From: Jason Zaman <perfinion@xxxxxxxxxx> avc: denied { watch } for pid=12656 comm="gmain" path="/var/lib/colord/icc" dev="zfs" ino=100677 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:colord_var_lib_t:s0 tclass=dir permissive=0 avc: denied { watch } for pid=12656 comm="gmain" path="/usr/share/color/icc/colord" dev="zfs" ino=67586 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 --- policy/modules/services/colord.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/services/colord.te b/policy/modules/services/colord.te index 24eda8a9..44f2b049 100644 --- a/policy/modules/services/colord.te +++ b/policy/modules/services/colord.te @@ -42,6 +42,7 @@ fs_tmpfs_filetrans(colord_t, colord_tmpfs_t, { dir file }) manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t) manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t) files_var_lib_filetrans(colord_t, colord_var_lib_t, dir) +allow colord_t colord_var_lib_t:dir watch; kernel_read_crypto_sysctls(colord_t) kernel_read_device_sysctls(colord_t) @@ -82,6 +83,7 @@ domain_use_interactive_fds(colord_t) files_list_mnt(colord_t) files_read_usr_files(colord_t) files_map_usr_files(colord_t) +files_watch_usr_dirs(colord_t) fs_getattr_noxattr_fs(colord_t) fs_getattr_tmpfs(colord_t) -- 2.24.1