diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if index 866838fee..b053242a6 100644 --- a/policy/modules/system/systemd.if +++ b/policy/modules/system/systemd.if @@ -523,6 +523,25 @@ interface(`systemd_rw_networkd_netlink_route_sockets',` allow $1 systemd_networkd_t:netlink_route_socket client_stream_socket_perms; ') +####################################### +## +## Allow domain to read files generated by systemd_networkd +## +## +## +## domain allowed access +## +## +# + +interface(`systemd_read_networkd_runtime',` + gen_require(` + type systemd_networkd_var_run_t; + ') + + list_dirs_pattern($1, systemd_networkd_var_run_t, systemd_networkd_var_run_t) + read_files_pattern($1, systemd_networkd_var_run_t, systemd_networkd_var_run_t) +') ######################################## ## diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index 708b9f233..79774dd31 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -858,6 +858,7 @@ auth_use_nsswitch(systemd_resolved_t) seutil_read_file_contexts(systemd_resolved_t) systemd_log_parse_environment(systemd_resolved_t) +systemd_read_networkd_runtime(systemd_resolved_t) optional_policy(` dbus_system_bus_client(systemd_resolved_t)