RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 811366 - stap-serverd runs as initrc_t
Summary: stap-serverd runs as initrc_t
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.3
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: Milos Malik
URL:
Whiteboard:
Depends On:
Blocks: 832330 1116380
TreeView+ depends on / blocked
 
Reported: 2012-04-10 20:00 UTC by Milos Malik
Modified: 2014-10-14 07:56 UTC (History)
5 users (show)

Fixed In Version: selinux-policy-3.7.19-247.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-10-14 07:56:32 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2014:1568 0 normal SHIPPED_LIVE selinux-policy bug fix and enhancement update 2014-10-14 01:27:37 UTC

Description Milos Malik 2012-04-10 20:00:11 UTC
Description of problem:


Version-Release number of selected component (if applicable):
selinux-policy-targeted-3.7.19-145.el6.noarch
selinux-policy-doc-3.7.19-145.el6.noarch
selinux-policy-mls-3.7.19-145.el6.noarch
selinux-policy-3.7.19-145.el6.noarch
selinux-policy-minimum-3.7.19-145.el6.noarch
systemtap-server-1.7-3.el6.x86_64

How reproducible:
always

Steps to Reproduce:
# service stap-server status
No managed stap-server is running
# run_init service stap-server start
Authenticating root.
Password: 
Starting stap-server -a "x86_64" -r "2.6.32-220.el6.x86_64" -u "stap-server" --log "/var/log/stap-server/log"
                                                           [  OK  ]
# service stap-server status
stap-server -a "x86_64" -r "2.6.32-220.el6.x86_64" -u "stap-server" -n "15947" --log "/var/log/stap-server/log" running as PID 15947
# ps -efZ | grep initrc_t
system_u:system_r:initrc_t:s0   155      15947     1  0 21:58 ?        00:00:00 /usr/libexec/systemtap/stap-serverd -r 2.6.32-220.el6.x86_64 -a x86_64 --log=/var/log/stap-server/log
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 root 16006 12100  0 21:59 pts/1 00:00:00 grep initrc_t
# 

Actual results:
* stap-serverd runs as initrc_t

Expected results:
* stap-server runs in its own SELinux domain

Comment 1 Milos Malik 2012-04-10 20:51:35 UTC
The daemon is not confined by SELinux. Please help SELinux folks to create a suitable policy module. You know that we should minimize the number of programs running as initrc_t, don't you?

Comment 2 Frank Ch. Eigler 2012-04-11 23:42:32 UTC
We're happy to help, though are not immediately able to write a selinux
module ourselves.  Perhaps reassign this bug to someone willing/able to do so?

stap-server does a lot, so may be complicated to tie down.  For example, 
it does all of the following unprivileged operations:

- it reads files in /etc/systemtap
- it talks to the local avahi daemon
- it modifies files in its home directory /var/lib/stap-server
  (but see bug #798036)
- it creates potentially large temporary files under $TMPDIR-/var/tmp
- it reads files under /usr/lib/debug and /lib/modules and elsewhere
- it runs make / gcc / the whole stratum of kernel-build tools/scripts
- it might even be configured to make outgoing network connections to
  other nearby stap-servers

Comment 3 RHEL Program Management 2012-07-10 08:38:30 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.

Comment 4 RHEL Program Management 2012-07-11 01:51:30 UTC
This request was erroneously removed from consideration in Red Hat Enterprise Linux 6.4, which is currently under development.  This request will be evaluated for inclusion in Red Hat Enterprise Linux 6.4.

Comment 5 Frank Ch. Eigler 2012-08-10 22:45:14 UTC
See also bug #798036, another selinux enforcement issue.

Comment 6 RHEL Program Management 2012-12-14 08:36:02 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.

Comment 9 Lukas Vrabec 2014-04-29 15:32:43 UTC
Patch sent to Miroslav.

Comment 11 Lukas Vrabec 2014-05-02 12:18:58 UTC
commit 444215373f4d5cd6c832816aaa588e00952cdc5c
Author: Lukas Vrabec <lvrabec>
Date:   Wed Apr 23 15:03:59 2014 +0200

    Added stapserver policy

Comment 14 Lukas Vrabec 2014-06-23 08:59:16 UTC
Milos,

Is it necessary to add this capability? Or everything run fine and you just see this AVC?

Comment 15 Lukas Vrabec 2014-07-08 12:57:09 UTC
patch sent.

Comment 18 Lukas Vrabec 2014-07-28 23:39:17 UTC
patch sent.

Comment 20 errata-xmlrpc 2014-10-14 07:56:32 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2014-1568.html


Note You need to log in before you can comment on or make changes to this bug.