I did ifup eth0, and got this.. audit(1154543958.058:4): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c255 tclass=process audit(1154543958.066:5): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:unconfined_t:s0-s0:c0.c255 tclass=process audit(1154543958.070:6): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c255 tclass=process audit(1154543958.074:7): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c255 tclass=process audit(1154543958.078:8): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c255 tclass=process audit(1154543958.086:9): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process audit(1154543958.090:10): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process audit(1154543958.094:11): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process audit(1154543958.106:12): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:unconfined_t:s0-s0:c0.c255 tclass=process audit(1154543958.114:13): avc: denied { ptrace } for pid=3707 comm="pidof" scontext=user_u:system_r:unconfined_t:s0 tcontext=system_u:system_r:unconfined_t:s0-s0:c0.c255 tclass=process
Fixed in selinux-policy-2.3.14-3
Should be fixed in the current release