diff --git a/policy/modules/services/smartmon.te b/policy/modules/services/smartmon.te
index b5c1a40b1..82bfa992d 100644
--- a/policy/modules/services/smartmon.te
+++ b/policy/modules/services/smartmon.te
@@ -120,3 +120,6 @@ optional_policy(`
seutil_sigchld_newrole(fsdaemon_t)
')
+optional_policy(`
+ fstools_read_fsadm_db_files(fsdaemon_t)
+')
diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if
index f994965af..d82b4b282 100644
--- a/policy/modules/system/fstools.if
+++ b/policy/modules/system/fstools.if
@@ -264,3 +264,21 @@ interface(`fstools_manage_swap_files',`
allow $1 swapfile_t:file manage_file_perms;
')
+
+########################################
+##
+## Read fsadm_db_t files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`fstools_read_fsadm_db_files',`
+ gen_require(`
+ type fsadm_db_t;
+ ')
+
+ read_files_pattern($1, fsadm_db_t, fsadm_db_t)
+')