type=AVC msg=audit(1298850461.411:16098): avc: denied { read } for pid=10660 comm="arpwatch" name="meminfo" dev=proc ino=4026531985 scontext=unconfined_u:system_r:arpwatch_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=AVC msg=audit(1298850461.411:16098): avc: denied { open } for pid=10660 comm="arpwatch" name="meminfo" dev=proc ino=4026531985 scontext=unconfined_u:system_r:arpwatch_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=AVC msg=audit(1298850461.411:16099): avc: denied { getattr } for pid=10660 comm="arpwatch" path="/proc/meminfo" dev=proc ino=4026531985 scontext=unconfined_u:system_r:arpwatch_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file
You can allow it for now using grep arpwatch /var/log/audit/audit.log |audit2allow -M myarpwatch semodule -i myarpwatch.pp
Fixed in selinux-policy-3.7.19-98.fc13
selinux-policy-3.7.19-101.fc13 has been submitted as an update for Fedora 13. https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-101.fc13
selinux-policy-3.7.19-101.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.