Description of problem: I started my laptop (T480s with Thunderbolt) and logged in. SELinux is preventing boltd from 'read' accesses on the lnk_file 7FF47003-3B6C-4E5E-A227-E979824A85D1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that boltd should be allowed read access on the 7FF47003-3B6C-4E5E-A227-E979824A85D1 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'boltd' --raw | audit2allow -M my-boltd # semodule -X 300 -i my-boltd.pp Additional Information: Source Context system_u:system_r:boltd_t:s0 Target Context system_u:object_r:sysfs_t:s0 Target Objects 7FF47003-3B6C-4E5E-A227-E979824A85D1 [ lnk_file ] Source boltd Source Path boltd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.3-48.fc30.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.2.18-200.fc30.x86_64 #1 SMP Tue Oct 1 13:14:07 UTC 2019 x86_64 x86_64 Alert Count 1 First Seen 2019-10-07 10:13:58 CEST Last Seen 2019-10-07 10:13:58 CEST Local ID 9970c4dd-dc73-4cc2-b4b6-afe31b1800e4 Raw Audit Messages type=AVC msg=audit(1570436038.341:223): avc: denied { read } for pid=2635 comm="boltd" name="7FF47003-3B6C-4E5E-A227-E979824A85D1" dev="sysfs" ino=23728 scontext=system_u:system_r:boltd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file permissive=1 Hash: boltd,boltd_t,sysfs_t,lnk_file,read Version-Release number of selected component: selinux-policy-3.14.3-48.fc30.noarch Additional info: component: selinux-policy reporter: libreport-2.10.1 hashmarkername: setroubleshoot kernel: 5.2.18-200.fc30.x86_64 type: libreport Potential duplicate: bug 1758731
*** This bug has been marked as a duplicate of bug 1759019 ***