Description of problem: After update to selinux-policy-targeted.noarch 0:3.8.1-3.fc14 Version-Release number of selected component (if applicable): At the boot time got follow messages: ... SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts type=1403 audit(1275152052.633:3): policy loaded auid=4294967295 ses=4294967295 dracut: Switching root type=1403 audit(1275152052.633:3): policy loaded auid=4294967295 ses=4294967295 dracut: Switching root type=1400 audit(1275152053.625:4): avc: denied { read write } for pid=293 comm="hostname" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:hostname_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.634:5): avc: denied { read write } for pid=293 comm="hostname" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:hostname_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.715:6): avc: denied { read write } for pid=296 comm="consoletype" path="/dev/null" dev=devtmpfs ino=4053 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.721:7): avc: denied { read write } for pid=297 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.731:8): avc: denied { read write } for pid=297 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.744:9): avc: denied { read write } for pid=296 comm="consoletype" path="/dev/null" dev=devtmpfs ino=4053 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.965:10): avc: denied { open } for pid=298 comm="mount" name="null" dev=devtmpfs ino=4053 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.976:11): avc: denied { read write } for pid=300 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.983:12): avc: denied { read write } for pid=300 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
*** This bug has been marked as a duplicate of bug 598475 ***