kernel file handle leak?
Russell Coker
russell at coker.com.au
Tue Aug 17 01:55:07 UTC 2004
When I boot a laptop with a Cardbus Ethernet card installed I get the
following avc messages related to a kernel file handle. Is this a known
issue?
(1092707493.572:0): avc: denied { read write } for pid=2131 exe=/sbin/ip
path=socket:[921] dev=sockfs ino=921 scontext=system_u:system_r:ifconfig_t
tcontext=system_u:system_r:kernel_t tclass=unix_dgram_socket
audit(1092707493.581:0): avc: denied { read write } for pid=2133
exe=/sbin/iwconfig path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707493.591:0): avc: denied { read write } for pid=2135
exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707493.604:0): avc: denied { read write } for pid=2139
exe=/sbin/modprobe path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:insmod_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707493.634:0): avc: denied { read write } for pid=2141
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707493.641:0): avc: denied { read write } for pid=2143
exe=/sbin/dhclient path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707498.179:0): avc: denied { read write } for pid=2316
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707498.188:0): avc: denied { read write } for pid=2318
exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707498.195:0): avc: denied { read write } for pid=2320
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707498.265:0): avc: denied { read write } for pid=2331
exe=/sbin/ifconfig path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707499.315:0): avc: denied { read write } for pid=2402
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
audit(1092707499.369:0): avc: denied { read write } for pid=2409
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t
tclass=unix_dgram_socket
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
More information about the fedora-selinux-list
mailing list