SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 selinux-policy-38.5-2.fc38.noarch ---- time->Sat Jan 28 05:40:15 2023 type=AVC msg=audit(1674902415.185:12363): avc: denied { name_bind } for pid=266945 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Jan 28 05:40:17 2023 type=AVC msg=audit(1674902417.835:12364): avc: denied { name_bind } for pid=266954 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Jan 28 05:40:20 2023 type=AVC msg=audit(1674902420.510:12365): avc: denied { name_bind } for pid=266961 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Jan 28 05:41:00 2023 type=AVC msg=audit(1674902460.456:12366): avc: denied { name_bind } for pid=267143 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Jan 28 05:41:03 2023 type=AVC msg=audit(1674902463.062:12367): avc: denied { name_bind } for pid=267152 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0 ---- time->Sat Jan 28 05:41:05 2023 type=AVC msg=audit(1674902465.661:12368): avc: denied { name_bind } for pid=267159 comm="nettest" src=12345 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=icmp_socket permissive=0