Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 947772 - Allow sanlock-helper to use SIGKILL on any process registered to sanlock
Allow sanlock-helper to use SIGKILL on any process registered to sanlock
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy (Show other bugs)
6.5
All Linux
urgent Severity urgent
: rc
: ---
Assigned To: Miroslav Grepl
Michal Trunecka
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-04-03 04:35 EDT by Federico Simoncelli
Modified: 2014-09-30 19:34 EDT (History)
7 users (show)

See Also:
Fixed In Version: selinux-policy-3.7.19-200.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-11-21 05:22:28 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2013:1598 normal SHIPPED_LIVE selinux-policy bug fix and enhancement update 2013-11-20 16:39:24 EST

  None (edit)
Description Federico Simoncelli 2013-04-03 04:35:45 EDT
Description of problem:
sanlock-helper process should be granted the permission to sigkill any process.

Version-Release number of selected component (if applicable):
selinux-policy-3.7.19-195.el6_4.3.noarch

Actual results:
type=1400 audit(1364976234.250:98432): avc:  denied  { sigkill } for  pid=6958 comm="sanlock-helper" scontext=system_u:system_r:sanlock_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:virtd_t:s0-s0:c0.c1023 tclass=process

Expected results:
sanlock-helper should be allowed to sigkill any process that is registered to sanlock (note: not limited to virtd_t).
Comment 1 Daniel Walsh 2013-04-08 12:53:40 EDT
Well I would prefer you to be more specific. What kind of daemons do you run under sanlock.  BTW I found the bug that is causing this access to not be available in virt.if.
Comment 8 errata-xmlrpc 2013-11-21 05:22:28 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-1598.html

Note You need to log in before you can comment on or make changes to this bug.