Bug 560161

Summary: SELinux is preventing mono (unconfined_mono_t) "unix_read unix_write" unlabeled_t.
Product: [Fedora] Fedora Reporter: sham sham435 <sham435>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: low    
Version: 12CC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:80670c6a0364d4074665ce96b0b343faadaa3948170804ab55dcbdc7884d2497
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-02-01 10:05:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description sham sham435 2010-01-30 00:58:57 UTC
Summary:

SELinux is preventing mono (unconfined_mono_t) "unix_read unix_write"
unlabeled_t.

Detailed Description:

SELinux denied access requested by mono. It is not expected that this access is
required by mono and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context                unconfined_u:unconfined_r:unconfined_mono_t:s0-s0:
                              c0.c1023
Target Context                system_u:object_r:unlabeled_t:s0
Target Objects                None [ sem ]
Source                        mono
Source Path                   /usr/bin/mono
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           mono-core-1.9.1-2.fc9
Target RPM Packages           
Policy RPM                    selinux-policy-3.3.1-135.fc9
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     (removed)
Platform                      Linux (removed) 2.6.25-14.fc9.i686 #1
                              SMP Thu May 1 06:28:41 EDT 2008 i686 i686
Alert Count                   1
First Seen                    Tue 02 Jan 2001 06:11:44 AM LKT
Last Seen                     Tue 02 Jan 2001 06:11:44 AM LKT
Local ID                      2ecce1dd-8ec1-412e-a3e9-666359bd0bf2
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(978394304.379:183): avc:  denied  { unix_read unix_write } for  pid=27139 comm="mono" key=1291891408 scontext=unconfined_u:unconfined_r:unconfined_mono_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=sem

node=(removed) type=SYSCALL msg=audit(978394304.379:183): arch=40000003 syscall=117 per=400000 success=no exit=-13 a0=2 a1=4d00b2d0 a2=8 a3=180 items=0 ppid=1 pid=27139 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="mono" exe="/usr/bin/mono" subj=unconfined_u:unconfined_r:unconfined_mono_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.3.1-135.fc9,catchall,mono,unconfined_mono_t,unlabeled_t,sem,unix_read,unix_write
audit2allow suggests:

#============= unconfined_mono_t ==============
allow unconfined_mono_t unlabeled_t:sem { unix_read unix_write };

Comment 1 Miroslav Grepl 2010-02-01 10:05:42 UTC

*** This bug has been marked as a duplicate of bug 560154 ***