Re: kernel file handle leak?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2004-08-16 at 21:55, Russell Coker wrote:
> When I boot a laptop with a Cardbus Ethernet card installed I get the 
> following avc messages related to a kernel file handle.  Is this a known 
> issue?
> 
> (1092707493.572:0): avc:  denied  { read write } for  pid=2131 exe=/sbin/ip 
> path=socket:[921] dev=sockfs ino=921 scontext=system_u:system_r:ifconfig_t 
> tcontext=system_u:system_r:kernel_t tclass=unix_dgram_socket
> audit(1092707493.581:0): avc:  denied  { read write } for  pid=2133 
> exe=/sbin/iwconfig path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707493.591:0): avc:  denied  { read write } for  pid=2135 
> exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707493.604:0): avc:  denied  { read write } for  pid=2139 
> exe=/sbin/modprobe path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:insmod_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707493.634:0): avc:  denied  { read write } for  pid=2141 
> exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707493.641:0): avc:  denied  { read write } for  pid=2143 
> exe=/sbin/dhclient path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707498.179:0): avc:  denied  { read write } for  pid=2316 
> exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707498.188:0): avc:  denied  { read write } for  pid=2318 
> exe=/sbin/ethtool path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707498.195:0): avc:  denied  { read write } for  pid=2320 
> exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707498.265:0): avc:  denied  { read write } for  pid=2331 
> exe=/sbin/ifconfig path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707499.315:0): avc:  denied  { read write } for  pid=2402 
> exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket
> audit(1092707499.369:0): avc:  denied  { read write } for  pid=2409 
> exe=/sbin/ip path=socket:[921] dev=sockfs ino=921 
> scontext=system_u:system_r:ifconfig_t tcontext=system_u:system_r:kernel_t 
> tclass=unix_dgram_socket

I've seen udev leaking a descriptor to a Unix datagram socket to its
helper programs, but that is usually labeled udev_t (but would be
kernel_t if you didn't install the udev policy or label udev properly,
so that kernel_t failed to transition to udev_t when running udev).

I've also seen the kernel leaking descriptors to rootfs entries unpacked
from the initramfs to all processes; SELinux stomps on those and resets
them to the null device.

-- 
Stephen Smalley <sds@xxxxxxxxxxxxxx>
National Security Agency


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux