Description of problem: Similar to the problem with rpc.mountd (Bug #167235). With enableaudit loaded, here are some blockers: avc: denied { name_bind } for comm="rpc.statd" src=631 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:ipp_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=631 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:ipp_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=636 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:ldap_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=636 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:ldap_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=647 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:dhcpd_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=647 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:dhcpd_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=749 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:kerberos_admin_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=750 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:kerberos_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=750 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:kerberos_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=783 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:spamd_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=847 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:dhcpd_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=847 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:dhcpd_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=873 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:rsync_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=873 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:rsync_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=891 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:inetd_child_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=891 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:inetd_child_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=892 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:inetd_child_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=892 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:inetd_child_port_t:s0 tclass=udp_socket avc: denied { name_bind } for comm="rpc.statd" src=901 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:swat_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=953 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:rndc_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=993 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket avc: denied { name_bind } for comm="rpc.statd" src=995 scontext=root:system_r:rpcd_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket Version-Release number of selected component (if applicable): selinux-policy-2.4.6-41.fc6
Fixed in selinux-policy-2.4.6-46
Moving modified bugs to closed