Bug 477109
Summary: | Trying wpa_supplicant results in "Unsupported driver 'madwifi'" | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Martin Donald <webmaster> |
Component: | wpa_supplicant | Assignee: | Dan Williams <dcbw> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 10 | CC: | dcbw |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-12-19 16:29:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 477283 |
Description
Martin Donald
2008-12-19 05:33:31 UTC
The 'madwifi' wpa_supplicant driver is not supported by Fedora because the kernel includes the official 'ath5k' and 'ath9k' drivers that support the same hardware, and because madwifi was never part of the upstream kernel. Please try one of those, or if the card is for some reason not suported by one of those drivers, then we need to add support for that card to the upstream kernel. Thank you. The wireless on my laptop is working fine now after a little struggle. I removed all traces of 'madwifi' from the system but still struggled until I found that selinux was denying wpa_supplicant access to /etc/wpa_supplicant/wpa_supplicant.conf. After setting permissive mode (as usual) for selinux and rebooting I was up and running. Wireless is difficult on linux. I always struggle to make it work. I had settled on atheros chipsets and madwifi because that combination consistantly worked. I've been unlucky otherwise. Selinux is even more difficult. There should be an easy way to let it just do those (determined to be safe) few things. I am sure that most users just do as I do and set permissive mode and give up the added security of selinux. My posting may not have been totally useless because others, having the same problems as I did, may see it, and get themselves up and running quicker than I did. Thanks again. Have you tried using NetworkManager at all? For most cases, it makes network connections (wired, wireless, cellular) a lot easier. Atheros chips are a much better bet these days since Atheros itself is actually contributing to the drivers in the Linux kernel. Any chance you could grab the specific SELinux denial message from /var/log/messages and file a new bug report for that against the 'selinux-policy' package in Bugzilla? If we can fix all the common denials (which we try to do), then it becomes much easier for stuff to work out of the box. You could also have tried to relabel (by, as root, 'touch /.autorelabel' and rebooting). Sometimes labels get messed up if you install files over top of ones shipped with Fedora. Anyway, if we could fix the error even though you've worked around it that would be great. /home/mhd: sealert -l 560183af-f100-4cd8-a378-30355ae09a4d Summary: SELinux is preventing wpa_supplicant (NetworkManager_t) "getattr" to /etc/wpa_supplicant/wpa_supplicant.conf (dosfs_t). Detailed Description: [SELinux is in permissive mode, the operation would have been denied but was permitted due to permissive mode.] SELinux denied access requested by wpa_supplicant. /etc/wpa_supplicant/wpa_supplicant.conf may be a mislabeled. /etc/wpa_supplicant/wpa_supplicant.conf default SELinux type is etc_t, but its current type is dosfs_t. Changing this file back to the default type, may fix your problem. File contexts can be assigned to a file in the following ways. * Files created in a directory receive the file context of the parent directory by default. * The SELinux policy might override the default label inherited from the parent directory by specifying a process running in context A which creates a file in a directory labeled B will instead create the file with label C. An example of this would be the dhcp client running with the dhclient_t type and creates a file in the directory /etc. This file would normally receive the etc_t type due to parental inheritance but instead the file is labeled with the net_conf_t type because the SELinux policy specifies this. * Users can change the file context on a file using tools such as chcon, or restorecon. This file could have been mislabeled either by user error, or if an normally confined application was run under the wrong domain. However, this might also indicate a bug in SELinux because the file should not have been labeled with this type. If you believe this is a bug, please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Allowing Access: You can restore the default system context to this file by executing the restorecon command. restorecon '/etc/wpa_supplicant/wpa_supplicant.conf', if this file is a directory, you can recursively restore using restorecon -R '/etc/wpa_supplicant/wpa_supplicant.conf'. Fix Command: restorecon '/etc/wpa_supplicant/wpa_supplicant.conf' Additional Information: Source Context unconfined_u:system_r:NetworkManager_t:s0 Target Context system_u:object_r:dosfs_t:s0 Target Objects /etc/wpa_supplicant/wpa_supplicant.conf [ file ] Source wpa_supplicant Source Path /usr/sbin/wpa_supplicant Port <Unknown> Host localhost.localdomain Source RPM Packages wpa_supplicant-0.6.4-2.fc10 Target RPM Packages wpa_supplicant-0.6.4-2.fc10 Policy RPM selinux-policy-3.5.13-34.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name restorecon Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.7-134.fc10.i686 #1 SMP Mon Dec 1 22:42:50 EST 2008 i686 i686 Alert Count 2 First Seen Fri Dec 19 11:16:00 2008 Last Seen Fri Dec 19 11:20:44 2008 Local ID 560183af-f100-4cd8-a378-30355ae09a4d Line Numbers Raw Audit Messages node=localhost.localdomain type=AVC msg=audit(1229714444.467:42): avc: denied { getattr } for pid=4595 comm="wpa_supplicant" path="/etc/wpa_supplicant/wpa_supplicant.conf" dev=sda1 ino=519337 scontext=unconfined_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file node=localhost.localdomain type=SYSCALL msg=audit(1229714444.467:42): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfdde688 a2=d75ff4 a3=824bb68 items=0 ppid=4594 pid=4595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=2 comm="wpa_supplicant" exe="/usr/sbin/wpa_supplicant" subj=unconfined_u:system_r:NetworkManager_t:s0 key=(null) |