Description of problem: Logged into graphical Wayland GNOME session as staff_r user, Wayland/Gnome-shell crashed and when I log in again, there's this denial. This could be preventing good core dumps from being captured for these lovely gnome-shell crashes? SELinux is preventing abrt-action-gen from 'map' accesses on the file /var/spool/abrt/ccpp-2018-02-12-09:44:13.351807-3048/coredump. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that abrt-action-gen should be allowed map access on the coredump file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'abrt-action-gen' --raw | audit2allow -M my-abrtactiongen # semodule -X 300 -i my-abrtactiongen.pp Additional Information: Source Context staff_u:staff_r:staff_t:s0-s0:c0.c1023 Target Context system_u:object_r:abrt_var_cache_t:s0 Target Objects /var/spool/abrt/ccpp-2018-02-12-09:44:13.351807-30 48/coredump [ file ] Source abrt-action-gen Source Path abrt-action-gen Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-283.24.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.14.16-300.fc27.x86_64 #1 SMP Wed Jan 31 19:24:27 UTC 2018 x86_64 x86_64 Alert Count 1 First Seen 2018-02-12 09:44:56 AEDT Last Seen 2018-02-12 09:44:56 AEDT Local ID 0b2392bd-7efe-4f8e-9a77-3497300c787c Raw Audit Messages type=AVC msg=audit(1518389096.688:383): avc: denied { map } for pid=9391 comm="abrt-action-gen" path="/var/spool/abrt/ccpp-2018-02-12-09:44:13.351807-3048/coredump" dev="dm-1" ino=761315 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:abrt_var_cache_t:s0 tclass=file permissive=0 Hash: abrt-action-gen,staff_t,abrt_var_cache_t,file,map Version-Release number of selected component: selinux-policy-3.13.1-283.24.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.3 hashmarkername: setroubleshoot kernel: 4.14.16-300.fc27.x86_64 type: libreport
selinux-policy-3.13.1-283.27.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.27.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.