-
-
Notifications
You must be signed in to change notification settings - Fork 56
vmupdate: disable SELinux during update #197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Apparently some packages (chromium) may load half-assembled SELinux policy during the update. Later in the update process the policy gets rebuilt and loaded again, so after the update all should be fine. But if the update gets interrupted by such half-installed policy, it won't work. Workaround the issue by disabling SELinux before the update. It will get enabled again the next time VM starts. Workaround for https://bugzilla.redhat.com/show_bug.cgi?id=2380156 Fixes QubesOS/qubes-issues#10054 Fixes QubesOS/qubes-issues#9663
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #197 +/- ##
==========================================
- Coverage 73.20% 73.03% -0.18%
==========================================
Files 10 10
Lines 1157 1157
==========================================
- Hits 847 845 -2
- Misses 310 312 +2 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025071515-4.3&flavor=pull-requests Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025061004-4.3&flavor=update
Failed tests10 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/142375#dependencies 10 fixed
Unstable testsPerformance TestsPerformance degradation:7 performance degradations
Remaining performance tests:65 tests
|
Apparently some packages (chromium) may load half-assembled SELinux
policy during the update. Later in the update process the policy gets
rebuilt and loaded again, so after the update all should be fine. But if
the update gets interrupted by such half-installed policy, it won't
work.
Workaround the issue by disabling SELinux before the update. It will get
enabled again the next time VM starts.
Workaround for https://bugzilla.redhat.com/show_bug.cgi?id=2380156
Fixes QubesOS/qubes-issues#10054
Fixes QubesOS/qubes-issues#9663