diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 2b86191fb..45163753a 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -433,6 +433,7 @@ ifdef(`init_systemd',`
logging_send_audit_msgs(init_t)
logging_relabelto_devlog_sock_files(init_t)
logging_relabel_generic_log_dirs(init_t)
+ logging_audit_socket_activation(init_t)
# lvm2-activation-generator checks file labels
seutil_read_file_contexts(init_t)
diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
index 5e4c0bacf..4223e6b76 100644
--- a/policy/modules/system/logging.if
+++ b/policy/modules/system/logging.if
@@ -484,6 +484,25 @@ interface(`logging_setattr_syslogd_tmp_files',`
allow $1 syslogd_tmp_t:file setattr;
')
+########################################
+##
+## Allow the domain to create the audit socket
+## for syslogd.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`logging_audit_socket_activation', `
+ gen_require(`
+ type syslogd_t;
+ ')
+
+ allow $1 syslogd_t:netlink_audit_socket create_socket_perms;
+')
+
########################################
##
## Relabel to and from syslog temporary file type.