diff --git a/policy/modules/services/smartmon.te b/policy/modules/services/smartmon.te index b5c1a40b1..82bfa992d 100644 --- a/policy/modules/services/smartmon.te +++ b/policy/modules/services/smartmon.te @@ -120,3 +120,6 @@ optional_policy(` seutil_sigchld_newrole(fsdaemon_t) ') +optional_policy(` + fstools_read_fsadm_db_files(fsdaemon_t) +') diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if index f994965af..d82b4b282 100644 --- a/policy/modules/system/fstools.if +++ b/policy/modules/system/fstools.if @@ -264,3 +264,21 @@ interface(`fstools_manage_swap_files',` allow $1 swapfile_t:file manage_file_perms; ') + +######################################## +## +## Read fsadm_db_t files. +## +## +## +## Domain allowed access. +## +## +# +interface(`fstools_read_fsadm_db_files',` + gen_require(` + type fsadm_db_t; + ') + + read_files_pattern($1, fsadm_db_t, fsadm_db_t) +')