The following was filed automatically by setroubleshoot: Summary: SELinux is preventing /sbin/modprobe "read" access on /etc/modprobe.d. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by modprobe. It is not expected that this access is required by modprobe and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 Target Context system_u:object_r:modules_conf_t:s0 Target Objects /etc/modprobe.d [ dir ] Source modprobe Source Path /sbin/modprobe Port <Unknown> Host (removed) Source RPM Packages module-init-tools-3.9-2.fc12 Target RPM Packages module-init-tools-3.9-2.fc12 Policy RPM selinux-policy-3.6.32-1.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31-23.fc12.x86_64 #1 SMP Wed Sep 16 15:54:05 EDT 2009 x86_64 x86_64 Alert Count 2 First Seen Sat 19 Sep 2009 11:13:12 AM IST Last Seen Sat 19 Sep 2009 11:13:12 AM IST Local ID c7c87d13-0565-4d72-b824-ab76bfd3d8e8 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1253338992.584:79): avc: denied { read } for pid=2408 comm="modprobe" name="modprobe.d" dev=sda6 ino=8150 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir node=(removed) type=AVC msg=audit(1253338992.584:79): avc: denied { open } for pid=2408 comm="modprobe" name="modprobe.d" dev=sda6 ino=8150 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1253338992.584:79): arch=c000003e syscall=2 success=yes exit=3 a0=413056 a1=90800 a2=0 a3=7fff25fa03c8 items=0 ppid=2405 pid=2408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="modprobe" exe="/sbin/modprobe" subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= insmod_t ============== allow insmod_t modules_conf_t:dir { read open };
This is fixed in the latest rawhide policy. Please yum upgrade.