I just saw this on todays rawhide. Not sure what triggered it. I'm not sure why pt_chown needs to mmap the zero page. Jakub ? Summary: SELinux is preventing /usr/libexec/pt_chown "mmap_zero" access on <Unknown>. Detailed Description: SELinux denied access requested by pt_chown. The current boolean settings do not allow this access. If you have not setup pt_chown to require this access this may signal an intrusion attempt. If you do intend this access you need to change the booleans on this system to allow the access. Allowing Access: Confined processes can be configured to run requiring different access, SELinux provides booleans to allow you to turn on/off access as needed. The boolean mmap_low_allowed is set incorrectly. Boolean Description: Allow certain domains to map low memory in the kernel Fix Command: # setsebool -P mmap_low_allowed 1 Additional Information: Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Target Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Target Objects None [ memprotect ] Source pt_chown Source Path /usr/libexec/pt_chown Port <Unknown> Host vaio Source RPM Packages glibc-common-2.10.90-24 Target RPM Packages Policy RPM selinux-policy-3.6.32-24.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall_boolean Host Name vaio Platform Linux vaio 2.6.31.1-56.fc12.x86_64 #1 SMP Tue Sep 29 16:16:22 EDT 2009 x86_64 x86_64 Alert Count 5 First Seen Fri 18 Sep 2009 03:09:17 PM EDT Last Seen Mon 12 Oct 2009 11:19:55 AM EDT Local ID eb5c499a-75d0-4fb6-a380-1a4f8671a238 Line Numbers Raw Audit Messages node=vaio type=AVC msg=audit(1255360795.327:17): avc: denied { mmap_zero } for pid=2112 comm="pt_chown" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect node=vaio type=AVC msg=audit(1255360795.327:17): avc: denied { mmap_zero } for pid=2112 comm="pt_chown" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect node=vaio type=AVC msg=audit(1255360795.327:17): avc: denied { mmap_zero } for pid=2112 comm="pt_chown" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=memprotect node=vaio type=SYSCALL msg=audit(1255360795.327:17): arch=c000003e syscall=125 success=no exit=-14 a0=7fffd6aac014 a1=0 a2=7fffd4dc4e80 a3=7fff82542f20 items=0 ppid=1950 pid=2112 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)
*** This bug has been marked as a duplicate of bug 525537 ***