kernel file handle leak?

Russell Coker russell at coker.com.au
Tue Aug 17 01:55:07 UTC 2004


When I boot a laptop with a Cardbus Ethernet card installed I get the 
following avc messages related to a kernel file handle.  Is this a known 
issue?

(1092707493.572:0): avc:  denied  { read write } for  pid=2131 exe=/sbin/ip 
path=socket:[921] dev=sockfs ino=921 scontext=system_u:system_r:ifconfig_t 
tcontext=system_u:system_r:kernel_t tclass=unix_dgram_socket
audit(1092707493.581:0): avc:  denied  { read write } for  pid=2133 
exe=/sbin/iwconfig path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707493.591:0): avc:  denied  { read write } for  pid=2135 
exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707493.604:0): avc:  denied  { read write } for  pid=2139 
exe=/sbin/modprobe path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:insmod_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707493.634:0): avc:  denied  { read write } for  pid=2141 
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707493.641:0): avc:  denied  { read write } for  pid=2143 
exe=/sbin/dhclient path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707498.179:0): avc:  denied  { read write } for  pid=2316 
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707498.188:0): avc:  denied  { read write } for  pid=2318 
exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707498.195:0): avc:  denied  { read write } for  pid=2320 
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707498.265:0): avc:  denied  { read write } for  pid=2331 
exe=/sbin/ifconfig path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707499.315:0): avc:  denied  { read write } for  pid=2402 
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket
audit(1092707499.369:0): avc:  denied  { read write } for  pid=2409 
exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
tclass=unix_dgram_socket


-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page



More information about the fedora-selinux-list mailing list