SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: permissive Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 selinux-policy-38.4-1.fc38.noarch ---- time->Sat Dec 31 09:58:35 2022 type=AVC msg=audit(1672498715.577:1055): avc: denied { name_bind } for pid=660431 comm="rpcbind" src=64592 scontext=system_u:system_r:rpcbind_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=udp_socket permissive=1 ---- time->Sat Dec 31 09:58:36 2022 type=AVC msg=audit(1672498716.569:1061): avc: denied { connectto } for pid=660453 comm="rpc.nfsd" path="/run/rpcbind.sock" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:rpcbind_t:s0 tclass=unix_stream_socket permissive=1 ---- time->Sat Dec 31 09:58:37 2022 type=AVC msg=audit(1672498717.416:1063): avc: denied { connectto } for pid=1214 comm="gssproxy" path="/run/gssproxy.sock" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:gssproxy_t:s0 tclass=unix_stream_socket permissive=1