1 |
commit: 86c76e3ee488d05e5ef7f6de0adefe66b6bba052 |
2 |
Author: Michael Mair-Keimberger (asterix) <m.mairkeimberger <AT> gmail <DOT> com> |
3 |
AuthorDate: Thu Jun 30 17:51:06 2016 +0000 |
4 |
Commit: Patrice Clement <monsieurp <AT> gentoo <DOT> org> |
5 |
CommitDate: Fri Jul 1 07:34:31 2016 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=86c76e3e |
7 |
|
8 |
app-admin/setools: remove unused patches |
9 |
|
10 |
Closes: https://github.com/gentoo/gentoo/pull/1803 |
11 |
|
12 |
Signed-off-by: Patrice Clement <monsieurp <AT> gentoo.org> |
13 |
|
14 |
.../fix-check-role_set_expand-libsepol-2.1.0.patch | 24 ----- |
15 |
.../setools/files/fix-implicit-def-fstat.patch | 13 --- |
16 |
.../setools3-userspace-2.4-compatibility.patch | 114 --------------------- |
17 |
3 files changed, 151 deletions(-) |
18 |
|
19 |
diff --git a/app-admin/setools/files/fix-check-role_set_expand-libsepol-2.1.0.patch b/app-admin/setools/files/fix-check-role_set_expand-libsepol-2.1.0.patch |
20 |
deleted file mode 100644 |
21 |
index 548f60b..0000000 |
22 |
--- a/app-admin/setools/files/fix-check-role_set_expand-libsepol-2.1.0.patch |
23 |
+++ /dev/null |
24 |
@@ -1,24 +0,0 @@ |
25 |
-diff -ur setools-3.3.7.orig/configure.ac setools-3.3.7/configure.ac |
26 |
---- setools-3.3.7.orig/configure.ac 2011-08-12 19:20:32.651000078 +0200 |
27 |
-+++ setools-3.3.7/configure.ac 2011-08-12 19:20:42.224000036 +0200 |
28 |
-@@ -503,7 +503,7 @@ |
29 |
- [AC_LANG_SOURCE([ |
30 |
- #include <sepol/policydb/expand.h> |
31 |
- int main () { |
32 |
-- return role_set_expand(NULL, NULL, NULL, NULL); |
33 |
-+ return role_set_expand(NULL, NULL, NULL, NULL, NULL); |
34 |
- }])], |
35 |
- sepol_new_user_role_mapping="yes", |
36 |
- sepol_new_user_role_mapping="no") |
37 |
-diff -ur setools-3.3.7.orig/libqpol/src/policy_define.c setools-3.3.7/libqpol/src/policy_define.c |
38 |
---- setools-3.3.7.orig/libqpol/src/policy_define.c 2011-08-12 19:20:32.657000013 +0200 |
39 |
-+++ setools-3.3.7/libqpol/src/policy_define.c 2011-08-12 19:20:53.907005864 +0200 |
40 |
-@@ -2133,7 +2133,7 @@ |
41 |
- |
42 |
- /* This ebitmap business is just to ensure that there are not conflicting role_trans rules */ |
43 |
- #ifdef HAVE_SEPOL_USER_ROLE_MAPPING |
44 |
-- if (role_set_expand(&roles, &e_roles, policydbp, NULL)) |
45 |
-+ if (role_set_expand(&roles, &e_roles, policydbp, NULL, NULL)) |
46 |
- #else |
47 |
- if (role_set_expand(&roles, &e_roles, policydbp)) |
48 |
- #endif |
49 |
|
50 |
diff --git a/app-admin/setools/files/fix-implicit-def-fstat.patch b/app-admin/setools/files/fix-implicit-def-fstat.patch |
51 |
deleted file mode 100644 |
52 |
index 7276432..0000000 |
53 |
--- a/app-admin/setools/files/fix-implicit-def-fstat.patch |
54 |
+++ /dev/null |
55 |
@@ -1,13 +0,0 @@ |
56 |
-diff -ur setools-3.3.7.orig/libqpol/src/policy.c setools-3.3.7/libqpol/src/policy.c |
57 |
---- setools-3.3.7.orig/libqpol/src/policy.c 2011-08-12 19:48:13.793000029 +0200 |
58 |
-+++ setools-3.3.7/libqpol/src/policy.c 2011-08-12 19:49:32.880001229 +0200 |
59 |
-@@ -36,6 +36,9 @@ |
60 |
- #include <stdio.h> |
61 |
- #include <stdlib.h> |
62 |
- #include <sys/mman.h> |
63 |
-+#include <sys/types.h> |
64 |
-+#include <sys/stat.h> |
65 |
-+#include <unistd.h> |
66 |
- #include <asm/types.h> |
67 |
- |
68 |
- #include <sepol/debug.h> |
69 |
|
70 |
diff --git a/app-admin/setools/files/setools3-userspace-2.4-compatibility.patch b/app-admin/setools/files/setools3-userspace-2.4-compatibility.patch |
71 |
deleted file mode 100644 |
72 |
index c8fc3f5..0000000 |
73 |
--- a/app-admin/setools/files/setools3-userspace-2.4-compatibility.patch |
74 |
+++ /dev/null |
75 |
@@ -1,114 +0,0 @@ |
76 |
-From f1e5b208d507171968ca4d2eeefd7980f1004a3c Mon Sep 17 00:00:00 2001 |
77 |
-From: Chris PeBenito <cpebenito@××××××.com> |
78 |
-Date: Thu, 12 Feb 2015 08:55:12 -0500 |
79 |
-Subject: [PATCH] Update for 2015-02-02 Userspace release (2.4) |
80 |
- |
81 |
-SETools now requires libsepol 2.4 and libselinux 2.4. |
82 |
---- |
83 |
- configure.ac | 6 +++--- |
84 |
- libqpol/src/policy_define.c | 4 ++-- |
85 |
- libqpol/src/policy_extend.c | 4 ++-- |
86 |
- libqpol/src/syn_rule_query.c | 6 +++--- |
87 |
- secmds/replcon.cc | 2 +- |
88 |
- 5 files changed, 11 insertions(+), 11 deletions(-) |
89 |
- |
90 |
-diff --git a/configure.ac b/configure.ac |
91 |
-index 80395e6..ae20da7 100644 |
92 |
---- a/configure.ac |
93 |
-+++ b/configure.ac |
94 |
-@@ -25,9 +25,9 @@ libseaudit_version=4.5 |
95 |
- setoolsdir='${prefix}/share/setools-3.3' |
96 |
- javadir='${prefix}/share/java' |
97 |
- |
98 |
--version_min_sepol_major=1 |
99 |
--version_min_sepol_minor=12 |
100 |
--version_min_sepol_patch=27 |
101 |
-+version_min_sepol_major=2 |
102 |
-+version_min_sepol_minor=4 |
103 |
-+version_min_sepol_patch=0 |
104 |
- |
105 |
- dnl *** end of tunable values *** |
106 |
- |
107 |
-diff --git a/libqpol/src/policy_define.c b/libqpol/src/policy_define.c |
108 |
-index 229779c..15f70ba 100644 |
109 |
---- a/libqpol/src/policy_define.c |
110 |
-+++ b/libqpol/src/policy_define.c |
111 |
-@@ -1661,7 +1661,7 @@ int define_compute_type_helper(int which, avrule_t ** rule) |
112 |
- goto bad; |
113 |
- } |
114 |
- class_perm_node_init(perm); |
115 |
-- perm->class = i + 1; |
116 |
-+ perm->tclass = i + 1; |
117 |
- perm->data = datum->s.value; |
118 |
- perm->next = avrule->perms; |
119 |
- avrule->perms = perm; |
120 |
-@@ -1901,7 +1901,7 @@ int define_te_avtab_helper(int which, avrule_t ** rule) |
121 |
- goto out; |
122 |
- } |
123 |
- class_perm_node_init(cur_perms); |
124 |
-- cur_perms->class = i + 1; |
125 |
-+ cur_perms->tclass = i + 1; |
126 |
- if (!perms) |
127 |
- perms = cur_perms; |
128 |
- if (tail) |
129 |
-diff --git a/libqpol/src/policy_extend.c b/libqpol/src/policy_extend.c |
130 |
-index 5325a87..1417271 100644 |
131 |
---- a/libqpol/src/policy_extend.c |
132 |
-+++ b/libqpol/src/policy_extend.c |
133 |
-@@ -843,7 +843,7 @@ static int qpol_syn_rule_table_insert_sepol_avrule(qpol_policy_t * policy, qpol_ |
134 |
- for (class_node = rule->perms; class_node; class_node = class_node->next) { |
135 |
- key.rule_type = rule->specified; |
136 |
- key.source_val = key.target_val = i + 1; |
137 |
-- key.class_val = class_node->class; |
138 |
-+ key.class_val = class_node->tclass; |
139 |
- key.cond = cond; |
140 |
- if (qpol_syn_rule_table_insert_entry(policy, table, &key, new_rule)) |
141 |
- goto err; |
142 |
-@@ -856,7 +856,7 @@ static int qpol_syn_rule_table_insert_sepol_avrule(qpol_policy_t * policy, qpol_ |
143 |
- key.rule_type = rule->specified; |
144 |
- key.source_val = i + 1; |
145 |
- key.target_val = j + 1; |
146 |
-- key.class_val = class_node->class; |
147 |
-+ key.class_val = class_node->tclass; |
148 |
- key.cond = cond; |
149 |
- if (qpol_syn_rule_table_insert_entry(policy, table, &key, new_rule)) |
150 |
- goto err; |
151 |
-diff --git a/libqpol/src/syn_rule_query.c b/libqpol/src/syn_rule_query.c |
152 |
-index 3e63204..d7578f1 100644 |
153 |
---- a/libqpol/src/syn_rule_query.c |
154 |
-+++ b/libqpol/src/syn_rule_query.c |
155 |
-@@ -67,7 +67,7 @@ static void *syn_rule_class_state_get_cur(const qpol_iterator_t * iter) |
156 |
- return NULL; |
157 |
- } |
158 |
- |
159 |
-- return db->class_val_to_struct[srcs->cur->class - 1]; |
160 |
-+ return db->class_val_to_struct[srcs->cur->tclass - 1]; |
161 |
- } |
162 |
- |
163 |
- static int syn_rule_class_state_next(qpol_iterator_t * iter) |
164 |
-@@ -465,10 +465,10 @@ int qpol_syn_avrule_get_perm_iter(const qpol_policy_t * policy, const qpol_syn_a |
165 |
- } |
166 |
- |
167 |
- for (node = internal_rule->perms; node; node = node->next) { |
168 |
-- for (i = 0; i < db->class_val_to_struct[node->class - 1]->permissions.nprim; i++) { |
169 |
-+ for (i = 0; i < db->class_val_to_struct[node->tclass - 1]->permissions.nprim; i++) { |
170 |
- if (!(node->data & (1 << i))) |
171 |
- continue; |
172 |
-- tmp = sepol_av_to_string(db, node->class, (sepol_access_vector_t) (1 << i)); |
173 |
-+ tmp = sepol_av_to_string(db, node->tclass, (sepol_access_vector_t) (1 << i)); |
174 |
- if (tmp) { |
175 |
- tmp++; /* remove prepended space */ |
176 |
- for (cur = 0; cur < perm_list_sz; cur++) |
177 |
-diff --git a/secmds/replcon.cc b/secmds/replcon.cc |
178 |
-index 34f7c1a..307c39f 100644 |
179 |
---- a/secmds/replcon.cc |
180 |
-+++ b/secmds/replcon.cc |
181 |
-@@ -60,7 +60,7 @@ static struct option const longopts[] = { |
182 |
- {NULL, 0, NULL, 0} |
183 |
- }; |
184 |
- |
185 |
--extern int lsetfilecon_raw(const char *, security_context_t) __attribute__ ((weak)); |
186 |
-+extern int lsetfilecon_raw(const char *, const char *) __attribute__ ((weak)); |
187 |
- |
188 |
- /** |
189 |
- * As that setools must work with older libselinux versions that may |