Re: livecd-creator + selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Stephen Smalley wrote:
On Thu, 2008-05-15 at 13:50 -0400, Eric Paris wrote:
So I'm still stumbling along in the dark trying to get livecd-creator to
build me a nice new F10 image inside an F10 host.  I've actually got an
image that built and runs, but not without its issues.

my kickstart file has:
auth --enableshadow --enablemd5
rootpw redhat

As Bill said, the handling of rootpw is non-intuitive from a historical kickstart perspective. I once suggested changing the kickstarts in livecd-tools to explicitly have rootpw lines (and then nuke the pw in %post), such that they would be generic fully automated kickstarts. People disagreed. (though what you observed is a bug that can be fixed without heeding my suggestion)

3) When booting I get 3 messages that say:
inode_doinit_with_dentry:  no dentry for dev=dm-0 ino=8345
The 3 inodes in question correspond to
/etc/udev
/etc/udev/rules.d
/etc/udev/rules.d/50-udev-default.rules

Happens when SELinux is setting up pre-existing inodes upon initial
policy load and it cannot find a dentry for the inode and thus cannot
invoke the ->getxattr method on it.   Likely harmless.  When/if the
files are subsequently looked up, the inodes should get set up at that
time upon the d_instantiate/d_splice_alias.

I've seen these messages forever, though didn't realize till now that they were an selinux related issue. If they are truly harmless, can someone remove the code that spits out the message please?

FYI- note that what is going on with that file is that it is being modified by the initramfs before policy is loaded-

see do_live_from_base_loop in /usr/lib/livecd-creator/mayflower, i.e. stuff like this-

echo "KERNEL==\"hd[a-z]\", BUS==\"ide\", SYSFS{removable}==\"1\", ATTRS{media}==\"cdrom\", PROGRAM=\"/lib/udev/vol_id -l %N\", RESULT==\"\$CDLABEL\", SYMLINK+=\"live\"" >> /sysroot/etc/udev/rules.d/50-udev*




no clues where this is coming from.  I don't see it when I booted my
host system....



Anyway, at this point I want clues/help/suggestions on how to create my
hacked up /selinux inside the chroot.

Out of curiosity, if someone feels like answering- are there any plans for selinux to support chroots in the sense of policy and even enabled/disabled being completely different between the host and the chroot? Seems like "chroot /mnt/sysimage rpm <some rpm commoand>" ought to 'just work(tm)'. But maybe I'm expecting too much functionality from a default fedora system.

-dmc


--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux