Bug 442519 - SELinux is preventing iscsid (iscsid_t) "signal" to <Unknown> (iscsid_t).
SELinux is preventing iscsid (iscsid_t) "signal" to <Unknown> (iscsid_t).
Product: Fedora
Classification: Fedora
Component: selinux-policy (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Daniel Walsh
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2008-04-15 06:23 EDT by Lubomir Kundrak
Modified: 2008-04-15 09:41 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-04-15 09:41:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Lubomir Kundrak 2008-04-15 06:23:09 EDT
Today's rawhide; when doing a service iscsid restart

Raw Audit Messages:

host=f9 type=AVC msg=audit(1208254723.300:33): avc: denied { signal } for
pid=1467 comm="iscsid" scontext=system_u:system_r:iscsid_t:s0
tcontext=system_u:system_r:iscsid_t:s0 tclass=process

host=f9 type=SYSCALL msg=audit(1208254723.300:33): arch=40000003 syscall=37
success=no exit=-13 a0=5ba a1=f a2=5ba a3=0 items=0 ppid=1 pid=1467
auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
tty=(none) ses=4294967295 comm="iscsid" exe="/sbin/iscsid"
subj=system_u:system_r:iscsid_t:s0 key=(null)
Comment 1 Josef Kubin 2008-04-15 07:40:29 EDT
My fix:

--- serefpolicy-3.3.1/policy/modules/system/iscsi.te    2008-04-15
13:29:59.000000000 +0200
+++ serefpolicy-3.3.1.myFix/policy/modules/system/iscsi.te      2008-04-15
13:31:32.000000000 +0200
@@ -29,7 +29,7 @@
 allow iscsid_t self:capability { dac_override ipc_lock net_admin sys_nice
sys_resource };
-allow iscsid_t self:process { setrlimit setsched };
+allow iscsid_t self:process { setrlimit setsched signal };
 allow iscsid_t self:fifo_file { read write };
 allow iscsid_t self:unix_stream_socket { create_stream_socket_perms connectto };
 allow iscsid_t self:unix_dgram_socket create_socket_perms;
Comment 2 Daniel Walsh 2008-04-15 09:41:51 EDT

You can allow this for now by executing 

# audit2allow -M mypol -i /var/log/audit/audit.log 
# semodule -i mypol.pp

Fixed in selinux-policy-3.3.1-36.fc9

Note You need to log in before you can comment on or make changes to this bug.