Summary: SELinux is preventing pt_chown (unconfined_t) "mmap_zero" to <Unknown> (unconfined_t). Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by pt_chown. The current boolean settings do not allow this access. If you have not setup pt_chown to require this access this may signal an intrusion attempt. If you do intend this access you need to change the booleans on this system to allow the access. Allowing Access: Confined processes can be configured to to run requiring different access, SELinux provides booleans to allow you to turn on/off access as needed. The boolean allow_unconfined_mmap_low is set incorrectly. Boolean Description: Allow unconfined domain to map low memory in the kernel Fix Command: # setsebool -P allow_unconfined_mmap_low 1 Additional Information: Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Target Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Target Objects None [ memprotect ] Source pt_chown Source Path /usr/libexec/pt_chown Port <Unknown> Host (removed) Source RPM Packages glibc-common-2.10.1-5 Target RPM Packages Policy RPM selinux-policy-3.6.12-83.fc11 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall_boolean Host Name (removed) Platform Linux (removed) 2.6.30.8-64.fc11.x86_64 #1 SMP Fri Sep 25 04:43:32 EDT 2009 x86_64 x86_64 Alert Count 1 First Seen Tue 13 Oct 2009 06:45:18 PM EDT Last Seen Tue 13 Oct 2009 06:45:18 PM EDT Local ID 616a74fd-17e6-489f-b90b-1fb34670e51d Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1255473918.293:53776): avc: denied { mmap_zero } for pid=4073 comm="pt_chown" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect node=(removed) type=SYSCALL msg=audit(1255473918.293:53776): arch=c000003e syscall=125 success=no exit=-14 a0=7fffbcbea014 a1=0 a2=7fffbb0f1e80 a3=7fff3a312190 items=0 ppid=3511 pid=4073 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.12-83.fc11,catchall_boolean,pt_chown,unconfined_t,unconfined_t,memprotect,mmap_zero audit2allow suggests: #============= unconfined_t ============== allow unconfined_t self:memprotect mmap_zero;
*** This bug has been marked as a duplicate of bug 538428 ***