Hide Forgot
Description of problem: SELinux is preventing /usr/bin/gsf-office-thumbnailer from 'write' accesses on the directory /home/brian/tmp. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that gsf-office-thumbnailer should be allowed write access on the tmp directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep gsf-office-thum /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 Target Context system_u:object_r:user_home_t:s0 Target Objects /home/brian/tmp [ dir ] Source gsf-office-thum Source Path /usr/bin/gsf-office-thumbnailer Port <Unknown> Host (removed) Source RPM Packages libgsf-1.14.26-4.fc19.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-74.9.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.11.4-201.fc19.x86_64 #1 SMP Thu Oct 10 14:11:18 UTC 2013 x86_64 x86_64 Alert Count 2 First Seen 2013-10-27 19:28:44 EDT Last Seen 2013-10-27 19:28:44 EDT Local ID e292c26d-7f16-4e32-a228-f97da63a1622 Raw Audit Messages type=AVC msg=audit(1382916524.972:530): avc: denied { write } for pid=2345 comm="gsf-office-thum" name="tmp" dev="dm-5" ino=131487 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1382916524.972:530): arch=x86_64 syscall=open success=no exit=EACCES a0=1401e20 a1=c2 a2=180 a3=0 items=0 ppid=2175 pid=2345 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=1 tty=(none) comm=gsf-office-thum exe=/usr/bin/gsf-office-thumbnailer subj=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 key=(null) Hash: gsf-office-thum,thumb_t,user_home_t,dir,write Additional info: reporter: libreport-2.1.8 hashmarkername: setroubleshoot kernel: 3.11.4-201.fc19.x86_64 type: libreport
Did you setup the /tmp directory to point at tmp in your homedir?
No. But I do have $TMPDIR pointing to ~/tmp.
Try as root. # semanage fcontext -a -t user_tmp_t "/home/brian/tmp" # restorecon -R -v /home/brian/tmp That should at least get the top level directory labeled correctly. If you could remove all content from that directory, other tools should be working correctly.
OK. Done. I guess we wait and see if I get any more errors.
OK. So I got another one of these AVC denials and my ~/tmp looks labeled as directed: $ ls -ldZ ~/tmp drwx-----x. brian brian system_u:object_r:user_tmp_t:s0 /home/brian/tmp
Could you attach the actual avc?
(In reply to Daniel Walsh from comment #6) > Could you attach the actual avc? What does that mean exactly? I usually get these alerts in the "SELinux Troubleshooter"/"SELinux Alert Browser" application. I am happy to go collect information from somewhere else if that would help though. Just tell me where to collect from.
The bottom of the alert messages or the output of # ausearch -m avc -ts recent -i
(In reply to Daniel Walsh from comment #6) > Could you attach the actual avc? I'm afraid this must have gotten push off of the stack (in my brain) during a stack overflow. Clearly too much time has passed to get this relevant information. I will just close this now and re-open if it happens again.