diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index b9c8b31..38ad120 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -27255,7 +27255,7 @@ index 2479587..890e1e2 100644
/var/(db|adm)/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
/var/lib/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
-index 3efd5b6..9e85ea0 100644
+index 3efd5b6..f645c21 100644
--- a/policy/modules/system/authlogin.if
+++ b/policy/modules/system/authlogin.if
@@ -23,11 +23,17 @@ interface(`auth_role',`
@@ -27317,7 +27317,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -95,69 +117,67 @@ interface(`auth_use_pam',`
+@@ -95,69 +117,68 @@ interface(`auth_use_pam',`
interface(`auth_login_pgm_domain',`
gen_require(`
type var_auth_t, auth_cache_t;
@@ -27375,6 +27375,7 @@ index 3efd5b6..9e85ea0 100644
mls_file_downgrade($1)
mls_process_set_level($1)
+ mls_process_write_to_clearance($1)
++ mls_process_write_all_levels($1)
mls_fd_share_all_levels($1)
auth_use_pam($1)
@@ -27426,7 +27427,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -231,6 +251,25 @@ interface(`auth_domtrans_login_program',`
+@@ -231,6 +252,25 @@ interface(`auth_domtrans_login_program',`
########################################
##
@@ -27452,7 +27453,7 @@ index 3efd5b6..9e85ea0 100644
## Execute a login_program in the target domain,
## with a range transition.
##
-@@ -322,6 +361,24 @@ interface(`auth_rw_cache',`
+@@ -322,6 +362,24 @@ interface(`auth_rw_cache',`
########################################
##
@@ -27477,7 +27478,7 @@ index 3efd5b6..9e85ea0 100644
## Manage authentication cache
##
##
-@@ -402,6 +459,8 @@ interface(`auth_domtrans_chk_passwd',`
+@@ -402,6 +460,8 @@ interface(`auth_domtrans_chk_passwd',`
optional_policy(`
samba_stream_connect_winbind($1)
')
@@ -27486,7 +27487,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -428,6 +487,24 @@ interface(`auth_domtrans_chkpwd',`
+@@ -428,6 +488,24 @@ interface(`auth_domtrans_chkpwd',`
########################################
##
@@ -27511,7 +27512,7 @@ index 3efd5b6..9e85ea0 100644
## Execute chkpwd programs in the chkpwd domain.
##
##
-@@ -448,6 +525,25 @@ interface(`auth_run_chk_passwd',`
+@@ -448,6 +526,25 @@ interface(`auth_run_chk_passwd',`
auth_domtrans_chk_passwd($1)
role $2 types chkpwd_t;
@@ -27537,7 +27538,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -467,7 +563,6 @@ interface(`auth_domtrans_upd_passwd',`
+@@ -467,7 +564,6 @@ interface(`auth_domtrans_upd_passwd',`
domtrans_pattern($1, updpwd_exec_t, updpwd_t)
auth_dontaudit_read_shadow($1)
@@ -27545,7 +27546,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -664,6 +759,10 @@ interface(`auth_manage_shadow',`
+@@ -664,6 +760,10 @@ interface(`auth_manage_shadow',`
allow $1 shadow_t:file manage_file_perms;
typeattribute $1 can_read_shadow_passwords, can_write_shadow_passwords;
@@ -27556,7 +27557,7 @@ index 3efd5b6..9e85ea0 100644
')
#######################################
-@@ -763,7 +862,50 @@ interface(`auth_rw_faillog',`
+@@ -763,7 +863,50 @@ interface(`auth_rw_faillog',`
')
logging_search_logs($1)
@@ -27608,7 +27609,7 @@ index 3efd5b6..9e85ea0 100644
')
#######################################
-@@ -824,9 +966,29 @@ interface(`auth_rw_lastlog',`
+@@ -824,9 +967,29 @@ interface(`auth_rw_lastlog',`
allow $1 lastlog_t:file { rw_file_perms lock setattr };
')
@@ -27639,7 +27640,7 @@ index 3efd5b6..9e85ea0 100644
##
##
##
-@@ -834,12 +996,27 @@ interface(`auth_rw_lastlog',`
+@@ -834,12 +997,27 @@ interface(`auth_rw_lastlog',`
##
##
#
@@ -27670,7 +27671,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -854,15 +1031,15 @@ interface(`auth_domtrans_pam',`
+@@ -854,15 +1032,15 @@ interface(`auth_domtrans_pam',`
#
interface(`auth_signal_pam',`
gen_require(`
@@ -27689,7 +27690,7 @@ index 3efd5b6..9e85ea0 100644
##
##
##
-@@ -875,13 +1052,33 @@ interface(`auth_signal_pam',`
+@@ -875,13 +1053,33 @@ interface(`auth_signal_pam',`
##
##
#
@@ -27727,7 +27728,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -959,9 +1156,30 @@ interface(`auth_manage_var_auth',`
+@@ -959,9 +1157,30 @@ interface(`auth_manage_var_auth',`
')
files_search_var($1)
@@ -27761,7 +27762,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -1040,6 +1258,10 @@ interface(`auth_manage_pam_pid',`
+@@ -1040,6 +1259,10 @@ interface(`auth_manage_pam_pid',`
files_search_pids($1)
allow $1 pam_var_run_t:dir manage_dir_perms;
allow $1 pam_var_run_t:file manage_file_perms;
@@ -27772,7 +27773,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -1176,6 +1398,7 @@ interface(`auth_manage_pam_console_data',`
+@@ -1176,6 +1399,7 @@ interface(`auth_manage_pam_console_data',`
files_search_pids($1)
manage_files_pattern($1, pam_var_console_t, pam_var_console_t)
manage_lnk_files_pattern($1, pam_var_console_t, pam_var_console_t)
@@ -27780,7 +27781,7 @@ index 3efd5b6..9e85ea0 100644
')
#######################################
-@@ -1576,6 +1799,25 @@ interface(`auth_setattr_login_records',`
+@@ -1576,6 +1800,25 @@ interface(`auth_setattr_login_records',`
########################################
##
@@ -27806,7 +27807,7 @@ index 3efd5b6..9e85ea0 100644
## Read login records files (/var/log/wtmp).
##
##
-@@ -1726,24 +1968,7 @@ interface(`auth_manage_login_records',`
+@@ -1726,24 +1969,7 @@ interface(`auth_manage_login_records',`
logging_rw_generic_log_dirs($1)
allow $1 wtmp_t:file manage_file_perms;
@@ -27832,7 +27833,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -1767,11 +1992,13 @@ interface(`auth_relabel_login_records',`
+@@ -1767,11 +1993,13 @@ interface(`auth_relabel_login_records',`
##
#
interface(`auth_use_nsswitch',`
@@ -27849,7 +27850,7 @@ index 3efd5b6..9e85ea0 100644
')
########################################
-@@ -1805,3 +2032,280 @@ interface(`auth_unconfined',`
+@@ -1805,3 +2033,280 @@ interface(`auth_unconfined',`
typeattribute $1 can_write_shadow_passwords;
typeattribute $1 can_relabelto_shadow_passwords;
')
@@ -37269,7 +37270,7 @@ index d43f3b1..870bc36 100644
+/etc/share/selinux/targeted(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
+/etc/share/selinux/mls(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
-index 3822072..1b9a765 100644
+index 3822072..929107c 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -135,6 +135,42 @@ interface(`seutil_exec_loadpolicy',`
@@ -37289,7 +37290,7 @@ index 3822072..1b9a765 100644
+ type load_policy_exec_t;
+ ')
+
-+ allow $1 load_policy_exec_t:file audit_access;
++ allow $1 load_policy_exec_t:file execute;
+')
+
+########################################
@@ -37486,7 +37487,7 @@ index 3822072..1b9a765 100644
+ type setfiles_exec_t;
+ ')
+
-+ allow $1 setfiles_exec_t:file audit_access;
++ allow $1 setfiles_exec_t:file execute;
+')
+
+########################################
@@ -37863,28 +37864,10 @@ index 3822072..1b9a765 100644
')
#######################################
-@@ -1067,6 +1512,42 @@ interface(`seutil_get_semanage_read_lock',`
+@@ -1067,6 +1512,24 @@ interface(`seutil_get_semanage_read_lock',`
#######################################
##
-+## Allow access check on module store
-+##
-+##
-+##
-+## Domain allowed access.
-+##
-+##
-+#
-+interface(`seutil_access_check_semanage_read_lock',`
-+ gen_require(`
-+ type semanage_read_lock_t;
-+ ')
-+
-+ allow $1 semanage_read_lock_t:file audit_access;
-+')
-+
-+#######################################
-+##
+## Dontaudit access check on module store
+##
+##
@@ -37898,7 +37881,7 @@ index 3822072..1b9a765 100644
+ type semanage_read_lock_t;
+ ')
+
-+ dontaudit $1 semanage_read_lock_t:file audit_access;
++ dontaudit $1 semanage_read_lock_t:dir_file_class_set audit_access;
+')
+
+#######################################
@@ -37906,7 +37889,7 @@ index 3822072..1b9a765 100644
## Get trans lock on module store
##
##
-@@ -1137,3 +1618,122 @@ interface(`seutil_dontaudit_libselinux_linked',`
+@@ -1137,3 +1600,122 @@ interface(`seutil_dontaudit_libselinux_linked',`
selinux_dontaudit_get_fs_mount($1)
seutil_dontaudit_read_config($1)
')
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index 3f12b14..b12d4b0 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -21620,7 +21620,7 @@ index 62d22cb..f8ab4af 100644
+ files_var_filetrans($1, system_dbusd_var_lib_t, dir, "ibus")
')
diff --git a/dbus.te b/dbus.te
-index c9998c8..94ff984 100644
+index c9998c8..011faba 100644
--- a/dbus.te
+++ b/dbus.te
@@ -4,17 +4,15 @@ gen_require(`
@@ -21744,7 +21744,7 @@ index c9998c8..94ff984 100644
mls_fd_use_all_levels(system_dbusd_t)
mls_rangetrans_target(system_dbusd_t)
mls_file_read_all_levels(system_dbusd_t)
-@@ -123,66 +122,165 @@ term_dontaudit_use_console(system_dbusd_t)
+@@ -123,66 +122,166 @@ term_dontaudit_use_console(system_dbusd_t)
auth_use_nsswitch(system_dbusd_t)
auth_read_pam_console_data(system_dbusd_t)
@@ -21753,6 +21753,7 @@ index c9998c8..94ff984 100644
+corecmd_read_bin_sockets(system_dbusd_t)
+# needed for system-tools-backends
+corecmd_exec_shell(system_dbusd_t)
++corecmd_exec_bin(system_dbusd_t)
+
+domain_use_interactive_fds(system_dbusd_t)
+domain_read_all_domains_state(system_dbusd_t)
@@ -21924,7 +21925,7 @@ index c9998c8..94ff984 100644
kernel_read_kernel_sysctls(session_bus_type)
corecmd_list_bin(session_bus_type)
-@@ -191,23 +289,18 @@ corecmd_read_bin_files(session_bus_type)
+@@ -191,23 +290,18 @@ corecmd_read_bin_files(session_bus_type)
corecmd_read_bin_pipes(session_bus_type)
corecmd_read_bin_sockets(session_bus_type)
@@ -21949,7 +21950,7 @@ index c9998c8..94ff984 100644
files_dontaudit_search_var(session_bus_type)
fs_getattr_romfs(session_bus_type)
-@@ -215,7 +308,6 @@ fs_getattr_xattr_fs(session_bus_type)
+@@ -215,7 +309,6 @@ fs_getattr_xattr_fs(session_bus_type)
fs_list_inotifyfs(session_bus_type)
fs_dontaudit_list_nfs(session_bus_type)
@@ -21957,7 +21958,7 @@ index c9998c8..94ff984 100644
selinux_validate_context(session_bus_type)
selinux_compute_access_vector(session_bus_type)
selinux_compute_create_context(session_bus_type)
-@@ -225,18 +317,36 @@ selinux_compute_user_contexts(session_bus_type)
+@@ -225,18 +318,36 @@ selinux_compute_user_contexts(session_bus_type)
auth_read_pam_console_data(session_bus_type)
logging_send_audit_msgs(session_bus_type)
@@ -21999,7 +22000,7 @@ index c9998c8..94ff984 100644
')
########################################
-@@ -244,5 +354,9 @@ optional_policy(`
+@@ -244,5 +355,9 @@ optional_policy(`
# Unconfined access to this module
#
@@ -30267,10 +30268,10 @@ index c21a528..a746a2b 100644
/var/lib/glance(/.*)? gen_context(system_u:object_r:glance_var_lib_t,s0)
diff --git a/glance.if b/glance.if
-index 9eacb2c..2f3fa34 100644
+index 9eacb2c..7b19ad2 100644
--- a/glance.if
+++ b/glance.if
-@@ -1,5 +1,36 @@
+@@ -1,5 +1,38 @@
## OpenStack image registry and delivery service.
+#######################################
@@ -30302,12 +30303,14 @@ index 9eacb2c..2f3fa34 100644
+
+ logging_send_syslog_msg($1_t)
+
++ auth_use_nsswitch($1_t)
++
+')
+
########################################
##
## Execute a domain transition to
-@@ -26,9 +57,9 @@ interface(`glance_domtrans_registry',`
+@@ -26,9 +59,9 @@ interface(`glance_domtrans_registry',`
## run glance api.
##
##
@@ -30319,7 +30322,7 @@ index 9eacb2c..2f3fa34 100644
##
#
interface(`glance_domtrans_api',`
-@@ -242,8 +273,13 @@ interface(`glance_admin',`
+@@ -242,8 +275,13 @@ interface(`glance_admin',`
type glance_registry_initrc_exec_t, glance_api_initrc_exec_t;
')
@@ -39451,7 +39454,7 @@ index f6c00d8..7b777ab 100644
+ kerberos_tmp_filetrans_host_rcache($1, "ldap_55")
')
diff --git a/kerberos.te b/kerberos.te
-index 8833d59..534f815 100644
+index 8833d59..61910d0 100644
--- a/kerberos.te
+++ b/kerberos.te
@@ -6,11 +6,11 @@ policy_module(kerberos, 1.12.0)
@@ -39774,8 +39777,12 @@ index 8833d59..534f815 100644
allow kpropd_t krb5_host_rcache_t:file manage_file_perms;
-@@ -303,26 +341,20 @@ files_tmp_filetrans(kpropd_t, krb5kdc_tmp_t, { file dir })
+@@ -301,27 +339,25 @@ manage_dirs_pattern(kpropd_t, krb5kdc_tmp_t, krb5kdc_tmp_t)
+ manage_files_pattern(kpropd_t, krb5kdc_tmp_t, krb5kdc_tmp_t)
+ files_tmp_filetrans(kpropd_t, krb5kdc_tmp_t, { file dir })
++kernel_read_system_state(kpropd_t)
++
corecmd_exec_bin(kpropd_t)
-corenet_all_recvfrom_unlabeled(kpropd_t)
@@ -39795,13 +39802,14 @@ index 8833d59..534f815 100644
selinux_validate_context(kpropd_t)
- logging_send_syslog_msg(kpropd_t)
+-logging_send_syslog_msg(kpropd_t)
++auth_use_nsswitch(kpropd_t)
-miscfiles_read_localization(kpropd_t)
--
++logging_send_syslog_msg(kpropd_t)
+
seutil_read_file_contexts(kpropd_t)
- sysnet_dns_name_resolve(kpropd_t)
diff --git a/kerneloops.if b/kerneloops.if
index 714448f..fa0c994 100644
--- a/kerneloops.if
@@ -42048,10 +42056,10 @@ index 0000000..236707b
+
diff --git a/linuxptp.te b/linuxptp.te
new file mode 100644
-index 0000000..affa9bd
+index 0000000..15aea48
--- /dev/null
+++ b/linuxptp.te
-@@ -0,0 +1,173 @@
+@@ -0,0 +1,172 @@
+policy_module(linuxptp, 1.0.0)
+
+
@@ -42224,7 +42232,6 @@ index 0000000..affa9bd
+optional_policy(`
+ gpsd_rw_shm(ptp4l_t)
+')
-+
diff --git a/lircd.if b/lircd.if
index dff21a7..b6981c8 100644
--- a/lircd.if
@@ -54533,7 +54540,7 @@ index 94b9734..448a7e8 100644
+/var/run/wpa_supplicant(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
/var/run/wpa_supplicant-global -s gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
diff --git a/networkmanager.if b/networkmanager.if
-index 86dc29d..1cd0d0e 100644
+index 86dc29d..98fdac1 100644
--- a/networkmanager.if
+++ b/networkmanager.if
@@ -2,7 +2,7 @@
@@ -54757,7 +54764,7 @@ index 86dc29d..1cd0d0e 100644
##
##
##
-@@ -241,13 +306,13 @@ interface(`networkmanager_append_log_files',`
+@@ -241,13 +306,32 @@ interface(`networkmanager_append_log_files',`
##
##
#
@@ -54770,10 +54777,29 @@ index 86dc29d..1cd0d0e 100644
files_search_pids($1)
- allow $1 NetworkManager_var_run_t:file read_file_perms;
+ manage_files_pattern($1, NetworkManager_var_run_t, NetworkManager_var_run_t)
++')
++
++########################################
++##
++## Manage NetworkManager PID sock files.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`networkmanager_manage_pid_sock_files',`
++ gen_require(`
++ type NetworkManager_var_run_t;
++ ')
++
++ files_search_pids($1)
++ manage_sock_files_pattern($1, NetworkManager_var_run_t, NetworkManager_var_run_t)
')
####################################
-@@ -272,14 +337,33 @@ interface(`networkmanager_stream_connect',`
+@@ -272,14 +356,33 @@ interface(`networkmanager_stream_connect',`
########################################
##
@@ -54809,7 +54835,7 @@ index 86dc29d..1cd0d0e 100644
##
##
## Role allowed access.
-@@ -287,33 +371,132 @@ interface(`networkmanager_stream_connect',`
+@@ -287,33 +390,132 @@ interface(`networkmanager_stream_connect',`
##
##
#
@@ -61915,7 +61941,7 @@ index 6837e9a..21e6dae 100644
domain_system_change_exemption($1)
role_transition $2 openvpn_initrc_exec_t system_r;
diff --git a/openvpn.te b/openvpn.te
-index 63957a3..ba34f72 100644
+index 63957a3..57fbf6d 100644
--- a/openvpn.te
+++ b/openvpn.te
@@ -6,6 +6,13 @@ policy_module(openvpn, 1.12.2)
@@ -62040,7 +62066,7 @@ index 63957a3..ba34f72 100644
')
tunable_policy(`openvpn_enable_homedirs && use_nfs_home_dirs',`
-@@ -164,10 +188,19 @@ tunable_policy(`openvpn_can_network_connect',`
+@@ -164,10 +188,20 @@ tunable_policy(`openvpn_can_network_connect',`
')
optional_policy(`
@@ -62054,13 +62080,14 @@ index 63957a3..ba34f72 100644
optional_policy(`
+ networkmanager_stream_connect(openvpn_t)
+ networkmanager_manage_pid_files(openvpn_t)
++ networkmanager_manage_pid_sock_files(openvpn_t)
+')
+
+optional_policy(`
dbus_system_bus_client(openvpn_t)
dbus_connect_system_bus(openvpn_t)
-@@ -175,3 +208,27 @@ optional_policy(`
+@@ -175,3 +209,27 @@ optional_policy(`
networkmanager_dbus_chat(openvpn_t)
')
')
@@ -73549,10 +73576,10 @@ index 6643b49..dd0c3d3 100644
optional_policy(`
diff --git a/puppet.fc b/puppet.fc
-index d68e26d..cad91e2 100644
+index d68e26d..d2c4d2a 100644
--- a/puppet.fc
+++ b/puppet.fc
-@@ -1,18 +1,20 @@
+@@ -1,18 +1,21 @@
-/etc/puppet(/.*)? gen_context(system_u:object_r:puppet_etc_t,s0)
+/etc/puppet(/.*)? gen_context(system_u:object_r:puppet_etc_t,s0)
@@ -73567,6 +73594,7 @@ index d68e26d..cad91e2 100644
+#helper scripts
+/usr/bin/start-puppet-agent -- gen_context(system_u:object_r:puppetagent_exec_t,s0)
+/usr/bin/start-puppet-master -- gen_context(system_u:object_r:puppetmaster_exec_t,s0)
++/usr/bin/start-puppet-ca -- gen_context(system_u:object_r:puppetca_exec_t,s0)
-/usr/sbin/puppetca -- gen_context(system_u:object_r:puppetca_exec_t,s0)
-/usr/sbin/puppetd -- gen_context(system_u:object_r:puppet_exec_t,s0)
@@ -85814,7 +85842,7 @@ index ef3b225..d248cd3 100644
init_labeled_script_domtrans($1, rpm_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/rpm.te b/rpm.te
-index 6fc360e..1abda8b 100644
+index 6fc360e..15fcd26 100644
--- a/rpm.te
+++ b/rpm.te
@@ -1,15 +1,13 @@
@@ -86156,7 +86184,7 @@ index 6fc360e..1abda8b 100644
mls_file_read_all_levels(rpm_script_t)
mls_file_write_all_levels(rpm_script_t)
-@@ -331,30 +331,52 @@ storage_raw_write_fixed_disk(rpm_script_t)
+@@ -331,30 +331,53 @@ storage_raw_write_fixed_disk(rpm_script_t)
term_getattr_unallocated_ttys(rpm_script_t)
term_list_ptys(rpm_script_t)
@@ -86186,6 +86214,7 @@ index 6fc360e..1abda8b 100644
+init_disable_services(rpm_script_t)
+init_enable_services(rpm_script_t)
+init_reload_services(rpm_script_t)
++init_manage_transient_unit(rpm_script_t)
init_domtrans_script(rpm_script_t)
init_telinit(rpm_script_t)
@@ -86218,7 +86247,7 @@ index 6fc360e..1abda8b 100644
ifdef(`distro_redhat',`
optional_policy(`
-@@ -363,41 +385,69 @@ ifdef(`distro_redhat',`
+@@ -363,41 +386,69 @@ ifdef(`distro_redhat',`
')
')
@@ -86299,7 +86328,7 @@ index 6fc360e..1abda8b 100644
optional_policy(`
java_domtrans_unconfined(rpm_script_t)
-@@ -409,6 +459,6 @@ optional_policy(`
+@@ -409,6 +460,6 @@ optional_policy(`
')
optional_policy(`
@@ -97492,7 +97521,7 @@ index a240455..f4d8c79 100644
- admin_pattern($1, sssd_log_t)
')
diff --git a/sssd.te b/sssd.te
-index 2d8db1f..dbb5dd6 100644
+index 2d8db1f..fe72f8e 100644
--- a/sssd.te
+++ b/sssd.te
@@ -28,9 +28,12 @@ logging_log_file(sssd_var_log_t)
@@ -97550,7 +97579,7 @@ index 2d8db1f..dbb5dd6 100644
corecmd_exec_bin(sssd_t)
-@@ -83,28 +79,36 @@ domain_read_all_domains_state(sssd_t)
+@@ -83,28 +79,34 @@ domain_read_all_domains_state(sssd_t)
domain_obj_id_change_exemption(sssd_t)
files_list_tmp(sssd_t)
@@ -97571,11 +97600,9 @@ index 2d8db1f..dbb5dd6 100644
+seutil_rw_login_config_dirs(sssd_t)
+seutil_manage_login_config_files(sssd_t)
+
-+seutil_access_check_module_store(sssd_t)
-+
-+seutil_access_check_load_policy(sssd_t)
-+seutil_access_check_setfiles(sssd_t)
-+seutil_access_check_semanage_read_lock(sssd_t)
++seutil_dontaudit_access_check_load_policy(sssd_t)
++seutil_dontaudit_access_check_setfiles(sssd_t)
++seutil_dontaudit_access_check_semanage_read_lock(sssd_t)
mls_file_read_to_clearance(sssd_t)
mls_socket_read_to_clearance(sssd_t)
@@ -97591,7 +97618,7 @@ index 2d8db1f..dbb5dd6 100644
init_read_utmp(sssd_t)
-@@ -112,18 +116,36 @@ logging_send_syslog_msg(sssd_t)
+@@ -112,18 +114,36 @@ logging_send_syslog_msg(sssd_t)
logging_send_audit_msgs(sssd_t)
miscfiles_read_generic_certs(sssd_t)
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 8aef00c..690ebbb 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 94%{?dist}
+Release: 95%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -604,6 +604,9 @@ SELinux Reference policy mls base module.
%endif
%changelog
+* Wed Nov 19 2014 Lukas Vrabec 3.13.1-95
+- Allow networkmanager manage also openvpn sock pid files.
+
* Wed Nov 19 2014 Lukas Vrabec 3.13.1-94
- Allow openvpn to create uuid connections in /var/run/NetworkManager with NM labeling.
- Allow sendmail to create dead.letter. BZ(1165443)