Package: refpolicy Version: 2:0.0.20080702-4 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20080807 qa-ftbfs Justification: FTBFS on i386
Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: > make[1]: Entering directory > `/build/user-refpolicy_0.0.20080702-4-amd64-cD4KSC/refpolicy-0.0.20080702-4/debian/build-selinux-policy-default' > m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 > -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D > self_contained_policy policy/flask/security_classes policy/flask/initial_sids > policy/flask/access_vectors policy/support/file_patterns.spt > policy/support/ipc_patterns.spt policy/support/loadable_module.spt > policy/support/misc_macros.spt policy/support/misc_patterns.spt > policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt policy/mls > policy/mcs policy/policy_capabilities > tmp/pre_te_files.conf > python -E support/genclassperms.py policy/flask/access_vectors > policy/flask/security_classes > tmp/generated_definitions.conf > echo "define(\`base_per_role_template',\`" >> tmp/generated_definitions.conf > for i in application apt authlogin clock corecommands corenetwork cron > devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug > inetd init iptables kernel libraries locallogin logging logrotate mcs > miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff > storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage; > do echo > "ifdef(\`""$i""_per_role_template',\`""$i""_per_role_template("'$*'")')" >> > tmp/generated_definitions.conf ; done > for i in application apt authlogin clock corecommands corenetwork cron > devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug > inetd init iptables kernel libraries locallogin logging logrotate mcs > miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff > storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage; > do echo "ifdef(\`""$i""_per_userdomain_template',\`" >> > tmp/generated_definitions.conf ; echo "errprint(\`Warning: > per_userdomain_templates have been renamed to per_role_templates > (""$i""_per_userdomain_template)'__endline__)" >> > tmp/generated_definitions.conf ; echo > """$i""_per_userdomain_template("'$*'")')" >> tmp/generated_definitions.conf > ; done > echo "')" >> tmp/generated_definitions.conf > test -f policy/booleans.conf && gawk -f support/set_bools_tuns.awk > policy/booleans.conf >> tmp/generated_definitions.conf || true > m4 policy/support/file_patterns.spt policy/support/ipc_patterns.spt > policy/support/loadable_module.spt policy/support/misc_macros.spt > policy/support/misc_patterns.spt policy/support/mls_mcs_macros.spt > policy/support/obj_perm_sets.spt policy/modules/system/application.if > policy/modules/admin/apt.if policy/modules/system/authlogin.if > policy/modules/system/clock.if policy/modules/kernel/corecommands.if > policy/modules/kernel/corenetwork.if policy/modules/services/cron.if > policy/modules/kernel/devices.if policy/modules/admin/dmesg.if > policy/modules/kernel/domain.if policy/modules/admin/dpkg.if > policy/modules/kernel/files.if policy/modules/kernel/filesystem.if > policy/modules/system/fstools.if policy/modules/system/getty.if > policy/modules/services/hal.if policy/modules/system/hostname.if > policy/modules/system/hotplug.if policy/modules/services/inetd.if > policy/modules/system/init.if policy/modules/system/iptables.if > policy/modules/kernel/kernel.if policy/modules/system/libraries.if > policy/modules/system/locallogin.if policy/modules/system/logging.if > policy/modules/admin/logrotate.if policy/modules/kernel/mcs.if > policy/modules/system/miscfiles.if policy/modules/kernel/mls.if > policy/modules/system/modutils.if policy/modules/system/mount.if > policy/modules/services/mta.if policy/modules/system/netlabel.if > policy/modules/kernel/selinux.if policy/modules/system/selinuxutil.if > policy/modules/system/setrans.if policy/modules/roles/staff.if > policy/modules/kernel/storage.if policy/modules/admin/su.if > policy/modules/roles/sysadm.if policy/modules/system/sysnetwork.if > policy/modules/kernel/terminal.if policy/modules/system/udev.if > policy/modules/roles/unprivuser.if policy/modules/system/userdomain.if > policy/modules/admin/usermanage.if policy/modules/admin/acct.if > policy/modules/services/aide.if policy/modules/admin/alsa.if > policy/modules/admin/amanda.if policy/modules/services/apache.if > policy/modules/services/apm.if policy/modules/services/arpwatch.if > policy/modules/roles/auditadm.if policy/modules/services/automount.if > policy/modules/services/avahi.if policy/modules/services/bind.if > policy/modules/services/bluetooth.if policy/modules/admin/bootloader.if > policy/modules/services/canna.if policy/modules/admin/certwatch.if > policy/modules/services/comsat.if policy/modules/services/courier.if > policy/modules/services/cpucontrol.if policy/modules/services/cups.if > policy/modules/services/cvs.if policy/modules/services/cyrus.if > policy/modules/services/dbskk.if policy/modules/services/dbus.if > policy/modules/services/dhcp.if policy/modules/services/dictd.if > policy/modules/services/distcc.if policy/modules/admin/dmidecode.if > policy/modules/services/dovecot.if policy/modules/services/fetchmail.if > policy/modules/services/finger.if policy/modules/services/ftp.if > policy/modules/apps/gpg.if policy/modules/services/gpm.if > policy/modules/services/howl.if policy/modules/services/inn.if > policy/modules/system/ipsec.if policy/modules/services/irqbalance.if > policy/modules/apps/java.if policy/modules/services/kerberos.if > policy/modules/services/ktalk.if policy/modules/services/ldap.if > policy/modules/apps/loadkeys.if policy/modules/admin/logwatch.if > policy/modules/services/lpd.if policy/modules/system/lvm.if > policy/modules/services/mailman.if policy/modules/services/mysql.if > policy/modules/admin/netutils.if policy/modules/services/networkmanager.if > policy/modules/services/nis.if policy/modules/services/nscd.if > policy/modules/services/ntp.if policy/modules/services/openct.if > policy/modules/services/openvpn.if policy/modules/system/pcmcia.if > policy/modules/services/pcscd.if policy/modules/services/pegasus.if > policy/modules/services/portmap.if policy/modules/services/postfix.if > policy/modules/services/postgresql.if policy/modules/services/ppp.if > policy/modules/admin/prelink.if policy/modules/services/prelude.if > policy/modules/services/privoxy.if policy/modules/services/procmail.if > policy/modules/admin/quota.if policy/modules/services/radius.if > policy/modules/services/radvd.if policy/modules/system/raid.if > policy/modules/services/rdisc.if policy/modules/services/remotelogin.if > policy/modules/services/rlogin.if policy/modules/services/rpc.if > policy/modules/services/rshd.if policy/modules/services/rsync.if > policy/modules/services/samba.if policy/modules/services/sasl.if > policy/modules/services/sendmail.if policy/modules/apps/slocate.if > policy/modules/services/smartmon.if policy/modules/services/snmp.if > policy/modules/services/spamassassin.if policy/modules/services/squid.if > policy/modules/services/ssh.if policy/modules/services/stunnel.if > policy/modules/admin/sudo.if policy/modules/services/sysstat.if > policy/modules/services/tcpd.if policy/modules/services/telnet.if > policy/modules/services/tftp.if policy/modules/admin/tmpreaper.if > policy/modules/admin/tzdata.if policy/modules/system/unconfined.if > policy/modules/services/uucp.if policy/modules/admin/vbetool.if > policy/modules/admin/vpn.if policy/modules/apps/webalizer.if > policy/modules/services/xfs.if policy/modules/services/xserver.if > policy/modules/services/zebra.if policy/modules/admin/amtu.if > policy/modules/admin/anaconda.if policy/modules/admin/consoletype.if > policy/modules/admin/firstboot.if policy/modules/admin/kudzu.if > policy/modules/admin/readahead.if policy/modules/admin/rpm.if > policy/modules/roles/secadm.if policy/modules/admin/updfstab.if > policy/modules/admin/backup.if policy/modules/admin/brctl.if > policy/modules/admin/ddcprobe.if policy/modules/admin/kismet.if > policy/modules/admin/mrtg.if policy/modules/admin/portage.if > policy/modules/admin/sxid.if policy/modules/admin/tripwire.if > policy/modules/admin/usbmodules.if policy/modules/apps/ada.if > policy/modules/apps/authbind.if policy/modules/apps/awstats.if > policy/modules/apps/calamaris.if policy/modules/apps/cdrecord.if > policy/modules/apps/ethereal.if policy/modules/apps/evolution.if > policy/modules/apps/games.if policy/modules/apps/gift.if > policy/modules/apps/gnome.if policy/modules/apps/irc.if > policy/modules/apps/lockdev.if policy/modules/apps/mono.if > policy/modules/apps/mozilla.if policy/modules/apps/mplayer.if > policy/modules/apps/podsleuth.if policy/modules/apps/qemu.if > policy/modules/apps/rssh.if policy/modules/apps/screen.if > policy/modules/apps/thunderbird.if policy/modules/apps/tvtime.if > policy/modules/apps/uml.if policy/modules/apps/userhelper.if > policy/modules/apps/usernetctl.if policy/modules/apps/vmware.if > policy/modules/apps/wine.if policy/modules/apps/wireshark.if > policy/modules/apps/yam.if policy/modules/services/afs.if > policy/modules/services/amavis.if policy/modules/services/apcupsd.if > policy/modules/services/asterisk.if policy/modules/services/audioentropy.if > policy/modules/services/bitlbee.if policy/modules/services/ccs.if > policy/modules/services/cipe.if policy/modules/services/clamav.if > policy/modules/services/clockspeed.if policy/modules/services/consolekit.if > policy/modules/services/dante.if policy/modules/services/dcc.if > policy/modules/services/ddclient.if policy/modules/services/djbdns.if > policy/modules/services/dnsmasq.if policy/modules/services/exim.if > policy/modules/services/fail2ban.if policy/modules/services/gatekeeper.if > policy/modules/services/i18n_input.if policy/modules/services/imaze.if > policy/modules/services/ircd.if policy/modules/services/jabber.if > policy/modules/services/kerneloops.if policy/modules/services/monop.if > policy/modules/services/munin.if policy/modules/services/nagios.if > policy/modules/services/nessus.if policy/modules/services/nsd.if > policy/modules/services/ntop.if policy/modules/services/nx.if > policy/modules/services/oav.if policy/modules/services/oddjob.if > policy/modules/services/openca.if policy/modules/services/perdition.if > policy/modules/services/portslave.if > policy/modules/services/postfixpolicyd.if policy/modules/services/postgrey.if > policy/modules/services/publicfile.if policy/modules/services/pxe.if > policy/modules/services/pyzor.if policy/modules/services/qmail.if > policy/modules/services/razor.if policy/modules/services/resmgr.if > policy/modules/services/rhgb.if policy/modules/services/ricci.if > policy/modules/services/roundup.if policy/modules/services/rpcbind.if > policy/modules/services/rwho.if policy/modules/services/setroubleshoot.if > policy/modules/services/slrnpull.if policy/modules/services/snort.if > policy/modules/services/soundserver.if policy/modules/services/speedtouch.if > policy/modules/services/timidity.if policy/modules/services/tor.if > policy/modules/services/transproxy.if policy/modules/services/ucspitcp.if > policy/modules/services/uptime.if policy/modules/services/uwimap.if > policy/modules/services/virt.if policy/modules/services/watchdog.if > policy/modules/services/xprint.if policy/modules/services/zabbix.if > policy/modules/system/daemontools.if policy/modules/system/iscsi.if > policy/modules/system/pythonsupport.if policy/modules/system/xen.if > support/iferror.m4 >> tmp/all_interfaces.conf.tmp > sed -e s/dollarsstar/\$\*/g tmp/all_interfaces.conf.tmp >> > tmp/all_interfaces.conf > echo "" > tmp/rolemap.conf > m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 > -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D > self_contained_policy -D self_contained_policy policy/rolemap | gawk > '/^[[:blank:]]*[A-Za-z]/{ print "gen_require(type " $3 "; role " $1 > ";)\nbase_per_role_template(" $2 "," $3 "," $1 ")" }' >> tmp/rolemap.conf > m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 > -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D > self_contained_policy -s policy/support/file_patterns.spt > policy/support/ipc_patterns.spt policy/support/loadable_module.spt > policy/support/misc_macros.spt policy/support/misc_patterns.spt > policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt > tmp/generated_definitions.conf tmp/all_interfaces.conf > policy/modules/system/application.te policy/modules/admin/apt.te > policy/modules/system/authlogin.te policy/modules/system/clock.te > policy/modules/kernel/corecommands.te policy/modules/kernel/corenetwork.te > policy/modules/services/cron.te policy/modules/kernel/devices.te > policy/modules/admin/dmesg.te policy/modules/kernel/domain.te > policy/modules/admin/dpkg.te policy/modules/kernel/files.te > policy/modules/kernel/filesystem.te policy/modules/system/fstools.te > policy/modules/system/getty.te policy/modules/services/hal.te > policy/modules/system/hostname.te policy/modules/system/hotplug.te > policy/modules/services/inetd.te policy/modules/system/init.te > policy/modules/system/iptables.te policy/modules/kernel/kernel.te > policy/modules/system/libraries.te policy/modules/system/locallogin.te > policy/modules/system/logging.te policy/modules/admin/logrotate.te > policy/modules/kernel/mcs.te policy/modules/system/miscfiles.te > policy/modules/kernel/mls.te policy/modules/system/modutils.te > policy/modules/system/mount.te policy/modules/services/mta.te > policy/modules/system/netlabel.te policy/modules/kernel/selinux.te > policy/modules/system/selinuxutil.te policy/modules/system/setrans.te > policy/modules/roles/staff.te policy/modules/kernel/storage.te > policy/modules/admin/su.te policy/modules/roles/sysadm.te > policy/modules/system/sysnetwork.te policy/modules/kernel/terminal.te > policy/modules/system/udev.te policy/modules/roles/unprivuser.te > policy/modules/system/userdomain.te policy/modules/admin/usermanage.te > tmp/rolemap.conf > tmp/all_te_files.conf > policy/modules/system/authlogin.te:208: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/admin/dpkg.te:179: Warning: r_dir_perms is deprecated please > use list_dir_perms instead. > policy/modules/admin/dpkg.te:180: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/system/init.te:396: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/system/locallogin.te:118: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/system/logging.te:47: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/system/mount.te:98: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/system/selinuxutil.te:529: Warning: r_dir_perms is deprecated > please use list_dir_perms instead. > policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/staff.te:11: Warning: r_dir_perms is deprecated please > use list_dir_perms instead. > policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/sysadm.te:18: Warning: r_dir_perms is deprecated please > use list_dir_perms instead. > policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/system/udev.te:62: Warning: r_dir_perms is deprecated please > use list_dir_perms instead. > policy/modules/system/udev.te:114: Warning: r_file_perms is deprecated please > use read_file_perms instead. > policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/roles/unprivuser.te:14: Warning: r_dir_perms is deprecated > please use list_dir_perms instead. > policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated > please use read_file_perms instead. > policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated > please use read_file_perms instead. > m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 > -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D > self_contained_policy policy/support/file_patterns.spt > policy/support/ipc_patterns.spt policy/support/loadable_module.spt > policy/support/misc_macros.spt policy/support/misc_patterns.spt > policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt > policy/users policy/constraints > tmp/post_te_files.conf > sed -r -f support/get_type_attr_decl.sed tmp/all_te_files.conf | LC_ALL=C > sort > tmp/all_attrs_types.conf > cat tmp/post_te_files.conf > tmp/all_post.conf > egrep '^sid ' tmp/all_te_files.conf >> tmp/all_post.conf || true > egrep '^fs_use_(xattr|task|trans)' tmp/all_te_files.conf >> tmp/all_post.conf > || true > egrep ^genfscon tmp/all_te_files.conf >> tmp/all_post.conf || true > egrep ^portcon tmp/all_te_files.conf >> tmp/all_post.conf || true > egrep ^netifcon tmp/all_te_files.conf >> tmp/all_post.conf || true > egrep ^nodecon tmp/all_te_files.conf >> tmp/all_post.conf || true > sed -r -f support/comment_move_decl.sed tmp/all_te_files.conf > > tmp/only_te_rules.conf > m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 > -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D > self_contained_policy policy/support/file_patterns.spt > policy/support/ipc_patterns.spt policy/support/loadable_module.spt > policy/support/misc_macros.spt policy/support/misc_patterns.spt > policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt > tmp/generated_definitions.conf policy/global_booleans policy/global_tunables > > tmp/global_bools.conf > Creating default base module base.conf > cat tmp/pre_te_files.conf tmp/all_attrs_types.conf tmp/global_bools.conf > tmp/only_te_rules.conf tmp/all_post.conf > base.conf > Compiling default base module > /usr/bin/checkmodule -M -U deny base.conf -o tmp/base.mod > libsepol.expand_module: Error while indexing out symbols > /usr/bin/checkmodule: expand module failed > /usr/bin/checkmodule: loading policy configuration from base.conf > make[1]: *** [tmp/base.mod] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2008/08/07 A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot containing a sid i386 environment. Internet was not accessible from the build systems. -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]