diff --git a/policy/modules/apps/gnome.if b/policy/modules/apps/gnome.if
index 852f36f..92ab0c3 100644
--- a/policy/modules/apps/gnome.if
+++ b/policy/modules/apps/gnome.if
@@ -471,7 +471,7 @@ interface(`gnome_stream_connect',`
########################################
##
-## read gnome homedir content (.config)
+## list gnome homedir content (.config)
##
##
##
@@ -489,6 +489,24 @@ template(`gnome_list_home_config',`
########################################
##
+## read gnome homedir content (.config)
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+template(`gnome_read_home_config',`
+ gen_require(`
+ type config_home_t;
+ ')
+
+ read_files_pattern($1, config_home_t, config_home_t)
+')
+
+########################################
+##
## Read/Write all inherited gnome home config
##
##
diff --git a/policy/modules/roles/unconfineduser.te b/policy/modules/roles/unconfineduser.te
index faef468..821d0dd 100644
--- a/policy/modules/roles/unconfineduser.te
+++ b/policy/modules/roles/unconfineduser.te
@@ -186,7 +186,11 @@ optional_policy(`
')
optional_policy(`
- xserver_rw_shm(unconfined_usertype)
+ gen_require(`
+ type user_tmpfs_t;
+ ')
+
+ xserver_rw_session(unconfined_usertype, user_tmpfs_t)
xserver_run_xauth(unconfined_usertype, unconfined_r)
xserver_dbus_chat_xdm(unconfined_usertype)
')
diff --git a/policy/modules/services/icecast.te b/policy/modules/services/icecast.te
index fbcdd74..f441c9a 100644
--- a/policy/modules/services/icecast.te
+++ b/policy/modules/services/icecast.te
@@ -40,6 +40,7 @@ files_pid_filetrans(icecast_t, icecast_var_run_t, { file dir })
kernel_read_system_state(icecast_t)
corenet_tcp_bind_soundd_port(icecast_t)
+corenet_tcp_connect_soundd_port(icecast_t)
# Init script handling
domain_use_interactive_fds(icecast_t)
diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index a5d4a43..6581e4b 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -245,6 +245,10 @@ optional_policy(`
')
optional_policy(`
+ gnome_read_home_config(udev_t)
+')
+
+optional_policy(`
lvm_domtrans(udev_t)
')