Is there a way of running pg_dump and pg_dumpall under selinux, without abandoning or rewriting the targeted policy?
Grab selinux-policy-targeted-1.17.30-2.62 off of
I still get errors. I can't run pg_dumpall as root or postgres:
[root@server2 log]# rpm -qa selinux-policy-targeted selinux-policy-targeted-1.17.30-2.62
[root@server2 log]# grep pg_dumpall messages
Jan 4 09:50:13 server2 kernel: audit(1104850213.722:0): avc: denied { write } for pid=16053
exe=/usr/bin/pg_dumpall name=.s.PGSQL.5432 dev=md0 ino=213026 scontext=user_u:system_r:postgresql_t
tcontext=root:object_r:tmp_t tclass=sock_file
Jan 4 09:50:17 server2 kernel: audit(1104850217.630:0): avc: denied { write } for pid=16057
exe=/usr/bin/pg_dumpall name=.s.PGSQL.5432 dev=md0 ino=213026 scontext=user_u:system_r:postgresql_t
tcontext=root:object_r:tmp_t tclass=sock_file
Jan 4 09:50:29 server2 kernel: audit(1104850229.137:0): avc: denied { write } for pid=16133
exe=/usr/bin/pg_dumpall name=.s.PGSQL.5432 dev=md0 ino=213026 scontext=root:system_r:postgresql_t
tcontext=root:object_r:tmp_t tclass=sock_file
Jan 4 09:50:37 server2 kernel: audit(1104850237.546:0): avc: denied { write } for pid=16166
exe=/usr/bin/pg_dumpall name=.s.PGSQL.5432 dev=md0 ino=213026 scontext=user_u:system_r:postgresql_t
tcontext=root:object_r:tmp_t tclass=sock_file
Any suggestions?
- Mike