:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 07:09:06 ] :: [ BEGIN ] :: Running 'rlImport 'selinux-policy/common'' :: [ 07:09:06 ] :: [ INFO ] :: rlImport: Found 'selinux-policy/common', version '43' during upwards traversal :: [ 07:09:06 ] :: [ INFO ] :: rlImport: Will try to import selinux-policy/common from /root/selinux/selinux-policy/Library/common/lib.sh :: [ 07:09:06 ] :: [ INFO ] :: found dependencies: 'distribution/epel ' :: [ 07:09:06 ] :: [ INFO ] :: rlImport: Found 'distribution/epel', version '2' during upwards traversal :: [ 07:09:06 ] :: [ INFO ] :: rlImport: Will try to import distribution/epel from /root/distribution/Library/epel/lib.sh :: [ 07:09:07 ] :: [ INFO ] :: found dependencies: ' distribution/LibrariesWrapper distribution/epel-internal' :: [ 07:09:07 ] :: [ INFO ] :: rlImport: Found 'distribution/LibrariesWrapper', version '9' during upwards traversal :: [ 07:09:07 ] :: [ INFO ] :: rlImport: Will try to import distribution/LibrariesWrapper from /root/distribution/Library/LibrariesWrapper/lib.sh :: [ 07:09:07 ] :: [ INFO ] :: found dependencies: '' :: [ 07:09:07 ] :: [ INFO ] :: rlImport: Found 'distribution/epel-internal', version '3' during upwards traversal :: [ 07:09:07 ] :: [ INFO ] :: rlImport: Will try to import distribution/epel-internal from /root/distribution/Library/epel-internal/lib.sh :: [ 07:09:07 ] :: [ INFO ] :: found dependencies: '' done. done. :: [ 07:09:07 ] :: [ BEGIN ] :: Running 'rlImport distribution/LibrariesWrapper' :: [ 07:09:07 ] :: [ PASS ] :: Command 'rlImport distribution/LibrariesWrapper' (Expected 0, got 0) :: [ 07:09:07 ] :: [ INFO ] :: LibrariesWrapperImport(): library fetched already :: [ 07:09:07 ] :: [ BEGIN ] :: Running 'git checkout "master" -- "epel"' :: [ 07:09:07 ] :: [ PASS ] :: Command 'git checkout "master" -- "epel"' (Expected 0, got 0) :: [ 07:09:07 ] :: [ INFO ] :: found epel v42 from https://github.com/beakerlib/epel.git?72a1d18b541fdbd775d87bb69b57c3e018e18552#epel in /root/distribution/Library/epel/lib/epel loading library distribution/epel v42... done. :: [ 07:09:07 ] :: [ LOG ] :: Determined distro is 'rhel' :: [ 07:09:07 ] :: [ LOG ] :: Determined rhel release is '10' :: [ 07:09:07 ] :: [ LOG ] :: epel repo is accessible :: [ 07:09:07 ] :: [ LOG ] :: epel repo already present :: [ 07:09:07 ] :: [ INFO ] :: SELinux: using 'semodule -lfull' to list modules :: [ 07:09:07 ] :: [ INFO ] :: Running with policy located in /etc/selinux/targeted/policy/policy.34 :: [ 07:09:07 ] :: [ LOG ] :: enriched audit log format already enabled :: [ 07:09:07 ] :: [ LOG ] :: stop the audit daemon first :: [ 07:09:07 ] :: [ BEGIN ] :: Running 'service auditd stop' Stopping logging: :: [ 07:09:07 ] :: [ PASS ] :: Command 'service auditd stop' (Expected 0,2, got 0) :: [ 07:09:12 ] :: [ LOG ] :: audit daemon configuration file is updated, starting the audit service Redirecting to /bin/systemctl status auditd.service Redirecting to /bin/systemctl start auditd.service :: [ 07:09:13 ] :: [ LOG ] :: rlServiceStart: Service auditd started successfully :: [ 07:09:13 ] :: [ INFO ] :: SELinux related packages listing: :: [ 07:09:13 ] :: [ INFO ] :: checkpolicy-3.8-1.el10.x86_64 libselinux-3.8-1.el10.x86_64 libselinux-utils-3.8-1.el10.x86_64 libsemanage-3.8.1-1.el10_0.x86_64 libsepol-3.8-1.el10.x86_64 mcstrans-3.8-1.el10.x86_64 policycoreutils-3.8-1.el10.x86_64 policycoreutils-devel-3.8-1.el10.x86_64 policycoreutils-newrole-3.8-1.el10.x86_64 policycoreutils-python-utils-3.8-1.el10.noarch selinux-policy-40.13.29-1.el10.noarch selinux-policy-devel-40.13.29-1.el10.noarch selinux-policy-mls-40.13.29-1.el10.noarch selinux-policy-targeted-40.13.29-1.el10.noarch setools-console-4.5.1-4.el10.x86_64 :: [ 07:09:13 ] :: [ INFO ] :: listing took 0 second(s) :: [ 07:09:13 ] :: [ INFO ] :: package 'setools-console-4.5.1-4.el10.x86_64' covers required package 'setools-console' :: [ 07:09:13 ] :: [ INFO ] :: package 'expect-5.45.4-25.el10.x86_64' covers required package 'expect' :: [ 07:09:13 ] :: [ INFO ] :: package 'policycoreutils-python-utils-3.8-1.el10.noarch' covers required package 'policycoreutils-python-utils' :: [ 07:09:13 ] :: [ INFO ] :: package 'selinux-policy-devel-40.13.29-1.el10.noarch' covers required package 'selinux-policy-devel' :: [ 07:09:13 ] :: [ PASS ] :: Command 'rlImport 'selinux-policy/common'' (Expected 0,1, got 0) package power-profiles-daemon is not installed :: [ 07:09:13 ] :: [ BEGIN ] :: Running 'yum -y install tuned-ppd' Updating Subscription Management repositories. Unable to read consumer identity This system is not registered with an entitlement server. You can use "rhc" or "subscription-manager" to register. Last metadata expiration check: 0:49:59 ago on Wed 16 Apr 2025 06:19:15 AM EDT. Package tuned-ppd-2.25.1-1.el10.noarch is already installed. Dependencies resolved. Nothing to do. Complete! :: [ 07:09:14 ] :: [ PASS ] :: Command 'yum -y install tuned-ppd' (Expected 0, got 0) selinux-policy-40.13.29-1.el10.noarch :: [ 07:09:14 ] :: [ PASS ] :: Checking for the presence of selinux-policy rpm :: [ 07:09:14 ] :: [ LOG ] :: Package versions: :: [ 07:09:14 ] :: [ LOG ] :: selinux-policy-40.13.29-1.el10.noarch selinux-policy-targeted-40.13.29-1.el10.noarch :: [ 07:09:14 ] :: [ PASS ] :: Checking for the presence of selinux-policy-targeted rpm :: [ 07:09:14 ] :: [ LOG ] :: Package versions: :: [ 07:09:14 ] :: [ LOG ] :: selinux-policy-targeted-40.13.29-1.el10.noarch tuned-ppd-2.25.1-1.el10.noarch :: [ 07:09:14 ] :: [ PASS ] :: Checking for the presence of tuned-ppd rpm :: [ 07:09:14 ] :: [ LOG ] :: Package versions: :: [ 07:09:14 ] :: [ LOG ] :: tuned-ppd-2.25.1-1.el10.noarch Redirecting to /bin/systemctl status tuned-ppd.service :: [ 07:09:14 ] :: [ BEGIN ] :: Running 'setenforce 1' :: [ 07:09:14 ] :: [ PASS ] :: Command 'setenforce 1' (Expected 0, got 0) :: [ 07:09:14 ] :: [ BEGIN ] :: Running 'id -Z' unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 :: [ 07:09:14 ] :: [ PASS ] :: Command 'id -Z' (Expected 0, got 0) :: [ 07:09:14 ] :: [ BEGIN ] :: Running 'sestatus' SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 :: [ 07:09:14 ] :: [ PASS ] :: Command 'sestatus' (Expected 0, got 0) :: [ 07:09:14 ] :: [ BEGIN ] :: Running 'semodule --list-modules=full | grep -i disabled' :: [ 07:09:14 ] :: [ PASS ] :: Command 'semodule --list-modules=full | grep -i disabled' (Expected 0,1, got 1) :: [ 07:09:14 ] :: [ LOG ] :: rlSESetTimestamp: Setting timestamp 'TIMESTAMP' [04/16/2025 07:09:14] :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 10s :: Assertions: 12 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: RHEL-69450 + RHEL-69526 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: /usr/sbin/tuned-ppd system_u:object_r:tuned_ppd_exec_t:s0 :: [ 07:09:17 ] :: [ PASS ] :: Result of matchpathcon /usr/sbin/tuned-ppd should contain tuned_ppd_exec_t (Assert: expected 0, got 0) :: [ 07:09:17 ] :: [ INFO ] :: rlSESearchRule: checking rule 'allow init_t tuned_ppd_t : process { transition } [ ]' FILTERED RULES allow init_t daemon:process siginh; allow init_t domain:process { getattr getpgid noatsecure rlimitinh setrlimit setsched sigchld sigkill signal signull sigstop }; allow initrc_domain daemon:process transition; :: [ 07:09:18 ] :: [ PASS ] :: check permission 'transition' is present (Assert: '0' should equal '0') :: [ 07:09:19 ] :: [ INFO ] :: rlSESearchRule: checking rule 'type_transition init_t tuned_ppd_exec_t : process tuned_ppd_t' FILTERED RULES type_transition init_t tuned_ppd_exec_t:process tuned_ppd_t; :: [ 07:09:20 ] :: [ PASS ] :: check permission 'tuned_ppd_t' is present (Assert: '0' should equal '0') :: [ 07:09:20 ] :: [ INFO ] :: rlSESearchRule: checking rule 'allow init_t tuned_ppd_exec_t : file { getattr open read execute } [ ]' FILTERED RULES allow init_t direct_init_entry:file execute_no_trans; allow init_t file_type:file { getattr relabelfrom relabelto }; allow init_t non_security_file_type:file watch; allow initrc_domain direct_init_entry:file { execute getattr map open read }; :: [ 07:09:22 ] :: [ PASS ] :: check permission 'getattr' is present (Assert: '0' should equal '0') :: [ 07:09:22 ] :: [ PASS ] :: check permission 'open' is present (Assert: '0' should equal '0') :: [ 07:09:22 ] :: [ PASS ] :: check permission 'read' is present (Assert: '0' should equal '0') :: [ 07:09:22 ] :: [ PASS ] :: check permission 'execute' is present (Assert: '0' should equal '0') :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 5s :: Assertions: 7 good, 0 bad :: RESULT: PASS (RHEL-69450 + RHEL-69526) xdm_t is defined tuned_ppd_t is defined :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: RHEL-85849 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 07:09:22 ] :: [ INFO ] :: rlSESearchRule: checking rule 'allow xdm_t tuned_ppd_t : dbus { send_msg } [ ]' FILTERED RULES :: [ 07:09:23 ] :: [ FAIL ] :: check permission 'send_msg' is present (Assert: '1' should equal '0') :: [ 07:09:24 ] :: [ INFO ] :: rlSESearchRule: checking rule 'allow tuned_ppd_t xdm_t : dbus { send_msg } [ ]' FILTERED RULES :: [ 07:09:25 ] :: [ FAIL ] :: check permission 'send_msg' is present (Assert: '1' should equal '0') :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 3s :: Assertions: 0 good, 2 bad :: RESULT: FAIL (RHEL-85849) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: real scenario -- standalone service :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 07:09:25 ] :: [ BEGIN ] :: Running 'service gdm start' Redirecting to /bin/systemctl start gdm.service :: [ 07:09:25 ] :: [ PASS ] :: Command 'service gdm start' (Expected 0, got 0) :: [ 07:09:25 ] :: [ BEGIN ] :: Running 'service gdm status' Redirecting to /bin/systemctl status gdm.service ● gdm.service - GNOME Display Manager Loaded: loaded (/usr/lib/systemd/system/gdm.service; enabled; preset: enabled) Active: active (running) since Wed 2025-04-16 07:09:25 EDT; 73ms ago Invocation: 0c533dbf4da7466bb1765309873d7cc6 Main PID: 61788 (gdm) Tasks: 4 (limit: 10683) Memory: 1.1M (peak: 1.5M) CPU: 11ms CGroup: /system.slice/gdm.service └─61788 /usr/sbin/gdm Apr 16 07:09:25 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Startin…. Apr 16 07:09:25 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Started…. Hint: Some lines were ellipsized, use -l to show in full. :: [ 07:09:25 ] :: [ PASS ] :: Command 'service gdm status' (Expected 0, got 0) :: [ 07:09:27 ] :: [ BEGIN ] :: Running 'service tuned-ppd start' Redirecting to /bin/systemctl start tuned-ppd.service :: [ 07:09:29 ] :: [ PASS ] :: Command 'service tuned-ppd start' (Expected 0, got 0) :: [ 07:09:31 ] :: [ BEGIN ] :: Running 'ps -efZ | grep -v " grep " | grep -E "tuned-ppd"' system_u:system_r:tuned_ppd_t:s0 root 62598 1 3 07:09 ? 00:00:00 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l :: [ 07:09:31 ] :: [ PASS ] :: Command 'ps -efZ | grep -v " grep " | grep -E "tuned-ppd"' (Expected 0, got 0) :: [ 07:09:31 ] :: [ BEGIN ] :: Running 'ps -efZ | grep -v " grep " | grep -E "tuned_ppd_t.*tuned-ppd"' system_u:system_r:tuned_ppd_t:s0 root 62598 1 3 07:09 ? 00:00:00 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l :: [ 07:09:31 ] :: [ PASS ] :: Command 'ps -efZ | grep -v " grep " | grep -E "tuned_ppd_t.*tuned-ppd"' (Expected 0, got 0) :: [ 07:09:32 ] :: [ BEGIN ] :: Running 'service tuned-ppd status' Redirecting to /bin/systemctl status tuned-ppd.service ● tuned-ppd.service - PPD-to-TuneD API Translation Daemon Loaded: loaded (/usr/lib/systemd/system/tuned-ppd.service; enabled; preset: enabled) Active: active (running) since Wed 2025-04-16 07:09:29 EDT; 3s ago Invocation: 80bad743e9214f608c8336087ec7f12a Main PID: 62598 (tuned-ppd) Tasks: 4 (limit: 10683) Memory: 13.5M (peak: 13.7M) CPU: 103ms CGroup: /system.slice/tuned-ppd.service └─62598 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l Apr 16 07:09:29 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Startin…. Apr 16 07:09:29 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Started…. Hint: Some lines were ellipsized, use -l to show in full. :: [ 07:09:33 ] :: [ PASS ] :: Command 'service tuned-ppd status' (Expected 0,1,3, got 0) :: [ 07:09:34 ] :: [ BEGIN ] :: Running 'busctl introspect net.hadess.PowerProfiles /org/freedesktop/UPower/PowerProfiles' NAME TYPE SIGNATURE RESULT/VALUE FLAGS org.freedesktop.DBus.Introspectable interface - - - .Introspect method - s - org.freedesktop.DBus.Properties interface - - - .Get method ss v - .GetAll method s a{sv} - .Set method ssv - - .PropertiesChanged signal sa{sv}as - - org.freedesktop.UPower.PowerProfiles interface - - - .HoldProfile method sss u - .ReleaseProfile method u - - .ProfileReleased signal u - - :: [ 07:09:34 ] :: [ PASS ] :: Command 'busctl introspect net.hadess.PowerProfiles /org/freedesktop/UPower/PowerProfiles' (Expected 0, got 0) :: [ 07:09:34 ] :: [ BEGIN ] :: Running 'busctl introspect net.hadess.PowerProfiles /net/hadess/PowerProfiles' NAME TYPE SIGNATURE RESULT/VALUE FLAGS net.hadess.PowerProfiles interface - - - .HoldProfile method sss u - .ReleaseProfile method u - - .ProfileReleased signal u - - org.freedesktop.DBus.Introspectable interface - - - .Introspect method - s - org.freedesktop.DBus.Properties interface - - - .Get method ss v - .GetAll method s a{sv} - .Set method ssv - - .PropertiesChanged signal sa{sv}as - - :: [ 07:09:34 ] :: [ PASS ] :: Command 'busctl introspect net.hadess.PowerProfiles /net/hadess/PowerProfiles' (Expected 0, got 0) :: [ 07:09:34 ] :: [ BEGIN ] :: Running 'restorecon -Rv /etc /run /var -e /var/ARTIFACTS' Can't stat exclude path "/var/ARTIFACTS", No such file or directory - ignoring. Relabeled /run/user/0/gvfs from unconfined_u:object_r:user_tmp_t:s0 to unconfined_u:object_r:fusefs_t:s0 Relabeled /run/user/42/dbus-1 from system_u:object_r:user_tmp_t:s0 to system_u:object_r:session_dbusd_tmp_t:s0 Relabeled /run/user/42/dbus-1/services from system_u:object_r:user_tmp_t:s0 to system_u:object_r:session_dbusd_tmp_t:s0 restorecon: Could not stat /run/user/42/doc: Permission denied. Relabeled /run/user/42/keyring from system_u:object_r:user_tmp_t:s0 to system_u:object_r:gkeyringd_tmp_t:s0 Relabeled /run/user/42/keyring/control from system_u:object_r:user_tmp_t:s0 to system_u:object_r:gkeyringd_tmp_t:s0 :: [ 07:09:34 ] :: [ PASS ] :: Command 'restorecon -Rv /etc /run /var -e /var/ARTIFACTS' (Expected 0-255, got 0) :: [ 07:09:34 ] :: [ BEGIN ] :: Running 'service tuned-ppd restart' Redirecting to /bin/systemctl restart tuned-ppd.service :: [ 07:09:35 ] :: [ PASS ] :: Command 'service tuned-ppd restart' (Expected 0, got 0) :: [ 07:09:36 ] :: [ BEGIN ] :: Running 'ps -efZ | grep -v " grep " | grep -E "tuned-ppd"' system_u:system_r:tuned_ppd_t:s0 root 63418 1 4 07:09 ? 00:00:00 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l :: [ 07:09:36 ] :: [ PASS ] :: Command 'ps -efZ | grep -v " grep " | grep -E "tuned-ppd"' (Expected 0, got 0) :: [ 07:09:36 ] :: [ BEGIN ] :: Running 'ps -efZ | grep -v " grep " | grep -E "tuned_ppd_t.*tuned-ppd"' system_u:system_r:tuned_ppd_t:s0 root 63418 1 4 07:09 ? 00:00:00 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l :: [ 07:09:36 ] :: [ PASS ] :: Command 'ps -efZ | grep -v " grep " | grep -E "tuned_ppd_t.*tuned-ppd"' (Expected 0, got 0) :: [ 07:09:37 ] :: [ BEGIN ] :: Running 'service tuned-ppd status' Redirecting to /bin/systemctl status tuned-ppd.service ● tuned-ppd.service - PPD-to-TuneD API Translation Daemon Loaded: loaded (/usr/lib/systemd/system/tuned-ppd.service; enabled; preset: enabled) Active: active (running) since Wed 2025-04-16 07:09:35 EDT; 2s ago Invocation: 7e238f4909c34f6c9aeffc3ebef06668 Main PID: 63418 (tuned-ppd) Tasks: 4 (limit: 10683) Memory: 14.1M (peak: 14.2M) CPU: 93ms CGroup: /system.slice/tuned-ppd.service └─63418 /usr/bin/python3 -Es /usr/sbin/tuned-ppd -l Apr 16 07:09:34 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Startin…. Apr 16 07:09:35 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Started…. Hint: Some lines were ellipsized, use -l to show in full. :: [ 07:09:37 ] :: [ PASS ] :: Command 'service tuned-ppd status' (Expected 0,1,3, got 0) :: [ 07:09:39 ] :: [ BEGIN ] :: Running 'service tuned-ppd stop' Redirecting to /bin/systemctl stop tuned-ppd.service :: [ 07:09:39 ] :: [ PASS ] :: Command 'service tuned-ppd stop' (Expected 0, got 0) :: [ 07:09:41 ] :: [ BEGIN ] :: Running 'service tuned-ppd status' Redirecting to /bin/systemctl status tuned-ppd.service ○ tuned-ppd.service - PPD-to-TuneD API Translation Daemon Loaded: loaded (/usr/lib/systemd/system/tuned-ppd.service; enabled; preset: enabled) Active: inactive (dead) since Wed 2025-04-16 07:09:39 EDT; 1s ago Duration: 4.441s Invocation: 7e238f4909c34f6c9aeffc3ebef06668 Process: 63418 ExecStart=/usr/sbin/tuned-ppd -l (code=exited, status=0/SUCCESS) Main PID: 63418 (code=exited, status=0/SUCCESS) Mem peak: 14.3M CPU: 108ms Apr 16 07:09:34 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Startin…. Apr 16 07:09:35 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Started…. Apr 16 07:09:39 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Stoppin…. Apr 16 07:09:39 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: tuned-p…. Apr 16 07:09:39 prereserve-1mt-rhel-10.1-20250330.2-28248-2025-04-16-09-58 systemd[1]: Stopped…. Hint: Some lines were ellipsized, use -l to show in full. :: [ 07:09:41 ] :: [ PASS ] :: Command 'service tuned-ppd status' (Expected 0,1,3, got 3) :: [ 07:09:44 ] :: [ BEGIN ] :: Running 'service gdm stop' Redirecting to /bin/systemctl stop gdm.service :: [ 07:09:44 ] :: [ PASS ] :: Command 'service gdm stop' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 19s :: Assertions: 16 good, 0 bad :: RESULT: PASS (real scenario -- standalone service) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 07:09:46 ] :: [ LOG ] :: rlSEAVCCheck: Search for AVCs, USER_AVCs, SELINUX_ERRs, and USER_SELINUX_ERRs since timestamp 'TIMESTAMP' [04/16/2025 07:09:14] ---- type=USER_AVC msg=audit(04/16/2025 07:09:29.821:1072) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:29.905:1073) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:30.156:1074) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:31.216:1075) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:35.055:1078) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:35.057:1079) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---- type=USER_AVC msg=audit(04/16/2025 07:09:35.059:1080) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' :: [ 07:09:46 ] :: [ INFO ] :: rlSEAVCCheck: ignoring patterns: :: [ 07:09:46 ] :: [ INFO ] :: rlSEAVCCheck: type=USER_AVC.*received (policyload|setenforce) notice ---==============--- UNEXPECTED MESSAGES: type=USER_AVC msg=audit(04/16/2025 07:09:29.821:1072) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:29.905:1073) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:30.156:1074) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:31.216:1075) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:35.055:1078) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:35.057:1079) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' type=USER_AVC msg=audit(04/16/2025 07:09:35.059:1080) : pid=677 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:tuned_ppd_t:s0 tclass=dbus permissive=0 exe=/usr/bin/dbus-broker sauid=dbus hostname=? addr=? terminal=?' ---==============--- :: [ 07:09:46 ] :: [ FAIL ] :: Check there are no unexpected AVCs/ERRORs (Assert: expected 0, got 1) Redirecting to /bin/systemctl status tuned-ppd.service :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 2s :: Assertions: 0 good, 1 bad :: RESULT: WARN (Cleanup)