Package: refpolicy
Version: 2:0.0.20080702-4
Severity: serious
User: [EMAIL PROTECTED]
Usertags: qa-ftbfs-20080807 qa-ftbfs
Justification: FTBFS on i386

Hi,

During a rebuild of all packages in sid, your package failed to build on
i386.

Relevant part:
> make[1]: Entering directory 
> `/build/user-refpolicy_0.0.20080702-4-amd64-cD4KSC/refpolicy-0.0.20080702-4/debian/build-selinux-policy-default'
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D 
> self_contained_policy policy/flask/security_classes policy/flask/initial_sids 
> policy/flask/access_vectors policy/support/file_patterns.spt 
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt 
> policy/support/misc_macros.spt policy/support/misc_patterns.spt 
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt policy/mls 
> policy/mcs policy/policy_capabilities > tmp/pre_te_files.conf
> python -E support/genclassperms.py policy/flask/access_vectors 
> policy/flask/security_classes > tmp/generated_definitions.conf
> echo "define(\`base_per_role_template',\`" >> tmp/generated_definitions.conf
> for i in application apt authlogin clock corecommands corenetwork cron 
> devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug 
> inetd init iptables kernel libraries locallogin logging logrotate mcs 
> miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff 
> storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage; 
> do echo 
> "ifdef(\`""$i""_per_role_template',\`""$i""_per_role_template("'$*'")')" >> 
> tmp/generated_definitions.conf ; done
> for i in application apt authlogin clock corecommands corenetwork cron 
> devices dmesg domain dpkg files filesystem fstools getty hal hostname hotplug 
> inetd init iptables kernel libraries locallogin logging logrotate mcs 
> miscfiles mls modutils mount mta netlabel selinux selinuxutil setrans staff 
> storage su sysadm sysnetwork terminal udev unprivuser userdomain usermanage; 
> do echo "ifdef(\`""$i""_per_userdomain_template',\`" >> 
> tmp/generated_definitions.conf ; echo "errprint(\`Warning: 
> per_userdomain_templates have been renamed to per_role_templates 
> (""$i""_per_userdomain_template)'__endline__)" >> 
> tmp/generated_definitions.conf ; echo 
> """$i""_per_userdomain_template("'$*'")')"  >> tmp/generated_definitions.conf 
> ; done
> echo "')" >> tmp/generated_definitions.conf
> test -f policy/booleans.conf && gawk -f support/set_bools_tuns.awk 
> policy/booleans.conf >> tmp/generated_definitions.conf || true
> m4 policy/support/file_patterns.spt policy/support/ipc_patterns.spt 
> policy/support/loadable_module.spt policy/support/misc_macros.spt 
> policy/support/misc_patterns.spt policy/support/mls_mcs_macros.spt 
> policy/support/obj_perm_sets.spt policy/modules/system/application.if 
> policy/modules/admin/apt.if policy/modules/system/authlogin.if 
> policy/modules/system/clock.if policy/modules/kernel/corecommands.if 
> policy/modules/kernel/corenetwork.if policy/modules/services/cron.if 
> policy/modules/kernel/devices.if policy/modules/admin/dmesg.if 
> policy/modules/kernel/domain.if policy/modules/admin/dpkg.if 
> policy/modules/kernel/files.if policy/modules/kernel/filesystem.if 
> policy/modules/system/fstools.if policy/modules/system/getty.if 
> policy/modules/services/hal.if policy/modules/system/hostname.if 
> policy/modules/system/hotplug.if policy/modules/services/inetd.if 
> policy/modules/system/init.if policy/modules/system/iptables.if 
> policy/modules/kernel/kernel.if policy/modules/system/libraries.if 
> policy/modules/system/locallogin.if policy/modules/system/logging.if 
> policy/modules/admin/logrotate.if policy/modules/kernel/mcs.if 
> policy/modules/system/miscfiles.if policy/modules/kernel/mls.if 
> policy/modules/system/modutils.if policy/modules/system/mount.if 
> policy/modules/services/mta.if policy/modules/system/netlabel.if 
> policy/modules/kernel/selinux.if policy/modules/system/selinuxutil.if 
> policy/modules/system/setrans.if policy/modules/roles/staff.if 
> policy/modules/kernel/storage.if policy/modules/admin/su.if 
> policy/modules/roles/sysadm.if policy/modules/system/sysnetwork.if 
> policy/modules/kernel/terminal.if policy/modules/system/udev.if 
> policy/modules/roles/unprivuser.if policy/modules/system/userdomain.if 
> policy/modules/admin/usermanage.if policy/modules/admin/acct.if 
> policy/modules/services/aide.if policy/modules/admin/alsa.if 
> policy/modules/admin/amanda.if policy/modules/services/apache.if 
> policy/modules/services/apm.if policy/modules/services/arpwatch.if 
> policy/modules/roles/auditadm.if policy/modules/services/automount.if 
> policy/modules/services/avahi.if policy/modules/services/bind.if 
> policy/modules/services/bluetooth.if policy/modules/admin/bootloader.if 
> policy/modules/services/canna.if policy/modules/admin/certwatch.if 
> policy/modules/services/comsat.if policy/modules/services/courier.if 
> policy/modules/services/cpucontrol.if policy/modules/services/cups.if 
> policy/modules/services/cvs.if policy/modules/services/cyrus.if 
> policy/modules/services/dbskk.if policy/modules/services/dbus.if 
> policy/modules/services/dhcp.if policy/modules/services/dictd.if 
> policy/modules/services/distcc.if policy/modules/admin/dmidecode.if 
> policy/modules/services/dovecot.if policy/modules/services/fetchmail.if 
> policy/modules/services/finger.if policy/modules/services/ftp.if 
> policy/modules/apps/gpg.if policy/modules/services/gpm.if 
> policy/modules/services/howl.if policy/modules/services/inn.if 
> policy/modules/system/ipsec.if policy/modules/services/irqbalance.if 
> policy/modules/apps/java.if policy/modules/services/kerberos.if 
> policy/modules/services/ktalk.if policy/modules/services/ldap.if 
> policy/modules/apps/loadkeys.if policy/modules/admin/logwatch.if 
> policy/modules/services/lpd.if policy/modules/system/lvm.if 
> policy/modules/services/mailman.if policy/modules/services/mysql.if 
> policy/modules/admin/netutils.if policy/modules/services/networkmanager.if 
> policy/modules/services/nis.if policy/modules/services/nscd.if 
> policy/modules/services/ntp.if policy/modules/services/openct.if 
> policy/modules/services/openvpn.if policy/modules/system/pcmcia.if 
> policy/modules/services/pcscd.if policy/modules/services/pegasus.if 
> policy/modules/services/portmap.if policy/modules/services/postfix.if 
> policy/modules/services/postgresql.if policy/modules/services/ppp.if 
> policy/modules/admin/prelink.if policy/modules/services/prelude.if 
> policy/modules/services/privoxy.if policy/modules/services/procmail.if 
> policy/modules/admin/quota.if policy/modules/services/radius.if 
> policy/modules/services/radvd.if policy/modules/system/raid.if 
> policy/modules/services/rdisc.if policy/modules/services/remotelogin.if 
> policy/modules/services/rlogin.if policy/modules/services/rpc.if 
> policy/modules/services/rshd.if policy/modules/services/rsync.if 
> policy/modules/services/samba.if policy/modules/services/sasl.if 
> policy/modules/services/sendmail.if policy/modules/apps/slocate.if 
> policy/modules/services/smartmon.if policy/modules/services/snmp.if 
> policy/modules/services/spamassassin.if policy/modules/services/squid.if 
> policy/modules/services/ssh.if policy/modules/services/stunnel.if 
> policy/modules/admin/sudo.if policy/modules/services/sysstat.if 
> policy/modules/services/tcpd.if policy/modules/services/telnet.if 
> policy/modules/services/tftp.if policy/modules/admin/tmpreaper.if 
> policy/modules/admin/tzdata.if policy/modules/system/unconfined.if 
> policy/modules/services/uucp.if policy/modules/admin/vbetool.if 
> policy/modules/admin/vpn.if policy/modules/apps/webalizer.if 
> policy/modules/services/xfs.if policy/modules/services/xserver.if 
> policy/modules/services/zebra.if policy/modules/admin/amtu.if 
> policy/modules/admin/anaconda.if policy/modules/admin/consoletype.if 
> policy/modules/admin/firstboot.if policy/modules/admin/kudzu.if 
> policy/modules/admin/readahead.if policy/modules/admin/rpm.if 
> policy/modules/roles/secadm.if policy/modules/admin/updfstab.if 
> policy/modules/admin/backup.if policy/modules/admin/brctl.if 
> policy/modules/admin/ddcprobe.if policy/modules/admin/kismet.if 
> policy/modules/admin/mrtg.if policy/modules/admin/portage.if 
> policy/modules/admin/sxid.if policy/modules/admin/tripwire.if 
> policy/modules/admin/usbmodules.if policy/modules/apps/ada.if 
> policy/modules/apps/authbind.if policy/modules/apps/awstats.if 
> policy/modules/apps/calamaris.if policy/modules/apps/cdrecord.if 
> policy/modules/apps/ethereal.if policy/modules/apps/evolution.if 
> policy/modules/apps/games.if policy/modules/apps/gift.if 
> policy/modules/apps/gnome.if policy/modules/apps/irc.if 
> policy/modules/apps/lockdev.if policy/modules/apps/mono.if 
> policy/modules/apps/mozilla.if policy/modules/apps/mplayer.if 
> policy/modules/apps/podsleuth.if policy/modules/apps/qemu.if 
> policy/modules/apps/rssh.if policy/modules/apps/screen.if 
> policy/modules/apps/thunderbird.if policy/modules/apps/tvtime.if 
> policy/modules/apps/uml.if policy/modules/apps/userhelper.if 
> policy/modules/apps/usernetctl.if policy/modules/apps/vmware.if 
> policy/modules/apps/wine.if policy/modules/apps/wireshark.if 
> policy/modules/apps/yam.if policy/modules/services/afs.if 
> policy/modules/services/amavis.if policy/modules/services/apcupsd.if 
> policy/modules/services/asterisk.if policy/modules/services/audioentropy.if 
> policy/modules/services/bitlbee.if policy/modules/services/ccs.if 
> policy/modules/services/cipe.if policy/modules/services/clamav.if 
> policy/modules/services/clockspeed.if policy/modules/services/consolekit.if 
> policy/modules/services/dante.if policy/modules/services/dcc.if 
> policy/modules/services/ddclient.if policy/modules/services/djbdns.if 
> policy/modules/services/dnsmasq.if policy/modules/services/exim.if 
> policy/modules/services/fail2ban.if policy/modules/services/gatekeeper.if 
> policy/modules/services/i18n_input.if policy/modules/services/imaze.if 
> policy/modules/services/ircd.if policy/modules/services/jabber.if 
> policy/modules/services/kerneloops.if policy/modules/services/monop.if 
> policy/modules/services/munin.if policy/modules/services/nagios.if 
> policy/modules/services/nessus.if policy/modules/services/nsd.if 
> policy/modules/services/ntop.if policy/modules/services/nx.if 
> policy/modules/services/oav.if policy/modules/services/oddjob.if 
> policy/modules/services/openca.if policy/modules/services/perdition.if 
> policy/modules/services/portslave.if 
> policy/modules/services/postfixpolicyd.if policy/modules/services/postgrey.if 
> policy/modules/services/publicfile.if policy/modules/services/pxe.if 
> policy/modules/services/pyzor.if policy/modules/services/qmail.if 
> policy/modules/services/razor.if policy/modules/services/resmgr.if 
> policy/modules/services/rhgb.if policy/modules/services/ricci.if 
> policy/modules/services/roundup.if policy/modules/services/rpcbind.if 
> policy/modules/services/rwho.if policy/modules/services/setroubleshoot.if 
> policy/modules/services/slrnpull.if policy/modules/services/snort.if 
> policy/modules/services/soundserver.if policy/modules/services/speedtouch.if 
> policy/modules/services/timidity.if policy/modules/services/tor.if 
> policy/modules/services/transproxy.if policy/modules/services/ucspitcp.if 
> policy/modules/services/uptime.if policy/modules/services/uwimap.if 
> policy/modules/services/virt.if policy/modules/services/watchdog.if 
> policy/modules/services/xprint.if policy/modules/services/zabbix.if 
> policy/modules/system/daemontools.if policy/modules/system/iscsi.if 
> policy/modules/system/pythonsupport.if policy/modules/system/xen.if 
> support/iferror.m4 >> tmp/all_interfaces.conf.tmp
> sed -e s/dollarsstar/\$\*/g tmp/all_interfaces.conf.tmp >> 
> tmp/all_interfaces.conf
> echo "" > tmp/rolemap.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D 
> self_contained_policy -D self_contained_policy policy/rolemap | gawk 
> '/^[[:blank:]]*[A-Za-z]/{ print "gen_require(type " $3 "; role " $1 
> ";)\nbase_per_role_template(" $2 "," $3 "," $1 ")" }' >> tmp/rolemap.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D 
> self_contained_policy -s policy/support/file_patterns.spt 
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt 
> policy/support/misc_macros.spt policy/support/misc_patterns.spt 
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt 
> tmp/generated_definitions.conf tmp/all_interfaces.conf 
> policy/modules/system/application.te policy/modules/admin/apt.te 
> policy/modules/system/authlogin.te policy/modules/system/clock.te 
> policy/modules/kernel/corecommands.te policy/modules/kernel/corenetwork.te 
> policy/modules/services/cron.te policy/modules/kernel/devices.te 
> policy/modules/admin/dmesg.te policy/modules/kernel/domain.te 
> policy/modules/admin/dpkg.te policy/modules/kernel/files.te 
> policy/modules/kernel/filesystem.te policy/modules/system/fstools.te 
> policy/modules/system/getty.te policy/modules/services/hal.te 
> policy/modules/system/hostname.te policy/modules/system/hotplug.te 
> policy/modules/services/inetd.te policy/modules/system/init.te 
> policy/modules/system/iptables.te policy/modules/kernel/kernel.te 
> policy/modules/system/libraries.te policy/modules/system/locallogin.te 
> policy/modules/system/logging.te policy/modules/admin/logrotate.te 
> policy/modules/kernel/mcs.te policy/modules/system/miscfiles.te 
> policy/modules/kernel/mls.te policy/modules/system/modutils.te 
> policy/modules/system/mount.te policy/modules/services/mta.te 
> policy/modules/system/netlabel.te policy/modules/kernel/selinux.te 
> policy/modules/system/selinuxutil.te policy/modules/system/setrans.te 
> policy/modules/roles/staff.te policy/modules/kernel/storage.te 
> policy/modules/admin/su.te policy/modules/roles/sysadm.te 
> policy/modules/system/sysnetwork.te policy/modules/kernel/terminal.te 
> policy/modules/system/udev.te policy/modules/roles/unprivuser.te 
> policy/modules/system/userdomain.te policy/modules/admin/usermanage.te 
> tmp/rolemap.conf > tmp/all_te_files.conf
> policy/modules/system/authlogin.te:208: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/admin/dpkg.te:179: Warning: r_dir_perms is deprecated please 
> use list_dir_perms instead.
> policy/modules/admin/dpkg.te:180: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/system/init.te:396: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/system/locallogin.te:118: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/system/logging.te:47: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/system/mount.te:98: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_dir_perms is deprecated 
> please use list_dir_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/system/selinuxutil.te:529: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_dir_perms is deprecated please 
> use list_dir_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/staff.te:11: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_dir_perms is deprecated please 
> use list_dir_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/sysadm.te:18: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/system/udev.te:62: Warning: r_dir_perms is deprecated please 
> use list_dir_perms instead.
> policy/modules/system/udev.te:114: Warning: r_file_perms is deprecated please 
> use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_dir_perms is deprecated 
> please use list_dir_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> policy/modules/roles/unprivuser.te:14: Warning: r_file_perms is deprecated 
> please use read_file_perms instead.
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D 
> self_contained_policy policy/support/file_patterns.spt 
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt 
> policy/support/misc_macros.spt policy/support/misc_patterns.spt 
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt 
> policy/users policy/constraints > tmp/post_te_files.conf
> sed -r -f support/get_type_attr_decl.sed tmp/all_te_files.conf | LC_ALL=C 
> sort > tmp/all_attrs_types.conf
> cat tmp/post_te_files.conf > tmp/all_post.conf
> egrep '^sid ' tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep '^fs_use_(xattr|task|trans)' tmp/all_te_files.conf >> tmp/all_post.conf 
> || true
> egrep ^genfscon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^portcon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^netifcon tmp/all_te_files.conf >> tmp/all_post.conf || true
> egrep ^nodecon tmp/all_te_files.conf >> tmp/all_post.conf || true
> sed -r -f support/comment_move_decl.sed tmp/all_te_files.conf > 
> tmp/only_te_rules.conf
> m4 -D enable_mcs -D distro_debian -D direct_sysadm_daemon -D mls_num_sens=16 
> -D mls_num_cats=1024 -D mcs_num_cats=1024 -D hide_broken_symptoms -D 
> self_contained_policy policy/support/file_patterns.spt 
> policy/support/ipc_patterns.spt policy/support/loadable_module.spt 
> policy/support/misc_macros.spt policy/support/misc_patterns.spt 
> policy/support/mls_mcs_macros.spt policy/support/obj_perm_sets.spt 
> tmp/generated_definitions.conf policy/global_booleans policy/global_tunables 
> > tmp/global_bools.conf
> Creating default base module base.conf
> cat tmp/pre_te_files.conf tmp/all_attrs_types.conf tmp/global_bools.conf 
> tmp/only_te_rules.conf tmp/all_post.conf > base.conf
> Compiling default base module
> /usr/bin/checkmodule -M -U deny base.conf -o tmp/base.mod
> libsepol.expand_module: Error while indexing out symbols
> /usr/bin/checkmodule:  expand module failed
> /usr/bin/checkmodule:  loading policy configuration from base.conf
> make[1]: *** [tmp/base.mod] Error 1

The full build log is available from:
   http://people.debian.org/~lucas/logs/2008/08/07

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot containing a sid i386
environment.  Internet was not accessible from the build systems.

-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED]             GPG: 1024D/023B3F4F |



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to