diff options
| -rw-r--r-- | recipes-security/selinux/policycoreutils/policycoreutils-fts_flags-FTS_NOCHDIR.patch | 25 | ||||
| -rw-r--r-- | recipes-security/selinux/policycoreutils_2.7.bb (renamed from recipes-security/selinux/policycoreutils_2.6.bb) | 6 | ||||
| -rw-r--r-- | recipes-security/selinux/policycoreutils_git.bb | 6 |
3 files changed, 7 insertions, 30 deletions
diff --git a/recipes-security/selinux/policycoreutils/policycoreutils-fts_flags-FTS_NOCHDIR.patch b/recipes-security/selinux/policycoreutils/policycoreutils-fts_flags-FTS_NOCHDIR.patch deleted file mode 100644 index fd04b51..0000000 --- a/recipes-security/selinux/policycoreutils/policycoreutils-fts_flags-FTS_NOCHDIR.patch +++ /dev/null | |||
| @@ -1,25 +0,0 @@ | |||
| 1 | This works around a bug in the default libc used by OE. FTS functions are | ||
| 2 | supposed to change the current working directory as they walk the file | ||
| 3 | hierarchy. The fts_accpath member of the FTSENT structure relies on this | ||
| 4 | behavior and without it the path is not relative to cwd as expected. | ||
| 5 | Supplying the FTS_NOCHDIR flag disables this optimization and causes | ||
| 6 | fts_accpath to be relative to the directory where the traversal started. | ||
| 7 | Use of this flag doesn't effect compatibility with glibc. | ||
| 8 | |||
| 9 | An alternative fix could replace the use of fts_accpath with fts_path | ||
| 10 | which is absolute. | ||
| 11 | |||
| 12 | Signed-off-by: Philip Tricca <flihp@twobit.us> | ||
| 13 | Index: policycoreutils/setfiles/setfiles.c | ||
| 14 | =================================================================== | ||
| 15 | --- policycoreutils.orig/setfiles/setfiles.c | ||
| 16 | +++ policycoreutils/setfiles/setfiles.c | ||
| 17 | @@ -194,7 +194,7 @@ int main(int argc, char **argv) | ||
| 18 | r_opts.expand_realpath = 0; | ||
| 19 | r_opts.abort_on_error = 1; | ||
| 20 | r_opts.add_assoc = 1; | ||
| 21 | - r_opts.fts_flags = FTS_PHYSICAL | FTS_XDEV; | ||
| 22 | + r_opts.fts_flags = FTS_PHYSICAL | FTS_XDEV | FTS_NOCHDIR; | ||
| 23 | ctx_validate = 1; | ||
| 24 | } else { | ||
| 25 | /* | ||
diff --git a/recipes-security/selinux/policycoreutils_2.6.bb b/recipes-security/selinux/policycoreutils_2.7.bb index 6a625b3..50f15d0 100644 --- a/recipes-security/selinux/policycoreutils_2.6.bb +++ b/recipes-security/selinux/policycoreutils_2.7.bb | |||
| @@ -1,10 +1,10 @@ | |||
| 1 | include selinux_20161014.inc | 1 | include selinux_20170804.inc |
| 2 | include ${BPN}.inc | 2 | include ${BPN}.inc |
| 3 | 3 | ||
| 4 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | 4 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" |
| 5 | 5 | ||
| 6 | SRC_URI[md5sum] = "0358f0136e2dd9a8c9e99f181aaab1b2" | 6 | SRC_URI[md5sum] = "65311b66ae01f7b7ad7c2ea7401b68ed" |
| 7 | SRC_URI[sha256sum] = "68891b376f5048edc53c6ccb2fca44da3dc7f4563f4b6894e201d70c04a05a29" | 7 | SRC_URI[sha256sum] = "0a1b8a4a323b854981c6755ff025fe98a0f1cff307f109abb260f0490f13e4f4" |
| 8 | 8 | ||
| 9 | SRC_URI += "\ | 9 | SRC_URI += "\ |
| 10 | file://policycoreutils-fix-sepolicy-install-path.patch \ | 10 | file://policycoreutils-fix-sepolicy-install-path.patch \ |
diff --git a/recipes-security/selinux/policycoreutils_git.bb b/recipes-security/selinux/policycoreutils_git.bb index b630797..5be8728 100644 --- a/recipes-security/selinux/policycoreutils_git.bb +++ b/recipes-security/selinux/policycoreutils_git.bb | |||
| @@ -1,5 +1,4 @@ | |||
| 1 | PR = "r99" | 1 | PV = "2.7+git${SRCPV}" |
| 2 | PV = "2.2.5+git${SRCPV}" | ||
| 3 | 2 | ||
| 4 | include selinux_git.inc | 3 | include selinux_git.inc |
| 5 | include ${BPN}.inc | 4 | include ${BPN}.inc |
| @@ -9,6 +8,9 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | |||
| 9 | SRC_URI += "\ | 8 | SRC_URI += "\ |
| 10 | file://policycoreutils-fix-sepolicy-install-path.patch \ | 9 | file://policycoreutils-fix-sepolicy-install-path.patch \ |
| 11 | file://policycoreutils-make-O_CLOEXEC-optional.patch \ | 10 | file://policycoreutils-make-O_CLOEXEC-optional.patch \ |
| 11 | file://policycoreutils-loadpolicy-symlink.patch \ | ||
| 12 | file://policycoreutils-process-ValueError-for-sepolicy-seobject.patch \ | ||
| 13 | file://policycoreutils-fix-TypeError-for-seobject.py.patch \ | ||
| 12 | file://0001-mcstrans-fix-the-init-script.patch \ | 14 | file://0001-mcstrans-fix-the-init-script.patch \ |
| 13 | file://enable-mcstrans.patch \ | 15 | file://enable-mcstrans.patch \ |
| 14 | " | 16 | " |
