diff --git a/refpolicy/policy/modules/admin/amanda.te b/refpolicy/policy/modules/admin/amanda.te
index 157ab1430..4a25d6c33 100644
--- a/refpolicy/policy/modules/admin/amanda.te
+++ b/refpolicy/policy/modules/admin/amanda.te
@@ -115,6 +115,10 @@ files_create_tmp_files(amanda_t, amanda_tmp_t, { file dir })
kernel_read_system_state(amanda_t)
kernel_read_kernel_sysctl(amanda_t)
kernel_dontaudit_getattr_unlabeled_file(amanda_t)
+kernel_dontaudit_read_proc_symlink(amanda_t)
+
+# Added for targeted policy
+term_use_unallocated_tty(amanda_t)
corenet_tcp_sendrecv_all_if(amanda_t)
corenet_udp_sendrecv_all_if(amanda_t)
diff --git a/refpolicy/policy/modules/kernel/kernel.if b/refpolicy/policy/modules/kernel/kernel.if
index 6d557ad2c..bdd44b94d 100644
--- a/refpolicy/policy/modules/kernel/kernel.if
+++ b/refpolicy/policy/modules/kernel/kernel.if
@@ -568,6 +568,24 @@ interface(`kernel_dontaudit_read_system_state',`
dontaudit $1 proc_t:file read;
')
+########################################
+##
+## Do not audit attempts by caller to
+## read system state information in proc.
+##
+##
+## The process type not to audit.
+##
+#
+interface(`kernel_dontaudit_read_proc_symlink',`
+ gen_require(`
+ type proc_t;
+ class lnk_file read;
+ ')
+
+ dontaudit $1 proc_t:lnk_file read;
+')
+
#######################################
##
## Allow caller to read the state information for software raid.