SELinux is preventing /sbin/iwconfig from using the sys_module capability. ***** Plugin sys_module (99.5 confidence) suggests ************************* If you do not believe that /sbin/iwconfig should be attempting to modify the kernel by loading a kernel module. Then a process might be attempting to hack into your system. Do contact your security administrator and report this issue. ***** Plugin catchall (1.49 confidence) suggests *************************** If you believe that iwconfig should have the sys_module capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep iwconfig /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:ifconfig_t:s0 Target Context system_u:system_r:ifconfig_t:s0 Target Objects Unknown [ capability ] Source iwconfig Source Path /sbin/iwconfig Port <Unknown> Host JesusChrist.localdomain Source RPM Packages wireless-tools-29-5.1.fc12 Target RPM Packages Policy RPM selinux-policy-3.9.7-37.fc14 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name JesusChrist.localdomain Platform Linux JesusChrist.localdomain 2.6.35.12-88.fc14.x86_64 #1 SMP Thu Mar 31 21:21:57 UTC 2011 x86_64 x86_64 Alert Count 20 First Seen Mon 11 Apr 2011 03:29:46 PM MDT Last Seen Wed 13 Apr 2011 09:45:38 PM MDT Local ID 813e4c2d-71c1-4f41-bf6b-2e882345860b Raw Audit Messages type=AVC msg=audit(1302752738.294:34808): avc: denied { sys_module } for pid=6772 comm="iwconfig" capability=16 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:system_r:ifconfig_t:s0 tclass=capability type=SYSCALL msg=audit(1302752738.294:34808): arch=x86_64 syscall=ioctl success=no exit=ENODEV a0=3 a1=8b06 a2=7fffca5234a0 a3=0 items=0 ppid=6761 pid=6772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=iwconfig exe=/sbin/iwconfig subj=system_u:system_r:ifconfig_t:s0 key=(null) Hash: iwconfig,ifconfig_t,ifconfig_t,capability,sys_module audit2allow #============= ifconfig_t ============== allow ifconfig_t self:capability sys_module; audit2allow -R #============= ifconfig_t ============== allow ifconfig_t self:capability sys_module; -- test mailing list test@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe: https://admin.fedoraproject.org/mailman/listinfo/test