Summary: SELinux is preventing nm-system-setti (system_dbusd_t) "read" to ./ifcfg-wlan0 (etc_runtime_t). Detailed Description: SELinux denied access requested by nm-system-setti. It is not expected that this access is required by nm-system-setti and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for ./ifcfg-wlan0, restorecon -v './ifcfg-wlan0' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context system_u:system_r:system_dbusd_t:SystemLow Target Context system_u:object_r:etc_runtime_t:SystemLow Target Objects ./ifcfg-wlan0 [ file ] Source nm-system-setti Source Path /usr/sbin/nm-system-settings Port <Unknown> Host (removed) Source RPM Packages NetworkManager-0.7.0-0.6.7.svn3370.fc8 Target RPM Packages Policy RPM selinux-policy-3.0.8-98.fc8 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall_file Host Name (removed) Platform Linux (removed) 2.6.24.4-64.fc8 #1 SMP Sat Mar 29 09:54:46 EDT 2008 i686 i686 Alert Count 45 First Seen Sat 26 Apr 2008 12:19:08 PM EDT Last Seen Sat 14 Jun 2008 12:15:59 PM EDT Local ID 5ccef934-531a-4039-b86f-2fca6d512232 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1213460159.157:9): avc: denied { read } for pid=2447 comm="nm-system-setti" name="ifcfg-wlan0" dev=dm-0 ino=3049525 scontext=system_u:system_r:system_dbusd_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1213460159.157:9): arch=40000003 syscall=5 success=no exit=-13 a0=91927f8 a1=0 a2=bfbaf5d8 a3=91927f8 items=0 ppid=1 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="nm-system-setti" exe="/usr/sbin/nm-system-settings" subj=system_u:system_r:system_dbusd_t:s0 key=(null) Hash String generated from selinux-policy-3.0.8-98.fc8,catchall_file,nm-system-setti,system_dbusd_t,etc_runtime_t,file,read audit2allow suggests: #============= system_dbusd_t ============== #!!!! This avc is allowed in the current policy allow system_dbusd_t etc_runtime_t:file read;
*** This bug has been marked as a duplicate of bug 538428 ***