diff --git a/refpolicy/policy/modules/services/portmap.te b/refpolicy/policy/modules/services/portmap.te
index 80e2b5a..c9dcd28 100644
--- a/refpolicy/policy/modules/services/portmap.te
+++ b/refpolicy/policy/modules/services/portmap.te
@@ -39,6 +39,7 @@ allow portmap_t portmap_tmp_t:file create_file_perms;
 files_create_tmp_files(portmap_t, portmap_tmp_t, { file dir })
 
 allow portmap_t portmap_var_run_t:file create_file_perms;
+allow portmap_t portmap_var_run_t:dir rw_dir_perms;
 files_create_pid(portmap_t,portmap_var_run_t)
 
 kernel_read_kernel_sysctl(portmap_t)
diff --git a/refpolicy/policy/modules/services/rlogin.te b/refpolicy/policy/modules/services/rlogin.te
index ab2d4e9..17d8e1e 100644
--- a/refpolicy/policy/modules/services/rlogin.te
+++ b/refpolicy/policy/modules/services/rlogin.te
@@ -44,6 +44,7 @@ allow rlogind_t rlogind_tmp_t:file create_file_perms;
 files_create_tmp_files(rlogind_t, rlogind_tmp_t, { file dir })
 
 allow rlogind_t rlogind_var_run_t:file create_file_perms;
+allow rlogind_t rlogind_var_run_t:dir rw_dir_perms;
 files_create_pid(rlogind_t,rlogind_var_run_t)
 
 kernel_read_kernel_sysctl(rlogind_t)
diff --git a/refpolicy/policy/modules/services/rsync.te b/refpolicy/policy/modules/services/rsync.te
index 514a3df..8c2719e 100644
--- a/refpolicy/policy/modules/services/rsync.te
+++ b/refpolicy/policy/modules/services/rsync.te
@@ -48,6 +48,7 @@ allow rsync_t rsync_tmp_t:file create_file_perms;
 files_create_tmp_files(rsync_t, rsync_tmp_t, { file dir })
 
 allow rsync_t rsync_var_run_t:file create_file_perms;
+allow rsync_t rsync_var_run_t:dir rw_dir_perms;
 files_create_pid(rsync_t,rsync_var_run_t)
 
 kernel_read_kernel_sysctl(rsync_t)
diff --git a/refpolicy/policy/modules/system/logging.te b/refpolicy/policy/modules/system/logging.te
index e7869a5..77e6b6e 100644
--- a/refpolicy/policy/modules/system/logging.te
+++ b/refpolicy/policy/modules/system/logging.te
@@ -279,6 +279,7 @@ files_create_pid(syslogd_t,syslogd_var_run_t,file)
 
 # manage pid file
 allow syslogd_t syslogd_var_run_t:file create_file_perms;
+allow syslogd_t syslogd_var_run_t:dir rw_dir_perms;
 files_create_pid(syslogd_t,syslogd_var_run_t)
 
 kernel_read_kernel_sysctl(syslogd_t)