diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 42de367d7..20c81fb21 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -6737,6 +6737,25 @@ interface(`files_relabel_all_pid_dirs',`
relabel_dirs_pattern($1, pidfile, pidfile)
')
+########################################
+##
+## Relabel to/from all var_run (pid) socket files
+##
+##
+##
+## Domain alloed access.
+##
+##
+#
+interface(`files_relabel_all_pid_sock_files',`
+ gen_require(`
+ attribute pidfile;
+ ')
+
+ relabel_sock_files_pattern($1, pidfile, pidfile)
+')
+
+
########################################
##
## Relabel to/from all var_run (pid) files and directories
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 17c31fa78..a704d3ce3 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -320,6 +320,7 @@ ifdef(`init_systemd',`
files_mounton_root(init_t)
files_search_pids(init_t)
files_relabel_all_pids(init_t)
+ files_relabel_all_pid_sock_files(init_t)
files_relabelto_etc_runtime_dirs(init_t)
files_relabelto_etc_runtime_files(init_t)
files_read_all_locks(init_t)