Description of problem: This happened immediately after logging into a Cinnamon session. SELinux is preventing pulseaudio from 'map' accesses on the file /home/gholms/.config/pulse/1aed1b1d684145f0b3b77b0530662854-card-database.tdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that pulseaudio should be allowed map access on the 1aed1b1d684145f0b3b77b0530662854-card-database.tdb file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'pulseaudio' --raw | audit2allow -M my-pulseaudio # semodule -X 300 -i my-pulseaudio.pp Additional Information: Source Context staff_u:staff_r:pulseaudio_t:s0-s0:c0.c1023 Target Context staff_u:object_r:pulseaudio_home_t:s0 Target Objects /home/gholms/.config/pulse/1aed1b1d684145f0b3b77b0 530662854-card-database.tdb [ file ] Source pulseaudio Source Path pulseaudio Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-283.16.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.13.13-300.fc27.x86_64 #1 SMP Wed Nov 15 15:47:50 UTC 2017 x86_64 x86_64 Alert Count 3 First Seen 2017-11-21 08:47:08 PST Last Seen 2017-11-21 08:47:08 PST Local ID 2cf00b57-7344-4251-ae4f-317fc69277bb Raw Audit Messages type=AVC msg=audit(1511282828.881:245): avc: denied { map } for pid=2141 comm="pulseaudio" path="/home/gholms/.config/pulse/1aed1b1d684145f0b3b77b0530662854-card-database.tdb" dev="dm-7" ino=75522379 scontext=staff_u:staff_r:pulseaudio_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:pulseaudio_home_t:s0 tclass=file permissive=0 Hash: pulseaudio,pulseaudio_t,pulseaudio_home_t,file,map Version-Release number of selected component: selinux-policy-3.13.1-283.16.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.3 hashmarkername: setroubleshoot kernel: 4.13.13-300.fc27.x86_64 type: libreport
selinux-policy-3.13.1-283.18.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.18.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.