SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: permissive Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 selinux-policy-38.5-1.fc38.noarch ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.241:623): avc: denied { view } for pid=156648 comm="request-key" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.241:624): avc: denied { read } for pid=156648 comm="request-key" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.242:625): avc: denied { execute_no_trans } for pid=156648 comm="request-key" path="/usr/sbin/cifs.idmap" dev="dm-0" ino=17552043 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.244:626): avc: denied { setattr } for pid=156648 comm="cifs.idmap" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.244:627): avc: denied { create } for pid=156648 comm="cifs.idmap" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_generic_helper_t:s0 tclass=unix_dgram_socket permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.244:628): avc: denied { connect } for pid=156648 comm="cifs.idmap" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_generic_helper_t:s0 tclass=unix_dgram_socket permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.244:629): avc: denied { read } for pid=156648 comm="cifs.idmap" name="log" dev="devtmpfs" ino=156 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=lnk_file permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.245:630): avc: denied { search } for pid=156648 comm="cifs.idmap" name="systemd" dev="tmpfs" ino=2 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=dir permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.245:631): avc: denied { search } for pid=156648 comm="cifs.idmap" name="journal" dev="tmpfs" ino=42 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:syslogd_var_run_t:s0 tclass=dir permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.245:632): avc: denied { write } for pid=156648 comm="cifs.idmap" name="dev-log" dev="tmpfs" ino=43 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.245:633): avc: denied { sendto } for pid=156648 comm="cifs.idmap" path="/run/systemd/journal/dev-log" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.245:634): avc: denied { search } for pid=156648 comm="cifs.idmap" name="sss" dev="dm-0" ino=290284 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=dir permissive=1 ---- time->Wed Jan 25 09:02:42 2023 type=AVC msg=audit(1674655362.246:635): avc: denied { search } for pid=156648 comm="cifs.idmap" name="mc" dev="dm-0" ino=290285 scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:object_r:sssd_public_t:s0 tclass=dir permissive=1