I had a raid5 set fail, and noticed two AVCs, which seem to have prevented root from getting mail about the failure, which meant it went unnoticed for weeks.. type=AVC msg=audit(1170003945.248:7): avc: denied { read } for pid=2771 comm="sendmail" name="md1" dev=tmpfs ino=7157 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file type=AVC msg=audit(1170003945.248:7): avc: denied { read } for pid=2771 comm="sendmail" name="mdstat" dev=proc ino=4026532358 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:object_r:proc_mdstat_t:s0 tclass=file
I you sure these are not leaked file descriptors? Why would the senmail application want to read a fixed disk or proc_mdstat?
hmm, could be. I'm not sure where to start looking though, and as the raid array has been reconstructed, it's not reproducable right now.
This is actually an mdadm issue, not raidtools. Changing component.
*** This bug has been marked as a duplicate of 216241 ***