_perms;
  ')
 diff --git a/firewalld.te b/firewalld.te
-index 98072a3..1b550dd 100644
+index 98072a3..d5d852e 100644
 --- a/firewalld.te
 +++ b/firewalld.te
 @@ -21,9 +21,15 @@ logging_log_file(firewalld_var_log_t)
@@ -28435,7 +28455,7 @@ index 98072a3..1b550dd 100644
  
  allow firewalld_t firewalld_var_log_t:file append_file_perms;
  allow firewalld_t firewalld_var_log_t:file create_file_perms;
-@@ -48,8 +56,13 @@ manage_files_pattern(firewalld_t, firewalld_tmp_t, firewalld_tmp_t)
+@@ -48,8 +56,14 @@ manage_files_pattern(firewalld_t, firewalld_tmp_t, firewalld_tmp_t)
  files_tmp_filetrans(firewalld_t, firewalld_tmp_t, file)
  allow firewalld_t firewalld_tmp_t:file mmap_file_perms;
  
@@ -28444,12 +28464,14 @@ index 98072a3..1b550dd 100644
 +allow firewalld_t firewalld_tmpfs_t:file mmap_file_perms;
 +
  manage_files_pattern(firewalld_t, firewalld_var_run_t, firewalld_var_run_t)
- files_pid_filetrans(firewalld_t, firewalld_var_run_t, file)
+-files_pid_filetrans(firewalld_t, firewalld_var_run_t, file)
++manage_dirs_pattern(firewalld_t, firewalld_var_run_t, firewalld_var_run_t)
++files_pid_filetrans(firewalld_t, firewalld_var_run_t, { file dir })
 +can_exec(firewalld_t, firewalld_var_run_t)
  
  kernel_read_network_state(firewalld_t)
  kernel_read_system_state(firewalld_t)
-@@ -63,20 +76,19 @@ dev_search_sysfs(firewalld_t)
+@@ -63,20 +77,19 @@ dev_search_sysfs(firewalld_t)
  
  domain_use_interactive_fds(firewalld_t)
  
@@ -28476,7 +28498,7 @@ index 98072a3..1b550dd 100644
  
  optional_policy(`
  	dbus_system_domain(firewalld_t, firewalld_exec_t)
-@@ -95,6 +107,10 @@ optional_policy(`
+@@ -95,6 +108,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -99807,7 +99829,7 @@ index 1499b0b..6950cab 100644
 -	spamassassin_role($2, $1)
  ')
 diff --git a/spamassassin.te b/spamassassin.te
-index cc58e35..2794505 100644
+index cc58e35..d20d0ed 100644
 --- a/spamassassin.te
 +++ b/spamassassin.te
 @@ -7,50 +7,23 @@ policy_module(spamassassin, 2.6.1)
@@ -100351,7 +100373,7 @@ index cc58e35..2794505 100644
  corenet_all_recvfrom_netlabel(spamd_t)
  corenet_tcp_sendrecv_generic_if(spamd_t)
  corenet_udp_sendrecv_generic_if(spamd_t)
-@@ -331,78 +450,59 @@ corenet_udp_sendrecv_generic_node(spamd_t)
+@@ -331,78 +450,60 @@ corenet_udp_sendrecv_generic_node(spamd_t)
  corenet_tcp_sendrecv_all_ports(spamd_t)
  corenet_udp_sendrecv_all_ports(spamd_t)
  corenet_tcp_bind_generic_node(spamd_t)
@@ -100361,6 +100383,7 @@ index cc58e35..2794505 100644
  corenet_tcp_bind_spamd_port(spamd_t)
 -
 -corenet_sendrecv_razor_client_packets(spamd_t)
++corenet_tcp_connect_all_unreserved_ports(spamd_t)
 +corenet_tcp_connect_spamd_port(spamd_t)
  corenet_tcp_connect_razor_port(spamd_t)
 -
@@ -100455,7 +100478,7 @@ index cc58e35..2794505 100644
  ')
  
  optional_policy(`
-@@ -421,21 +521,13 @@ optional_policy(`
+@@ -421,21 +522,13 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -100479,7 +100502,7 @@ index cc58e35..2794505 100644
  ')
  
  optional_policy(`
-@@ -443,8 +535,8 @@ optional_policy(`
+@@ -443,8 +536,8 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -100489,7 +100512,7 @@ index cc58e35..2794505 100644
  ')
  
  optional_policy(`
-@@ -455,7 +547,17 @@ optional_policy(`
+@@ -455,7 +548,17 @@ optional_policy(`
  optional_policy(`
  	razor_domtrans(spamd_t)
  	razor_read_lib_files(spamd_t)
@@ -100508,7 +100531,7 @@ index cc58e35..2794505 100644
  ')
  
  optional_policy(`
-@@ -463,9 +565,9 @@ optional_policy(`
+@@ -463,9 +566,9 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -100519,7 +100542,7 @@ index cc58e35..2794505 100644
  ')
  
  optional_policy(`
-@@ -474,32 +576,32 @@ optional_policy(`
+@@ -474,32 +577,32 @@ optional_policy(`
  
  ########################################
  #
@@ -100562,7 +100585,7 @@ index cc58e35..2794505 100644
  
  corecmd_exec_bin(spamd_update_t)
  corecmd_exec_shell(spamd_update_t)
-@@ -508,25 +610,21 @@ dev_read_urand(spamd_update_t)
+@@ -508,25 +611,21 @@ dev_read_urand(spamd_update_t)
  
  domain_use_interactive_fds(spamd_update_t)
  
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 72e03b0..7a1e5c2 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.13.1
-Release: 163%{?dist}
+Release: 164%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -664,6 +664,15 @@ exit 0
 %endif
 
 %changelog
+* Tue Dec 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-164
+- Allow firewalld to create firewalld_var_run_t directory. BZ(1291243)
+- Add interface firewalld_read_pid_files()
+- Allow iptables to read firewalld pid files. BZ(1291243)
+- Allow the user cronjobs to run in their userdomain
+- Label ssdm binaries storedin /etc/sddm/ as bin_t. BZ(1288111)
+- Merge pull request #81 from rhatdan/rawhide-base
+- New access needed by systemd domains
+
 * Wed Dec 09 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-163
 - Allow whack executed by sysadm SELinux user to access /var/run/pluto/pluto.ctl. It fixes "ipsec auto --status" executed by sysadm_t.
 - Add ipsec_read_pid() interface