Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 331948 Details for
Bug 446706
sec-policy/selinux-dovecot - /etc/selinux/targeted/contexts/files/file_contexts: line 339 has invalid regex /etc/dovecot(/.*)?*: nothing to repeat
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
sec-policy/selinux-dovecot-2.20120725-r5 build log
file_446706.txt (text/plain), 17.82 KB, created by
eroen
on 2012-12-10 11:40:35 UTC
(
hide
)
Description:
sec-policy/selinux-dovecot-2.20120725-r5 build log
Filename:
MIME Type:
Creator:
eroen
Created:
2012-12-10 11:40:35 UTC
Size:
17.82 KB
patch
obsolete
> * Package: sec-policy/selinux-dovecot-2.20120725-r5 > * Repository: gentoo > * Maintainer: selinux@gentoo.org > * USE: amd64 elibc_glibc kernel_linux selinux userland_GNU > * FEATURES: fakeroot preserve-libs sandbox selinux sesandbox userpriv usersandbox >>>> Unpacking source... >>>> Unpacking refpolicy-2.20120725.tar.bz2 to /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work >>>> Unpacking patchbundle-selinux-base-policy-2.20120725-r5.tar.bz2 to /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work >>>> Source unpacked in /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work >>>> Preparing source in /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work ... > * Applying SELinux policy updates ... > * 0001-udev-call_init_script_directly_for_network_hotplugging-r1.patc [ ok ] > * 0002-dbus-dbus_can_access_xdg_locations-r1.patch ... [ ok ] > * 0002-mozilla-browser_can_access_xdg_locations-r1.patch ... [ ok ] > * 0002-userdomain-users_can_manage_their_xdg_locations-r2.patch ... [ ok ] > * 0002-xdg-introduce_xdg_types_and_declarations-r2.patch ... [ ok ] > * 0003-gpg-update_interactions_between_gpg_and_mutt-r1.patch ... [ ok ] > * 0003-mutt-introduce_mutt_types_and_declarations-r1.patch ... [ ok ] > * 0003-staff-update_with_mutt_role-r1.patch ... [ ok ] > * 0003-sysadm-update_with_mutt_role-r1.patch ... [ ok ] > * 0003-unprivuser-update_with_mutt_role-r1.patch ... [ ok ] > * 0004-pan-introduce_pan_type_declarations_and_definitions-r1.patch . [ ok ] > * 0004-staff-update_with_pan_role-r1.patch ... [ ok ] > * 0004-unprivuser-update_with_pan_role-r1.patch ... [ ok ] > * 0005-links-introduce_links_type_declarations_and_definitions-r1.pat [ ok ] > * 0005-staff-update_with_links_role-r1.patch ... [ ok ] > * 0005-unprivuser-update_with_links_role-r1.patch ... [ ok ] > * 0006-filesystem-add_dontaudit_interface_for_tmpfs_getattr-r3.patch [ ok ] > * 0006-skype-introduce_skype_domain-r4.patch ... [ ok ] > * 0006-staff-update_with_skype_role-r1.patch ... [ ok ] > * 0006-unprivuser-update_with_skype_role-r1.patch ... [ ok ] > * 0007-gorg-introduce_gorg_type_declarations_and_definitions-r1.patch [ ok ] > * 0007-staff-update_with_gorg_role-r1.patch ... [ ok ] > * 0007-sysadm-update_with_gorg_role-r1.patch ... [ ok ] > * 0007-unprivuser-update_with_gorg_role-r1.patch ... [ ok ] > * 0008-nginx-introduce_nginx_type_declarations_and_definitions-r1.pat [ ok ] > * 0008-sysadm-update_with_nginx_admin-r1.patch ... [ ok ] > * 0009-corecommands-various_file_context_updates-r1.patch ... [ ok ] > * 0010-mount-allow_relabelfrom_for_all_types_to_support_nonstandard_m [ ok ]nts-r1.patch ... > * 0011-mount-support_rw_puppet_tmp_files_to_capture_output_for_puppet [ ok ]ch ... > * 0012-logging-allow_syslog_to_create_syslog_dir-r5.patch ... [ ok ] > * 0013-files-use_runetime_files_in_etc_env-r1.patch ... [ ok ] > * 0013-portage-use_runtime_files_for_gcc_config-r1.patch ... [ ok ] > * 0014-qemu-interact_with_vde-r1.patch ... [ ok ] > * 0014-sysadm-add_vde_role-r1.patch ... [ ok ] > * 0014-vde-introduce_vde_type_declarations_and_definitions-r1.patch . [ ok ] > * 0015-fail2ban-dontaudit_write_to_usr_dirs-r1.patch ... [ ok ] > * 0015-fail2ban-r1.patch ... [ ok ] > * 0015-init-allow_initrc_to_stream_connect_to_fail2ban_socket-r1.patc [ ok ] > * 0015-init-dontaudit_write_to_use_dirs-r1.patch ... [ ok ] > * 0016-telnet-mark_remotelogin_domtrans_as_optional_policy-r1.patch . [ ok ] > * 0017-init-updates_on_init-r1.patch ... [ ok ] > * 0018-udev-new_udev_manages_udev_tbl_t_more-r1.patch ... [ ok ] > * 0019-init-let_initrc_scripts_create_dirs_in_sysfs-r1.patch ... [ ok ] > * 0020-portage-allow_fetch_domain_to_use_portage_devpts_to_show_progr [ ok ]downloads-r1.patch ... > * 0021-logging-allow_syslog_ng_to_create_persist_file_elsewhere-r1.pa [ ok ] > * 0022-init-allow_exports_to_be_called_from_initrc_so_needs_to_have_a [ ok ]o_var_lib_nfs-r1.patch ... > * 0022-r1.patch ... [ ok ] > * 0023-puppet-updates_on_puppet_policy-r1.patch ... [ ok ] > * 0025-courier-update_on_courier_policy-r1.patch ... [ ok ] > * 0026-ldap-update_on_ldap_policy-r2.patch ... [ ok ] > * 0028-xserver-update_on_xserver_policy-r1.patch ... [ ok ] > * 0029-cron-use_interactive_fds-r1.patch ... [ ok ] > * 0031-apache-introduce_functions_for_aggregated_types-r1.patch ... [ ok ] > * 0032-lvm-mark_dev_lvm_as_lock_dir-r1.patch ... [ ok ] > * 0033-init-add_domtrans_through_rc_exec_in_init_domtrans_script_call [ ok ]ch ... > * 0034-portage-r1.patch ... [ ok ] > * 0035-mount-allow_getattr_from_mount_on_security_needed_to_mount_wit [ ok ]ontext-r1.patch ... > * 0035-su-allow_getattr_from_su_domains_on_security_needed_to_run_su- [ ok ]h ... > * 0036-sysadm-allow_sysadm_to_call_qemu_to_launch_virt_images_from_co [ ok ]ne-r1.patch ... > * 0037-init-mark_location_for_ip6tables_save_and_restore-r1.patch ... [ ok ] > * 0038-nginx-allow_listing_configuration_dir_used_by_wildcard_include [ ok ]fig-r1.patch ... > * 0039-init-mark_console_directory_as_initrc_state_t-r1.patch ... [ ok ] > * 0040-devices-add_interface_to_getattr_on_sysfs_filesystem-r1.patch [ ok ] > * 0040-selinux-add_calls_to_dev_getattr_sysfs_fs_and_dontaudit_where_ [ ok ]r1.patch ... > * 0041-init-r1.patch ... [ ok ] > * 0042-kernel-ignore_search_on_unlabeled_dirs_by_kernel_before_it_mou [ ok ]them-r1.patch ... > * 0043-mount-allow_mount_to_setsched_kernel-r1.patch ... [ ok ] > * 0044-files-introduce_files_create_pid_dirs-r1.patch ... [ ok ] > * 0044-init-allow_bootmisc_to_mkdir_rmdir_in_var_run-r1.patch ... [ ok ] > * 0045-init-allow_initrc_script_to_delete_stale_syslog_socket_control [ ok ]1.patch ... > * 0045-logging-introduce_logging_delete_devlog_socket_interface-r1.pa [ ok ] > * 0046-init-allow_initrc_script_to_clean_up_tmp_during_bootup-r1.patc [ ok ] > * 0047-portage-dontaudit_home_dir_search_and_getattr-r1.patch ... [ ok ] > * 0048-init-grant_sys_admin_capability_to_initrc_scripts-r1.patch ... [ ok ] > * 0049-sysnetwork-dontaudit_sys_admin_capability_request-r1.patch ... [ ok ] > * 0050-cron-allow_creation_of_cronjob_t_key-r1.patch ... [ ok ] > * 0051-authlogin-have_pwd_lock_file_marked_as_etc_t-r1.patch ... [ ok ] > * 0052-init-allow_init_scripts_to_work_with_cgroups-r1.patch ... [ ok ] > * 0053-unconfined-support_unconfined_domains_to_launch_xserver_from_c [ ok ]atch ... > * 0054-ddcprobe-mark_kudzu_dependency_as_optional-r1.patch ... [ ok ] > * 0055-devices-introduce_dev_setattr_generic_chr_files_interface-r1.p [ ok ]. > * 0055-kernel-allow_kdevtmpfs_to_setattr_chr_file_in_dev-r1.patch ... [ ok ] > * 0056-selinuxutil-mark_modules_directory_as_semanage_store-r1.patch [ ok ] > * 0057-udev-update_file_contexts_for_udev_binaries-r1.patch ... [ ok ] > * 0058-dmesg-dontaudit_rw_on_generic_device_files-r1.patch ... [ ok ] > * 0059-awstats-put_apache_call_in_right_location-r1.patch ... [ ok ] > * 0059-bitlbee-optional_inetd_calls-r1.patch ... [ ok ] > * 0059-cvs-optional_inetd-calls-r1.patch ... [ ok ] > * 0059-cvs-update_daemon_call-r1.patch ... [ ok ] > * 0059-djbdns-optional_ucspi_calls-r1.patch ... [ ok ] > * 0059-finger-optional_inetd_call-r1.patch ... [ ok ] > * 0059-modemmanager-optional_networkmanager_call-r1.patch ... [ ok ] > * 0059-mplayer-optional_xserver_call-r1.patch ... [ ok ] > * 0059-telnet-optional_inetd_calls-r1.patch ... [ ok ] > * 0059-webalizer-optional_apache_calls-r1.patch ... [ ok ] > * 0060-apache-support_search_on_all_web_content-r1.patch ... [ ok ] > * 0061-phpfpm-introduce_domain_for_phpfpm-r1.patch ... [ ok ] > * 0062-gnome-introduce_xdg_config_support-r1.patch ... [ ok ] > * 0063-dracut-introduce_dracut_domain-r1.patch ... [ ok ] > * 0063-modutils-allow_depmod_to_create_write_dracut_temp_files-r1.pat [ ok ] > * 0063-sysadm-allow_sysadm_run_rights_on_dracut-r1.patch ... [ ok ] > * 0064-networkmanager-mark_wpa_cli_as_an_interactive_application-r1.p [ ok ]. > * 0064-sysadm-allow_sysadm_to_call_wpa_cli-r1.patch ... [ ok ] > * 0065-portage-add_portage_eselect_module_attribute-r1.patch ... [ ok ] > * 0065-selinuxutil-mark_semanage_as_eselect_managed-r1.patch ... [ ok ] > * 0069-alsa-support_alsadomain_for_semaphores-r1.patch ... [ ok ] > * 0069-chromium-add_in_chromium_policy-r4.patch ... [ ok ] > * 0069-devices-add_dontaudit_for_sysfs-r1.patch ... [ ok ] > * 0069-files-add_dontaudit_for_etc_files-r1.patch ... [ ok ] > * 0069-flash-introduce_flash_file_locations-r1.patch ... [ ok ] > * 0069-getty-add_dontaudit_for_getty_fds-r1.patch ... [ ok ] > * 0069-java-support_sound_and_browser_tmp_file_access-r1.patch ... [ ok ] > * 0069-kernel-add_dontaudit_for_reading_kernel_sysctls-r1.patch ... [ ok ] > * 0069-miscfiles-support_for_user_provided_certificates-r1.patch ... [ ok ] > * 0069-mozilla-proper_confinement_within_mozilla-r4.patch ... [ ok ] > * 0069-mplayer-support_alsa_domain_group-r1.patch ... [ ok ] > * 0069-staff-staff_calls_chromium-r1.patch ... [ ok ] > * 0069-unconfined-unconfined_calls_chromium-r1.patch ... [ ok ] > * 0069-unprivuser-user_calls_chromium-r1.patch ... [ ok ] > * 0074-selinuxutil-do_not_audit_dac_read_search_stuff-r2.patch ... [ ok ] > * 0074-sysnetwork-do_not_audit_wpa_cli_fds-r2.patch ... [ ok ] > * 0081-sysadm-allow_sysadm_to_be_mail_admin-r2.patch ... [ ok ] > * 0082-dbus-declare_run_dir-2.patch ... [ ok ] > * 0082-init-support_init_daemon_run_dir_interface-r4.patch ... [ ok ] > * 0082-mysql-declare_run_dir-r2.patch ... [ ok ] > * 0082-udev-update_udev_policy_to_support_run_dir-r2.patch ... [ ok ] > * 0083-tor-mark_as_run_dir-2.patch ... [ ok ] > * 0087-modutils-label_kmod_correctly-r3.patch ... [ ok ] > * 0088-udev-allow_udev_to_load_kernel_modules-r3.patch ... [ ok ] > * 0089-publicfile-update_contexts_for_publicfile-r3.patch ... [ ok ] > * 0090-mta-read_aliases_requires_search_on_mail-r3.patch ... [ ok ] > * 0091-java-remove_duplicate_file_context-r4.patch ... [ ok ] > * 0092-postgresql-execute_rights_and_run_dir_support-r4.patch ... [ ok ] > * 0092-sysadm-allow_postgresql_administration-r4.patch ... [ ok ] > * 0093-sysadm-allow_asterisk_administration-r4.patch ... [ ok ] > * 0094-bind-remove_named_lib_type-r4.patch ... [ ok ] > * 0098-asterisk-init_create_run_asterisk-r5.patch ... [ ok ] > * 0099-sysadm-manage_openvpn_domain-r5.patch ... [ ok ] > * 0100-sysadm-manage_bind_domain-r5.patch ... [ ok ] > * 0101-sysadm-manage_ntp_domain-r5.patch ... [ ok ] > * 0102-consolekit-named_file_transition_for_run_dir-r5.patch ... [ ok ] > * 0103-nscd-named_file_transition_for_run_dir-r5.patch ... [ ok ] > * 0104-all-merge_set_from_20120725-r5.patch ... [ ok ] > * 0105-puppet-introduce_admin_interfaces-r5.patch ... [ ok ] > * 0105-sysadm-system_admin_for_puppet-r5.patch ... [ ok ] > * 0106-lvm-request_kernel_module_loading_for_cryptsetup-r5.patch ... [ ok ] > * 0107-dbus-setrlimit_for_opoen_file_descriptors-r5.patch ... [ ok ] > * 0108-files-lost_found_dirs_backport-r5.patch ... [ ok ] > * 0109-authlogin-interfaces_for_consolekit_creating_tagfiles-r5.patch [ ok ] > * 0109-consolekit-create_pam_console_tagfiles_on_login-r5.patch ... [ ok ] > * 0110-logging-mark_persistance_file_as_syslogd_var_lib_t-r5.patch .. [ ok ] > * 0111-consolekit-read_dbus_machine_id-r5.patch ... [ ok ] > * 0111-dbus-update_interface_to_read_symlink_lib_too-r5.patch ... [ ok ] > * 0112-devices-support_loop_device_context-r5.patch ... [ ok ] > * 0113-all-turn_off_booleans_by_default-r5.patch ... [ ok ] > * 0114-sensord-introduce_sensord_policy-r5.patch ... [ ok ] > * 0115-sasl-allow_sasl_to_talk_with_mysql_over_tcp-r5.patch ... [ ok ] > * 0116-quota-allow_request_load_kernel_modules-r5.patch ... [ ok ] > * 0117-djbdns-fix_ports_usage-r5.patch ... [ ok ] > * 0118-systemtap-initial_policy-r5.patch ... [ ok ] > * 0119-clamav-read_system_and_network_state-r5.patch ... [ ok ] > * 0120-all-block_suspend_fixes-r5.patch ... [ ok ] > * 0121-dovecot-support_ldap_user_authentication-r5.patch ... [ ok ] > * 0122-gitosis-support_gitolite3-r5.patch ... [ ok ] > * 0123-gpg-agent_reads_dev_random-r5.patch ... [ ok ] > * 0124-milter-add_greylist_updates-r5.patch ... [ ok ] > * 0125-networkmanager-allow_wicd_to_run_wpa_cli-r5.patch ... [ ok ] > * 0126-lpd-read_crypto_sysctls_for_cups-r5.patch ... [ ok ] > * 0127-policykit-support_minimal_polkit-r5.patch ... [ ok ] > * 0128-tor-reads_network_sysctls-r5.patch ... [ ok ] > * 0129-sanlock-various_capability_updates_for_sanlock-r5.patch ... [ ok ] > * Done with patching >>>> Source prepared. >>>> Configuring source in /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work ... >>>> Source configured. >>>> Compiling source in /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work ... >make -j4 -j1 NAME=strict -C /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work//strict >make: Entering directory `/var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work/strict' >Compiling strict dovecot module >/usr/bin/checkmodule: loading policy configuration from tmp/dovecot.tmp >/usr/bin/checkmodule: policy configuration loaded >/usr/bin/checkmodule: writing binary representation (version 15) to tmp/dovecot.mod >Creating strict dovecot.pp policy package >rm tmp/dovecot.mod.fc tmp/dovecot.mod >make: Leaving directory `/var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work/strict' >make -j4 -j1 NAME=targeted -C /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work//targeted >make: Entering directory `/var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work/targeted' >Compiling targeted dovecot module >/usr/bin/checkmodule: loading policy configuration from tmp/dovecot.tmp >/usr/bin/checkmodule: policy configuration loaded >/usr/bin/checkmodule: writing binary representation (version 15) to tmp/dovecot.mod >Creating targeted dovecot.pp policy package >rm tmp/dovecot.mod.fc tmp/dovecot.mod >make: Leaving directory `/var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/work/targeted' >>>> Source compiled. >>>> Test phase [not enabled]: sec-policy/selinux-dovecot-2.20120725-r5 > >>>> Install selinux-dovecot-2.20120725-r5 into /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/image/ category sec-policy > * Installing strict dovecot policy package > * Installing targeted dovecot policy package >>>> Completed installing selinux-dovecot-2.20120725-r5 into /var/tmp/portage/sec-policy/selinux-dovecot-2.20120725-r5/image/ > > * Removing /usr/share/doc > * checking 2 files for package collisions >>>> Merging sec-policy/selinux-dovecot-2.20120725-r5 to / >>>> Setting SELinux security labels >/etc/selinux/targeted/contexts/files/file_contexts: line 339 has invalid regex /etc/dovecot(/.*)?*: nothing to repeat >--- /usr/ >--- /usr/share/ >--- /usr/share/selinux/ >--- /usr/share/selinux/strict/ >>>> /usr/share/selinux/strict/dovecot.pp >--- /usr/share/selinux/targeted/ >>>> /usr/share/selinux/targeted/dovecot.pp >>>> Safely unmerging already-installed instance... >No package files given... Grabbing a set. >--- replaced obj /usr/share/selinux/targeted/dovecot.pp >--- replaced dir /usr/share/selinux/targeted >--- replaced obj /usr/share/selinux/strict/dovecot.pp >--- replaced dir /usr/share/selinux/strict >--- replaced dir /usr/share/selinux >--- replaced dir /usr/share >--- replaced dir /usr >>>> Regenerating /etc/ld.so.cache... >>>> Original instance of package unmerged safely. > * Inserting the following modules into the strict module store: dovecot >/etc/selinux/strict/contexts/files/file_contexts: line 339 has invalid regex /etc/dovecot(/.*)?*: nothing to repeat > * SELinux modules loaded succesfully. > * Inserting the following modules into the targeted module store: dovecot >/etc/selinux/targeted/contexts/files/file_contexts: line 339 has invalid regex /etc/dovecot(/.*)?*: nothing to repeat > * SELinux modules loaded succesfully. >>>> sec-policy/selinux-dovecot-2.20120725-r5 merged.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 446706
: 331948