diff --git a/policy/modules/contrib/lldpad.te b/policy/modules/contrib/lldpad.te
index a59c715c9e..d5b2cbe6ed 100644
--- a/policy/modules/contrib/lldpad.te
+++ b/policy/modules/contrib/lldpad.te
@@ -88,11 +88,16 @@ optional_policy(`
snmp_stream_connect(lldpad_t)
')
+optional_policy(`
+ sysadm_dgram_send(lldpad_t)
+')
+
optional_policy(`
sysnet_read_config(lldpad_t)
')
optional_policy(`
+ systemd_machined_stream_connect(lldpad_t)
systemd_userdbd_stream_connect(lldpad_t)
')
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
index fb64880eb1..762b4e84c6 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
@@ -208,6 +208,10 @@ optional_policy(`
iotop_run(staff_t, staff_r)
')
+optional_policy(`
+ lldpad_dgram_send(staff_t)
+')
+
optional_policy(`
logadm_role_change(staff_r)
')
diff --git a/policy/modules/roles/sysadm.if b/policy/modules/roles/sysadm.if
index 36740eab39..24970ea227 100644
--- a/policy/modules/roles/sysadm.if
+++ b/policy/modules/roles/sysadm.if
@@ -253,3 +253,21 @@ interface(`sysadm_rw_pipes',`
allow $1 sysadm_t:fifo_file rw_fifo_file_perms;
')
+
+########################################
+##
+## Send a message to sysadm user over a datagram socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`sysadm_dgram_send',`
+ gen_require(`
+ type sysadm_t;
+ ')
+
+ allow $1 sysadm_t:unix_dgram_socket sendto;
+')
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
index f7afd1be4c..29b6d361c7 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -379,6 +379,10 @@ optional_policy(`
libs_run_ldconfig(sysadm_t, sysadm_r)
')
+optional_policy(`
+ lldpad_dgram_send(sysadm_t)
+')
+
optional_policy(`
logrotate_run(sysadm_t, sysadm_r)
')
diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
index ffed3193ea..3ae83d6490 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
@@ -95,6 +95,10 @@ optional_policy(`
irc_role(user_r, user_t)
')
+optional_policy(`
+ lldpad_dgram_send(user_t)
+')
+
optional_policy(`
oident_manage_user_content(user_t)
oident_relabel_user_content(user_t)