Research
.
Skip Search Box

SELinux Mailing List

Re: SE Linux on Debian

From: Tom <tom_at_lemuria.org>
Date: Wed, 2 Oct 2002 09:24:04 +0200


On Tue, Oct 01, 2002 at 11:50:17PM -0700, Tracy R Reed wrote:
> It seemed like make relabel would be a good idea to ensure everything is
> labelled properly after all of the messing around I have done and I got
> this:

Absolutely, yes. You should relabel twice: Once before rebooting into the SELinux kernel, once after (to label the files created during shutdown and boot).

> home:/etc/selinux# make relabel
> /usr/sbin/setfiles file_contexts/file_contexts `mount | awk '/(ext[23]|reiserfs)/{print $3}'`
> /usr/sbin/setfiles: Running on a SELinux kernel, using new system calls /usr/sbin/setfiles: read 767 specifications
> /usr/sbin/setfiles: invalid context system_u:object_r:home_root_t on line number 86
> /usr/sbin/setfiles: invalid context system_u:object_r:games_exec_t on line number 616
> /usr/sbin/setfiles: invalid context system_u:object_r:var_log_inetd_t on line number 647
> /usr/sbin/setfiles: invalid context system_u:object_r:rndc_conf_t on line number 759
> /usr/sbin/setfiles: invalid context system_u:object_r:useradd_exec_t on line number 995
> /usr/sbin/setfiles: invalid context system_u:object_r:useradd_exec_t on line number 996
> /usr/sbin/setfiles: invalid context system_u:object_r:useradd_exec_t on line number 997
> /usr/sbin/setfiles: invalid context system_u:object_r:useradd_exec_t on line number 998
> /usr/sbin/setfiles: invalid context system_u:object_r:vmware_user_conf_t on line number 1053
> /usr/sbin/setfiles: invalid context system_u:object_r:xauth_exec_t on line number 1058
> make: *** [relabel] Error 1

I've seen these during my yesterday burnout, too. Check if your loaded policy, policy on disk and kernel all match in versions. Did it load the policy correctly? Try make load again. Also, I think you can delete the /etc/selinux/file_contexts/file_contexts file since it should be created from the .fc files.
Also, when you remove .te files, don't forget to remove the corresponding .fc files, too.

-- 
PGP/GPG key: http://web.lemuria.org/pubkey.html
pub  1024D/2D7A04F5 2002-05-16 Tom Vogt <tom@lemuria.org>
     Key fingerprint = C731 64D1 4BCF 4C20 48A4  29B2 BF01 9FA1 2D7A 04F5

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Wed 2 Oct 2002 - 03:37:13 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service