diff options
23 files changed, 24 insertions, 539 deletions
diff --git a/recipes-security/selinux/checkpolicy_3.7.bb b/recipes-security/selinux/checkpolicy_3.8.bb index 60f506d..60f506d 100644 --- a/recipes-security/selinux/checkpolicy_3.7.bb +++ b/recipes-security/selinux/checkpolicy_3.8.bb | |||
diff --git a/recipes-security/selinux/libselinux-python_3.7.bb b/recipes-security/selinux/libselinux-python_3.8.bb index 5099e55..3c5c489 100644 --- a/recipes-security/selinux/libselinux-python_3.7.bb +++ b/recipes-security/selinux/libselinux-python_3.8.bb | |||
@@ -15,7 +15,6 @@ SRC_URI += "\ | |||
15 | file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \ | 15 | file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \ |
16 | file://0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \ | 16 | file://0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \ |
17 | file://0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch \ | 17 | file://0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch \ |
18 | file://0001-libselinux-fix-swig-bindings-for-4.3.0.patch \ | ||
19 | " | 18 | " |
20 | 19 | ||
21 | S = "${WORKDIR}/git/libselinux" | 20 | S = "${WORKDIR}/git/libselinux" |
diff --git a/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch b/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch index b307b6f..28a2cc0 100644 --- a/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch +++ b/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From dff260851ccecf9723a6ddfce0103e09f3ba4613 Mon Sep 17 00:00:00 2001 | 1 | From 626d07afcb8e8b3a68158e8a3ea1654620769644 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Mon, 13 Apr 2020 12:44:23 +0800 | 3 | Date: Mon, 13 Apr 2020 12:44:23 +0800 |
4 | Subject: [PATCH] Makefile: fix python modules install path for multilib | 4 | Subject: [PATCH] Makefile: fix python modules install path for multilib |
@@ -11,10 +11,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
11 | 1 file changed, 1 insertion(+), 1 deletion(-) | 11 | 1 file changed, 1 insertion(+), 1 deletion(-) |
12 | 12 | ||
13 | diff --git a/src/Makefile b/src/Makefile | 13 | diff --git a/src/Makefile b/src/Makefile |
14 | index d3b981f..265f1be 100644 | 14 | index 213c7d3..92227cb 100644 |
15 | --- a/src/Makefile | 15 | --- a/src/Makefile |
16 | +++ b/src/Makefile | 16 | +++ b/src/Makefile |
17 | @@ -191,7 +191,7 @@ install: all | 17 | @@ -193,7 +193,7 @@ install: all |
18 | ln -sf --relative $(DESTDIR)$(SHLIBDIR)/$(LIBSO) $(DESTDIR)$(LIBDIR)/$(TARGET) | 18 | ln -sf --relative $(DESTDIR)$(SHLIBDIR)/$(LIBSO) $(DESTDIR)$(LIBDIR)/$(TARGET) |
19 | 19 | ||
20 | install-pywrap: pywrap | 20 | install-pywrap: pywrap |
diff --git a/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch b/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch deleted file mode 100644 index 277c36c..0000000 --- a/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch +++ /dev/null | |||
@@ -1,91 +0,0 @@ | |||
1 | From 8e0e718bae53fff30831b92cd784151d475a20da Mon Sep 17 00:00:00 2001 | ||
2 | From: Petr Lautrbach <lautrbach@redhat.com> | ||
3 | Date: Wed, 16 Oct 2024 20:48:11 +0200 | ||
4 | Subject: [PATCH] libselinux: fix swig bindings for 4.3.0 | ||
5 | MIME-Version: 1.0 | ||
6 | Content-Type: text/plain; charset=UTF-8 | ||
7 | Content-Transfer-Encoding: 8bit | ||
8 | |||
9 | https://github.com/swig/swig/blob/master/CHANGES.current | ||
10 | |||
11 | "[Python] #2907 Fix returning null from functions with output | ||
12 | parameters. Ensures OUTPUT and INOUT typemaps are handled | ||
13 | consistently wrt return type. | ||
14 | |||
15 | New declaration of SWIG_Python_AppendOutput is now: | ||
16 | |||
17 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void); | ||
18 | |||
19 | The 3rd parameter is new and the new $isvoid special variable | ||
20 | should be passed to it, indicating whether or not the wrapped | ||
21 | function returns void. | ||
22 | |||
23 | Also consider replacing with: | ||
24 | |||
25 | SWIG_AppendOutput(PyObject* result, PyObject* obj); | ||
26 | |||
27 | which calls SWIG_Python_AppendOutput with same parameters but adding $isvoid | ||
28 | for final parameter." | ||
29 | |||
30 | Fixes: https://github.com/SELinuxProject/selinux/issues/447 | ||
31 | |||
32 | selinuxswig_python_wrap.c: In function ‘_wrap_security_compute_user’: | ||
33 | selinuxswig_python_wrap.c:11499:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’ | ||
34 | 11499 | resultobj = SWIG_Python_AppendOutput(resultobj, plist); | ||
35 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
36 | selinuxswig_python_wrap.c:1248:1: note: declared here | ||
37 | 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) { | ||
38 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
39 | selinuxswig_python_wrap.c: In function ‘_wrap_security_compute_user_raw’: | ||
40 | selinuxswig_python_wrap.c:11570:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’ | ||
41 | 11570 | resultobj = SWIG_Python_AppendOutput(resultobj, plist); | ||
42 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
43 | selinuxswig_python_wrap.c:1248:1: note: declared here | ||
44 | 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) { | ||
45 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
46 | selinuxswig_python_wrap.c: In function ‘_wrap_security_get_boolean_names’: | ||
47 | selinuxswig_python_wrap.c:12470:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’ | ||
48 | 12470 | resultobj = SWIG_Python_AppendOutput(resultobj, list); | ||
49 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
50 | selinuxswig_python_wrap.c:1248:1: note: declared here | ||
51 | 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) { | ||
52 | | ^~~~~~~~~~~~~~~~~~~~~~~~ | ||
53 | error: command '/usr/bin/gcc' failed with exit code 1 | ||
54 | |||
55 | Suggested-by: Jitka Plesnikova <jplesnik@redhat.com> | ||
56 | Signed-off-by: Petr Lautrbach <lautrbach@redhat.com> | ||
57 | Acked-by: James Carter <jwcart2@gmail.com> | ||
58 | |||
59 | Upstream-Status: Backport | ||
60 | [https://github.com/SELinuxProject/selinux/commit/8e0e718bae53fff30831b92cd784151d475a20da] | ||
61 | |||
62 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
63 | --- | ||
64 | src/selinuxswig_python.i | 4 ++-- | ||
65 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
66 | |||
67 | diff --git a/src/selinuxswig_python.i b/src/selinuxswig_python.i | ||
68 | index 17e03b9e..03ed296d 100644 | ||
69 | --- a/src/selinuxswig_python.i | ||
70 | +++ b/src/selinuxswig_python.i | ||
71 | @@ -71,7 +71,7 @@ def install(src, dest): | ||
72 | for (i = 0; i < *$2; i++) { | ||
73 | PyList_SetItem(list, i, PyString_FromString((*$1)[i])); | ||
74 | } | ||
75 | - $result = SWIG_Python_AppendOutput($result, list); | ||
76 | + $result = SWIG_AppendOutput($result, list); | ||
77 | } | ||
78 | |||
79 | /* return a sid along with the result */ | ||
80 | @@ -108,7 +108,7 @@ def install(src, dest): | ||
81 | plist = PyList_New(0); | ||
82 | } | ||
83 | |||
84 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
85 | + $result = SWIG_AppendOutput($result, plist); | ||
86 | } | ||
87 | |||
88 | /* Makes functions in get_context_list.h return a Python list of contexts */ | ||
89 | -- | ||
90 | 2.25.1 | ||
91 | |||
diff --git a/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch b/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch index 7ebe64f..ae0da8b 100644 --- a/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch +++ b/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 303d8dfe53fcd02ea5818f976369cdb629bc1114 Mon Sep 17 00:00:00 2001 | 1 | From 1048b80be8fe800fa343f26db833a6e89b5ba9ab Mon Sep 17 00:00:00 2001 |
2 | From: Thomas Petazzoni <thomas.petazzoni@bootlin.com> | 2 | From: Thomas Petazzoni <thomas.petazzoni@bootlin.com> |
3 | Date: Fri, 25 Oct 2019 13:37:14 +0200 | 3 | Date: Fri, 25 Oct 2019 13:37:14 +0200 |
4 | Subject: [PATCH] Do not use PYCEXT, and rely on the installed file name | 4 | Subject: [PATCH] Do not use PYCEXT, and rely on the installed file name |
@@ -27,7 +27,7 @@ Signed-off-by: Changqing Li <changqing.li@windriver.com> | |||
27 | 1 file changed, 1 insertion(+), 2 deletions(-) | 27 | 1 file changed, 1 insertion(+), 2 deletions(-) |
28 | 28 | ||
29 | diff --git a/src/Makefile b/src/Makefile | 29 | diff --git a/src/Makefile b/src/Makefile |
30 | index 265f1be..47e51d6 100644 | 30 | index 92227cb..7c71c65 100644 |
31 | --- a/src/Makefile | 31 | --- a/src/Makefile |
32 | +++ b/src/Makefile | 32 | +++ b/src/Makefile |
33 | @@ -15,7 +15,6 @@ INCLUDEDIR ?= $(PREFIX)/include | 33 | @@ -15,7 +15,6 @@ INCLUDEDIR ?= $(PREFIX)/include |
@@ -38,7 +38,7 @@ index 265f1be..47e51d6 100644 | |||
38 | RUBYINC ?= $(shell $(RUBY) -e 'puts "-I" + RbConfig::CONFIG["rubyarchhdrdir"] + " -I" + RbConfig::CONFIG["rubyhdrdir"]') | 38 | RUBYINC ?= $(shell $(RUBY) -e 'puts "-I" + RbConfig::CONFIG["rubyarchhdrdir"] + " -I" + RbConfig::CONFIG["rubyhdrdir"]') |
39 | RUBYLIBS ?= $(shell $(RUBY) -e 'puts "-L" + RbConfig::CONFIG["libdir"] + " -L" + RbConfig::CONFIG["archlibdir"] + " " + RbConfig::CONFIG["LIBRUBYARG_SHARED"]') | 39 | RUBYLIBS ?= $(shell $(RUBY) -e 'puts "-L" + RbConfig::CONFIG["libdir"] + " -L" + RbConfig::CONFIG["archlibdir"] + " " + RbConfig::CONFIG["LIBRUBYARG_SHARED"]') |
40 | RUBYINSTALL ?= $(shell $(RUBY) -e 'puts RbConfig::CONFIG["vendorarchdir"]') | 40 | RUBYINSTALL ?= $(shell $(RUBY) -e 'puts RbConfig::CONFIG["vendorarchdir"]') |
41 | @@ -193,7 +192,7 @@ install: all | 41 | @@ -195,7 +194,7 @@ install: all |
42 | install-pywrap: pywrap | 42 | install-pywrap: pywrap |
43 | CFLAGS="$(CPPFLAGS) $(CFLAGS) $(SWIG_CFLAGS)" $(PYTHON) -m pip install --prefix=$(PREFIX) --root $(DESTDIR) --ignore-installed --no-deps $(PYTHON_SETUP_ARGS) . | 43 | CFLAGS="$(CPPFLAGS) $(CFLAGS) $(SWIG_CFLAGS)" $(PYTHON) -m pip install --prefix=$(PREFIX) --root $(DESTDIR) --ignore-installed --no-deps $(PYTHON_SETUP_ARGS) . |
44 | install -m 644 $(SWIGPYOUT) $(DESTDIR)$(PYTHONLIBDIR)/selinux/__init__.py | 44 | install -m 644 $(SWIGPYOUT) $(DESTDIR)$(PYTHONLIBDIR)/selinux/__init__.py |
diff --git a/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch b/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch index 0cd8f20..39edb6c 100644 --- a/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch +++ b/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6c2af45ec8cff9b282d599dc098db0ca127bdc59 Mon Sep 17 00:00:00 2001 | 1 | From f33b426680492629d3d8ed664049cbe584f26f18 Mon Sep 17 00:00:00 2001 |
2 | From: Renato Caldas <renato@calgera.com> | 2 | From: Renato Caldas <renato@calgera.com> |
3 | Date: Thu, 29 Jun 2023 13:59:11 +0100 | 3 | Date: Thu, 29 Jun 2023 13:59:11 +0100 |
4 | Subject: [PATCH] libselinux: restore: drop the obsolete LSF transitional API. | 4 | Subject: [PATCH] libselinux: restore: drop the obsolete LSF transitional API. |
@@ -14,10 +14,10 @@ Signed-off-by: Renato Caldas <renato@calgera.com> | |||
14 | 1 file changed, 2 insertions(+), 2 deletions(-) | 14 | 1 file changed, 2 insertions(+), 2 deletions(-) |
15 | 15 | ||
16 | diff --git a/src/selinux_restorecon.c b/src/selinux_restorecon.c | 16 | diff --git a/src/selinux_restorecon.c b/src/selinux_restorecon.c |
17 | index 38f10f1..5b3d035 100644 | 17 | index bc6ed93..3bc0d8d 100644 |
18 | --- a/src/selinux_restorecon.c | 18 | --- a/src/selinux_restorecon.c |
19 | +++ b/src/selinux_restorecon.c | 19 | +++ b/src/selinux_restorecon.c |
20 | @@ -436,7 +436,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, | 20 | @@ -438,7 +438,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, |
21 | file_spec_t *prevfl, *fl; | 21 | file_spec_t *prevfl, *fl; |
22 | uint32_t h; | 22 | uint32_t h; |
23 | int ret; | 23 | int ret; |
@@ -26,7 +26,7 @@ index 38f10f1..5b3d035 100644 | |||
26 | 26 | ||
27 | __pthread_mutex_lock(&fl_mutex); | 27 | __pthread_mutex_lock(&fl_mutex); |
28 | 28 | ||
29 | @@ -450,7 +450,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, | 29 | @@ -452,7 +452,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, |
30 | for (prevfl = &fl_head[h], fl = fl_head[h].next; fl; | 30 | for (prevfl = &fl_head[h], fl = fl_head[h].next; fl; |
31 | prevfl = fl, fl = fl->next) { | 31 | prevfl = fl, fl = fl->next) { |
32 | if (ino == fl->ino) { | 32 | if (ino == fl->ino) { |
diff --git a/recipes-security/selinux/libselinux_3.7.bb b/recipes-security/selinux/libselinux_3.8.bb index b0dcde6..b0dcde6 100644 --- a/recipes-security/selinux/libselinux_3.7.bb +++ b/recipes-security/selinux/libselinux_3.8.bb | |||
diff --git a/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch b/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch deleted file mode 100644 index cba77c9..0000000 --- a/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch +++ /dev/null | |||
@@ -1,422 +0,0 @@ | |||
1 | From e38815d7b44cac435195c82a54d2bf2517bc4b1a Mon Sep 17 00:00:00 2001 | ||
2 | From: Petr Lautrbach <lautrbach@redhat.com> | ||
3 | Date: Wed, 16 Oct 2024 20:48:12 +0200 | ||
4 | Subject: [PATCH] libsemanage: fix swig bindings for 4.3.0 | ||
5 | |||
6 | https://github.com/swig/swig/blob/master/CHANGES.current | ||
7 | |||
8 | "[Python] #2907 Fix returning null from functions with output | ||
9 | parameters. Ensures OUTPUT and INOUT typemaps are handled | ||
10 | consistently wrt return type. | ||
11 | |||
12 | New declaration of SWIG_Python_AppendOutput is now: | ||
13 | |||
14 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void); | ||
15 | |||
16 | The 3rd parameter is new and the new $isvoid special variable | ||
17 | should be passed to it, indicating whether or not the wrapped | ||
18 | function returns void. | ||
19 | |||
20 | Also consider replacing with: | ||
21 | |||
22 | SWIG_AppendOutput(PyObject* result, PyObject* obj); | ||
23 | |||
24 | which calls SWIG_Python_AppendOutput with same parameters but adding $isvoid | ||
25 | for final parameter." | ||
26 | |||
27 | Fixes: https://github.com/SELinuxProject/selinux/issues/447 | ||
28 | |||
29 | Suggested-by: Jitka Plesnikova <jplesnik@redhat.com> | ||
30 | Signed-off-by: Petr Lautrbach <lautrbach@redhat.com> | ||
31 | Acked-by: James Carter <jwcart2@gmail.com> | ||
32 | |||
33 | Upstream-Status: Backport | ||
34 | [https://github.com/SELinuxProject/selinux/commit/e38815d7b44cac435195c82a54d2bf2517bc4b1a] | ||
35 | |||
36 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
37 | --- | ||
38 | src/semanageswig_python.i | 64 +++++++++++++-------------- | ||
39 | src/semanageswig_ruby.i | 32 +++++++------- | ||
40 | 2 files changed, 48 insertions(+), 48 deletions(-) | ||
41 | |||
42 | diff --git a/src/semanageswig_python.i b/src/semanageswig_python.i | ||
43 | index 5f011396..0e27424f 100644 | ||
44 | --- a/src/semanageswig_python.i | ||
45 | +++ b/src/semanageswig_python.i | ||
46 | @@ -111,7 +111,7 @@ | ||
47 | } | ||
48 | |||
49 | %typemap(argout) char** { | ||
50 | - $result = SWIG_Python_AppendOutput($result, SWIG_FromCharPtr(*$1)); | ||
51 | + $result = SWIG_AppendOutput($result, SWIG_FromCharPtr(*$1)); | ||
52 | free(*$1); | ||
53 | } | ||
54 | |||
55 | @@ -134,7 +134,7 @@ | ||
56 | NULL, NULL, &plist) < 0) | ||
57 | $result = SWIG_From_int(STATUS_ERR); | ||
58 | else | ||
59 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
60 | + $result = SWIG_AppendOutput($result, plist); | ||
61 | } | ||
62 | } | ||
63 | } | ||
64 | @@ -148,7 +148,7 @@ | ||
65 | } | ||
66 | |||
67 | %typemap(argout) semanage_module_info_t ** { | ||
68 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
69 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
70 | } | ||
71 | |||
72 | /** module key typemaps **/ | ||
73 | @@ -160,7 +160,7 @@ | ||
74 | } | ||
75 | |||
76 | %typemap(argout) semanage_module_key_t ** { | ||
77 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
78 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
79 | } | ||
80 | |||
81 | /** context typemaps **/ | ||
82 | @@ -172,7 +172,7 @@ | ||
83 | } | ||
84 | |||
85 | %typemap(argout) semanage_context_t** { | ||
86 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
87 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
88 | } | ||
89 | |||
90 | /** boolean typemaps **/ | ||
91 | @@ -197,7 +197,7 @@ | ||
92 | (void (*) (void*)) &semanage_bool_free, &plist) < 0) | ||
93 | $result = SWIG_From_int(STATUS_ERR); | ||
94 | else | ||
95 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
96 | + $result = SWIG_AppendOutput($result, plist); | ||
97 | } | ||
98 | } | ||
99 | } | ||
100 | @@ -207,11 +207,11 @@ | ||
101 | } | ||
102 | |||
103 | %typemap(argout) semanage_bool_t ** { | ||
104 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
105 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
106 | } | ||
107 | |||
108 | %typemap(argout) semanage_bool_key_t ** { | ||
109 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
110 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
111 | } | ||
112 | |||
113 | %typemap(in, numinputs=0) semanage_bool_key_t **(semanage_bool_key_t *temp=NULL) { | ||
114 | @@ -240,7 +240,7 @@ | ||
115 | (void (*) (void*)) &semanage_fcontext_free, &plist) < 0) | ||
116 | $result = SWIG_From_int(STATUS_ERR); | ||
117 | else | ||
118 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
119 | + $result = SWIG_AppendOutput($result, plist); | ||
120 | } | ||
121 | } | ||
122 | } | ||
123 | @@ -250,11 +250,11 @@ | ||
124 | } | ||
125 | |||
126 | %typemap(argout) semanage_fcontext_t ** { | ||
127 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
128 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
129 | } | ||
130 | |||
131 | %typemap(argout) semanage_fcontext_key_t ** { | ||
132 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
133 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
134 | } | ||
135 | |||
136 | %typemap(in, numinputs=0) semanage_fcontext_key_t **(semanage_fcontext_key_t *temp=NULL) { | ||
137 | @@ -284,7 +284,7 @@ | ||
138 | (void (*) (void*)) &semanage_iface_free, &plist) < 0) | ||
139 | $result = SWIG_From_int(STATUS_ERR); | ||
140 | else | ||
141 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
142 | + $result = SWIG_AppendOutput($result, plist); | ||
143 | } | ||
144 | } | ||
145 | } | ||
146 | @@ -294,11 +294,11 @@ | ||
147 | } | ||
148 | |||
149 | %typemap(argout) semanage_iface_t ** { | ||
150 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
151 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
152 | } | ||
153 | |||
154 | %typemap(argout) semanage_iface_key_t ** { | ||
155 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
156 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
157 | } | ||
158 | |||
159 | %typemap(in, numinputs=0) semanage_iface_key_t **(semanage_iface_key_t *temp=NULL) { | ||
160 | @@ -328,7 +328,7 @@ | ||
161 | (void (*) (void*)) &semanage_seuser_free, &plist) < 0) | ||
162 | $result = SWIG_From_int(STATUS_ERR); | ||
163 | else | ||
164 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
165 | + $result = SWIG_AppendOutput($result, plist); | ||
166 | } | ||
167 | } | ||
168 | } | ||
169 | @@ -338,11 +338,11 @@ | ||
170 | } | ||
171 | |||
172 | %typemap(argout) semanage_seuser_t ** { | ||
173 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
174 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
175 | } | ||
176 | |||
177 | %typemap(argout) semanage_seuser_key_t ** { | ||
178 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
179 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
180 | } | ||
181 | |||
182 | %typemap(in, numinputs=0) semanage_seuser_key_t **(semanage_seuser_key_t *temp=NULL) { | ||
183 | @@ -371,7 +371,7 @@ | ||
184 | (void (*) (void*)) &semanage_user_free, &plist) < 0) | ||
185 | $result = SWIG_From_int(STATUS_ERR); | ||
186 | else | ||
187 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
188 | + $result = SWIG_AppendOutput($result, plist); | ||
189 | } | ||
190 | } | ||
191 | } | ||
192 | @@ -381,11 +381,11 @@ | ||
193 | } | ||
194 | |||
195 | %typemap(argout) semanage_user_t ** { | ||
196 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
197 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
198 | } | ||
199 | |||
200 | %typemap(argout) semanage_user_key_t ** { | ||
201 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
202 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
203 | } | ||
204 | |||
205 | %typemap(in, numinputs=0) semanage_user_key_t **(semanage_user_key_t *temp=NULL) { | ||
206 | @@ -414,7 +414,7 @@ | ||
207 | (void (*) (void*)) &semanage_port_free, &plist) < 0) | ||
208 | $result = SWIG_From_int(STATUS_ERR); | ||
209 | else | ||
210 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
211 | + $result = SWIG_AppendOutput($result, plist); | ||
212 | } | ||
213 | } | ||
214 | } | ||
215 | @@ -424,11 +424,11 @@ | ||
216 | } | ||
217 | |||
218 | %typemap(argout) semanage_port_t ** { | ||
219 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
220 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
221 | } | ||
222 | |||
223 | %typemap(argout) semanage_port_key_t ** { | ||
224 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
225 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
226 | } | ||
227 | |||
228 | %typemap(in, numinputs=0) semanage_port_key_t **(semanage_port_key_t *temp=NULL) { | ||
229 | @@ -457,7 +457,7 @@ | ||
230 | (void (*) (void*)) &semanage_ibpkey_free, &plist) < 0) | ||
231 | $result = SWIG_From_int(STATUS_ERR); | ||
232 | else | ||
233 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
234 | + $result = SWIG_AppendOutput($result, plist); | ||
235 | } | ||
236 | } | ||
237 | } | ||
238 | @@ -467,11 +467,11 @@ | ||
239 | } | ||
240 | |||
241 | %typemap(argout) semanage_ibpkey_t ** { | ||
242 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
243 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
244 | } | ||
245 | |||
246 | %typemap(argout) semanage_ibpkey_key_t ** { | ||
247 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
248 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
249 | } | ||
250 | |||
251 | %typemap(in, numinputs=0) semanage_ibpkey_key_t **(semanage_ibpkey_key_t *temp=NULL) { | ||
252 | @@ -500,7 +500,7 @@ | ||
253 | (void (*) (void*)) &semanage_ibendport_free, &plist) < 0) | ||
254 | $result = SWIG_From_int(STATUS_ERR); | ||
255 | else | ||
256 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
257 | + $result = SWIG_AppendOutput($result, plist); | ||
258 | } | ||
259 | } | ||
260 | } | ||
261 | @@ -510,11 +510,11 @@ | ||
262 | } | ||
263 | |||
264 | %typemap(argout) semanage_ibendport_t ** { | ||
265 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
266 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
267 | } | ||
268 | |||
269 | %typemap(argout) semanage_ibendport_key_t ** { | ||
270 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
271 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
272 | } | ||
273 | |||
274 | %typemap(in, numinputs=0) semanage_ibendport_key_t **(semanage_ibendport_key_t *temp=NULL) { | ||
275 | @@ -543,7 +543,7 @@ | ||
276 | (void (*) (void*)) &semanage_node_free, &plist) < 0) | ||
277 | $result = SWIG_From_int(STATUS_ERR); | ||
278 | else | ||
279 | - $result = SWIG_Python_AppendOutput($result, plist); | ||
280 | + $result = SWIG_AppendOutput($result, plist); | ||
281 | } | ||
282 | } | ||
283 | } | ||
284 | @@ -553,12 +553,12 @@ | ||
285 | } | ||
286 | |||
287 | %typemap(argout) semanage_node_t ** { | ||
288 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
289 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
290 | } | ||
291 | |||
292 | |||
293 | %typemap(argout) semanage_node_key_t ** { | ||
294 | - $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
295 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
296 | } | ||
297 | |||
298 | %typemap(in, numinputs=0) semanage_node_key_t **(semanage_node_key_t *temp=NULL) { | ||
299 | diff --git a/src/semanageswig_ruby.i b/src/semanageswig_ruby.i | ||
300 | index e030e4ae..9010b545 100644 | ||
301 | --- a/src/semanageswig_ruby.i | ||
302 | +++ b/src/semanageswig_ruby.i | ||
303 | @@ -38,7 +38,7 @@ | ||
304 | } | ||
305 | |||
306 | %typemap(argout) semanage_module_info_t ** { | ||
307 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
308 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
309 | } | ||
310 | |||
311 | /** context typemaps **/ | ||
312 | @@ -50,7 +50,7 @@ | ||
313 | } | ||
314 | |||
315 | %typemap(argout) semanage_context_t** { | ||
316 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
317 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
318 | } | ||
319 | |||
320 | /** boolean typemaps **/ | ||
321 | @@ -66,11 +66,11 @@ | ||
322 | } | ||
323 | |||
324 | %typemap(argout) semanage_bool_t ** { | ||
325 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
326 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
327 | } | ||
328 | |||
329 | %typemap(argout) semanage_bool_key_t ** { | ||
330 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
331 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
332 | } | ||
333 | |||
334 | %typemap(in, numinputs=0) semanage_bool_key_t **(semanage_bool_key_t *temp=NULL) { | ||
335 | @@ -90,11 +90,11 @@ | ||
336 | } | ||
337 | |||
338 | %typemap(argout) semanage_fcontext_t ** { | ||
339 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
340 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
341 | } | ||
342 | |||
343 | %typemap(argout) semanage_fcontext_key_t ** { | ||
344 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
345 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
346 | } | ||
347 | |||
348 | %typemap(in, numinputs=0) semanage_fcontext_key_t **(semanage_fcontext_key_t *temp=NULL) { | ||
349 | @@ -114,11 +114,11 @@ | ||
350 | } | ||
351 | |||
352 | %typemap(argout) semanage_iface_t ** { | ||
353 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
354 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
355 | } | ||
356 | |||
357 | %typemap(argout) semanage_iface_key_t ** { | ||
358 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
359 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
360 | } | ||
361 | |||
362 | %typemap(in, numinputs=0) semanage_iface_key_t **(semanage_iface_key_t *temp=NULL) { | ||
363 | @@ -138,11 +138,11 @@ | ||
364 | } | ||
365 | |||
366 | %typemap(argout) semanage_seuser_t ** { | ||
367 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
368 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
369 | } | ||
370 | |||
371 | %typemap(argout) semanage_seuser_key_t ** { | ||
372 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
373 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
374 | } | ||
375 | |||
376 | %typemap(in, numinputs=0) semanage_seuser_key_t **(semanage_seuser_key_t *temp=NULL) { | ||
377 | @@ -162,11 +162,11 @@ | ||
378 | } | ||
379 | |||
380 | %typemap(argout) semanage_user_t ** { | ||
381 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
382 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
383 | } | ||
384 | |||
385 | %typemap(argout) semanage_user_key_t ** { | ||
386 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
387 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
388 | } | ||
389 | |||
390 | %typemap(in, numinputs=0) semanage_user_key_t **(semanage_user_key_t *temp=NULL) { | ||
391 | @@ -186,11 +186,11 @@ | ||
392 | } | ||
393 | |||
394 | %typemap(argout) semanage_port_t ** { | ||
395 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
396 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
397 | } | ||
398 | |||
399 | %typemap(argout) semanage_port_key_t ** { | ||
400 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
401 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
402 | } | ||
403 | |||
404 | %typemap(in, numinputs=0) semanage_port_key_t **(semanage_port_key_t *temp=NULL) { | ||
405 | @@ -210,12 +210,12 @@ | ||
406 | } | ||
407 | |||
408 | %typemap(argout) semanage_node_t ** { | ||
409 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
410 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
411 | } | ||
412 | |||
413 | |||
414 | %typemap(argout) semanage_node_key_t ** { | ||
415 | - $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
416 | + $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0)); | ||
417 | } | ||
418 | |||
419 | %typemap(in, numinputs=0) semanage_node_key_t **(semanage_node_key_t *temp=NULL) { | ||
420 | -- | ||
421 | 2.25.1 | ||
422 | |||
diff --git a/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch b/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch index daaeb3b..3cab867 100644 --- a/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch +++ b/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From a91134e98ba4b3b6645d12bb68a07976b60f86c8 Mon Sep 17 00:00:00 2001 | 1 | From 418a2736fd7da15758ab84f9448e7517e3ad82c1 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Mon, 26 Mar 2012 15:15:16 +0800 | 3 | Date: Mon, 26 Mar 2012 15:15:16 +0800 |
4 | Subject: [PATCH] libsemanage: Fix execve segfaults on Ubuntu. | 4 | Subject: [PATCH] libsemanage: Fix execve segfaults on Ubuntu. |
@@ -17,10 +17,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | 17 | 1 file changed, 1 insertion(+), 1 deletion(-) |
18 | 18 | ||
19 | diff --git a/src/semanage_store.c b/src/semanage_store.c | 19 | diff --git a/src/semanage_store.c b/src/semanage_store.c |
20 | index 27c5d34..519f298 100644 | 20 | index 2ca2e90..914d720 100644 |
21 | --- a/src/semanage_store.c | 21 | --- a/src/semanage_store.c |
22 | +++ b/src/semanage_store.c | 22 | +++ b/src/semanage_store.c |
23 | @@ -1470,7 +1470,7 @@ static int semanage_exec_prog(semanage_handle_t * sh, | 23 | @@ -1445,7 +1445,7 @@ static int semanage_exec_prog(semanage_handle_t * sh, |
24 | if (forkval == 0) { | 24 | if (forkval == 0) { |
25 | /* child process. file descriptors will be closed | 25 | /* child process. file descriptors will be closed |
26 | * because they were set as close-on-exec. */ | 26 | * because they were set as close-on-exec. */ |
diff --git a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch index e9df8be..8abf847 100644 --- a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch +++ b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c96010440e7a2a87787a535fd0f9ccf26a2b4a5e Mon Sep 17 00:00:00 2001 | 1 | From 0fddb654b4193e91b8534cbbeaa5fd9b6aa1ead2 Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Mon, 20 Jan 2014 03:53:48 -0500 | 3 | Date: Mon, 20 Jan 2014 03:53:48 -0500 |
4 | Subject: [PATCH] libsemanage: allow to disable audit support | 4 | Subject: [PATCH] libsemanage: allow to disable audit support |
@@ -13,7 +13,7 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | |||
13 | 3 files changed, 31 insertions(+), 2 deletions(-) | 13 | 3 files changed, 31 insertions(+), 2 deletions(-) |
14 | 14 | ||
15 | diff --git a/src/Makefile b/src/Makefile | 15 | diff --git a/src/Makefile b/src/Makefile |
16 | index d525996..2f5e159 100644 | 16 | index 8dfbd76..4012f28 100644 |
17 | --- a/src/Makefile | 17 | --- a/src/Makefile |
18 | +++ b/src/Makefile | 18 | +++ b/src/Makefile |
19 | @@ -27,6 +27,14 @@ ifeq ($(DEBUG),1) | 19 | @@ -27,6 +27,14 @@ ifeq ($(DEBUG),1) |
@@ -41,7 +41,7 @@ index d525996..2f5e159 100644 | |||
41 | 41 | ||
42 | $(LIBPC): $(LIBPC).in ../VERSION | 42 | $(LIBPC): $(LIBPC).in ../VERSION |
43 | diff --git a/src/seusers_local.c b/src/seusers_local.c | 43 | diff --git a/src/seusers_local.c b/src/seusers_local.c |
44 | index 795a33d..6539cdf 100644 | 44 | index eb3f82b..45da825 100644 |
45 | --- a/src/seusers_local.c | 45 | --- a/src/seusers_local.c |
46 | +++ b/src/seusers_local.c | 46 | +++ b/src/seusers_local.c |
47 | @@ -8,7 +8,11 @@ typedef struct semanage_seuser record_t; | 47 | @@ -8,7 +8,11 @@ typedef struct semanage_seuser record_t; |
@@ -72,7 +72,7 @@ index 795a33d..6539cdf 100644 | |||
72 | 72 | ||
73 | int semanage_seuser_modify_local(semanage_handle_t * handle, | 73 | int semanage_seuser_modify_local(semanage_handle_t * handle, |
74 | const semanage_seuser_key_t * key, | 74 | const semanage_seuser_key_t * key, |
75 | @@ -164,8 +170,11 @@ int semanage_seuser_modify_local(semanage_handle_t * handle, | 75 | @@ -165,8 +171,11 @@ int semanage_seuser_modify_local(semanage_handle_t * handle, |
76 | (void) semanage_seuser_query(handle, key, &previous); | 76 | (void) semanage_seuser_query(handle, key, &previous); |
77 | handle->msg_callback = callback; | 77 | handle->msg_callback = callback; |
78 | rc = dbase_modify(handle, dconfig, key, new); | 78 | rc = dbase_modify(handle, dconfig, key, new); |
@@ -84,7 +84,7 @@ index 795a33d..6539cdf 100644 | |||
84 | err: | 84 | err: |
85 | if (previous) | 85 | if (previous) |
86 | semanage_seuser_free(previous); | 86 | semanage_seuser_free(previous); |
87 | @@ -181,8 +190,12 @@ int semanage_seuser_del_local(semanage_handle_t * handle, | 87 | @@ -182,8 +191,12 @@ int semanage_seuser_del_local(semanage_handle_t * handle, |
88 | dbase_config_t *dconfig = semanage_seuser_dbase_local(handle); | 88 | dbase_config_t *dconfig = semanage_seuser_dbase_local(handle); |
89 | rc = dbase_del(handle, dconfig, key); | 89 | rc = dbase_del(handle, dconfig, key); |
90 | semanage_seuser_query(handle, key, &seuser); | 90 | semanage_seuser_query(handle, key, &seuser); |
@@ -98,7 +98,7 @@ index 795a33d..6539cdf 100644 | |||
98 | semanage_seuser_free(seuser); | 98 | semanage_seuser_free(seuser); |
99 | return rc; | 99 | return rc; |
100 | diff --git a/tests/Makefile b/tests/Makefile | 100 | diff --git a/tests/Makefile b/tests/Makefile |
101 | index 69f49a3..f914492 100644 | 101 | index 241ff17..fa03fb6 100644 |
102 | --- a/tests/Makefile | 102 | --- a/tests/Makefile |
103 | +++ b/tests/Makefile | 103 | +++ b/tests/Makefile |
104 | @@ -4,10 +4,18 @@ CILS = $(sort $(wildcard *.cil)) | 104 | @@ -4,10 +4,18 @@ CILS = $(sort $(wildcard *.cil)) |
@@ -114,7 +114,7 @@ index 69f49a3..f914492 100644 | |||
114 | +endif | 114 | +endif |
115 | + | 115 | + |
116 | EXECUTABLE = libsemanage-tests | 116 | EXECUTABLE = libsemanage-tests |
117 | CFLAGS += -g -O0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute -Wno-unused-parameter | 117 | CFLAGS += -g -O0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute |
118 | override CFLAGS += -I../src -I../include | 118 | override CFLAGS += -I../src -I../include |
119 | -override LDLIBS += -lcunit -lbz2 -laudit -lselinux -lsepol | 119 | -override LDLIBS += -lcunit -lbz2 -laudit -lselinux -lsepol |
120 | +override LDLIBS += -lcunit -lbz2 $(LIBAUDIT) -lselinux -lsepol | 120 | +override LDLIBS += -lcunit -lbz2 $(LIBAUDIT) -lselinux -lsepol |
diff --git a/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch b/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch index d880e1e..4b1d3cc 100644 --- a/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch +++ b/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 7af73c1684ce0e30ce0cd58b51708bde1e3a1984 Mon Sep 17 00:00:00 2001 | 1 | From af4948d5a1cfb41338a7539dcd80735b5c250e58 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe@deserted.net> | 2 | From: Joe MacDonald <joe@deserted.net> |
3 | Date: Wed, 7 May 2014 11:36:27 -0400 | 3 | Date: Wed, 7 May 2014 11:36:27 -0400 |
4 | Subject: [PATCH] libsemanage: disable expand-check on policy load | 4 | Subject: [PATCH] libsemanage: disable expand-check on policy load |
diff --git a/recipes-security/selinux/libsemanage_3.7.bb b/recipes-security/selinux/libsemanage_3.8.bb index 7e6c91f..ef22957 100644 --- a/recipes-security/selinux/libsemanage_3.7.bb +++ b/recipes-security/selinux/libsemanage_3.8.bb | |||
@@ -5,7 +5,7 @@ as by programs like load_policy that need to perform specific transformations \ | |||
5 | on binary policies such as customizing policy boolean settings." | 5 | on binary policies such as customizing policy boolean settings." |
6 | SECTION = "base" | 6 | SECTION = "base" |
7 | LICENSE = "LGPL-2.1-or-later" | 7 | LICENSE = "LGPL-2.1-or-later" |
8 | LIC_FILES_CHKSUM = "file://${S}/LICENSE;md5=a6f89e2100d9b6cdffcea4f398e37343" | 8 | LIC_FILES_CHKSUM = "file://${S}/LICENSE;md5=03068f550c635f6520e0f0252da412fc" |
9 | 9 | ||
10 | require selinux_common.inc | 10 | require selinux_common.inc |
11 | 11 | ||
@@ -14,7 +14,6 @@ inherit lib_package python3native | |||
14 | SRC_URI += "file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ | 14 | SRC_URI += "file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ |
15 | file://libsemanage-allow-to-disable-audit-support.patch \ | 15 | file://libsemanage-allow-to-disable-audit-support.patch \ |
16 | file://libsemanage-disable-expand-check-on-policy-load.patch \ | 16 | file://libsemanage-disable-expand-check-on-policy-load.patch \ |
17 | file://0001-libsemanage-fix-swig-bindings-for-4.3.0.patch \ | ||
18 | " | 17 | " |
19 | 18 | ||
20 | DEPENDS = "libsepol libselinux python3 bison-native swig-native" | 19 | DEPENDS = "libsepol libselinux python3 bison-native swig-native" |
diff --git a/recipes-security/selinux/libsepol_3.7.bb b/recipes-security/selinux/libsepol_3.8.bb index 0c28e9b..0c28e9b 100644 --- a/recipes-security/selinux/libsepol_3.7.bb +++ b/recipes-security/selinux/libsepol_3.8.bb | |||
diff --git a/recipes-security/selinux/mcstrans_3.7.bb b/recipes-security/selinux/mcstrans_3.8.bb index 4a8482f..4c8aed3 100644 --- a/recipes-security/selinux/mcstrans_3.7.bb +++ b/recipes-security/selinux/mcstrans_3.8.bb | |||
@@ -31,7 +31,7 @@ do_install:append() { | |||
31 | 31 | ||
32 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 32 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
33 | install -d ${D}${sysconfdir}/tmpfiles.d | 33 | install -d ${D}${sysconfdir}/tmpfiles.d |
34 | echo "d ${localstatedir}/run/setrans - - - -" \ | 34 | echo "d ${runtimedir}/setrans - - - -" \ |
35 | > ${D}${sysconfdir}/tmpfiles.d/setrans.conf | 35 | > ${D}${sysconfdir}/tmpfiles.d/setrans.conf |
36 | else | 36 | else |
37 | install -d ${D}${sysconfdir}/default/volatiles | 37 | install -d ${D}${sysconfdir}/default/volatiles |
diff --git a/recipes-security/selinux/policycoreutils_3.7.bb b/recipes-security/selinux/policycoreutils_3.8.bb index 9e59c4b..9e59c4b 100644 --- a/recipes-security/selinux/policycoreutils_3.7.bb +++ b/recipes-security/selinux/policycoreutils_3.8.bb | |||
diff --git a/recipes-security/selinux/restorecond_3.7.bb b/recipes-security/selinux/restorecond_3.8.bb index 8e57283..8e57283 100644 --- a/recipes-security/selinux/restorecond_3.7.bb +++ b/recipes-security/selinux/restorecond_3.8.bb | |||
diff --git a/recipes-security/selinux/secilc_3.7.bb b/recipes-security/selinux/secilc_3.8.bb index 5e0da3f..5e0da3f 100644 --- a/recipes-security/selinux/secilc_3.7.bb +++ b/recipes-security/selinux/secilc_3.8.bb | |||
diff --git a/recipes-security/selinux/selinux-dbus_3.7.bb b/recipes-security/selinux/selinux-dbus_3.8.bb index b1198af..b1198af 100644 --- a/recipes-security/selinux/selinux-dbus_3.7.bb +++ b/recipes-security/selinux/selinux-dbus_3.8.bb | |||
diff --git a/recipes-security/selinux/selinux-gui_3.7.bb b/recipes-security/selinux/selinux-gui_3.8.bb index fbd5e70..fbd5e70 100644 --- a/recipes-security/selinux/selinux-gui_3.7.bb +++ b/recipes-security/selinux/selinux-gui_3.8.bb | |||
diff --git a/recipes-security/selinux/selinux-python_3.7.bb b/recipes-security/selinux/selinux-python_3.8.bb index e2dc932..e2dc932 100644 --- a/recipes-security/selinux/selinux-python_3.7.bb +++ b/recipes-security/selinux/selinux-python_3.8.bb | |||
diff --git a/recipes-security/selinux/selinux-sandbox_3.7.bb b/recipes-security/selinux/selinux-sandbox_3.8.bb index 2cb55d6..2cb55d6 100644 --- a/recipes-security/selinux/selinux-sandbox_3.7.bb +++ b/recipes-security/selinux/selinux-sandbox_3.8.bb | |||
diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/selinux/selinux_common.inc index 8dd6c2e..30109b9 100644 --- a/recipes-security/selinux/selinux_common.inc +++ b/recipes-security/selinux/selinux_common.inc | |||
@@ -1,7 +1,7 @@ | |||
1 | HOMEPAGE = "https://github.com/SELinuxProject" | 1 | HOMEPAGE = "https://github.com/SELinuxProject" |
2 | 2 | ||
3 | SRC_URI = "git://github.com/SELinuxProject/selinux.git;branch=main;protocol=https" | 3 | SRC_URI = "git://github.com/SELinuxProject/selinux.git;branch=main;protocol=https" |
4 | SRCREV = "2eb286bc0841791043567437ba5413f3014fb94e" | 4 | SRCREV = "71aec30d068789e856e7cc429b620ae1cfa890f1" |
5 | 5 | ||
6 | UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" | 6 | UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" |
7 | 7 | ||
diff --git a/recipes-security/selinux/semodule-utils_3.7.bb b/recipes-security/selinux/semodule-utils_3.8.bb index 0c1c189..0c1c189 100644 --- a/recipes-security/selinux/semodule-utils_3.7.bb +++ b/recipes-security/selinux/semodule-utils_3.8.bb | |||