diff --git a/policy/modules/system/selinuxutil.fc b/policy/modules/system/selinuxutil.fc
index a627a15bd..80bfb608f 100644
--- a/policy/modules/system/selinuxutil.fc
+++ b/policy/modules/system/selinuxutil.fc
@@ -48,6 +48,9 @@
/usr/sbin/setsebool -- gen_context(system_u:object_r:semanage_exec_t,s0)
/usr/sbin/semanage -- gen_context(system_u:object_r:semanage_exec_t,s0)
/usr/sbin/semodule -- gen_context(system_u:object_r:semanage_exec_t,s0)
+
+/usr/share/system-config-selinux/selinux_server\.py -- gen_context(system_u:object_r:selinux_dbus_exec_t,s0)
+
/usr/libexec/selinux/semanage_migrate_store -- gen_context(system_u:object_r:semanage_exec_t,s0)
#
diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
index 86411f9fc..1807125be 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -1,5 +1,26 @@
## Policy for SELinux policy and userland applications.
+########################################
+##
+## Send and receive messages from
+## selinux semanage dbus interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`seutil_semanage_dbus_chat',`
+ gen_require(`
+ type selinux_dbus_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 selinux_dbus_t:dbus send_msg;
+ allow selinux_dbus_t $1:dbus send_msg;
+')
+
#######################################
##
## Execute checkpolicy in the checkpolicy domain.
diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
index 3eedf82c3..7d664bed6 100644
--- a/policy/modules/system/selinuxutil.te
+++ b/policy/modules/system/selinuxutil.te
@@ -97,6 +97,10 @@ application_domain(run_init_t, run_init_exec_t)
domain_system_change_exemption(run_init_t)
role run_init_roles types run_init_t;
+type selinux_dbus_t;
+type selinux_dbus_exec_t;
+dbus_system_domain(selinux_dbus_t, selinux_dbus_exec_t)
+
type semanage_t;
type semanage_exec_t;
application_domain(semanage_t, semanage_exec_t)
@@ -482,6 +486,25 @@ optional_policy(`
daemontools_domtrans_start(run_init_t)
')
+########################################
+#
+# selinux DBUS local policy
+#
+
+allow selinux_dbus_t self:fifo_file rw_inherited_fifo_file_perms;
+allow selinux_dbus_t self:unix_stream_socket create_socket_perms;
+
+corecmd_exec_bin(selinux_dbus_t)
+
+files_read_etc_symlinks(selinux_dbus_t)
+files_list_usr(selinux_dbus_t)
+
+policykit_dbus_chat(selinux_dbus_t)
+
+miscfiles_read_localization(selinux_dbus_t)
+
+seutil_domtrans_semanage(selinux_dbus_t)
+
########################################
#
# semodule local policy