Description of problem: SELinux is preventing gdm-wayland-ses from 'read' accesses on the lnk_file /var/lib/dbus/machine-id. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that gdm-wayland-ses should be allowed read access on the machine-id lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'gdm-wayland-ses' --raw | audit2allow -M my-gdmwaylandses # semodule -X 300 -i my-gdmwaylandses.pp Additional Information: Source Context xguest_u:xguest_r:xguest_t:s0 Target Context system_u:object_r:system_dbusd_var_lib_t:s0 Target Objects /var/lib/dbus/machine-id [ lnk_file ] Source gdm-wayland-ses Source Path gdm-wayland-ses Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-260.1.fc26.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.11.10-300.fc26.x86_64 #1 SMP Wed Jul 12 17:05:39 UTC 2017 x86_64 x86_64 Alert Count 5 First Seen 2017-07-25 18:38:10 AEST Last Seen 2017-07-25 18:39:23 AEST Local ID 6c81a7de-3bce-44e2-9a7f-88ca15cb37cd Raw Audit Messages type=AVC msg=audit(1500971963.379:1028): avc: denied { read } for pid=1794 comm="gdm-wayland-ses" name="machine-id" dev="nvme0n1p1" ino=108 scontext=xguest_u:xguest_r:xguest_t:s0 tcontext=system_u:object_r:system_dbusd_var_lib_t:s0 tclass=lnk_file permissive=0 Hash: gdm-wayland-ses,xguest_t,system_dbusd_var_lib_t,lnk_file,read Version-Release number of selected component: selinux-policy-3.13.1-260.1.fc26.noarch Additional info: component: selinux-policy reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.11.10-300.fc26.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1467036 ***