SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 selinux-policy-38.3-1.fc38.noarch ---- time->Sat Dec 17 04:56:40 2022 type=AVC msg=audit(1671271000.598:12487): avc: denied { name_bind } for pid=353485 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Dec 17 04:56:43 2022 type=AVC msg=audit(1671271003.110:12488): avc: denied { name_bind } for pid=353494 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Dec 17 04:56:45 2022 type=AVC msg=audit(1671271005.579:12489): avc: denied { name_bind } for pid=353501 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Dec 17 04:57:22 2022 type=AVC msg=audit(1671271042.665:12490): avc: denied { name_bind } for pid=353683 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Dec 17 04:57:25 2022 type=AVC msg=audit(1671271045.074:12491): avc: denied { name_bind } for pid=353690 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Dec 17 04:57:27 2022 type=AVC msg=audit(1671271047.466:12492): avc: denied { name_bind } for pid=353699 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0