The following was filed automatically by setroubleshoot: Sommario: Your system may be seriously compromised! Descrizione dettagliata: SELinux has prevented iw from loading a kernel module. All confined programs that need to load kernel modules should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. Abilitazione accesso in corso: Contact your security administrator and report this issue. Informazioni aggiuntive: Contesto della sorgente system_u:system_r:udev_t:s0-s0:c0.c1023 Contesto target system_u:system_r:udev_t:s0-s0:c0.c1023 Oggetti target None [ capability ] Sorgente iw Percorso della sorgente /usr/bin/iw Porta <Sconosciuto> Host (removed) Sorgente Pacchetti RPM iw-0.9.15-2.fc12 Pacchetti RPM target RPM della policy selinux-policy-3.6.26-8.fc12 Selinux abilitato True Tipo di policy targeted MLS abilitato True Modalità Enforcing Enforcing Nome plugin sys_module Host Name (removed) Piattaforma Linux (removed) 2.6.31-0.125.4.2.rc5.git2.fc12.i686.PAE #1 SMP Tue Aug 11 21:01:03 EDT 2009 i686 i686 Conteggio avvisi 1 Primo visto mar 08 set 2009 16:48:09 CEST Ultimo visto mar 08 set 2009 16:48:09 CEST ID locale 463ec6b4-15f5-45c6-8122-f682dccfc53c Numeri di linea Messaggi Raw Audit node=(removed) type=AVC msg=audit(1252421289.314:31847): avc: denied { sys_module } for pid=1372 comm="iw" capability=16 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability node=(removed) type=SYSCALL msg=audit(1252421289.314:31847): arch=40000003 syscall=54 success=no exit=-19 a0=4 a1=8933 a2=bfbf946c a3=4 items=0 ppid=1357 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iw" exe="/usr/bin/iw" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= udev_t ============== allow udev_t self:capability sys_module;
*** This bug has been marked as a duplicate of bug 522962 ***