diff --git a/refpolicy/Changelog b/refpolicy/Changelog
index 33d8754..c0ef05b 100644
--- a/refpolicy/Changelog
+++ b/refpolicy/Changelog
@@ -1,3 +1,5 @@
+- Additional interfaces in corecommands, miscfiles, and userdomain
+ from Joy Latten.
- Miscellaneous fixes from Thomas Bleher.
- Deprecate module name as first parameter of optional_policy()
now that optionals are allowed everywhere.
diff --git a/refpolicy/policy/modules/kernel/corecommands.if b/refpolicy/policy/modules/kernel/corecommands.if
index 8302033..e129415 100644
--- a/refpolicy/policy/modules/kernel/corecommands.if
+++ b/refpolicy/policy/modules/kernel/corecommands.if
@@ -41,6 +41,42 @@ interface(`corecmd_bin_alias',`
########################################
##
+## Make general progams in bin an entrypoint for
+## the specified domain.
+##
+##
+##
+## The domain for which bin_t is an entrypoint.
+##
+##
+interface(`corecmd_bin_entry_type',`
+ gen_require(`
+ type bin_t;
+ ')
+
+ domain_entry_file($1,bin_t)
+')
+
+########################################
+##
+## Make general progams in sbin an entrypoint for
+## the specified domain.
+##
+##
+##
+## The domain for which sbin programs are an entrypoint.
+##
+##
+interface(`corecmd_sbin_entry_type',`
+ gen_require(`
+ type sbin_t;
+ ')
+
+ domain_entry_file($1,sbin_t)
+')
+
+########################################
+##
## Make the shell an entrypoint for the specified domain.
##
##
@@ -779,4 +815,3 @@ interface(`corecmd_exec_chroot',`
can_exec($1,chroot_exec_t)
allow $1 self:capability sys_chroot;
')
-
diff --git a/refpolicy/policy/modules/kernel/corecommands.te b/refpolicy/policy/modules/kernel/corecommands.te
index 1185d89..75dc4f1 100644
--- a/refpolicy/policy/modules/kernel/corecommands.te
+++ b/refpolicy/policy/modules/kernel/corecommands.te
@@ -1,5 +1,5 @@
-policy_module(corecommands,1.3.4)
+policy_module(corecommands,1.3.5)
########################################
#
diff --git a/refpolicy/policy/modules/system/miscfiles.if b/refpolicy/policy/modules/system/miscfiles.if
index ac3e8f6..7838a10 100644
--- a/refpolicy/policy/modules/system/miscfiles.if
+++ b/refpolicy/policy/modules/system/miscfiles.if
@@ -303,3 +303,62 @@ interface(`miscfiles_exec_tetex_data',`
allow $1 tetex_data_t:dir r_dir_perms;
can_exec($1,tetex_data_t)
')
+
+########################################
+##
+## Let test files be an entry point for
+## a specified domain.
+##
+##
+##
+## Domain to be entered.
+##
+##
+#
+interface(`miscfiles_domain_entry_test_files',`
+ gen_require(`
+ type test_file_t;
+ ')
+
+ domain_entry_file($1, test_file_t)
+')
+
+########################################
+##
+## Read test files and directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`miscfiles_read_test_files',`
+ gen_require(`
+ type test_file_t;
+ ')
+
+ allow $1 test_file_t:dir r_dir_perms;
+ allow $1 test_file_t:file r_file_perms;
+ allow $1 test_file_t:lnk_file r_file_perms;
+')
+
+########################################
+##
+## Execute test files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`miscfiles_exec_test_files',`
+ gen_require(`
+ type test_file_t;
+ ')
+
+ allow $1 test_file_t:dir r_dir_perms;
+ allow $1 test_file_t:lnk_file r_file_perms;
+ can_exec($1, test_file_t)
+')
diff --git a/refpolicy/policy/modules/system/miscfiles.te b/refpolicy/policy/modules/system/miscfiles.te
index f12850f..3720757 100644
--- a/refpolicy/policy/modules/system/miscfiles.te
+++ b/refpolicy/policy/modules/system/miscfiles.te
@@ -1,5 +1,5 @@
-policy_module(miscfiles,1.0.0)
+policy_module(miscfiles,1.0.1)
########################################
#
diff --git a/refpolicy/policy/modules/system/userdomain.if b/refpolicy/policy/modules/system/userdomain.if
index eb07854..dc63864 100644
--- a/refpolicy/policy/modules/system/userdomain.if
+++ b/refpolicy/policy/modules/system/userdomain.if
@@ -3241,6 +3241,115 @@ interface(`userdom_entry_spec_domtrans_sysadm',`
########################################
##
+## Allow sysadm to execute a generic bin program in
+## a specified domain. This is an explicit transition,
+## requiring the caller to use setexeccon().
+##
+##
+##
+## Allow sysadm to execute a generic bin program in
+## a specified domain.
+##
+##
+## This is a interface to support third party modules
+## and its use is not allowed in upstream reference
+## policy.
+##
+##
+##
+##
+## Domain to execute in.
+##
+##
+#
+interface(`userdom_sysadm_bin_spec_domtrans_to',`
+ gen_require(`
+ type sysadm_t;
+ ')
+
+ corecmd_bin_spec_domtrans(sysadm_t,$1)
+
+ allow sysadm_t $1:fd use;
+ allow $1 sysadm_t:fd use;
+ allow $1 sysadm_t:fifo_file rw_file_perms;
+ allow $1 sysadm_t:process sigchld;
+')
+
+########################################
+##
+## Allow sysadm to execute a generic sbin program in
+## a specified domain. This is an explicit transition,
+## requiring the caller to use setexeccon().
+##
+##
+##
+## Allow sysadm to execute a generic sbin program in
+## a specified domain.
+##
+##
+## This is a interface to support third party modules
+## and its use is not allowed in upstream reference
+## policy.
+##
+##
+##
+##
+## Domain to execute in.
+##
+##
+#
+interface(`userdom_sysadm_sbin_spec_domtrans_to',`
+ gen_require(`
+ type sysadm_t;
+ ')
+
+ corecmd_sbin_spec_domtrans(sysadm_t, $1)
+
+ allow sysadm_t $1:fd use;
+ allow $1 sysadm_t:fd use;
+ allow $1 sysadm_t:fifo_file rw_file_perms;
+ allow $1 sysadm_t:process sigchld;
+')
+
+########################################
+##
+## Allow sysadm to execute all entrypoint files
+## in the specified domain. This is an explicit
+## transition, requiring the caller to use setexeccon().
+##
+##
+##
+## Allow sysadm to execute all entrypoint files
+## in the specified domain. This is an explicit
+## transition, requiring the caller to use setexeccon().
+##
+##
+## This is a interface to support third party modules
+## and its use is not allowed in upstream reference
+## policy.
+##
+##
+##
+##
+## Domain to execute in.
+##
+##
+#
+interface(`userdom_sysadm_entry_spec_domtrans_to',`
+ gen_require(`
+ type sysadm_t;
+ ')
+
+ domain_entry_file_spec_domtrans(sysadm_t, $1)
+
+ allow sysadm_t $1:fd use;
+ allow $1 sysadm_t:fd use;
+ allow $1 sysadm_t:fifo_file rw_file_perms;
+ allow $1 sysadm_t:process sigchld;
+')
+
+########################################
+##
## Search the staff users home directory.
##
##
diff --git a/refpolicy/policy/modules/system/userdomain.te b/refpolicy/policy/modules/system/userdomain.te
index c28ad16..fda1e87 100644
--- a/refpolicy/policy/modules/system/userdomain.te
+++ b/refpolicy/policy/modules/system/userdomain.te
@@ -1,5 +1,5 @@
-policy_module(userdomain,1.3.5)
+policy_module(userdomain,1.3.6)
gen_require(`
role sysadm_r, staff_r, user_r;