basebuilder_pel7ppc64bebuilder0
7 years ago
2 changed files with 1444 additions and 0 deletions
@ -0,0 +1,608 @@
@@ -0,0 +1,608 @@
|
||||
diff --git checkpolicy-2.5/Android.mk checkpolicy-2.5/Android.mk |
||||
index 98f5168..3b7ff8a 100644 |
||||
--- checkpolicy-2.5/Android.mk |
||||
+++ checkpolicy-2.5/Android.mk |
||||
@@ -12,10 +12,6 @@ common_cflags := \ |
||||
-Wall -Wshadow -O2 \ |
||||
-pipe -fno-strict-aliasing \ |
||||
|
||||
-ifeq ($(HOST_OS),darwin) |
||||
-common_cflags += -DDARWIN |
||||
-endif |
||||
- |
||||
common_includes := \ |
||||
$(LOCAL_PATH)/ \ |
||||
$(LOCAL_PATH)/../libsepol/include/ \ |
||||
diff --git checkpolicy-2.5/ChangeLog checkpolicy-2.5/ChangeLog |
||||
index dfe4908..f2216ec 100644 |
||||
--- checkpolicy-2.5/ChangeLog |
||||
+++ checkpolicy-2.5/ChangeLog |
||||
@@ -1,3 +1,11 @@ |
||||
+ * Extend checkpolicy pathname matching, from Stephen Smalley. |
||||
+ * Fix typos in test/dispol, from Petr Lautrbach. |
||||
+ * Set flex as default lexer, from Julien Pivotto. |
||||
+ * Fix checkmodule output message, from Petr Lautrbach. |
||||
+ * Build policy on systems not supporting DCCP protocol, from Richard Haines. |
||||
+ * Fail if module name different than output base filename, from James Carter |
||||
+ * Add support for portcon dccp protocol, from Richard Haines |
||||
+ |
||||
2.5 2016-02-23 |
||||
* Add neverallow support for ioctl extended permissions, from Jeff Vander Stoep. |
||||
* fix double free on name-based type transitions, from Stephen Smalley. |
||||
diff --git checkpolicy-2.5/Makefile checkpolicy-2.5/Makefile |
||||
index e5fae3d..53a3074 100644 |
||||
--- checkpolicy-2.5/Makefile |
||||
+++ checkpolicy-2.5/Makefile |
||||
@@ -8,6 +8,7 @@ LIBDIR ?= $(PREFIX)/lib |
||||
INCLUDEDIR ?= $(PREFIX)/include |
||||
TARGETS = checkpolicy checkmodule |
||||
|
||||
+LEX = flex |
||||
YACC = bison -y |
||||
|
||||
CFLAGS ?= -g -Wall -Werror -Wshadow -O2 -pipe -fno-strict-aliasing |
||||
diff --git checkpolicy-2.5/checkmodule.c checkpolicy-2.5/checkmodule.c |
||||
index 5957d29..53cc5a0 100644 |
||||
--- checkpolicy-2.5/checkmodule.c |
||||
+++ checkpolicy-2.5/checkmodule.c |
||||
@@ -19,6 +19,7 @@ |
||||
#include <stdio.h> |
||||
#include <errno.h> |
||||
#include <sys/mman.h> |
||||
+#include <libgen.h> |
||||
|
||||
#include <sepol/module_to_cil.h> |
||||
#include <sepol/policydb/policydb.h> |
||||
@@ -258,6 +259,25 @@ int main(int argc, char **argv) |
||||
} |
||||
} |
||||
|
||||
+ if (policy_type != POLICY_BASE && outfile) { |
||||
+ char *mod_name = modpolicydb.name; |
||||
+ char *out_path = strdup(outfile); |
||||
+ if (out_path == NULL) { |
||||
+ fprintf(stderr, "%s: out of memory\n", argv[0]); |
||||
+ exit(1); |
||||
+ } |
||||
+ char *out_name = basename(out_path); |
||||
+ char *separator = strrchr(out_name, '.'); |
||||
+ if (separator) { |
||||
+ *separator = '\0'; |
||||
+ } |
||||
+ if (strcmp(mod_name, out_name) != 0) { |
||||
+ fprintf(stderr, "%s: Module name %s is different than the output base filename %s\n", argv[0], mod_name, out_name); |
||||
+ exit(1); |
||||
+ } |
||||
+ free(out_path); |
||||
+ } |
||||
+ |
||||
if (modpolicydb.policy_type == POLICY_BASE && !cil) { |
||||
/* Verify that we can successfully expand the base module. */ |
||||
policydb_t kernpolicydb; |
||||
@@ -294,7 +314,7 @@ int main(int argc, char **argv) |
||||
|
||||
if (!cil) { |
||||
printf("%s: writing binary representation (version %d) to %s\n", |
||||
- argv[0], policyvers, file); |
||||
+ argv[0], policyvers, outfile); |
||||
|
||||
if (write_binary_policy(&modpolicydb, outfp) != 0) { |
||||
fprintf(stderr, "%s: error writing %s\n", argv[0], outfile); |
||||
diff --git checkpolicy-2.5/checkpolicy.c checkpolicy-2.5/checkpolicy.c |
||||
index 9da661e..5bc0c56 100644 |
||||
--- checkpolicy-2.5/checkpolicy.c |
||||
+++ checkpolicy-2.5/checkpolicy.c |
||||
@@ -22,6 +22,7 @@ |
||||
* |
||||
* Policy Module support. |
||||
* |
||||
+ * Copyright (C) 2017 Mellanox Technologies Inc. |
||||
* Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
||||
* Copyright (C) 2003 - 2005 Tresys Technology, LLC |
||||
* Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> |
||||
@@ -64,13 +65,16 @@ |
||||
#include <sys/stat.h> |
||||
#include <sys/socket.h> |
||||
#include <netinet/in.h> |
||||
+#ifndef IPPROTO_DCCP |
||||
+#define IPPROTO_DCCP 33 |
||||
+#endif |
||||
#include <arpa/inet.h> |
||||
#include <fcntl.h> |
||||
#include <stdio.h> |
||||
#include <errno.h> |
||||
#include <sys/mman.h> |
||||
|
||||
-#ifdef DARWIN |
||||
+#ifdef __APPLE__ |
||||
#include <ctype.h> |
||||
#endif |
||||
|
||||
@@ -679,6 +683,8 @@ int main(int argc, char **argv) |
||||
printf("h) change a boolean value\n"); |
||||
printf("i) display constraint expressions\n"); |
||||
printf("j) display validatetrans expressions\n"); |
||||
+ printf("k) Call ibpkey_sid\n"); |
||||
+ printf("l) Call ibendport_sid\n"); |
||||
#ifdef EQUIVTYPES |
||||
printf("z) Show equivalent types\n"); |
||||
#endif |
||||
@@ -919,6 +925,8 @@ int main(int argc, char **argv) |
||||
protocol = IPPROTO_TCP; |
||||
else if (!strcmp(ans, "udp") || !strcmp(ans, "UDP")) |
||||
protocol = IPPROTO_UDP; |
||||
+ else if (!strcmp(ans, "dccp") || !strcmp(ans, "DCCP")) |
||||
+ protocol = IPPROTO_DCCP; |
||||
else { |
||||
printf("unknown protocol\n"); |
||||
break; |
||||
@@ -1198,6 +1206,50 @@ int main(int argc, char **argv) |
||||
"\nNo validatetrans expressions found.\n"); |
||||
} |
||||
break; |
||||
+ case 'k': |
||||
+ { |
||||
+ char *p; |
||||
+ struct in6_addr addr6; |
||||
+ uint64_t subnet_prefix; |
||||
+ unsigned int pkey; |
||||
+ |
||||
+ printf("subnet prefix? "); |
||||
+ FGETS(ans, sizeof(ans), stdin); |
||||
+ ans[strlen(ans) - 1] = 0; |
||||
+ p = (char *)&addr6; |
||||
+ |
||||
+ if (inet_pton(AF_INET6, ans, p) < 1) { |
||||
+ printf("error parsing subnet prefix\n"); |
||||
+ break; |
||||
+ } |
||||
+ |
||||
+ memcpy(&subnet_prefix, p, sizeof(subnet_prefix)); |
||||
+ printf("pkey? "); |
||||
+ FGETS(ans, sizeof(ans), stdin); |
||||
+ pkey = atoi(ans); |
||||
+ sepol_ibpkey_sid(subnet_prefix, pkey, &ssid); |
||||
+ printf("sid %d\n", ssid); |
||||
+ } |
||||
+ break; |
||||
+ case 'l': |
||||
+ printf("device name (eg. mlx4_0)? "); |
||||
+ FGETS(ans, sizeof(ans), stdin); |
||||
+ ans[strlen(ans) - 1] = 0; |
||||
+ |
||||
+ name = malloc((strlen(ans) + 1) * sizeof(char)); |
||||
+ if (!name) { |
||||
+ fprintf(stderr, "couldn't malloc string.\n"); |
||||
+ break; |
||||
+ } |
||||
+ strcpy(name, ans); |
||||
+ |
||||
+ printf("port? "); |
||||
+ FGETS(ans, sizeof(ans), stdin); |
||||
+ port = atoi(ans); |
||||
+ sepol_ibendport_sid(name, port, &ssid); |
||||
+ printf("sid %d\n", ssid); |
||||
+ free(name); |
||||
+ break; |
||||
#ifdef EQUIVTYPES |
||||
case 'z': |
||||
identify_equiv_types(); |
||||
diff --git checkpolicy-2.5/policy_define.c checkpolicy-2.5/policy_define.c |
||||
index ee20fea..f65958c 100644 |
||||
--- checkpolicy-2.5/policy_define.c |
||||
+++ checkpolicy-2.5/policy_define.c |
||||
@@ -20,6 +20,7 @@ |
||||
* Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
||||
* Copyright (C) 2003 - 2008 Tresys Technology, LLC |
||||
* Copyright (C) 2007 Red Hat Inc. |
||||
+ * Copyright (C) 2017 Mellanox Techonologies Inc. |
||||
* This program is free software; you can redistribute it and/or modify |
||||
* it under the terms of the GNU General Public License as published by |
||||
* the Free Software Foundation, version 2. |
||||
@@ -36,6 +37,9 @@ |
||||
#include <string.h> |
||||
#include <sys/socket.h> |
||||
#include <netinet/in.h> |
||||
+#ifndef IPPROTO_DCCP |
||||
+#define IPPROTO_DCCP 33 |
||||
+#endif |
||||
#include <arpa/inet.h> |
||||
#include <stdlib.h> |
||||
#include <limits.h> |
||||
@@ -4876,6 +4880,8 @@ int define_port_context(unsigned int low, unsigned int high) |
||||
protocol = IPPROTO_TCP; |
||||
} else if ((strcmp(id, "udp") == 0) || (strcmp(id, "UDP") == 0)) { |
||||
protocol = IPPROTO_UDP; |
||||
+ } else if ((strcmp(id, "dccp") == 0) || (strcmp(id, "DCCP") == 0)) { |
||||
+ protocol = IPPROTO_DCCP; |
||||
} else { |
||||
yyerror2("unrecognized protocol %s", id); |
||||
free(newc); |
||||
@@ -4931,6 +4937,192 @@ int define_port_context(unsigned int low, unsigned int high) |
||||
return -1; |
||||
} |
||||
|
||||
+int define_ibpkey_context(unsigned int low, unsigned int high) |
||||
+{ |
||||
+ ocontext_t *newc, *c, *l, *head; |
||||
+ struct in6_addr subnet_prefix; |
||||
+ char *id; |
||||
+ int rc = 0; |
||||
+ |
||||
+ if (policydbp->target_platform != SEPOL_TARGET_SELINUX) { |
||||
+ yyerror("ibpkeycon not supported for target"); |
||||
+ return -1; |
||||
+ } |
||||
+ |
||||
+ if (pass == 1) { |
||||
+ id = (char *)queue_remove(id_queue); |
||||
+ free(id); |
||||
+ parse_security_context(NULL); |
||||
+ return 0; |
||||
+ } |
||||
+ |
||||
+ newc = malloc(sizeof(*newc)); |
||||
+ if (!newc) { |
||||
+ yyerror("out of memory"); |
||||
+ return -1; |
||||
+ } |
||||
+ memset(newc, 0, sizeof(*newc)); |
||||
+ |
||||
+ id = queue_remove(id_queue); |
||||
+ if (!id) { |
||||
+ yyerror("failed to read the subnet prefix"); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ rc = inet_pton(AF_INET6, id, &subnet_prefix); |
||||
+ free(id); |
||||
+ if (rc < 1) { |
||||
+ yyerror("failed to parse the subnet prefix"); |
||||
+ if (rc == 0) |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ if (subnet_prefix.s6_addr[2] || subnet_prefix.s6_addr[3]) { |
||||
+ yyerror("subnet prefix should be 0's in the low order 64 bits."); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ if (low > 0xffff || high > 0xffff) { |
||||
+ yyerror("pkey value too large, pkeys are 16 bits."); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ memcpy(&newc->u.ibpkey.subnet_prefix, &subnet_prefix.s6_addr[0], |
||||
+ sizeof(newc->u.ibpkey.subnet_prefix)); |
||||
+ |
||||
+ newc->u.ibpkey.low_pkey = low; |
||||
+ newc->u.ibpkey.high_pkey = high; |
||||
+ |
||||
+ if (low > high) { |
||||
+ yyerror2("low pkey %d exceeds high pkey %d", low, high); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ rc = parse_security_context(&newc->context[0]); |
||||
+ if (rc) |
||||
+ goto out; |
||||
+ |
||||
+ /* Preserve the matching order specified in the configuration. */ |
||||
+ head = policydbp->ocontexts[OCON_IBPKEY]; |
||||
+ for (l = NULL, c = head; c; l = c, c = c->next) { |
||||
+ unsigned int low2, high2; |
||||
+ |
||||
+ low2 = c->u.ibpkey.low_pkey; |
||||
+ high2 = c->u.ibpkey.high_pkey; |
||||
+ |
||||
+ if (low == low2 && high == high2 && |
||||
+ c->u.ibpkey.subnet_prefix == newc->u.ibpkey.subnet_prefix) { |
||||
+ yyerror2("duplicate ibpkeycon entry for %d-%d ", |
||||
+ low, high); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ if (low2 <= low && high2 >= high && |
||||
+ c->u.ibpkey.subnet_prefix == newc->u.ibpkey.subnet_prefix) { |
||||
+ yyerror2("ibpkeycon entry for %d-%d hidden by earlier entry for %d-%d", |
||||
+ low, high, low2, high2); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ } |
||||
+ |
||||
+ if (l) |
||||
+ l->next = newc; |
||||
+ else |
||||
+ policydbp->ocontexts[OCON_IBPKEY] = newc; |
||||
+ |
||||
+ return 0; |
||||
+ |
||||
+out: |
||||
+ free(newc); |
||||
+ return rc; |
||||
+} |
||||
+ |
||||
+int define_ibendport_context(unsigned int port) |
||||
+{ |
||||
+ ocontext_t *newc, *c, *l, *head; |
||||
+ char *id; |
||||
+ int rc = 0; |
||||
+ |
||||
+ if (policydbp->target_platform != SEPOL_TARGET_SELINUX) { |
||||
+ yyerror("ibendportcon not supported for target"); |
||||
+ return -1; |
||||
+ } |
||||
+ |
||||
+ if (pass == 1) { |
||||
+ id = (char *)queue_remove(id_queue); |
||||
+ free(id); |
||||
+ parse_security_context(NULL); |
||||
+ return 0; |
||||
+ } |
||||
+ |
||||
+ if (port > 0xff || port == 0) { |
||||
+ yyerror("Invalid ibendport port number, should be 0 < port < 256"); |
||||
+ return -1; |
||||
+ } |
||||
+ |
||||
+ newc = malloc(sizeof(*newc)); |
||||
+ if (!newc) { |
||||
+ yyerror("out of memory"); |
||||
+ return -1; |
||||
+ } |
||||
+ memset(newc, 0, sizeof(*newc)); |
||||
+ |
||||
+ newc->u.ibendport.dev_name = queue_remove(id_queue); |
||||
+ if (!newc->u.ibendport.dev_name) { |
||||
+ yyerror("failed to read infiniband device name."); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ if (strlen(newc->u.ibendport.dev_name) > IB_DEVICE_NAME_MAX - 1) { |
||||
+ yyerror("infiniband device name exceeds max length of 63."); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ |
||||
+ newc->u.ibendport.port = port; |
||||
+ |
||||
+ if (parse_security_context(&newc->context[0])) { |
||||
+ free(newc); |
||||
+ return -1; |
||||
+ } |
||||
+ |
||||
+ /* Preserve the matching order specified in the configuration. */ |
||||
+ head = policydbp->ocontexts[OCON_IBENDPORT]; |
||||
+ for (l = NULL, c = head; c; l = c, c = c->next) { |
||||
+ unsigned int port2; |
||||
+ |
||||
+ port2 = c->u.ibendport.port; |
||||
+ |
||||
+ if (port == port2 && |
||||
+ !strcmp(c->u.ibendport.dev_name, |
||||
+ newc->u.ibendport.dev_name)) { |
||||
+ yyerror2("duplicate ibendportcon entry for %s port %u", |
||||
+ newc->u.ibendport.dev_name, port); |
||||
+ rc = -1; |
||||
+ goto out; |
||||
+ } |
||||
+ } |
||||
+ |
||||
+ if (l) |
||||
+ l->next = newc; |
||||
+ else |
||||
+ policydbp->ocontexts[OCON_IBENDPORT] = newc; |
||||
+ |
||||
+ return 0; |
||||
+ |
||||
+out: |
||||
+ free(newc->u.ibendport.dev_name); |
||||
+ free(newc); |
||||
+ return rc; |
||||
+} |
||||
+ |
||||
int define_netif_context(void) |
||||
{ |
||||
ocontext_t *newc, *c, *head; |
||||
@@ -5135,7 +5327,7 @@ int define_ipv6_node_context(void) |
||||
|
||||
memset(newc, 0, sizeof(ocontext_t)); |
||||
|
||||
-#ifdef DARWIN |
||||
+#ifdef __APPLE__ |
||||
memcpy(&newc->u.node6.addr[0], &addr.s6_addr[0], 16); |
||||
memcpy(&newc->u.node6.mask[0], &mask.s6_addr[0], 16); |
||||
#else |
||||
diff --git checkpolicy-2.5/policy_define.h checkpolicy-2.5/policy_define.h |
||||
index 964baae..3282aed 100644 |
||||
--- checkpolicy-2.5/policy_define.h |
||||
+++ checkpolicy-2.5/policy_define.h |
||||
@@ -43,6 +43,8 @@ int define_level(void); |
||||
int define_netif_context(void); |
||||
int define_permissive(void); |
||||
int define_polcap(void); |
||||
+int define_ibpkey_context(unsigned int low, unsigned int high); |
||||
+int define_ibendport_context(unsigned int port); |
||||
int define_port_context(unsigned int low, unsigned int high); |
||||
int define_pirq_context(unsigned int pirq); |
||||
int define_iomem_context(uint64_t low, uint64_t high); |
||||
diff --git checkpolicy-2.5/policy_parse.y checkpolicy-2.5/policy_parse.y |
||||
index 3b6a2f8..35b7a33 100644 |
||||
--- checkpolicy-2.5/policy_parse.y |
||||
+++ checkpolicy-2.5/policy_parse.y |
||||
@@ -21,6 +21,7 @@ |
||||
* Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
||||
* Copyright (C) 2003 - 2008 Tresys Technology, LLC |
||||
* Copyright (C) 2007 Red Hat Inc. |
||||
+ * Copyright (C) 2017 Mellanox Technologies Inc. |
||||
* This program is free software; you can redistribute it and/or modify |
||||
* it under the terms of the GNU General Public License as published by |
||||
* the Free Software Foundation, version 2. |
||||
@@ -134,6 +135,8 @@ typedef int (* require_func_t)(int pass); |
||||
%token TARGET |
||||
%token SAMEUSER |
||||
%token FSCON PORTCON NETIFCON NODECON |
||||
+%token IBPKEYCON |
||||
+%token IBENDPORTCON |
||||
%token PIRQCON IOMEMCON IOPORTCON PCIDEVICECON DEVICETREECON |
||||
%token FSUSEXATTR FSUSETASK FSUSETRANS |
||||
%token GENFSCON |
||||
@@ -169,7 +172,7 @@ base_policy : { if (define_policy(pass, 0) == -1) return -1; } |
||||
opt_default_rules opt_mls te_rbac users opt_constraints |
||||
{ if (pass == 1) { if (policydb_index_bools(policydbp)) return -1;} |
||||
else if (pass == 2) { if (policydb_index_others(NULL, policydbp, 0)) return -1;}} |
||||
- initial_sid_contexts opt_fs_contexts opt_fs_uses opt_genfs_contexts net_contexts opt_dev_contexts |
||||
+ initial_sid_contexts opt_fs_contexts opt_fs_uses opt_genfs_contexts net_contexts opt_dev_contexts opt_ibpkey_contexts opt_ibendport_contexts |
||||
; |
||||
classes : class_def |
||||
| classes class_def |
||||
@@ -695,7 +698,7 @@ fs_contexts : fs_context_def |
||||
fs_context_def : FSCON number number security_context_def security_context_def |
||||
{if (define_fs_context($2,$3)) return -1;} |
||||
; |
||||
-net_contexts : opt_port_contexts opt_netif_contexts opt_node_contexts |
||||
+net_contexts : opt_port_contexts opt_netif_contexts opt_node_contexts |
||||
; |
||||
opt_port_contexts : port_contexts |
||||
| |
||||
@@ -708,6 +711,26 @@ port_context_def : PORTCON identifier number security_context_def |
||||
| PORTCON identifier number '-' number security_context_def |
||||
{if (define_port_context($3,$5)) return -1;} |
||||
; |
||||
+opt_ibpkey_contexts : ibpkey_contexts |
||||
+ | |
||||
+ ; |
||||
+ibpkey_contexts : ibpkey_context_def |
||||
+ | ibpkey_contexts ibpkey_context_def |
||||
+ ; |
||||
+ibpkey_context_def : IBPKEYCON ipv6_addr number security_context_def |
||||
+ {if (define_ibpkey_context($3,$3)) return -1;} |
||||
+ | IBPKEYCON ipv6_addr number '-' number security_context_def |
||||
+ {if (define_ibpkey_context($3,$5)) return -1;} |
||||
+ ; |
||||
+opt_ibendport_contexts : ibendport_contexts |
||||
+ | |
||||
+ ; |
||||
+ibendport_contexts : ibendport_context_def |
||||
+ | ibendport_contexts ibendport_context_def |
||||
+ ; |
||||
+ibendport_context_def : IBENDPORTCON identifier number security_context_def |
||||
+ {if (define_ibendport_context($3)) return -1;} |
||||
+ ; |
||||
opt_netif_contexts : netif_contexts |
||||
| |
||||
; |
||||
diff --git checkpolicy-2.5/policy_scan.l checkpolicy-2.5/policy_scan.l |
||||
index 22da338..f38dd22 100644 |
||||
--- checkpolicy-2.5/policy_scan.l |
||||
+++ checkpolicy-2.5/policy_scan.l |
||||
@@ -12,6 +12,7 @@ |
||||
* Added support for binary policy modules |
||||
* |
||||
* Copyright (C) 2003-5 Tresys Technology, LLC |
||||
+ * Copyright (C) 2017 Mellanox Technologies Inc. |
||||
* This program is free software; you can redistribute it and/or modify |
||||
* it under the terms of the GNU General Public License as published by |
||||
* the Free Software Foundation, version 2. |
||||
@@ -181,6 +182,10 @@ INCOMP | |
||||
incomp { return(INCOMP);} |
||||
fscon | |
||||
FSCON { return(FSCON);} |
||||
+ibpkeycon | |
||||
+IBPKEYCON { return(IBPKEYCON);} |
||||
+ibendportcon | |
||||
+IBENDPORTCON { return(IBENDPORTCON);} |
||||
portcon | |
||||
PORTCON { return(PORTCON);} |
||||
netifcon | |
||||
@@ -249,9 +254,9 @@ high | |
||||
HIGH { return(HIGH); } |
||||
low | |
||||
LOW { return(LOW); } |
||||
-"/"({alnum}|[_\.\-/])* { return(PATH); } |
||||
-\""/"[ !#-~]*\" { return(QPATH); } |
||||
-\"({alnum}|[_\.\-\+\~\: ])+\" { return(FILENAME); } |
||||
+"/"[^ \n\r\t\f]* { return(PATH); } |
||||
+\""/"[^\"\n]*\" { return(QPATH); } |
||||
+\"[^"/"\"\n]+\" { return(FILENAME); } |
||||
{letter}({alnum}|[_\-])*([\.]?({alnum}|[_\-]))* { return(IDENTIFIER); } |
||||
{digit}+|0x{hexval}+ { return(NUMBER); } |
||||
{alnum}*{letter}{alnum}* { return(FILESYSTEM); } |
||||
diff --git checkpolicy-2.5/test/dismod.c checkpolicy-2.5/test/dismod.c |
||||
index 08b039d..c91ab93 100644 |
||||
--- checkpolicy-2.5/test/dismod.c |
||||
+++ checkpolicy-2.5/test/dismod.c |
||||
@@ -243,6 +243,13 @@ int display_avrule(avrule_t * avrule, policydb_t * policy, |
||||
} |
||||
} else if (avrule->specified & AVRULE_NEVERALLOW) { |
||||
fprintf(fp, " neverallow"); |
||||
+ } else if (avrule->specified & AVRULE_XPERMS) { |
||||
+ if (avrule->specified & AVRULE_XPERMS_ALLOWED) |
||||
+ fprintf(fp, "allowxperm "); |
||||
+ else if (avrule->specified & AVRULE_XPERMS_AUDITALLOW) |
||||
+ fprintf(fp, "auditallowxperm "); |
||||
+ else if (avrule->specified & AVRULE_XPERMS_DONTAUDIT) |
||||
+ fprintf(fp, "dontauditxperm "); |
||||
} else { |
||||
fprintf(fp, " ERROR: no valid rule type specified\n"); |
||||
return -1; |
||||
@@ -282,6 +289,24 @@ int display_avrule(avrule_t * avrule, policydb_t * policy, |
||||
policy, fp); |
||||
} else if (avrule->specified & AVRULE_TYPE) { |
||||
display_id(policy, fp, SYM_TYPES, avrule->perms->data - 1, ""); |
||||
+ } else if (avrule->specified & AVRULE_XPERMS) { |
||||
+ avtab_extended_perms_t xperms; |
||||
+ int i; |
||||
+ |
||||
+ if (avrule->xperms->specified == AVRULE_XPERMS_IOCTLFUNCTION) |
||||
+ xperms.specified = AVTAB_XPERMS_IOCTLFUNCTION; |
||||
+ else if (avrule->xperms->specified == AVRULE_XPERMS_IOCTLDRIVER) |
||||
+ xperms.specified = AVTAB_XPERMS_IOCTLDRIVER; |
||||
+ else { |
||||
+ fprintf(fp, " ERROR: no valid xperms specified\n"); |
||||
+ return -1; |
||||
+ } |
||||
+ |
||||
+ xperms.driver = avrule->xperms->driver; |
||||
+ for (i = 0; i < EXTENDED_PERMS_LEN; i++) |
||||
+ xperms.perms[i] = avrule->xperms->perms[i]; |
||||
+ |
||||
+ fprintf(fp, "%s", sepol_extended_perms_to_string(&xperms)); |
||||
} |
||||
|
||||
fprintf(fp, ";\n"); |
||||
diff --git checkpolicy-2.5/test/dispol.c checkpolicy-2.5/test/dispol.c |
||||
index 86f5688..a78ce81 100644 |
||||
--- checkpolicy-2.5/test/dispol.c |
||||
+++ checkpolicy-2.5/test/dispol.c |
||||
@@ -252,11 +252,11 @@ int display_cond_expressions(policydb_t * p, FILE * fp) |
||||
int display_handle_unknown(policydb_t * p, FILE * out_fp) |
||||
{ |
||||
if (p->handle_unknown == ALLOW_UNKNOWN) |
||||
- fprintf(out_fp, "Allow unknown classes and permisions\n"); |
||||
+ fprintf(out_fp, "Allow unknown classes and permissions\n"); |
||||
else if (p->handle_unknown == DENY_UNKNOWN) |
||||
- fprintf(out_fp, "Deny unknown classes and permisions\n"); |
||||
+ fprintf(out_fp, "Deny unknown classes and permissions\n"); |
||||
else if (p->handle_unknown == REJECT_UNKNOWN) |
||||
- fprintf(out_fp, "Reject unknown classes and permisions\n"); |
||||
+ fprintf(out_fp, "Reject unknown classes and permissions\n"); |
||||
return 0; |
||||
} |
||||
|
||||
@@ -349,7 +349,7 @@ int menu(void) |
||||
printf("\nSelect a command:\n"); |
||||
printf("1) display unconditional AVTAB\n"); |
||||
printf("2) display conditional AVTAB (entirely)\n"); |
||||
- printf("3) display conditional AVTAG (only ENABLED rules)\n"); |
||||
+ printf("3) display conditional AVTAB (only ENABLED rules)\n"); |
||||
printf("4) display conditional AVTAB (only DISABLED rules)\n"); |
||||
printf("5) display conditional bools\n"); |
||||
printf("6) display conditional expressions\n"); |
@ -0,0 +1,836 @@
@@ -0,0 +1,836 @@
|
||||
%define libselinuxver 2.5-12 |
||||
%define libsepolver 2.5-8 |
||||
Summary: SELinux policy compiler |
||||
Name: checkpolicy |
||||
Version: 2.5 |
||||
Release: 6%{?dist} |
||||
License: GPLv2 |
||||
Group: Development/System |
||||
Source: https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20160223/checkpolicy-2.5.tar.gz |
||||
# HEAD f4e2ab4e29496130bc89dddf8096e9367b25665b |
||||
Patch1: checkpolicy-rhel.patch |
||||
|
||||
BuildRoot: %{_tmppath}/%{name}-buildroot |
||||
BuildRequires: byacc bison flex flex-static libsepol-static >= %{libsepolver} libselinux-devel >= %{libselinuxver} |
||||
|
||||
%description |
||||
Security-enhanced Linux is a feature of the Linux® kernel and a number |
||||
of utilities with enhanced security functionality designed to add |
||||
mandatory access controls to Linux. The Security-enhanced Linux |
||||
kernel contains new architectural components originally developed to |
||||
improve the security of the Flask operating system. These |
||||
architectural components provide general support for the enforcement |
||||
of many kinds of mandatory access control policies, including those |
||||
based on the concepts of Type Enforcement®, Role-based Access |
||||
Control, and Multi-level Security. |
||||
|
||||
This package contains checkpolicy, the SELinux policy compiler. |
||||
Only required for building policies. |
||||
|
||||
%prep |
||||
%setup -q -n checkpolicy-2.5 |
||||
%patch1 -p1 -b .rhel |
||||
|
||||
%build |
||||
make clean |
||||
make LIBDIR="%{_libdir}" CFLAGS="%{optflags}" |
||||
cd test |
||||
make LIBDIR="%{_libdir}" CFLAGS="%{optflags}" |
||||
|
||||
%install |
||||
rm -rf ${RPM_BUILD_ROOT} |
||||
mkdir -p ${RPM_BUILD_ROOT}%{_bindir} |
||||
make LIBDIR="%{_libdir}" DESTDIR="${RPM_BUILD_ROOT}" install |
||||
install test/dismod ${RPM_BUILD_ROOT}%{_bindir}/sedismod |
||||
install test/dispol ${RPM_BUILD_ROOT}%{_bindir}/sedispol |
||||
|
||||
%clean |
||||
rm -rf ${RPM_BUILD_ROOT} |
||||
|
||||
%files |
||||
%defattr(-,root,root) |
||||
%{!?_licensedir:%global license %%doc} |
||||
%license COPYING |
||||
%{_bindir}/checkpolicy |
||||
%{_bindir}/checkmodule |
||||
%{_mandir}/man8/checkpolicy.8.gz |
||||
%{_mandir}/man8/checkmodule.8.gz |
||||
%{_bindir}/sedismod |
||||
%{_bindir}/sedispol |
||||
|
||||
%changelog |
||||
* Thu Oct 19 2017 Vit Mojzis <vmojzis@redhat.com> - 2.5-6 |
||||
- Add ibendport ocontext handling |
||||
- Add support for ibendportcon labels |
||||
- Add ibpkey ocontext handling |
||||
- Add support for ibpkeycon labels |
||||
- Add binary module support for xperms |
||||
|
||||
* Mon Sep 25 2017 Vit Mojzis <vmojzis@redhat.com> - 2.5-5 |
||||
- Rebuild to incorporate cgroup_seclabel capability introduced in libsepol (rhbz#1494179) |
||||
|
||||
* Thu Aug 11 2016 Petr Lautrbach <plautrba@redhat.com> 2.5-4 |
||||
- Extend checkpolicy pathname matching |
||||
|
||||
* Mon Jun 27 2016 Petr Lautrbach <plautrba@redhat.com> - 2.5-3 |
||||
- Fix typos in test/dispol |
||||
- Set flex as default lexer |
||||
- Fix checkmodule output message |
||||
- Build policy on systems not supporting DCCP protocol |
||||
- Fail if module name different than output base filename |
||||
|
||||
* Mon Apr 11 2016 Petr Lautrbach <plautrba@redhat.com> - 2.5-2 |
||||
- Add support for portcon dccp protocol |
||||
|
||||
* Tue Feb 23 2016 Petr Lautrbach <plautrba@redhat.com> 2.5-1 |
||||
- Update to upstream release 2016-02-23 |
||||
|
||||
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 2.1.12-6 |
||||
- Mass rebuild 2014-01-24 |
||||
|
||||
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 2.1.12-5 |
||||
- Mass rebuild 2013-12-27 |
||||
|
||||
* Tue Jul 16 2013 Dan Walsh <dwalsh@redhat.com> - 2.1.12-4 |
||||
- Fix a segmentation fault if the --handle-unknown option was set without |
||||
arguments. |
||||
- Thanks to Alexandre Rebert and his team at Carnegie Mellon University |
||||
for detecting this crash. |
||||
|
||||
* Tue Mar 19 2013 Dan Walsh <dwalsh@redhat.com> - 2.1.12-3 |
||||
- ":" should be allowed for file trans names |
||||
|
||||
* Tue Mar 12 2013 Dan Walsh <dwalsh@redhat.com> - 2.1.12-2 |
||||
- Space should be allowed for file trans names |
||||
|
||||
* Thu Feb 7 2013 Dan Walsh <dwalsh@redhat.com> - 2.1.12-1 |
||||
- Update to upstream |
||||
* Fix errors found by coverity |
||||
* implement default type policy syntax |
||||
* Free allocated memory when clean up / exit. |
||||
|
||||
* Sat Jan 5 2013 Dan Walsh <dwalsh@redhat.com> - 2.1.11-3 |
||||
- Update to latest patches from eparis/Upstream |
||||
- checkpolicy: libsepol: implement default type policy syntax |
||||
- |
||||
- We currently have a mechanism in which the default user, role, and range |
||||
- can be picked up from the source or the target object. This implements |
||||
- the same thing for types. The kernel will override this with type |
||||
- transition rules and similar. This is just the default if nothing |
||||
- specific is given. |
||||
|
||||
|
||||
* Wed Sep 19 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.11-2 |
||||
- Rebuild with fixed libsepol |
||||
|
||||
* Thu Sep 13 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.11-1 |
||||
- Update to upstream |
||||
* fd leak reading policy |
||||
* check return code on ebitmap_set_bit |
||||
|
||||
* Mon Jul 30 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.10-4 |
||||
- Rebuild to grab latest libsepol |
||||
|
||||
* Tue Jul 24 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.10-3 |
||||
- Rebuild to grab latest libsepol |
||||
|
||||
* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.1.10-2 |
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild |
||||
|
||||
* Wed Jul 4 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.10-1 |
||||
- Update to upstream |
||||
* sepolgen: We need to support files that have a + in them |
||||
* Android/MacOS X build support |
||||
|
||||
* Mon Apr 23 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.9-4 |
||||
- Rebuild to get latest libsepol which fixes the file_name transition problems |
||||
|
||||
* Tue Apr 17 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.9-3 |
||||
- Recompile with libsepol that has support for ptrace_child |
||||
|
||||
* Tue Apr 3 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.9-2 |
||||
- Allow checkpolicy to use + in a file name |
||||
|
||||
* Thu Mar 29 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.9-1 |
||||
- Update to upstream |
||||
* implement new default labeling behaviors for usr, role, range |
||||
* Fix dead links to www.nsa.gov/selinux |
||||
|
||||
* Mon Jan 16 2012 Dan Walsh <dwalsh@redhat.com> - 2.1.8-3 |
||||
- Fix man page to link to www.nsa.giv/research/selinux |
||||
|
||||
* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.1.8-2 |
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild |
||||
|
||||
* Wed Dec 21 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.8-1 |
||||
-Update to upstream |
||||
* add ignoredirs config for genhomedircon |
||||
* Fallback_user_level can be NULL if you are not using MLS |
||||
|
||||
* Wed Dec 21 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-3 |
||||
- default_rules should be optional |
||||
|
||||
* Thu Dec 15 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-2 |
||||
- Rebuild with latest libsepol |
||||
|
||||
* Tue Dec 6 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-1 |
||||
- Upgrade to upstream |
||||
* dis* fixed signed vs unsigned errors |
||||
* dismod: fix unused parameter errors |
||||
* test: Makefile: include -W and -Werror |
||||
* allow ~ in filename transition rules |
||||
- Allow policy to specify the source of target for generating the default user,role |
||||
- or mls label for a new target. |
||||
|
||||
* Mon Nov 14 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.6-2 |
||||
- Allow ~ in a filename |
||||
|
||||
* Fri Nov 4 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.6-1 |
||||
- Upgrade to upstream |
||||
* Revert "checkpolicy: Redo filename/filesystem syntax to support filename trans rules" |
||||
* drop libsepol dynamic link in checkpolicy |
||||
|
||||
* Tue Sep 20 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.5-2 |
||||
- Fix checkpolicy to ignore '"' in filename trans rules |
||||
|
||||
* Mon Sep 19 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.5-1 |
||||
-Update to upstream |
||||
* Separate tunable from boolean during compile. |
||||
|
||||
* Tue Aug 30 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.4-0 |
||||
-Update to upstream |
||||
* checkpolicy: fix spacing in output message |
||||
|
||||
* Thu Aug 18 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.3-0 |
||||
* add missing ; to attribute_role_def |
||||
*Redo filename/filesystem syntax to support filename trans |
||||
|
||||
* Wed Aug 3 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.2-0 |
||||
-Update to upstream |
||||
* .gitignore changes |
||||
* dispol output of role trans |
||||
* man page update: build a module with an older policy version |
||||
|
||||
* Thu Jul 28 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.1-0 |
||||
-Update to upstream |
||||
* Minor updates to filename trans rule output in dis{mod,pol} |
||||
|
||||
* Thu Jul 28 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.0-1 |
||||
-Update to upstream |
||||
|
||||
* Mon May 23 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.26-1 |
||||
-Update to upstream |
||||
* Wrap file names in filename transitions with quotes by Steve Lawrence. |
||||
* Allow filesystem names to start with a digit by James Carter. |
||||
* Add support for using the last path compnent in type transitions by Eric |
||||
|
||||
* Thu Apr 21 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.24-2 |
||||
* Fixes for new role_transition class field by Eric Paris. |
||||
|
||||
* Fri Apr 15 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.24-2 |
||||
- Add "-" as a file type |
||||
|
||||
* Tue Apr 12 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.24-1 |
||||
-Update to upstream |
||||
* Add new class field in role_transition by Harry Ciao. |
||||
|
||||
* Mon Apr 11 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.23-5 |
||||
- Fix type_transition to allow all files |
||||
|
||||
* Tue Mar 29 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.23-4 |
||||
- Patches from Eric Paris |
||||
We just use random numbers to make menu selections. Use #defines and |
||||
names that make some sense instead. |
||||
|
||||
This patch adds support for using the last path component as part of the |
||||
information in making labeling decisions for new objects. A example |
||||
rule looks like so: |
||||
|
||||
type_transition unconfined_t etc_t:file system_conf_t eric; |
||||
|
||||
This rule says if unconfined_t creates a file in a directory labeled |
||||
etc_t and the last path component is "eric" (no globbing, no matching |
||||
magic, just exact strcmp) it should be labeled system_conf_t. |
||||
|
||||
The kernel and policy representation does not have support for such |
||||
rules in conditionals, and thus policy explicitly notes that fact if |
||||
such a rule is added to a conditional. |
||||
|
||||
|
||||
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.0.23-3 |
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild |
||||
|
||||
* Wed Jan 12 2011 Dan Walsh <dwalsh@redhat.com> - 2.0.23-2 |
||||
- Add James Carters Patch |
||||
*This patch is needed because some filesystem names (such as 9p) start |
||||
with a digit. |
||||
|
||||
* Tue Dec 21 2010 Dan Walsh <dwalsh@redhat.com> - 2.0.23-1 |
||||
- Latest update from NSA |
||||
* Remove unused variables to fix compliation under GCC 4.6 by Justin Mattock |
||||
|
||||
* Wed Dec 8 2010 Dan Walsh <dwalsh@redhat.com> - 2.0.22-2 |
||||
- Rebuild to make sure it will build in Fedora |
||||
|
||||
* Wed Jun 16 2010 Dan Walsh <dwalsh@redhat.com> - 2.0.22-1 |
||||
- Latest update from NSA |
||||
* Update checkmodule man page and usage by Daniel Walsh and Steve Lawrence |
||||
- Allow policy version to be one number |
||||
|
||||
* Mon May 3 2010 Dan Walsh <dwalsh@redhat.com> - 2.0.21-2 |
||||
- Fix checkmodule man page and usage statements |
||||
|
||||
* Sun Nov 1 2009 Dan Walsh <dwalsh@redhat.com> - 2.0.21-1 |
||||
- Latest update from NSA |
||||
* Add support for building Xen policies from Paul Nuzzi. |
||||
* Add long options to checkpolicy and checkmodule by Guido |
||||
Trentalancia <guido@trentalancia.com> |
||||
|
||||
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.0.19-3 |
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild |
||||
|
||||
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.0.19-2 |
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild |
||||
|
||||
* Wed Feb 18 2009 Dan Walsh <dwalsh@redhat.com> - 2.0.19-1 |
||||
- Latest update from NSA |
||||
* Fix alias field in module format, caused by boundary format change |
||||
from Caleb Case. |
||||
|
||||
* Fri Jan 30 2009 Dan Walsh <dwalsh@redhat.com> - 2.0.18-1 |
||||
- Latest update from NSA |
||||
* Properly escape regex symbols in the lexer from Stephen Smalley. |
||||
* Add bounds support from KaiGai Kohei. |
||||
|
||||
* Tue Oct 28 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.16-4 |
||||
|
||||
* Mon Jul 7 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.16-3 |
||||
- Rebuild with new libsepol |
||||
|
||||
* Wed May 28 2008 Tom "spot" Callaway <tcallawa@redhat.com> 2.0.16-2 |
||||
- fix license tag |
||||
|
||||
* Wed May 28 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.16-1 |
||||
- Latest update from NSA |
||||
* Update checkpolicy for user and role mapping support from Joshua Brindle. |
||||
|
||||
* Fri May 2 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.15-1 |
||||
- Latest update from NSA |
||||
* Fix for policy module versions that look like IPv4 addresses from Jim Carter. |
||||
Resolves bug 444451. |
||||
|
||||
* Fri May 2 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.14-2 |
||||
- Allow modules with 4 sections or more |
||||
|
||||
* Thu Mar 27 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.14-1 |
||||
- Latest update from NSA |
||||
* Add permissive domain support from Eric Paris. |
||||
|
||||
* Thu Mar 13 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.13-1 |
||||
- Latest update from NSA |
||||
* Split out non-grammar parts of policy_parse.yacc into |
||||
policy_define.c and policy_define.h from Todd C. Miller. |
||||
* Initialize struct policy_file before using it, from Todd C. Miller. |
||||
* Remove unused define, move variable out of .y file, simplify COND_ERR, from Todd C. Miller. |
||||
|
||||
* Thu Feb 28 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.10-1 |
||||
- Latest update from NSA |
||||
* Use yyerror2() where appropriate from Todd C. Miller. |
||||
- Build against latest libsepol |
||||
|
||||
* Fri Feb 22 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.9-2 |
||||
- Start shipping sedismod and sedispol |
||||
|
||||
* Mon Feb 4 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.9-1 |
||||
- Latest update from NSA |
||||
* Update dispol for libsepol avtab changes from Stephen Smalley. |
||||
|
||||
* Fri Jan 25 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.8-1 |
||||
- Latest update from NSA |
||||
* Deprecate role dominance in parser. |
||||
|
||||
* Mon Jan 21 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.7-2 |
||||
- Update to use libsepol-static library |
||||
|
||||
* Fri Jan 11 2008 Dan Walsh <dwalsh@redhat.com> - 2.0.7-1 |
||||
- Latest update from NSA |
||||
* Added support for policy capabilities from Todd Miller. |
||||
|
||||
* Thu Nov 15 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.6-1 |
||||
- Latest update from NSA |
||||
* Initialize the source file name from the command line argument so that checkpolicy/checkmodule report something more useful than "unknown source". |
||||
* Merged remove use of REJECT and trailing context in lex rules; make ipv4 address parsing like ipv6 from James Carter. |
||||
|
||||
* Tue Sep 18 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.4-1 |
||||
* Merged handle unknown policydb flag support from Eric Paris. |
||||
Adds new command line options -U {allow, reject, deny} for selecting |
||||
the flag when a base module or kernel policy is built. |
||||
|
||||
* Tue Aug 28 2007 Fedora Release Engineering <rel-eng at fedoraproject dot org> - 2.0.3-3 |
||||
- Rebuild for selinux ppc32 issue. |
||||
|
||||
* Mon Jun 18 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.3-2 |
||||
- Rebuild with the latest libsepol |
||||
|
||||
* Sun Jun 17 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.3-1 |
||||
- Latest update from NSA |
||||
* Merged fix for segfault on duplicate require of sensitivity from Caleb Case. |
||||
* Merged fix for dead URLs in checkpolicy man pages from Dan Walsh. |
||||
|
||||
* Thu Apr 12 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.2-1 |
||||
- Latest update from NSA |
||||
* Merged checkmodule man page fix from Dan Walsh. |
||||
|
||||
* Fri Mar 30 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.1-3 |
||||
- Rebuild with new libsepol |
||||
|
||||
* Wed Mar 28 2007 Dan Walsh <dwalsh@redhat.com> - 2.0.1-2 |
||||
- Rebuild with new libsepol |
||||
|
||||
* Mon Nov 20 2006 Dan Walsh <dwalsh@redhat.com> - 2.0.1-1 |
||||
- Latest update from NSA |
||||
* Merged patch to allow dots in class identifiers from Caleb Case. |
||||
|
||||
* Tue Nov 14 2006 Dan Walsh <dwalsh@redhat.com> - 2.0.0-1 |
||||
- Latest update from NSA |
||||
* Merged patch to use new libsepol error codes by Karl MacMillan. |
||||
* Updated version for stable branch. |
||||
|
||||
* Tue Nov 14 2006 Dan Walsh <dwalsh@redhat.com> - 1.33.1-2 |
||||
- Rebuild for new libraries |
||||
|
||||
* Tue Nov 14 2006 Dan Walsh <dwalsh@redhat.com> - 1.33.1-1 |
||||
- Latest update from NSA |
||||
* Collapse user identifiers and identifiers together. |
||||
|
||||
* Tue Oct 17 2006 Dan Walsh <dwalsh@redhat.com> - 1.32-1 |
||||
- Latest update from NSA |
||||
* Updated version for release. |
||||
|
||||
* Thu Sep 28 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.12-1 |
||||
- Latest update from NSA |
||||
* Merged user and range_transition support for modules from |
||||
Darrel Goeddel |
||||
|
||||
* Wed Sep 6 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.11-1 |
||||
- Latest update from NSA |
||||
* merged range_transition enhancements and user module format |
||||
changes from Darrel Goeddel |
||||
* Merged symtab datum patch from Karl MacMillan. |
||||
|
||||
* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 1.30.9-1.1 |
||||
- rebuild |
||||
|
||||
* Tue Jul 4 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.8-1 |
||||
- Latest upgrade from NSA |
||||
* Lindent. |
||||
* Merged patch to remove TE rule conflict checking from the parser |
||||
from Joshua Brindle. This can only be done properly by the |
||||
expander. |
||||
* Merged patch to make checkpolicy/checkmodule handling of |
||||
duplicate/conflicting TE rules the same as the expander |
||||
from Joshua Brindle. |
||||
* Merged optionals in base take 2 patch set from Joshua Brindle. |
||||
|
||||
* Tue May 23 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.5-1 |
||||
- Latest upgrade from NSA |
||||
* Merged compiler cleanup patch from Karl MacMillan. |
||||
* Merged fix warnings patch from Karl MacMillan. |
||||
|
||||
* Wed Apr 5 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.4-1 |
||||
- Latest upgrade from NSA |
||||
* Changed require_class to reject permissions that have not been |
||||
declared if building a base module. |
||||
|
||||
* Tue Mar 28 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.3-1 |
||||
- Latest upgrade from NSA |
||||
* Fixed checkmodule to call link_modules prior to expand_module |
||||
to handle optionals. |
||||
* Fixed require_class to avoid shadowing permissions already defined |
||||
in an inherited common definition. |
||||
|
||||
* Mon Mar 27 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.1-2 |
||||
- Rebuild with new libsepol |
||||
|
||||
* Thu Mar 23 2006 Dan Walsh <dwalsh@redhat.com> - 1.30.1-1 |
||||
- Latest upgrade from NSA |
||||
* Moved processing of role and user require statements to 2nd pass. |
||||
|
||||
* Fri Mar 17 2006 Dan Walsh <dwalsh@redhat.com> - 1.30-1 |
||||
- Latest upgrade from NSA |
||||
* Updated version for release. |
||||
* Fixed bug in role dominance (define_role_dom). |
||||
|
||||
* Fri Feb 17 2006 Dan Walsh <dwalsh@redhat.com> - 1.29.4-1 |
||||
- Latest upgrade from NSA |
||||
* Added a check for failure to declare each sensitivity in |
||||
a level definition. |
||||
* Changed to clone level data for aliased sensitivities to |
||||
avoid double free upon sens_destroy. Bug reported by Kevin |
||||
Carr of Tresys Technology. |
||||
|
||||
* Mon Feb 13 2006 Dan Walsh <dwalsh@redhat.com> - 1.29.2-1 |
||||
- Latest upgrade from NSA |
||||
* Merged optionals in base patch from Joshua Brindle. |
||||
|
||||
* Mon Feb 13 2006 Dan Walsh <dwalsh@redhat.com> - 1.29.1-1.2 |
||||
- Need to build againi |
||||
|
||||
* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 1.29.1-1.1 |
||||
- bump again for double-long bug on ppc(64) |
||||
|
||||
* Tue Feb 07 2006 Dan Walsh <dwalsh@redhat.com> 1.29.1-1 |
||||
- Latest upgrade from NSA |
||||
* Merged sepol_av_to_string patch from Joshua Brindle. |
||||
|
||||
* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 1.28-5.1 |
||||
- rebuilt for new gcc4.1 snapshot and glibc changes |
||||
|
||||
* Fri Jan 13 2006 Dan Walsh <dwalsh@redhat.com> 1.28-5 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Fri Jan 13 2006 Dan Walsh <dwalsh@redhat.com> 1.28-5 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Thu Jan 5 2006 Dan Walsh <dwalsh@redhat.com> 1.28-4 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Wed Jan 4 2006 Dan Walsh <dwalsh@redhat.com> 1.28-3 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Fri Dec 16 2005 Dan Walsh <dwalsh@redhat.com> 1.28-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com> |
||||
- rebuilt |
||||
|
||||
* Fri Dec 9 2005 Dan Walsh <dwalsh@redhat.com> 1.28-1 |
||||
- Latest upgrade from NSA |
||||
|
||||
* Sun Dec 4 2005 Dan Walsh <dwalsh@redhat.com> 1.27.20-1 |
||||
- Latest upgrade from NSA |
||||
* Merged checkmodule man page from Dan Walsh, and edited it. |
||||
|
||||
* Thu Dec 1 2005 Dan Walsh <dwalsh@redhat.com> 1.27.19-1 |
||||
- Latest upgrade from NSA |
||||
* Added error checking of all ebitmap_set_bit calls for out of |
||||
memory conditions. |
||||
* Merged removal of compatibility handling of netlink classes |
||||
(requirement that policies with newer versions include the |
||||
netlink class definitions, remapping of fine-grained netlink |
||||
classes in newer source policies to single netlink class when |
||||
generating older policies) from George Coker. |
||||
|
||||
* Tue Nov 8 2005 Dan Walsh <dwalsh@redhat.com> 1.27.17-7 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Tue Oct 25 2005 Dan Walsh <dwalsh@redhat.com> 1.27.17-1 |
||||
- Latest upgrade from NSA |
||||
* Merged dismod fix from Joshua Brindle. |
||||
|
||||
* Thu Oct 20 2005 Dan Walsh <dwalsh@redhat.com> 1.27.16-1 |
||||
- Latest upgrade from NSA |
||||
* Removed obsolete cond_check_type_rules() function and call and |
||||
cond_optimize_lists() call from checkpolicy.c; these are handled |
||||
during parsing and expansion now. |
||||
* Updated calls to expand_module for interface change. |
||||
* Changed checkmodule to verify that expand_module succeeds |
||||
when building base modules. |
||||
* Merged module compiler fixes from Joshua Brindle. |
||||
* Removed direct calls to hierarchy_check_constraints() and |
||||
check_assertions() from checkpolicy since they are now called |
||||
internally by expand_module(). |
||||
|
||||
* Tue Oct 18 2005 Dan Walsh <dwalsh@redhat.com> 1.27.11-1 |
||||
- Latest upgrade from NSA |
||||
* Updated for changes to sepol policydb_index_others interface. |
||||
|
||||
* Tue Oct 18 2005 Dan Walsh <dwalsh@redhat.com> 1.27.10-1 |
||||
- Latest upgrade from NSA |
||||
* Updated for changes to sepol expand_module and link_modules interfaces. |
||||
* Sat Oct 15 2005 Dan Walsh <dwalsh@redhat.com> 1.27.9-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Fri Oct 14 2005 Dan Walsh <dwalsh@redhat.com> 1.27.9-1 |
||||
- Latest upgrade from NSA |
||||
* Merged support for require blocks inside conditionals from |
||||
Joshua Brindle (Tresys). |
||||
|
||||
* Wed Oct 12 2005 Karsten Hopp <karsten@redhat.de> 1.27.8-2 |
||||
- add buildrequirement for libselinux-devel for dispol |
||||
|
||||
* Mon Oct 10 2005 Dan Walsh <dwalsh@redhat.com> 1.27.8-1 |
||||
- Latest upgrade from NSA |
||||
* Updated for changes to libsepol. |
||||
|
||||
* Fri Oct 7 2005 Dan Walsh <dwalsh@redhat.com> 1.27.7-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Thu Oct 6 2005 Dan Walsh <dwalsh@redhat.com> 1.27.7-1 |
||||
- Latest upgrade from NSA |
||||
* Merged several bug fixes from Joshua Brindle (Tresys). |
||||
|
||||
* Tue Oct 4 2005 Dan Walsh <dwalsh@redhat.com> 1.27.6-1 |
||||
- Latest upgrade from NSA |
||||
* Merged MLS in modules patch from Joshua Brindle (Tresys). |
||||
|
||||
* Mon Oct 3 2005 Dan Walsh <dwalsh@redhat.com> 1.27.5-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Wed Sep 28 2005 Dan Walsh <dwalsh@redhat.com> 1.27.5-1 |
||||
- Latest upgrade from NSA |
||||
* Merged error handling improvement in checkmodule from Karl MacMillan (Tresys). |
||||
|
||||
* Tue Sep 27 2005 Dan Walsh <dwalsh@redhat.com> 1.27.4-1 |
||||
- Latest upgrade from NSA |
||||
* Merged bugfix for dup role transition error messages from |
||||
Karl MacMillan (Tresys). |
||||
|
||||
* Fri Sep 23 2005 Dan Walsh <dwalsh@redhat.com> 1.27.3-1 |
||||
- Latest upgrade from NSA |
||||
* Merged policyver/modulever patches from Joshua Brindle (Tresys). |
||||
|
||||
* Wed Sep 21 2005 Dan Walsh <dwalsh@redhat.com> 1.27.2-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Wed Sep 21 2005 Dan Walsh <dwalsh@redhat.com> 1.27.2-1 |
||||
- Latest upgrade from NSA |
||||
* Fixed parse_categories handling of undefined category. |
||||
|
||||
* Tue Sep 20 2005 Dan Walsh <dwalsh@redhat.com> 1.27.1-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Sat Sep 17 2005 Dan Walsh <dwalsh@redhat.com> 1.27.1-1 |
||||
- Latest upgrade from NSA |
||||
* Merged bug fix for role dominance handling from Darrel Goeddel (TCS). |
||||
* Wed Sep 14 2005 Dan Walsh <dwalsh@redhat.com> 1.26-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Mon Sep 12 2005 Dan Walsh <dwalsh@redhat.com> 1.26-1 |
||||
- Latest upgrade from NSA |
||||
* Updated version for release. |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Thu Sep 1 2005 Dan Walsh <dwalsh@redhat.com> 1.25.12-3 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Mon Aug 29 2005 Dan Walsh <dwalsh@redhat.com> 1.25.12-2 |
||||
- Rebuild to get latest libsepol |
||||
|
||||
* Mon Aug 22 2005 Dan Walsh <dwalsh@redhat.com> 1.25.12-1 |
||||
- Update to NSA Release |
||||
* Fixed handling of validatetrans constraint expressions. |
||||
Bug reported by Dan Walsh for checkpolicy -M. |
||||
|
||||
* Mon Aug 22 2005 Dan Walsh <dwalsh@redhat.com> 1.25.11-2 |
||||
- Fix mls crash |
||||
|
||||
* Fri Aug 19 2005 Dan Walsh <dwalsh@redhat.com> 1.25.11-1 |
||||
- Update to NSA Release |
||||
* Merged use-after-free fix from Serge Hallyn (IBM). |
||||
Bug found by Coverity. |
||||
|
||||
* Sun Aug 14 2005 Dan Walsh <dwalsh@redhat.com> 1.25.10-1 |
||||
- Update to NSA Release |
||||
* Fixed further memory leaks found by valgrind. |
||||
* Changed checkpolicy to destroy the policydbs prior to exit |
||||
to allow leak detection. |
||||
* Fixed several memory leaks found by valgrind. |
||||
|
||||
* Sun Aug 14 2005 Dan Walsh <dwalsh@redhat.com> 1.25.8-3 |
||||
- Rebuild to get latest libsepol changes |
||||
|
||||
* Sat Aug 13 2005 Dan Walsh <dwalsh@redhat.com> 1.25.8-2 |
||||
- Rebuild to get latest libsepol changes |
||||
|
||||
* Thu Aug 11 2005 Dan Walsh <dwalsh@redhat.com> 1.25.8-1 |
||||
- Update to NSA Release |
||||
* Updated checkpolicy and dispol for the new avtab format. |
||||
Converted users of ebitmaps to new inline operators. |
||||
Note: The binary policy format version has been incremented to |
||||
version 20 as a result of these changes. To build a policy |
||||
for a kernel that does not yet include these changes, use |
||||
the -c 19 option to checkpolicy. |
||||
* Merged patch to prohibit use of "self" as a type name from Jason Tang (Tresys). |
||||
* Merged patch to fix dismod compilation from Joshua Brindle (Tresys). |
||||
|
||||
* Wed Aug 10 2005 Dan Walsh <dwalsh@redhat.com> 1.25.5-1 |
||||
- Update to NSA Release |
||||
* Fixed call to hierarchy checking code to pass the right policydb. |
||||
* Merged patch to update dismod for the relocation of the |
||||
module read/write code from libsemanage to libsepol, and |
||||
to enable build of test subdirectory from Jason Tang (Tresys). |
||||
|
||||
* Thu Jul 28 2005 Dan Walsh <dwalsh@redhat.com> 1.25.3-1 |
||||
- Update to NSA Release |
||||
* Merged hierarchy check fix from Joshua Brindle (Tresys). |
||||
|
||||
* Thu Jul 7 2005 Dan Walsh <dwalsh@redhat.com> 1.25.2-1 |
||||
- Update to NSA Release |
||||
* Merged loadable module support from Tresys Technology. |
||||
* Merged patch to prohibit the use of * and ~ in type sets |
||||
(other than in neverallow statements) and in role sets |
||||
from Joshua Brindle (Tresys). |
||||
* Updated version for release. |
||||
|
||||
* Fri May 20 2005 Dan Walsh <dwalsh@redhat.com> 1.23-4-1 |
||||
- Update to NSA Release |
||||
* Merged cleanup patch from Dan Walsh. |
||||
|
||||
* Thu May 19 2005 Dan Walsh <dwalsh@redhat.com> 1.23-3-1 |
||||
- Update to NSA Release |
||||
* Added sepol_ prefix to Flask types to avoid namespace |
||||
collision with libselinux. |
||||
|
||||
* Sat May 7 2005 Dan Walsh <dwalsh@redhat.com> 1.23-2-1 |
||||
- Update to NSA Release |
||||
* Merged identifier fix from Joshua Brindle (Tresys). |
||||
|
||||
* Thu Apr 14 2005 Dan Walsh <dwalsh@redhat.com> 1.23,1-1 |
||||
* Merged hierarchical type/role patch from Tresys Technology. |
||||
* Merged MLS fixes from Darrel Goeddel of TCS. |
||||
|
||||
* Thu Mar 10 2005 Dan Walsh <dwalsh@redhat.com> 1.22-1 |
||||
- Update to NSA Release |
||||
|
||||
* Tue Mar 1 2005 Dan Walsh <dwalsh@redhat.com> 1.21.4-2 |
||||
- Rebuild for FC4 |
||||
|
||||
* Thu Feb 17 2005 Dan Walsh <dwalsh@redhat.com> 1.21.4-1 |
||||
* Merged define_user() cleanup patch from Darrel Goeddel (TCS). |
||||
* Moved genpolusers utility to libsepol. |
||||
* Merged range_transition support from Darrel Goeddel (TCS). |
||||
|
||||
* Thu Feb 10 2005 Dan Walsh <dwalsh@redhat.com> 1.21.2-1 |
||||
- Latest from NSA |
||||
* Changed relabel Makefile target to use restorecon. |
||||
|
||||
* Mon Feb 7 2005 Dan Walsh <dwalsh@redhat.com> 1.21.1-1 |
||||
- Latest from NSA |
||||
* Merged enhanced MLS support from Darrel Goeddel (TCS). |
||||
|
||||
* Fri Jan 7 2005 Dan Walsh <dwalsh@redhat.com> 1.20.1-1 |
||||
- Update for version increase at NSA |
||||
|
||||
* Mon Dec 20 2004 Dan Walsh <dwalsh@redhat.com> 1.19.2-1 |
||||
- Latest from NSA |
||||
* Merged typeattribute statement patch from Darrel Goeddel of TCS. |
||||
* Changed genpolusers to handle multiple user config files. |
||||
* Merged nodecon ordering patch from Chad Hanson of TCS. |
||||
|
||||
* Thu Nov 11 2004 Dan Walsh <dwalsh@redhat.com> 1.19.1-1 |
||||
- Latest from NSA |
||||
* Merged nodecon ordering patch from Chad Hanson of TCS. |
||||
|
||||
* Thu Nov 4 2004 Dan Walsh <dwalsh@redhat.com> 1.18.1-1 |
||||
- Latest from NSA |
||||
* MLS build fix. |
||||
|
||||
* Sat Sep 4 2004 Dan Walsh <dwalsh@redhat.com> 1.17.5-1 |
||||
- Latest from NSA |
||||
* Fixed Makefile dependencies (Chris PeBenito). |
||||
|
||||
* Sat Sep 4 2004 Dan Walsh <dwalsh@redhat.com> 1.17.4-1 |
||||
- Latest from NSA |
||||
* Fixed Makefile dependencies (Chris PeBenito). |
||||
|
||||
* Sat Sep 4 2004 Dan Walsh <dwalsh@redhat.com> 1.17.3-1 |
||||
- Latest from NSA |
||||
* Merged fix for role dominance ordering issue from Chad Hanson of TCS. |
||||
|
||||
* Mon Aug 30 2004 Dan Walsh <dwalsh@redhat.com> 1.17.2-1 |
||||
- Latest from NSA |
||||
|
||||
* Thu Aug 26 2004 Dan Walsh <dwalsh@redhat.com> 1.16.3-1 |
||||
- Fix NSA package to not include y.tab files. |
||||
|
||||
* Tue Aug 24 2004 Dan Walsh <dwalsh@redhat.com> 1.16.2-1 |
||||
- Latest from NSA |
||||
- Allow port ranges to overlap |
||||
|
||||
* Sun Aug 22 2004 Dan Walsh <dwalsh@redhat.com> 1.16.1-1 |
||||
- Latest from NSA |
||||
|
||||
* Mon Aug 16 2004 Dan Walsh <dwalsh@redhat.com> 1.15.6-1 |
||||
- Latest from NSA |
||||
|
||||
* Fri Aug 13 2004 Dan Walsh <dwalsh@redhat.com> 1.15.5-1 |
||||
- Latest from NSA |
||||
|
||||
* Wed Aug 11 2004 Dan Walsh <dwalsh@redhat.com> 1.15.4-1 |
||||
- Latest from NSA |
||||
|
||||
* Sat Aug 7 2004 Dan Walsh <dwalsh@redhat.com> 1.15.3-1 |
||||
- Latest from NSA |
||||
|
||||
* Wed Aug 4 2004 Dan Walsh <dwalsh@redhat.com> 1.15.2-1 |
||||
- Latest from NSA |
||||
|
||||
* Sat Jul 31 2004 Dan Walsh <dwalsh@redhat.com> 1.15.1-1 |
||||
- Latest from NSA |
||||
|
||||
* Tue Jul 27 2004 Dan Walsh <dwalsh@redhat.com> 1.14.2-1 |
||||
- Latest from NSA |
||||
|
||||
* Wed Jun 30 2004 Dan Walsh <dwalsh@redhat.com> 1.14.1-1 |
||||
- Latest from NSA |
||||
|
||||
* Fri Jun 18 2004 Dan Walsh <dwalsh@redhat.com> 1.12.2-1 |
||||
- Latest from NSA |
||||
|
||||
* Thu Jun 17 2004 Dan Walsh <dwalsh@redhat.com> 1.12.1-1 |
||||
- Update to latest from NSA |
||||
|
||||
* Wed Jun 16 2004 Dan Walsh <dwalsh@redhat.com> 1.12-1 |
||||
- Update to latest from NSA |
||||
|
||||
* Wed Jun 16 2004 Dan Walsh <dwalsh@redhat.com> 1.10-5 |
||||
- Add nlclass patch |
||||
|
||||
* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com> |
||||
- rebuilt |
||||
|
||||
* Fri Jun 4 2004 Dan Walsh <dwalsh@redhat.com> 1.10-3 |
||||
- Add BuildRequires flex |
||||
|
||||
* Thu Apr 8 2004 Dan Walsh <dwalsh@redhat.com> 1.10-2 |
||||
- Add BuildRequires byacc |
||||
|
||||
* Thu Apr 8 2004 Dan Walsh <dwalsh@redhat.com> 1.10-1 |
||||
- Upgrade to the latest from NSA |
||||
|
||||
* Mon Mar 15 2004 Dan Walsh <dwalsh@redhat.com> 1.8-1 |
||||
- Upgrade to the latest from NSA |
||||
|
||||
* Tue Feb 24 2004 Dan Walsh <dwalsh@redhat.com> 1.6-1 |
||||
- Upgrade to the latest from NSA |
||||
|
||||
* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com> |
||||
- rebuilt |
||||
|
||||
* Tue Jan 20 2004 Dan Walsh <dwalsh@redhat.com> 1.4-6 |
||||
- Add typealias patch |
||||
|
||||
* Tue Jan 20 2004 Dan Walsh <dwalsh@redhat.com> 1.4-5 |
||||
- Update excludetypes with negset-final patch |
||||
|
||||
* Wed Jan 14 2004 Dan Walsh <dwalsh@redhat.com> 1.4-4 |
||||
- Add excludetypes patch |
||||
|
||||
* Wed Jan 14 2004 Dan Walsh <dwalsh@redhat.com> 1.4-3 |
||||
- Add Colin Walter's lineno patch |
||||
|
||||
* Wed Jan 7 2004 Dan Walsh <dwalsh@redhat.com> 1.4-2 |
||||
- Remove check for roles transition |
||||
|
||||
* Sat Dec 6 2003 Dan Walsh <dwalsh@redhat.com> 1.4-1 |
||||
- upgrade to 1.4 |
||||
|
||||
* Wed Oct 1 2003 Dan Walsh <dwalsh@redhat.com> 1.2-1 |
||||
- upgrade to 1.2 |
||||
|
||||
* Thu Aug 28 2003 Dan Walsh <dwalsh@redhat.com> 1.1-2 |
||||
- upgrade to 1.1 |
||||
|
||||
* Mon Jun 2 2003 Dan Walsh <dwalsh@redhat.com> 1.0-1 |
||||
- Initial version |
Loading…
Reference in new issue