Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

can't get profile for display xrandr-eDP-1 #41

Open
sify21 opened this issue May 1, 2024 · 3 comments
Open

can't get profile for display xrandr-eDP-1 #41

sify21 opened this issue May 1, 2024 · 3 comments
Assignees
Labels

Comments

@sify21
Copy link

sify21 commented May 1, 2024

~/.xsession-errors

** (xiccd:2574): CRITICAL **: 11:35:02.167: can't get profile for display xrandr-eDP-1: failed to load file: Error opening file /var/lib/lightdm/.local/share/icc/edid-3563963f89dc3c7fc429a8d9ea9acc8c.icc: Permission denied

** (xiccd:2574): CRITICAL **: 11:35:02.167: can't get profile for display xrandr-eDP-1: failed to load file: Error opening file /var/lib/lightdm/.local/share/icc/edid-3563963f89dc3c7fc429a8d9ea9acc8c.icc: Permission denied

** (xiccd:2574): CRITICAL **: 11:35:02.189: unable to add device profile: failed to obtain org.freedesktop.color-manager.modify-device auth

/usr/share/dbus-1/system-services/org.freedesktop.ColorManager.service

[D-BUS Service]
Name=org.freedesktop.ColorManager
Exec=/usr/libexec/colord
User=colord
SystemdService=colord.service

/usr/share/dbus-1/system.d/org.freedesktop.ColorManager.conf

<?xml version="1.0" encoding="UTF-8"?> <!-- -*- XML -*- -->

<!DOCTYPE busconfig PUBLIC
 "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
 "https://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
<busconfig>

  <!-- This configuration file specifies the required security policies
       for the ColorManager to work. -->

  <!-- Only user root or user colord can own the colord service -->
  <policy user="root">
    <allow own="org.freedesktop.ColorManager"/>
  </policy>
  <policy user="colord">
    <allow own="org.freedesktop.ColorManager"/>
  </policy>

 <!-- Allow anyone to call into the service - we'll reject callers using PolicyKit -->
  <policy context="default">
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.ColorManager"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.ColorManager.Profile"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.ColorManager.Device"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.ColorManager.Sensor"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.DBus.Properties"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.DBus.Introspectable"/>
    <allow send_destination="org.freedesktop.ColorManager"
           send_interface="org.freedesktop.DBus.Peer"/>
  </policy>

</busconfig>
@agalakhov
Copy link
Owner

This is "permission denied". We didn't create this file. Where it does come from?

@sify21
Copy link
Author

sify21 commented May 1, 2024

I have no idea. They are under lightdm directory. Does it correspond to this setting?
image

@agalakhov
Copy link
Owner

These files are created for the lightdm user or something like, they don't belong to the actual user logged in. Looks like LightDM managed to start colord on its own and now colord tries to access files that do not belong to the current user. It is definitely a colord issue, not xiccd one. And it could be just a configuration issue, that is, deleting the whole icc directory under lightm can potentially help. There EDID-based ICC files are auto-generated and can be newly generated at any time.

Fixing file permissions manually could help as well, but I don't believe it's about file permissions. Probably it is about the whole directory permissions which should not be altered since there are other safety-critical files in the lightdm directory as well.

@agalakhov agalakhov self-assigned this May 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants