SELinux is preventing NetworkManager from read, write access on the chr_file rfkill.
***** Plugin catchall (100. confidence) suggests ***************************
If you believe that NetworkManager should be allowed read write access on the rfkill chr_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep NetworkManager /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:object_r:wireless_device_t:s0
Target Objects rfkill [ chr_file ]
Source NetworkManager
Source Path NetworkManager
Port <Unbekannt>
Host (removed)
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.9.16-18.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 2.6.38.3-18.fc15.x86_64 #1
SMP Fri Apr 22 13:24:23 UTC 2011 x86_64 x86_64
Alert Count 2
First Seen Fr 29 Apr 2011 09:51:11 CEST
Last Seen Fr 29 Apr 2011 11:12:55 CEST
Local ID 5f8130a3-ad1a-4b2d-bbe5-0dfea83097fb
Raw Audit Messages
type=AVC msg=audit(1304068375.600:50): avc: denied { read write } for pid=1004 comm="NetworkManager" name="rfkill" dev=devtmpfs ino=9828 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:wireless_device_t:s0 tclass=chr_file
Hash: NetworkManager,NetworkManager_t,wireless_device_t,chr_file,read,write
audit2allow
#============= NetworkManager_t ==============
allow NetworkManager_t wireless_device_t:chr_file { read write };
audit2allow -R
#============= NetworkManager_t ==============
allow NetworkManager_t wireless_device_t:chr_file { read write };
Comment 3Fedora Update System
2011-05-03 04:29:08 UTC
Package selinux-policy-3.9.16-21.fc15:
* should fix your issue,
* was pushed to the Fedora 15 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-21.fc15'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-21.fc15
then log in and leave karma (feedback).
*** Bug 701969 has been marked as a duplicate of this bug. ***
Comment 5Fedora Update System
2011-05-05 05:02:46 UTC
selinux-policy-3.9.16-21.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
SELinux is preventing NetworkManager from read, write access on the chr_file rfkill. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that NetworkManager should be allowed read write access on the rfkill chr_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep NetworkManager /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:NetworkManager_t:s0 Target Context system_u:object_r:wireless_device_t:s0 Target Objects rfkill [ chr_file ] Source NetworkManager Source Path NetworkManager Port <Unbekannt> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-18.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.38.3-18.fc15.x86_64 #1 SMP Fri Apr 22 13:24:23 UTC 2011 x86_64 x86_64 Alert Count 2 First Seen Fr 29 Apr 2011 09:51:11 CEST Last Seen Fr 29 Apr 2011 11:12:55 CEST Local ID 5f8130a3-ad1a-4b2d-bbe5-0dfea83097fb Raw Audit Messages type=AVC msg=audit(1304068375.600:50): avc: denied { read write } for pid=1004 comm="NetworkManager" name="rfkill" dev=devtmpfs ino=9828 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:wireless_device_t:s0 tclass=chr_file Hash: NetworkManager,NetworkManager_t,wireless_device_t,chr_file,read,write audit2allow #============= NetworkManager_t ============== allow NetworkManager_t wireless_device_t:chr_file { read write }; audit2allow -R #============= NetworkManager_t ============== allow NetworkManager_t wireless_device_t:chr_file { read write };