Re: SELinux-related Rawhide breakage today

2012-02-02 Thread Jim Meyering
Daniel J Walsh wrote:

 On 01/31/2012 12:07 PM, Jerry James wrote:
 After installing today's Rawhide updates on an x86_64 VM, I
 started having troubles running programs.  Nothing linked with
 libselinux.so.1 could actually open that library; the programs were
 getting EACCESS on the attempt.  I figured I needed to do a
 relabel, but since restorecon is linked with libselinux.so.1,
 .

 I touched /.autorelabel and rebooted.  The system couldn't even
 shut down, so I had to do a sync and a forced shutoff.  When the
 system came back up, it immediately started complaining about lots
 of programs that were unable to load libcrypt.  So I forced it off
 again and rebooted with enforcing=0.  That worked, but skipped the
 relabeling step!  I got a root shell and ran restorecon by hand to
 relabel.  The only file that got relabeled was this, which looks
 wrong:

 restorecon reset /lib64/libproc-3.2.8.so context
 system_u:object_r:lib_t:s0-system_u:object_r:default_t:s0

 Is something broken in SELinux land today?

 Yes we have shipped a policy that requires the usrmove functionality.

 If you add

 /lib64 /lib

 to

 /etc/selinux/targeted/contexts/files/file_contexts.subs_dist

 Then run restorecon -R -v /lib64

Thanks for the heads up.
I had just pulled the latest updates and found that I couldn't
ssh to that box at all -- console didn't work, either.
Luckily I still had the root ssh session from which I'd done the update.

In it, I confirmed the /lib64 /lib line is already present in that
file, presumably since I've just updated, and did this to recover:

setenforce 0
  restorecon -R -v /lib64
setenforce 1

Without the setenforce 0, restorecon would fail due to this:

# restorecon -R -v /lib64
restorecon: error while loading shared libraries: libselinux.so.1: cannot 
open shared object file: No such file or directory
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-02-01 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/01/2012 12:49 PM, Kevin Kofler wrote:
 Daniel J Walsh wrote:
 Yes we have shipped a policy that requires the usrmove
 functionality.
 
 How many times do we have to tell you that you MUST build usrmove
 stuff in the f17-usrmove build target, NOT in f17(-candidate)???
 
 This is already the third time somebody else cleans up your mess!
 (Rex Dieter fixed the first offending package, I fixed the second
 and now Adam Williamson fixed the third.) Please build your
 packages in the correct tag in the first place! (fedpkg build takes
 a --target flag for a reason!)
 
 Kevin Kofler
 
The first two happened at the same time.  The third happened because
of confusion over which is which.  Thanks for your consideration.

But as long as we live in the Rawhide/Non Rawhide world things are
going to be strange and mistakes are going to happen.

Why anyone is on Rawhide and not trying out usrmove is beyond me at
this time.  Rawhide is supposed to be the latest and greatest code...

If we are going to do usrmove, then lets do it and get over the hump.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk8pudUACgkQrlYvE4MpobMldACgtgKifrd/mWx4P93iDRAHsUfj
bW0AnRyECjTzWxOuIZQq+p2sZWHW401D
=Hg4k
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-02-01 Thread darrell pfeifer
On Wed, Feb 1, 2012 at 14:16, Daniel J Walsh dwa...@redhat.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1


 But as long as we live in the Rawhide/Non Rawhide world things are
 going to be strange and mistakes are going to happen.

 Why anyone is on Rawhide and not trying out usrmove is beyond me at
 this time.  Rawhide is supposed to be the latest and greatest code...

 If we are going to do usrmove, then lets do it and get over the hump.


 I am on rawhide and I usually update daily (though sometimes I am on koji
and update hourly to be completely insane).

There are times when there is a major change when I don't update as often
because I expect the change will cause problems that I don't have time to
fix/troubleshoot, or know I won't be able to submit a decent bug report.

There is also the need to test the next day because the fix might cause
another breakage to show up. Nothing like having a fresh batch of testers.

Also, thankfully, the change has not been pushed to rawhide but is
available for testing elsewhere. I'm very happy that this process has
started to happen for the larger changes to coordinate all the pieces that
need to be in place. When the change does get moved to rawhide I'll have
the decision of remaining with what I have or being part of the test at
whatever state it is in.

darrell
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-02-01 Thread Adam Williamson

On 2012-02-01 15:16, Daniel J Walsh wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/01/2012 12:49 PM, Kevin Kofler wrote:

Daniel J Walsh wrote:

Yes we have shipped a policy that requires the usrmove
functionality.


How many times do we have to tell you that you MUST build usrmove
stuff in the f17-usrmove build target, NOT in f17(-candidate)???

This is already the third time somebody else cleans up your mess!
(Rex Dieter fixed the first offending package, I fixed the second
and now Adam Williamson fixed the third.) Please build your
packages in the correct tag in the first place! (fedpkg build takes
a --target flag for a reason!)

Kevin Kofler


The first two happened at the same time.  The third happened because
of confusion over which is which.  Thanks for your consideration.

But as long as we live in the Rawhide/Non Rawhide world things are
going to be strange and mistakes are going to happen.

Why anyone is on Rawhide and not trying out usrmove is beyond me at
this time.  Rawhide is supposed to be the latest and greatest code...

If we are going to do usrmove, then lets do it and get over the hump.


There are a couple of main reasons:

1) We really didn't want the /usr move to delay Alpha testing. This one 
is already proving to be genuine: it's looking like we won't really be 
ready to push the /usr move stuff into 'production' for a day or two at 
least, but we can still generate working TC1 images today, since we used 
a tag for /usr move.


2) It was at the time (and to an extent still is) unclear whether the 
feature will eventually be un-approved. Providing the builds in a tag 
allows us to try the change out and look for previously unidentified 
roadblocks. If we hit something which makes us think 'crap, maybe we 
shouldn't do this after all', we don't have to revert and bump a ton of 
packages and probably cause some new problems and make things a very 
bumpy ride for 'regular' Rawhide users: we can just never tag the 
packages across to the Rawhide repo, and the change will never have 
happened.


--
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-02-01 Thread Kevin Fenzi
I'll note here a nice Help wanted... 

If you have access to RHEL6 (or I suppose any of the binary compatible
variants) and some time: 

rel-eng is looking for some quick regression testing of the rpm change
in https://bugzilla.redhat.com/show_bug.cgi?id=761000 to make sure it
doesn't break in any obvious way for all the builds we use our builders
for. 

See: 

https://fedorahosted.org/fesco/ticket/690#comment:33

for more info. 

Basically, just setup mock with no caching, install the rpm from 
http://people.redhat.com/harald/downloads/rpm/4.8.0-19.el6.0.usrmove.1/
and rebuild a bunch of core packages, then check them against the
normal versions. There should be no substantial differences. 

kevin


signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

SELinux-related Rawhide breakage today

2012-01-31 Thread Jerry James
After installing today's Rawhide updates on an x86_64 VM, I started
having troubles running programs.  Nothing linked with libselinux.so.1
could actually open that library; the programs were getting EACCESS on
the attempt.  I figured I needed to do a relabel, but since restorecon
is linked with libselinux.so.1, .

I touched /.autorelabel and rebooted.  The system couldn't even shut
down, so I had to do a sync and a forced shutoff.  When the system
came back up, it immediately started complaining about lots of
programs that were unable to load libcrypt.  So I forced it off again
and rebooted with enforcing=0.  That worked, but skipped the
relabeling step!  I got a root shell and ran restorecon by hand to
relabel.  The only file that got relabeled was this, which looks
wrong:

restorecon reset /lib64/libproc-3.2.8.so context
system_u:object_r:lib_t:s0-system_u:object_r:default_t:s0

Is something broken in SELinux land today?
-- 
Jerry James
http://www.jamezone.org/
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-01-31 Thread Adam Williamson
On Tue, 2012-01-31 at 14:09 -0500, Daniel J Walsh wrote:
 On 01/31/2012 12:07 PM, Jerry James wrote:
  After installing today's Rawhide updates on an x86_64 VM, I
  started having troubles running programs.  Nothing linked with
  libselinux.so.1 could actually open that library; the programs were
  getting EACCESS on the attempt.  I figured I needed to do a
  relabel, but since restorecon is linked with libselinux.so.1,
  .
  
  I touched /.autorelabel and rebooted.  The system couldn't even
  shut down, so I had to do a sync and a forced shutoff.  When the
  system came back up, it immediately started complaining about lots
  of programs that were unable to load libcrypt.  So I forced it off
  again and rebooted with enforcing=0.  That worked, but skipped the 
  relabeling step!  I got a root shell and ran restorecon by hand to 
  relabel.  The only file that got relabeled was this, which looks 
  wrong:
  
  restorecon reset /lib64/libproc-3.2.8.so context 
  system_u:object_r:lib_t:s0-system_u:object_r:default_t:s0
  
  Is something broken in SELinux land today?
 
 Yes we have shipped a policy that requires the usrmove functionality.
 
 If you add
 
 /lib64 /lib
 
 to
 
 /etc/selinux/targeted/contexts/files/file_contexts.subs_dist
 
 Then run restorecon -R -v /lib64
 
 It should fix the labeling.
 
 Not sure when usrmove is being pushed.

Could you please move that build to the usr move tag so it doesn't
affect all Rawhide users?
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: SELinux-related Rawhide breakage today

2012-01-31 Thread Adam Williamson
On Tue, 2012-01-31 at 11:19 -0800, Adam Williamson wrote:
  
  Yes we have shipped a policy that requires the usrmove functionality.
  
  If you add
  
  /lib64 /lib
  
  to
  
  /etc/selinux/targeted/contexts/files/file_contexts.subs_dist
  
  Then run restorecon -R -v /lib64
  
  It should fix the labeling.
  
  Not sure when usrmove is being pushed.
 
 Could you please move that build to the usr move tag so it doesn't
 affect all Rawhide users?

I've gone ahead and done this myself: selinux-policy -80 and -81 are now
tagged f17-usrmove and *not* tagged f17. Otherwise I think we'd get the
new selinux-policy in any F17 compose we did from now on, which would
screw it up.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel