diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2019-11-14 09:48:53 +0800 |
---|---|---|
committer | Joe MacDonald <joe_macdonald@mentor.com> | 2019-12-19 11:09:21 -0500 |
commit | 72a6a1f88bd43bf5ff47e019868b0b4a9ab2a619 (patch) | |
tree | 75ce6cc25e965fce7ffae875f71ac8bf55eabca2 | |
parent | f6ae2e82ed5756a29b014afa477285775e2c68ac (diff) | |
download | meta-selinux-72a6a1f88bd43bf5ff47e019868b0b4a9ab2a619.tar.gz |
restorecond: uprev to 2.9 (20190315)
* Rebase patches
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
3 files changed, 24 insertions, 19 deletions
diff --git a/recipes-security/selinux/restorecond/policycoreutils-make-O_CLOEXEC-optional.patch b/recipes-security/selinux/restorecond/policycoreutils-make-O_CLOEXEC-optional.patch index ab1a10a..2928aff 100644 --- a/recipes-security/selinux/restorecond/policycoreutils-make-O_CLOEXEC-optional.patch +++ b/recipes-security/selinux/restorecond/policycoreutils-make-O_CLOEXEC-optional.patch | |||
@@ -1,29 +1,34 @@ | |||
1 | From 4adc1c02e4da42f64249c05534875e732f043693 Mon Sep 17 00:00:00 2001 | ||
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | ||
3 | Date: Wed, 6 Nov 2019 23:17:50 +0800 | ||
1 | Subject: [PATCH] policycoreutils: make O_CLOEXEC optional | 4 | Subject: [PATCH] policycoreutils: make O_CLOEXEC optional |
2 | 5 | ||
3 | Various commits in the selinux tree in the current release added O_CLOEXEC | 6 | Various commits in the selinux tree in the current release added |
4 | to open() calls in an attempt to address file descriptor leaks as | 7 | O_CLOEXEC to open() calls in an attempt to address file descriptor leaks |
5 | described: | 8 | as described: |
6 | 9 | ||
7 | http://danwalsh.livejournal.com/53603.html | 10 | http://danwalsh.livejournal.com/53603.html |
8 | 11 | ||
9 | However O_CLOEXEC isn't available on all platforms, so make it a | 12 | However O_CLOEXEC isn't available on all platforms, so make it a |
10 | compile-time option and generate a warning when it is not available. The | 13 | compile-time option and generate a warning when it is not available. |
11 | actual impact of leaking these file descriptors is minimal, though it does | 14 | The actual impact of leaking these file descriptors is minimal, though |
12 | produce curious AVC Denied messages. | 15 | it does produce curious AVC Denied messages. |
13 | 16 | ||
14 | Uptream-Status: Inappropriate [O_CLOEXEC has been in Linux since 2007 and POSIX since 2008] | 17 | Uptream-Status: Inappropriate |
18 | [O_CLOEXEC has been in Linux since 2007 and POSIX since 2008] | ||
15 | 19 | ||
16 | Signed-off-by: Joe MacDonald <joe.macdonald@windriver.com> | 20 | Signed-off-by: Joe MacDonald <joe.macdonald@windriver.com> |
17 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | 21 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> |
22 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
18 | --- | 23 | --- |
19 | user.c | 8 +++++++- | 24 | user.c | 8 +++++++- |
20 | 1 file changed, 7 insertions(+), 1 deletion(-) | 25 | 1 file changed, 7 insertions(+), 1 deletion(-) |
21 | 26 | ||
22 | diff --git a/user.c b/user.c | 27 | diff --git a/user.c b/user.c |
23 | index 2c28676..6235772 100644 | 28 | index 714aae7..bbf018e 100644 |
24 | --- a/user.c | 29 | --- a/user.c |
25 | +++ b/user.c | 30 | +++ b/user.c |
26 | @@ -202,7 +202,13 @@ static int local_server() { | 31 | @@ -202,7 +202,13 @@ static int local_server(void) { |
27 | perror("asprintf"); | 32 | perror("asprintf"); |
28 | return -1; | 33 | return -1; |
29 | } | 34 | } |
@@ -39,5 +44,5 @@ index 2c28676..6235772 100644 | |||
39 | g_warning ("Lock file: %s", ptr); | 44 | g_warning ("Lock file: %s", ptr); |
40 | 45 | ||
41 | -- | 46 | -- |
42 | 1.7.9.5 | 47 | 2.7.4 |
43 | 48 | ||
diff --git a/recipes-security/selinux/restorecond_2.8.bb b/recipes-security/selinux/restorecond_2.8.bb deleted file mode 100644 index 4a83a23..0000000 --- a/recipes-security/selinux/restorecond_2.8.bb +++ /dev/null | |||
@@ -1,7 +0,0 @@ | |||
1 | include selinux_20180524.inc | ||
2 | include ${BPN}.inc | ||
3 | |||
4 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | ||
5 | |||
6 | SRC_URI[md5sum] = "cfe4e4d6184623fdcb9bc2681e693abb" | ||
7 | SRC_URI[sha256sum] = "323cab1128e5308cd85fea0e5c98e3c8973e1ada0b659f2fce76187e192271bf" | ||
diff --git a/recipes-security/selinux/restorecond_2.9.bb b/recipes-security/selinux/restorecond_2.9.bb new file mode 100644 index 0000000..2ccac18 --- /dev/null +++ b/recipes-security/selinux/restorecond_2.9.bb | |||
@@ -0,0 +1,7 @@ | |||
1 | require selinux_20190315.inc | ||
2 | require ${BPN}.inc | ||
3 | |||
4 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | ||
5 | |||
6 | SRC_URI[md5sum] = "1a24cb2a23d8bd01d3f8d9bb2031981f" | ||
7 | SRC_URI[sha256sum] = "cbf9820583e641ee0462fa7bc89e6024676af281e025703e17b2d019b1a25a4f" | ||