Bug 442519 - SELinux is preventing iscsid (iscsid_t) "signal" to <Unknown> (iscsid_t).
Summary: SELinux is preventing iscsid (iscsid_t) "signal" to <Unknown> (iscsid_t).
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-04-15 10:23 UTC by Lubomir Kundrak
Modified: 2008-04-15 13:41 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-04-15 13:41:51 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Lubomir Kundrak 2008-04-15 10:23:09 UTC
Today's rawhide; when doing a service iscsid restart

Raw Audit Messages:

host=f9 type=AVC msg=audit(1208254723.300:33): avc: denied { signal } for
pid=1467 comm="iscsid" scontext=system_u:system_r:iscsid_t:s0
tcontext=system_u:system_r:iscsid_t:s0 tclass=process

host=f9 type=SYSCALL msg=audit(1208254723.300:33): arch=40000003 syscall=37
success=no exit=-13 a0=5ba a1=f a2=5ba a3=0 items=0 ppid=1 pid=1467
auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
tty=(none) ses=4294967295 comm="iscsid" exe="/sbin/iscsid"
subj=system_u:system_r:iscsid_t:s0 key=(null)

Comment 1 Josef Kubin 2008-04-15 11:40:29 UTC
My fix:

--- serefpolicy-3.3.1/policy/modules/system/iscsi.te    2008-04-15
13:29:59.000000000 +0200
+++ serefpolicy-3.3.1.myFix/policy/modules/system/iscsi.te      2008-04-15
13:31:32.000000000 +0200
@@ -29,7 +29,7 @@
 #
 
 allow iscsid_t self:capability { dac_override ipc_lock net_admin sys_nice
sys_resource };
-allow iscsid_t self:process { setrlimit setsched };
+allow iscsid_t self:process { setrlimit setsched signal };
 allow iscsid_t self:fifo_file { read write };
 allow iscsid_t self:unix_stream_socket { create_stream_socket_perms connectto };
 allow iscsid_t self:unix_dgram_socket create_socket_perms;

Comment 2 Daniel Walsh 2008-04-15 13:41:51 UTC
Correct.

You can allow this for now by executing 

# audit2allow -M mypol -i /var/log/audit/audit.log 
# semodule -i mypol.pp

Fixed in selinux-policy-3.3.1-36.fc9


Note You need to log in before you can comment on or make changes to this bug.