Description of problem: Started seeing these recently: Mar 15 08:26:39 cappello kernel: audit(1142436390.168:2): avc: denied { read } for pid=2572 comm="hostname" name="mounts" dev=proc ino=168558609 scontext=system_u:system_r:hostname_t tcontext=system_u:system_r:hostname_t tclass=file Mar 15 08:26:39 cappello kernel: audit(1142436390.168:3): avc: denied { getattr } for pid=2572 comm="hostname" name="mounts" dev=proc ino=168558609 scontext=system_u:system_r:hostname_t tcontext=system_u:system_r:hostname_t tclass=file Mar 16 08:44:32 cappello kernel: audit(1142523863.167:2): avc: denied { read } for pid=2571 comm="hostname" name="mounts" dev=proc ino=168493073 scontext=system_u:system_r:hostname_t tcontext=system_u:system_r:hostname_t tclass=file Mar 16 08:44:32 cappello kernel: audit(1142523863.167:3): avc: denied { getattr } for pid=2571 comm="hostname" name="mounts" dev=proc ino=168493073 scontext=system_u:system_r:hostname_t tcontext=system_u:system_r:hostname_t tclass=file Don't think it's causing any problems. Version-Release number of selected component (if applicable): selinux-policy-targeted-1.27.1-2.22 How reproducible: Every boot
These usually happen when a program in the initrd is leaking file descriptors.
Can we get this fixed? It's generating a lot of logwatch spam for me. Anything I can do to debug?
This report targets the FC3 or FC4 products, which have now been EOL'd. Could you please check that it still applies to a current Fedora release, and either update the target product or close it ? Thanks.
Does appear to be fixed in FC5.