diff options
Diffstat (limited to 'recipes-security/selinux/libselinux/libselinux-make-SOCK_CLOEXEC-optional.patch')
-rw-r--r-- | recipes-security/selinux/libselinux/libselinux-make-SOCK_CLOEXEC-optional.patch | 38 |
1 files changed, 0 insertions, 38 deletions
diff --git a/recipes-security/selinux/libselinux/libselinux-make-SOCK_CLOEXEC-optional.patch b/recipes-security/selinux/libselinux/libselinux-make-SOCK_CLOEXEC-optional.patch deleted file mode 100644 index 77a9136..0000000 --- a/recipes-security/selinux/libselinux/libselinux-make-SOCK_CLOEXEC-optional.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From e630805d15a3b8d09330353f87a7e4a9fcc9998a Mon Sep 17 00:00:00 2001 | ||
2 | From: Joe MacDonald <joe.macdonald@windriver.com> | ||
3 | Date: Tue, 15 Oct 2013 10:07:43 -0400 | ||
4 | Subject: [PATCH] libselinux: make SOCK_CLOEXEC optional | ||
5 | |||
6 | libselinux/src/setrans_client.c checks for the existence of SOCK_CLOEXEC | ||
7 | before using it, however libselinux/src/avc_internal.c does not. Since | ||
8 | SOCK_CLOEXEC suffers the same problem as O_CLOEXEC on some older | ||
9 | platforms, we need to ensure we protect the references it it in the same | ||
10 | way. | ||
11 | |||
12 | Upstream-Status: Inappropriate | ||
13 | |||
14 | Signed-off-by: Joe MacDonald <joe.macdonald@windriver.com> | ||
15 | |||
16 | --- | ||
17 | src/avc_internal.c | 8 +++++++- | ||
18 | 1 file changed, 7 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/src/avc_internal.c b/src/avc_internal.c | ||
21 | index 49cecc9..148cc83 100644 | ||
22 | --- a/src/avc_internal.c | ||
23 | +++ b/src/avc_internal.c | ||
24 | @@ -60,7 +60,13 @@ int avc_netlink_open(int blocking) | ||
25 | int len, rc = 0; | ||
26 | struct sockaddr_nl addr; | ||
27 | |||
28 | - fd = socket(PF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_SELINUX); | ||
29 | + fd = socket(PF_NETLINK, SOCK_RAW | ||
30 | +#ifdef SOCK_CLOEXEC | ||
31 | + | SOCK_CLOEXEC | ||
32 | +#else | ||
33 | +#warning SOCK_CLOEXEC undefined on this platform, this may leak file descriptors | ||
34 | +#endif | ||
35 | + , NETLINK_SELINUX); | ||
36 | if (fd < 0) { | ||
37 | rc = fd; | ||
38 | goto out; | ||