# emerge -v =sec-policy/selinux-mutt-2.20110726-r3 These are the packages that would be merged, in order: Calculating dependencies... done! [ebuild R ] sec-policy/selinux-mutt-2.20110726-r3 0 kB Total: 1 package (1 reinstall), Size of downloads: 0 kB >>> Verifying ebuild manifests >>> Emerging (1 of 1) sec-policy/selinux-mutt-2.20110726-r3 * refpolicy-2.20110726.tar.bz2 RMD160 SHA1 SHA256 size ;-) ... [ ok ] * patchbundle-selinux-base-policy-2.20110726-r8.tar.bz2 RMD160 SHA1 SHA256 size ;-) ... [ ok ] >>> Unpacking source... >>> Unpacking refpolicy-2.20110726.tar.bz2 to /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work >>> Unpacking patchbundle-selinux-base-policy-2.20110726-r8.tar.bz2 to /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work >>> Source unpacked in /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work >>> Preparing source in /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work ... * Applying SELinux policy updates ... * 0000-fix-roles-staff-r1.patch ... [ ok ] * 0000-fix-roles-sysadm-r1.patch ... [ ok ] * 0000-fix-roles-unprivuser-r2.patch ... [ ok ] * 0001-iptables-support_xtables-multi_context-r1.patch ... [ ok ] * 0004-udev-support_init_script_hotplugging-r1.patch ... [ ok ] * 0005-nagios-allow_nrpe_to_read_nrpe_config-r1.patch ... [ ok ] * 0005-nagios-diskcheck_plugin_needs_getattr_on_mountpoint_directories-r2.patch ... [ ok ] * 0010-consolekit-make_hal_an_optional_dependency-r1.patch ... [ ok ] * 0014-corecommands-update_contexts_for_xfce4-r2.patch ... [ ok ] * 0015-unconfined-allow_unconfined_users_to_run_portage_commands-r1.patch ... [ ok ] * 0016-portage-eselect_support-r4.patch ... [ ok ] * 0016-selinuxutil-semanage_is_eselect_module_in_gentoo-r1.patch ... [ ok ] * 0018-init-introduce_gentoo_init_rc_exec_call-r4.patch ... [ ok ] * 0018-portage-gcc_config_calls_rc_for_some_stupid_color_stuff-r4.patch ... [ ok ] * 0018-selinuxutil-run_init_calls_rc-r4.patch ... [ ok ] * 0018-sysadm-system_administrative_commands_call_rc-r4.patch ... [ ok ] * 0019-portage-introduce_portage_gpg_t_filetype-r4.patch ... [ ok ] * 0019-portage-support_layman_and_emerge-webrsync_through_portage_fetch_t-r4.patch ... [ ok ] * 0020-gpg-introduce_gpg_exec_interface-r4.patch ... [ ok ] * 0020-portage-allow_portage_to_be_called_from_within_cron_jobs-r4.patch ... [ ok ] * 0020-portage-domtrans_support_to_portage_fetch_t-r4.patch ... [ ok ] * 0021-gpg-allow_gpg_to_read_write_mutt_prepared_emails-r4.patch ... [ ok ] * 0021-mutt-introduce_mutt_domain-r3.patch ... [ ok ] * 0021-staff-allow_staff_to_call_mutt-r1.patch ... [ ok ] * 0021-sysadm-allow_sysadm_to_use_mutt-r1.patch ... [ ok ] * 0022-links-introduce_links_t_domain-r1.patch ... [ ok ] * 0022-staff-allow_staff_to_call_links-r1.patch ... [ ok ] * 0023-puppet-allow_puppet_to_mount_file_systems-r3.patch ... [ ok ] * 0024-pan-support_pan_t_domain-r5.patch ... [ ok ] * 0024-staff-allow_staff_to_call_pan-r1.patch ... [ ok ] * 0025-mount-introduce_dontaudits-r1.patch ... [ ok ] * 0025-portage-introduce_booleans_and_dontaudits-r1.patch ... [ ok ] * 0025-raid-add_dontaudit_statements-r1.patch ... [ ok ] * 0026-skype-introduce_skype_domain-r5.patch ... [ ok ] * 0027-wireshark-01-allow_use_of_terminals_for_commandline_startup-r4.patch ... [ ok ] * 0027-wireshark-02-use_random_device_next_to_urandom-r4.patch ... [ ok ] * 0027-wireshark-03-execute_dumpcap_from_wireshark_domain-r4.patch ... [ ok ] * 0027-wireshark-04-dumpcap_communicates_with_wireshark_through_pipes-r4.patch ... [ ok ] * 0027-wireshark-05-allow_wireshark_to_read_sysfs_to_capture_packets-r4.patch ... [ ok ] * 0028-sysnetwork-various_dhcp_client_updates-r1.patch ... [ ok ] * 0030-mount-mount_needs_relabelfrom_as_well_for_nonstandard_mounts-r1.patch ... [ ok ] * 0031-puppet-various_puppet_fixes-r4.patch ... [ ok ] * 0032-mozilla-various_mozilla-fixes-r1.patch ... [ ok ] * 0033-mount-allow_mount_to_write_to_puppet_tmp_so_puppet_can_gather_mount_output-r1.patch ... [ ok ] * 0034-syslog-allow_syslog_to_create_var_lib_syslog_directory-r1.patch ... [ ok ] * 0035-init-various_init_fixes-r1.patch ... [ ok ] * 0036-zabbix-correct_zabbix_agentd_context-r2.patch ... [ ok ] * 0037-zabbix-call_mysql_over_tcpip-r2.patch ... [ ok ] * 0038-corecommands-various_context_updates-r2.patch ... [ ok ] * 0039-courier-various_updates_on_courier-imap-r1.patch ... * 0039-courier-various_updates_on_courier-imap-r1.patch ... [ ok ] * 0040-gorg-introduce_gorg_domain-r8.patch ... [ ok ] * 0041-ldap-various_openldap_updates-r1.patch ... [ ok ] * 0042-networkmanager-various_updates_to_support_wpa_cli-r1.patch ... [ ok ] * 0043-nginx-introduce_nginx_domain-r1.patch ... [ ok ] * 0044-postfix-various_postfix_updates-r1.patch ... [ ok ] * 0045-postgresql-various_postgresql-updates-r1.patch ... [ ok ] * 0046-xserver-various_xserver_updates-r1.patch ... [ ok ] * 0047-asterisk-allow_asterisk_to_chown_its_own_var_run_directory-r2.patch ... [ ok ] * 0047-asterisk-allow_asterisk_to_listen_on_its_control_socket-r2.patch ... [ ok ] * 0047-asterisk-allow_asterisk_to_read_from_dev_random-r2.patch ... [ ok ] * 0048-sysnetwork-support_LDAPS_for_LDAP_calls-r2.patch ... [ ok ] * 0049-kernel-dontaudit_on_udp_socket_listen_since_that_does_not_exist_anyhow-r2.patch ... [ ok ] * 0050-courier-update_courier_fc_for_courier_imap-r2.patch ... [ ok ] * 0052-asterisk-allow_initrc_to_manage_asterisk_log_and_pid_file_attributes-r3.patch ... [ ok ] * 0052-init-allow_initrc_to_manage_asterisk_log_and_pid_file_attributes-r3.patch ... [ ok ] * 0053-cron-make_cron_fds_interactive-r3.patch ... [ ok ] * 0054-portage-introduce_dontaudit_on_leaked_file_descriptors-r3.patch ... [ ok ] * 0054-selinuxutil-dontaudit_portage_leaked_file_descriptors-r3.patch ... [ ok ] * 0055-selinuxutil-support_semanage_permissive-r4.patch ... [ ok ] * 0056-portage-use_separate_interfaces_for_fetch_domain-r4.patch ... [ ok ] * 0056-puppet-use_separate_interfaces_for_fetch_domain-r4.patch ... [ ok ] * 0056-sysadm-use_separate_interfaces_for_fetch_domain-r4.patch ... [ ok ] * 0056-unconfined-use_separate_interfaces_for_fetch_domain-r4.patch ... [ ok ] * 0057-portage-mark_glsa-check_as_portage_entry_file-r5.patch ... [ ok ] * 0058-asterisk-mark_executable_as_application_exec-r5.patch ... [ ok ] * 0059-sysadm-make_sysadm_an_asterisk_admin-r5.patch ... [ ok ] * 0060-dbus-use_xdg_locations-r5.patch ... [ ok ] * 0060-mozilla-use_xdg_locations-r5.patch ... [ ok ] * 0060-mutt-update_xdg_calls-r8.patch ... [ ok ] * 0060-userdomain-users_can_manage_their_xdg_locations-r5.patch ... [ ok ] * 0060-xdg-introduce_xdg_types-r8.patch ... [ ok ] * 0061-portage-allow_gcc_config_to_work_with_nfs_mounted_partitions-r6.patch ... [ ok ] * 0062-portage-gcc-config_must_manage_etc_runtime_files-r6.patch ... [ ok ] * 0063-qemu-allow_qemu_to_interact_with_vde-r6.patch ... [ ok ] * 0063-sysadm-allow_sysadm_to_manage_vde_switches-r6.patch ... [ ok ] * 0063-vde-introduce_support_for_vde-r6.patch ... [ ok ] * 0064-init-allow_bootmisc_to_mkdir_rmdir_in_var_log-r6.patch ... [ ok ] * 0065-amavis-fix_amavisd_conf_file_context-r6.patch ... [ ok ] * 0066-nagios-give_nrpe_read_access_to_proc_mdstat-r6.patch ... [ ok ] * 0067-inetd-support_resource_limits_due_to_pam_limits_support-r6.patch ... [ ok ] * 0068-uwimap-make_inetd_call_optional-r6.patch ... [ ok ] * 0069-vde-drop_vde_conf_t_from_patchset_as_etc_t_is_sufficient-r7.patch ... [ ok ] * 0070-links-corrections_with_refpolicy_feedback-r7.patch ... [ ok ] * 0071-storage-have_dev_tmp-block_marked_as_fixed_disk_device_as_created_by_udev_tempnode-r7.patch ... [ ok ] * 0072-networkmanager-wpa_cli_is_an_interactive_application-r7.patch ... [ ok ] * 0073-dhcp-support_ldap_backend_infrastructure-r7.patch ... [ ok ] * 0074-inetd-allow_inetd_to_listen_on_pop_port-r7.patch ... [ ok ] * 0075-mozilla-allow_plugin_to_read_config_files-r8.patch ... [ ok ] * 0076-xserver-support_contexts_for_lxdm_and_slim-r8.patch ... [ ok ] * 0077-files-introduce_dontaudit_interfaces_for_mountpoints-r8.patch ... [ ok ] * 0077-mount-dontaudit_write_and_setattr_on_mountpoints-r8.patch ... [ ok ] * 0077-portage-dontaudit_netlink_and_put_tryouts_in_global_def-r8.patch ... [ ok ] * 0077-qemu-dontaudit_create_socket-r8.patch ... [ ok ] * 0077-selinuxutil-dontaudit_dac_read_search-r8.patch ... [ ok ] * 0077-sudo-dontaudit_search_user_home_dir-r8.patch ... [ ok ] * 0077-vde-dontaudit_search_user_home_dir-r8.patch ... [ ok ] * 0078-portage-mark_portage_ebuild_t_as_mountpoint-r8.patch ... [ ok ] * 0079-fail2ban-dontaudit_write_to_usr_dirs-r8.patch ... [ ok ] * 0079-init-allow_initrc_to_stream_connect_to_fail2ban_socket-r8.patch ... [ ok ] * 0079-init-dontaudit_write_to_usr_dirs-r8.patch ... [ ok ] * 0080-telnet-mark_remotelogin_domtrans_as_optional_policy-r8.patch ... [ ok ] * Done with patching >>> Source prepared. >>> Configuring source in /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work ... >>> Source configured. >>> Compiling source in /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work ... make -j3 -j1 NAME=strict -C /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work//strict make: Entering directory `/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/strict' Compiling strict mutt module /usr/bin/checkmodule: loading policy configuration from tmp/mutt.tmp /usr/bin/checkmodule: policy configuration loaded /usr/bin/checkmodule: writing binary representation (version 13) to tmp/mutt.mod Creating strict mutt.pp policy package rm tmp/mutt.mod.fc tmp/mutt.mod make: Leaving directory `/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/strict' make -j3 -j1 NAME=targeted -C /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work//targeted make: Entering directory `/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/targeted' Compiling targeted mutt module /usr/bin/checkmodule: loading policy configuration from tmp/mutt.tmp /usr/bin/checkmodule: policy configuration loaded /usr/bin/checkmodule: writing binary representation (version 13) to tmp/mutt.mod Creating targeted mutt.pp policy package rm tmp/mutt.mod.fc tmp/mutt.mod make: Leaving directory `/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/targeted' >>> Source compiled. >>> Test phase [not enabled]: sec-policy/selinux-mutt-2.20110726-r3 >>> Install selinux-mutt-2.20110726-r3 into /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/image/ category sec-policy * Installing strict mutt policy package * Installing targeted mutt policy package >>> Completed installing selinux-mutt-2.20110726-r3 into /var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/image/ >>> Installing (1 of 1) sec-policy/selinux-mutt-2.20110726-r3 * checking 2 files for package collisions >>> Merging sec-policy/selinux-mutt-2.20110726-r3 to / !!! Unable to set SELinux security labels --- /usr/ --- /usr/share/ --- /usr/share/selinux/ --- /usr/share/selinux/strict/ >>> /usr/share/selinux/strict/mutt.pp --- /usr/share/selinux/targeted/ >>> /usr/share/selinux/targeted/mutt.pp >>> Safely unmerging already-installed instance... No package files given... Grabbing a set. --- replaced obj /usr/share/selinux/targeted/mutt.pp --- replaced dir /usr/share/selinux/targeted --- replaced obj /usr/share/selinux/strict/mutt.pp --- replaced dir /usr/share/selinux/strict --- replaced dir /usr/share/selinux --- replaced dir /usr/share --- replaced dir /usr >>> Original instance of package unmerged safely. * Inserting the following modules into the strict module store: mutt libsepol.permission_copy_callback: Module mutt depends on permission nlmsg_tty_audit in class netlink_audit_socket, not satisfied (No such file or directory). libsemanage.semanage_link_sandbox: Link packages failed (No such file or directory). semodule: Failed! * ERROR: sec-policy/selinux-mutt-2.20110726-r3 failed (postinst phase): * Failed to load in modules mutt in the strict policy store * * Call stack: * ebuild.sh, line 85: Called pkg_postinst * environment, line 1962: Called selinux-policy-2_pkg_postinst * environment, line 2026: Called die * The specific snippet of code: * semodule -s ${i} ${COMMAND} || die "Failed to load in modules ${MODS} in the $i policy store"; * * If you need support, post the output of 'emerge --info =sec-policy/selinux-mutt-2.20110726-r3', * the complete build log and the output of 'emerge -pqv =sec-policy/selinux-mutt-2.20110726-r3'. * The complete build log is located at '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/temp/build.log'. * The ebuild environment file is located at '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/temp/environment'. * S: '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/' !!! FAILED postinst: 1 * Messages for package sec-policy/selinux-mutt-2.20110726-r3: * ERROR: sec-policy/selinux-mutt-2.20110726-r3 failed (postinst phase): * Failed to load in modules mutt in the strict policy store * * Call stack: * ebuild.sh, line 85: Called pkg_postinst * environment, line 1962: Called selinux-policy-2_pkg_postinst * environment, line 2026: Called die * The specific snippet of code: * semodule -s ${i} ${COMMAND} || die "Failed to load in modules ${MODS} in the $i policy store"; * * If you need support, post the output of 'emerge --info =sec-policy/selinux-mutt-2.20110726-r3', * the complete build log and the output of 'emerge -pqv =sec-policy/selinux-mutt-2.20110726-r3'. * The complete build log is located at '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/temp/build.log'. * The ebuild environment file is located at '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/temp/environment'. * S: '/var/tmp/portage/sec-policy/selinux-mutt-2.20110726-r3/work/' >>> Auto-cleaning packages... >>> No outdated packages were found on your system. * GNU info directory index is up-to-date. #