Here's a neat new issue, (that's i'm not totally sure is an issue) I'll get to looking at it myself eventually (yes sds, I do realize this is open source :-P), so don't waste much time on it. In the base policy below notice I've got user1_u allowed for role1_r but NOT for role2_r. I then have a genfscon statement which uses user1_u:role2_r (illegal) It bombs, but tells me the wrong line! [paris@localhost dismod-test]$ checkmodule -M -o base.mod base.conf checkmodule: loading policy configuration from base.conf base.conf:50:ERROR 'invalid security context' at token 'genfscon' on line 50: genfscon proc /2 user1_u:role1_r:type1_t:s0 genfscon proc /1 user1_u:role2_r:type1_t:s0 checkmodule: error(s) encountered while parsing configuration It lays the blame on line 50 which actually has a valid context. anyway, feel free to tell me the compiler doesn't know its broken until the first token on the next line and I should just deal with it, but I know I'd get mad looking at line50 trying to figure out what was wrong with that valid context when the busted one was on line 49. --- class class1 sid sid1 class class1 { perm1 perm2 } sensitivity s0; dominance { s0 } category c0; category c1; category c2; category c3; category c4; category c5; category c6; category c7; category c8; category c9; category c10; category c11; category c12; category c13; category c14; category c15; category c16; category c17; category c18; category c19; category c20; category c21; category c22; category c23; level s0:c0.c23; mlsconstrain class1 { perm1 perm2 } ( h1 dom h2 ); attribute attr1; type type1_t; type type2_t; role role1_r types { type1_t type2_t }; role role2_r types { type1_t type2_t }; allow type1_t type2_t: class1 { perm1 }; allow role1_r role2_r; bool bool1 true; #gen_user(user1_u,, role1_r, s0, s0 - s0:c0.c23) user user1_u roles { role1_r } level s0 range s0 - s0:c0.c23; sid sid1 user1_u:role1_r:type1_t:s0 fs_use_xattr ext2 user1_u:role1_r:type1_t:s0; genfscon proc / user1_u:role1_r:type1_t:s0 genfscon proc /1 user1_u:role2_r:type1_t:s0 genfscon proc /2 user1_u:role1_r:type1_t:s0 nodecon ::1 FFFF:FFFF:FFFF:FFFF:: user1_u:role1_r:type1_t:s0 -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.