SELinux is preventing NetworkManager from 'open' accesses on the chr_file rfkill. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that NetworkManager should be allowed open access on the rfkill chr_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep NetworkManager /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:NetworkManager_t:s0 Target Context system_u:object_r:wireless_device_t:s0 Target Objects rfkill [ chr_file ] Source NetworkManager Source Path NetworkManager Port <Unbekannt> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-18.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux untibox 2.6.38.4-20.fc15.i686 #1 SMP Thu Apr 28 23:45:59 UTC 2011 i686 i686 Alert Count 1 First Seen Mit 04 Mai 2011 14:22:34 CEST Last Seen Mit 04 Mai 2011 14:22:34 CEST Local ID 8a2c4d64-56f4-4e24-829c-a6cf30385919 Raw Audit Messages type=AVC msg=audit(1304511754.181:48): avc: denied { open } for pid=783 comm="NetworkManager" name="rfkill" dev=devtmpfs ino=10688 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:wireless_device_t:s0 tclass=chr_file Hash: NetworkManager,NetworkManager_t,wireless_device_t,chr_file,open audit2allow #============= NetworkManager_t ============== allow NetworkManager_t wireless_device_t:chr_file open; audit2allow -R #============= NetworkManager_t ============== allow NetworkManager_t wireless_device_t:chr_file open;
*** This bug has been marked as a duplicate of bug 700734 ***