We had previously posted about this AVC and understood in a reply that it was fixed in the next update but we're still seeing it once a day. time->Fri Jan 15 03:22:01 2016 type=AVC msg=audit(1452856921.601:1934): avc: denied { read } for pid=6439 comm="mdadm" name="RstSataV-193dfefa-a445-4302-99d8-ef3aad1a04c6" dev="efivarfs" ino=126 scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:efivarfs_t:s0 tclass=file permissive=0 It had been said that it was related to the secure boot process but all of our systems use that and only one system is reporting this AVC. -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx http://lists.fedoraproject.org/admin/lists/selinux@xxxxxxxxxxxxxxxxxxxxxxx