Description of problem: SELinux is preventing colord from 'map' accesses on the file /run/gnome-initial-setup/.local/share/icc/edid-aca41ed5ad1cf4faeb4f014fe52c1e3b.icc. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /run/gnome-initial-setup/.local/share/icc/edid-aca41ed5ad1cf4faeb4f014fe52c1e3b.icc default label should be var_run_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /run/gnome-initial-setup/.local/share/icc/edid-aca41ed5ad1cf4faeb4f014fe52c1e3b.icc ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that colord should be allowed map access on the edid-aca41ed5ad1cf4faeb4f014fe52c1e3b.icc file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'colord' --raw | audit2allow -M my-colord # semodule -X 300 -i my-colord.pp Additional Information: Source Context system_u:system_r:colord_t:s0 Target Context system_u:object_r:xdm_var_run_t:s0 Target Objects /run/gnome-initial-setup/.local/share/icc/edid- aca41ed5ad1cf4faeb4f014fe52c1e3b.icc [ file ] Source colord Source Path colord Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-277.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.13.0-0.rc7.git0.1.fc27.x86_64 #1 SMP Mon Aug 28 02:33:21 UTC 2017 x86_64 x86_64 Alert Count 1 First Seen 2017-10-12 11:02:40 CEST Last Seen 2017-10-12 11:02:40 CEST Local ID 20e5f84f-1f2c-4693-b5a0-9f366cfea5e6 Raw Audit Messages type=AVC msg=audit(1507798960.280:226): avc: denied { map } for pid=1382 comm="colord" path="/run/gnome-initial-setup/.local/share/icc/edid-aca41ed5ad1cf4faeb4f014fe52c1e3b.icc" dev="tmpfs" ino=35887 scontext=system_u:system_r:colord_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file permissive=0 Hash: colord,colord_t,xdm_var_run_t,file,map Version-Release number of selected component: selinux-policy-3.13.1-277.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.3 hashmarkername: setroubleshoot kernel: 4.13.16-300.fc27.x86_64 type: libreport
selinux-policy-3.13.1-283.18.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.18.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-8225c4e502
selinux-policy-3.13.1-283.19.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.