Description of problem: run command : /sbin/service iscsid stop. Note AVC denial: type=AVC msg=audit(1209345908.152:23): avc: denied { signal } for pid=2485 comm="iscsid" scontext=system_u:system_r:iscsid_t:s0 tcontext=system_u:system_r:iscsid_t:s0 tclass=process type=SYSCALL msg=audit(1209345908.152:23): arch=c000003e syscall=62 success=no exit=-13 a0=9b4 a1=f a2=40a788 a3=8101010101010100 items=0 ppid=1 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iscsid" exe="/sbin/iscsid" subj=system_u:system_r:iscsid_t:s0 key=(null) Summary SELinux is preventing iscsid (iscsid_t) "signal" to <Unknown> (iscsid_t). Detailed Description SELinux denied access requested by iscsid. It is not expected that this access is required by iscsid and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Version-Release number of selected component (if applicable): selinux-policy-targeted-3.3.1-35.fc9.noarch
You can allow this for now. # audit2allow -M mypol -l -i /var/log/audit/audit.log # semodule -i mypol.pp Fixed in selinux-policy-3.3.1-42.fc9.noarch