diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
index 866838fee..b053242a6 100644
--- a/policy/modules/system/systemd.if
+++ b/policy/modules/system/systemd.if
@@ -523,6 +523,25 @@ interface(`systemd_rw_networkd_netlink_route_sockets',`
allow $1 systemd_networkd_t:netlink_route_socket client_stream_socket_perms;
')
+#######################################
+##
+## Allow domain to read files generated by systemd_networkd
+##
+##
+##
+## domain allowed access
+##
+##
+#
+
+interface(`systemd_read_networkd_runtime',`
+ gen_require(`
+ type systemd_networkd_var_run_t;
+ ')
+
+ list_dirs_pattern($1, systemd_networkd_var_run_t, systemd_networkd_var_run_t)
+ read_files_pattern($1, systemd_networkd_var_run_t, systemd_networkd_var_run_t)
+')
########################################
##
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index 708b9f233..79774dd31 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -858,6 +858,7 @@ auth_use_nsswitch(systemd_resolved_t)
seutil_read_file_contexts(systemd_resolved_t)
systemd_log_parse_environment(systemd_resolved_t)
+systemd_read_networkd_runtime(systemd_resolved_t)
optional_policy(`
dbus_system_bus_client(systemd_resolved_t)