1 |
commit: 530aaa039c7d23c9f5e0eae7ebafd4b7814d9310 |
2 |
Author: Michał Górny <mgorny <AT> gentoo <DOT> org> |
3 |
AuthorDate: Sat Apr 2 22:00:45 2022 +0000 |
4 |
Commit: Michał Górny <mgorny <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Apr 2 22:04:46 2022 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=530aaa03 |
7 |
|
8 |
sys-apps/sandbox: Remove permanently broken sandbox 3.0+ |
9 |
|
10 |
The unreviewed changes in sandbox 3.0 has broken a number of packages, |
11 |
and the versions have been masked since November 2021. It seems |
12 |
that the author is not interested in fixing them, so remove them. |
13 |
|
14 |
Signed-off-by: Michał Górny <mgorny <AT> gentoo.org> |
15 |
|
16 |
profiles/package.mask | 8 --- |
17 |
sys-apps/sandbox/Manifest | 2 - |
18 |
.../sandbox/files/sandbox-3.1-label-decl.patch | 41 -------------- |
19 |
sys-apps/sandbox/sandbox-3.0.ebuild | 62 -------------------- |
20 |
sys-apps/sandbox/sandbox-3.1.ebuild | 66 ---------------------- |
21 |
5 files changed, 179 deletions(-) |
22 |
|
23 |
diff --git a/profiles/package.mask b/profiles/package.mask |
24 |
index 1f333a383968..556faa3898f7 100644 |
25 |
--- a/profiles/package.mask |
26 |
+++ b/profiles/package.mask |
27 |
@@ -410,14 +410,6 @@ dev-tex/pdfannotextractor |
28 |
dev-lang/vala:0.54 |
29 |
dev-lang/vala:0.56 |
30 |
|
31 |
-# Sam James <sam@g.o> (2021-11-03) |
32 |
-# Known issues with YAMA (kernel.yama.ptrace_scope=1) which is on by default |
33 |
-# in at least the sys-kernel/gento-kernel kernel config. |
34 |
-# Work is in progress to fix these but latest sandbox versions still seem |
35 |
-# to cause hangs in some situations. Mask for now to avoid duplicate reports. |
36 |
-# bug #821532, bug #821523 (and bug #821403 but shouldn't be in 3.1+). |
37 |
->=sys-apps/sandbox-3.0 |
38 |
- |
39 |
# Ionen Wolkens <ionen@g.o> (2021-10-09) |
40 |
# Vulkan beta driver branch aimed at Vulkan developers for testing |
41 |
# new features. Beside vulkan, it is typically behind the main branch |
42 |
|
43 |
diff --git a/sys-apps/sandbox/Manifest b/sys-apps/sandbox/Manifest |
44 |
index b3f61f637d3e..50fedc869e8e 100644 |
45 |
--- a/sys-apps/sandbox/Manifest |
46 |
+++ b/sys-apps/sandbox/Manifest |
47 |
@@ -4,5 +4,3 @@ DIST sandbox-2.26.tar.xz 444412 BLAKE2B 3bc88d86ba4e2522895c4448dff6da2cffceb912 |
48 |
DIST sandbox-2.27.tar.xz 448948 BLAKE2B 03a311c8c7c8719bac398e39ce49e7149bdaa1d5b2811f395eb2251a32aabba995f97c3d5d27461aadb64bf43adf2b0cbaa7c2f141dd86f64f8dd326422ac104 SHA512 2a53e6fc87cec975962737b1fadc447d86985d27b18ad2caed711116da2ba435f54db0f7dadb02664b2638b9dc77752831cd4820390f5c3e61a42429e13462a7 |
49 |
DIST sandbox-2.28.tar.xz 450840 BLAKE2B 1a144db1dcd140ce393f47b224c4389693bd3db6d056749968a9e78730b1075192148aa63fdfd5ab93893dfb96a87bcc36bee8b4540abefca0590a8def8365f2 SHA512 eaac54fbc35f51da3c94bfa10e0556f0fd39c20660fea2aa7d3cbf76dd3e4c9fb4a16cc198425988b79313f9331af030e1dca431c3f057ee4a04927c96897895 |
50 |
DIST sandbox-2.29.tar.xz 452784 BLAKE2B 388f5d9c49134696bafbc6b882581396a9fa2e7caa6ccfb4376706d653f836ce18e0d77527c4c4f2ff753c0b920ab5ab60e151dd8a4e399e13dbc3fe7c0533d6 SHA512 15c0e6b71e8b8547b8188f857568c99b1925d5a837a289b21c4f842341361bf7119b96083697dc83546caf530daab700fb8c2704974e7cfb804d64bb5257a4b4 |
51 |
-DIST sandbox-3.0.tar.xz 454384 BLAKE2B b4f38b7c5ed2dc52e558f1b7e36d2308e6017c9d14861c60eace0f240a909f11184e259b2359ea96cad81d21234cc9a6bcd9f313ce56bd2f3bb1ce836f006a50 SHA512 3a35ee0b19a356b1986468ef5d2ecd553b88cbdaf287ce31a211b4072097a9844fca413ffa0f2858b9a4e75ead822fe9d9834f17c241ba32c2f14e02619a70b3 |
52 |
-DIST sandbox-3.1.tar.xz 454404 BLAKE2B f8cc2960f1c7b3367d375952f0a7ca978c1a2cc27b63137046152d1080a1a7b6b99d356af0776d3b57a5c260b2d89f0b7bfb127967407b537642be04e92b8603 SHA512 e57c0fc1ddb5a63012abd02080770d49deaa1d0168508a794df2eaa25b2b7a4fa6c505e8b93572a3745912819202c264cdf980f10dc7101c487a9b03e7f65815 |
53 |
|
54 |
diff --git a/sys-apps/sandbox/files/sandbox-3.1-label-decl.patch b/sys-apps/sandbox/files/sandbox-3.1-label-decl.patch |
55 |
deleted file mode 100644 |
56 |
index b17f4b866f5a..000000000000 |
57 |
--- a/sys-apps/sandbox/files/sandbox-3.1-label-decl.patch |
58 |
+++ /dev/null |
59 |
@@ -1,41 +0,0 @@ |
60 |
-From 82f6d876660ba1132d75ccfef5c4301d123ea505 Mon Sep 17 00:00:00 2001 |
61 |
-From: Mike Frysinger <vapier@g.o> |
62 |
-Date: Wed, 3 Nov 2021 12:25:10 -0400 |
63 |
-Subject: [PATCH] libsandbox: tweak label/decl code for some compiler settings |
64 |
- |
65 |
-Looks like gcc is inconsistent in when it chokes on this code: |
66 |
-> a label can only be part of a statement and a declaration is not a statement |
67 |
- |
68 |
-Hoist the decl up to the top of scope to avoid the issue. |
69 |
- |
70 |
-Bug: https://bugs.gentoo.org/821433 |
71 |
-Signed-off-by: Mike Frysinger <vapier@g.o> |
72 |
---- |
73 |
- libsandbox/trace.c | 4 +++- |
74 |
- 1 file changed, 3 insertions(+), 1 deletion(-) |
75 |
- |
76 |
-diff --git a/libsandbox/trace.c b/libsandbox/trace.c |
77 |
-index f3390d99822e..d2899b743048 100644 |
78 |
---- a/libsandbox/trace.c |
79 |
-+++ b/libsandbox/trace.c |
80 |
-@@ -704,6 +704,8 @@ static char *flatten_args(char *const argv[]) |
81 |
- |
82 |
- bool trace_possible(const char *filename, char *const argv[], const void *data) |
83 |
- { |
84 |
-+ char *args; |
85 |
-+ |
86 |
- /* If YAMA ptrace_scope is very high, then we can't trace at all. #771360 */ |
87 |
- int yama = trace_yama_level(); |
88 |
- if (yama >= 2) { |
89 |
-@@ -721,7 +723,7 @@ bool trace_possible(const char *filename, char *const argv[], const void *data) |
90 |
- } |
91 |
- |
92 |
- fail: |
93 |
-- char *args = flatten_args(argv); |
94 |
-+ args = flatten_args(argv); |
95 |
- sb_eqawarn("Unable to trace static ELF: %s: %s\n", filename, args); |
96 |
- free(args); |
97 |
- return false; |
98 |
--- |
99 |
-2.33.0 |
100 |
- |
101 |
|
102 |
diff --git a/sys-apps/sandbox/sandbox-3.0.ebuild b/sys-apps/sandbox/sandbox-3.0.ebuild |
103 |
deleted file mode 100644 |
104 |
index 83e908988817..000000000000 |
105 |
--- a/sys-apps/sandbox/sandbox-3.0.ebuild |
106 |
+++ /dev/null |
107 |
@@ -1,62 +0,0 @@ |
108 |
-# Copyright 1999-2021 Gentoo Authors |
109 |
-# Distributed under the terms of the GNU General Public License v2 |
110 |
- |
111 |
-EAPI="7" |
112 |
- |
113 |
-inherit flag-o-matic multilib-minimal multiprocessing |
114 |
- |
115 |
-DESCRIPTION="sandbox'd LD_PRELOAD hack" |
116 |
-HOMEPAGE="https://wiki.gentoo.org/wiki/Project:Sandbox" |
117 |
-SRC_URI="https://dev.gentoo.org/~vapier/dist/${P}.tar.xz" |
118 |
- |
119 |
-LICENSE="GPL-2" |
120 |
-SLOT="0" |
121 |
-KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86" |
122 |
-IUSE="+nnp" |
123 |
- |
124 |
-DEPEND="app-arch/xz-utils |
125 |
- >=app-misc/pax-utils-0.1.19" #265376 |
126 |
-RDEPEND="" |
127 |
- |
128 |
-has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS+=" sandbox_death_notice" |
129 |
- |
130 |
-sandbox_death_notice() { |
131 |
- ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:" |
132 |
- ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox" |
133 |
-} |
134 |
- |
135 |
-src_prepare() { |
136 |
- default |
137 |
- |
138 |
- if ! use nnp ; then |
139 |
- sed -i 's:PR_SET_NO_NEW_PRIVS:___disable_nnp_hack:' src/sandbox.c || die |
140 |
- fi |
141 |
- |
142 |
- # sandbox uses `__asm__ (".symver "...` which does |
143 |
- # not play well with gcc's LTO: https://gcc.gnu.org/PR48200 |
144 |
- append-flags -fno-lto |
145 |
- append-ldflags -fno-lto |
146 |
-} |
147 |
- |
148 |
-multilib_src_configure() { |
149 |
- filter-lfs-flags #90228 |
150 |
- |
151 |
- ECONF_SOURCE="${S}" econf |
152 |
-} |
153 |
- |
154 |
-multilib_src_test() { |
155 |
- # Default sandbox build will run with --jobs set to # cpus. |
156 |
- emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" |
157 |
-} |
158 |
- |
159 |
-multilib_src_install_all() { |
160 |
- doenvd "${FILESDIR}"/09sandbox |
161 |
- |
162 |
- dodoc AUTHORS ChangeLog* README.md |
163 |
-} |
164 |
- |
165 |
-pkg_postinst() { |
166 |
- mkdir -p "${EROOT}"/var/log/sandbox |
167 |
- chown root:portage "${EROOT}"/var/log/sandbox |
168 |
- chmod 0770 "${EROOT}"/var/log/sandbox |
169 |
-} |
170 |
|
171 |
diff --git a/sys-apps/sandbox/sandbox-3.1.ebuild b/sys-apps/sandbox/sandbox-3.1.ebuild |
172 |
deleted file mode 100644 |
173 |
index 1c11a7faf157..000000000000 |
174 |
--- a/sys-apps/sandbox/sandbox-3.1.ebuild |
175 |
+++ /dev/null |
176 |
@@ -1,66 +0,0 @@ |
177 |
-# Copyright 1999-2021 Gentoo Authors |
178 |
-# Distributed under the terms of the GNU General Public License v2 |
179 |
- |
180 |
-EAPI="7" |
181 |
- |
182 |
-inherit flag-o-matic multilib-minimal multiprocessing |
183 |
- |
184 |
-DESCRIPTION="sandbox'd LD_PRELOAD hack" |
185 |
-HOMEPAGE="https://wiki.gentoo.org/wiki/Project:Sandbox" |
186 |
-SRC_URI="https://dev.gentoo.org/~vapier/dist/${P}.tar.xz" |
187 |
- |
188 |
-LICENSE="GPL-2" |
189 |
-SLOT="0" |
190 |
-KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86" |
191 |
-IUSE="+nnp" |
192 |
- |
193 |
-DEPEND="app-arch/xz-utils |
194 |
- >=app-misc/pax-utils-0.1.19" #265376 |
195 |
-RDEPEND="" |
196 |
- |
197 |
-PATCHES=( |
198 |
- "${FILESDIR}"/${P}-label-decl.patch #821433 |
199 |
-) |
200 |
- |
201 |
-has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS+=" sandbox_death_notice" |
202 |
- |
203 |
-sandbox_death_notice() { |
204 |
- ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:" |
205 |
- ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox" |
206 |
-} |
207 |
- |
208 |
-src_prepare() { |
209 |
- default |
210 |
- |
211 |
- if ! use nnp ; then |
212 |
- sed -i 's:PR_SET_NO_NEW_PRIVS:___disable_nnp_hack:' src/sandbox.c || die |
213 |
- fi |
214 |
- |
215 |
- # sandbox uses `__asm__ (".symver "...` which does |
216 |
- # not play well with gcc's LTO: https://gcc.gnu.org/PR48200 |
217 |
- append-flags -fno-lto |
218 |
- append-ldflags -fno-lto |
219 |
-} |
220 |
- |
221 |
-multilib_src_configure() { |
222 |
- filter-lfs-flags #90228 |
223 |
- |
224 |
- ECONF_SOURCE="${S}" econf |
225 |
-} |
226 |
- |
227 |
-multilib_src_test() { |
228 |
- # Default sandbox build will run with --jobs set to # cpus. |
229 |
- emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" |
230 |
-} |
231 |
- |
232 |
-multilib_src_install_all() { |
233 |
- doenvd "${FILESDIR}"/09sandbox |
234 |
- |
235 |
- dodoc AUTHORS ChangeLog* README.md |
236 |
-} |
237 |
- |
238 |
-pkg_postinst() { |
239 |
- mkdir -p "${EROOT}"/var/log/sandbox |
240 |
- chown root:portage "${EROOT}"/var/log/sandbox |
241 |
- chmod 0770 "${EROOT}"/var/log/sandbox |
242 |
-} |