Bug 808451

Summary: wrong(?) label on postgresql postmaster.pid file
Product: Red Hat Enterprise Linux 6 Reporter: Milos Malik <mmalik>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Michal Trunecka <mtruneck>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.3CC: dwalsh, ebenes, mgrepl, mtruneck, tgl
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.7.19-144.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-06-20 12:32:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Milos Malik 2012-03-30 12:37:33 UTC
Description of problem:


Version-Release number of selected component (if applicable):
postgresql-8.4.9-1.el6_1.1.x86_64
postgresql-server-8.4.9-1.el6_1.1.x86_64
postgresql-libs-8.4.9-1.el6_1.1.x86_64

How reproducible:
always

Steps to Reproduce:
# run_init service postgresql status
Authenticating root.
Password: 
postmaster is stopped
# restorecon -Rv /var
# run_init service postgresql start
Authenticating root.
Password: 
Starting postgresql service:                               [  OK  ]
# restorecon -Rv /var
restorecon reset /var/run/postmaster.5432.pid context system_u:object_r:initrc_var_run_t:s0->system_u:object_r:postgresql_var_run_t:s0
# 

Actual results:
* PID file is not labelled correctly

Expected results:
* PID file is labelled correctly

Comment 2 Tom Lane 2012-03-30 14:03:31 UTC
How would the script run restorecon on the PID file, when that doesn't exist beforehand?  If this is a bug, which I doubt, then it seems to me that it should be the province of the selinux policy to get this right to start with.

Comment 3 Milos Malik 2012-03-30 14:35:39 UTC
# grep pidfile= /etc/init.d/postgresql 
pidfile="/var/run/postmaster.${PGPORT}.pid"
#

The init script creates the PID file. Path to the PID file is known. Calling restorecon at the end of start() would be enough.

Comment 4 Tom Lane 2012-03-30 14:50:44 UTC
My point is that the file doesn't exist beforehand and so it is being created under the control of the current security policy.  If it's not correctly labeled, that's the fault of the security policy, not this script.

More to the point, since no AVC denial occurs, I suspect that the labeling is just fine and so the real problem is not the actual label but restorecon's opinion of what the label "should be".  I wouldn't be too surprised if adding a restorecon here created a problem instead of fixing one.

Anyway, reassigning to selinux-policy to see what they think.

Comment 5 Daniel Walsh 2012-03-30 16:54:55 UTC
Does postgresql actually write to this file?  Or is it just created by the init script?

Comment 6 Tom Lane 2012-03-30 17:35:03 UTC
(In reply to comment #5)
> Does postgresql actually write to this file?  Or is it just created by the init script?

At the moment it's created directly by the init script, via code like
  echo $pid > "$pidfile"

The whole thing is gone anyway in the systemd implementation, and if anyone complains about that we'd probably have to do something different to make it happen there.

Comment 7 Daniel Walsh 2012-03-30 17:43:44 UTC
Well then we should leave it labeled as initrc_var_run_t.

Comment 8 Miroslav Grepl 2012-04-02 10:08:43 UTC
Ok, then I will remove the labeling.

Comment 13 errata-xmlrpc 2012-06-20 12:32:48 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2012-0780.html