chroot load_policy will use selinuxfs which should be mounted in $NEWROOT/sys/fs/selinux for Fedora 19, but because there's no $NEWROOT/sys/fs, so later process will fail. Fixing this by bind mount /sys to $NEWROOT/sys. Signed-off-by: Dave Young <dyoung@xxxxxxxxxx> --- modules.d/98selinux/selinux-loadpolicy.sh | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) --- dracut.orig/modules.d/98selinux/selinux-loadpolicy.sh +++ dracut/modules.d/98selinux/selinux-loadpolicy.sh @@ -24,7 +24,8 @@ rd_load_policy() local ret=0 local out info "Loading SELinux policy" - # load_policy does mount /proc and /selinux in + mount -o bind /sys $NEWROOT/sys + # load_policy does mount /proc and /sys/fs/selinux in # libselinux,selinux_init_load_policy() if [ -x "$NEWROOT/sbin/load_policy" ]; then out=$(LANG=C chroot "$NEWROOT" /sbin/load_policy -i 2>&1) @@ -35,6 +36,8 @@ rd_load_policy() ret=$? info $out fi + umount $NEWROOT/sys/fs/selinux + umount $NEWROOT/sys if [ "$SELINUX" = "disabled" ]; then return 0; -- To unsubscribe from this list: send the line "unsubscribe initramfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html