Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/303717/?format=api
{ "id": 303717, "url": "http://patchwork.ozlabs.org/api/patches/303717/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/1387485489-4186-13-git-send-email-clshotwe@rockwellcollins.com/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1387485489-4186-13-git-send-email-clshotwe@rockwellcollins.com>", "list_archive_url": null, "date": "2013-12-19T20:38:01", "name": "[v5,12/20] policycoreutils: new package", "commit_ref": null, "pull_url": null, "state": "changes-requested", "archived": false, "hash": "db2d5112d1374fe5052ddbb5548528a70d72d7dd", "submitter": { "id": 38285, "url": "http://patchwork.ozlabs.org/api/people/38285/?format=api", "name": "Clayton Shotwell", "email": "clshotwe@rockwellcollins.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/1387485489-4186-13-git-send-email-clshotwe@rockwellcollins.com/mbox/", "series": [], "comments": "http://patchwork.ozlabs.org/api/patches/303717/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/303717/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@busybox.net>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "buildroot@lists.busybox.net" ], "Delivered-To": [ "patchwork-incoming@bilbo.ozlabs.org", "buildroot@osuosl.org" ], "Received": [ "from whitealder.osuosl.org (whitealder.osuosl.org\n\t[140.211.166.138])\n\tby ozlabs.org (Postfix) with ESMTP id BAE5F2C0079\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri, 20 Dec 2013 07:38:49 +1100 (EST)", "from localhost (localhost [127.0.0.1])\n\tby whitealder.osuosl.org (Postfix) with ESMTP id 183B58C5C9;\n\tThu, 19 Dec 2013 20:38:49 +0000 (UTC)", "from whitealder.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id ygaEaGbZTaTV; Thu, 19 Dec 2013 20:38:40 +0000 (UTC)", "from ash.osuosl.org (ash.osuosl.org [140.211.166.34])\n\tby whitealder.osuosl.org (Postfix) with ESMTP id 078DA8C5E2;\n\tThu, 19 Dec 2013 20:38:40 +0000 (UTC)", "from whitealder.osuosl.org (whitealder.osuosl.org\n\t[140.211.166.138])\n\tby ash.osuosl.org (Postfix) with ESMTP id 3B8F71BF99B\n\tfor <buildroot@lists.busybox.net>;\n\tThu, 19 Dec 2013 20:38:37 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n\tby whitealder.osuosl.org (Postfix) with ESMTP id 3C91D8C318\n\tfor <buildroot@lists.busybox.net>;\n\tThu, 19 Dec 2013 20:38:37 +0000 (UTC)", "from whitealder.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id l4hbK8CMlPE8 for <buildroot@lists.busybox.net>;\n\tThu, 19 Dec 2013 20:38:34 +0000 (UTC)", "from secvs02.rockwellcollins.com (secvs02.rockwellcollins.com\n\t[205.175.225.241])\n\tby whitealder.osuosl.org (Postfix) with ESMTPS id ADC918C59F\n\tfor <buildroot@busybox.net>; Thu, 19 Dec 2013 20:38:34 +0000 (UTC)", "from nosuchhost.198.131.in-addr.arpa (HELO\n\tcollinscrsmtp01.rockwellcollins.com) ([131.198.63.132])\n\tby mail-virt.rockwellcollins.com with ESMTP;\n\t19 Dec 2013 14:38:25 -0600", "from nyx ([131.198.63.11])\n\tby collinscrsmtp01.rockwellcollins.com (Lotus Domino Release 8.5.2FP2\n\tHF162) with ESMTP id 2013121914382463-2990152 ;\n\tThu, 19 Dec 2013 14:38:24 -0600 " ], "X-Virus-Scanned": [ "amavisd-new at osuosl.org", "amavisd-new at osuosl.org" ], "X-Greylist": "domain auto-whitelisted by SQLgrey-1.7.6", "From": "Clayton Shotwell <clshotwe@rockwellcollins.com>", "To": "buildroot@busybox.net", "Date": "Thu, 19 Dec 2013 14:38:01 -0600", "Message-Id": "<1387485489-4186-13-git-send-email-clshotwe@rockwellcollins.com>", "X-Mailer": "git-send-email 1.7.1", "In-Reply-To": "<1387485489-4186-1-git-send-email-clshotwe@rockwellcollins.com>", "References": "<1387485489-4186-1-git-send-email-clshotwe@rockwellcollins.com>", "X-MIMETrack": "Itemize by SMTP Server on\n\tCollinsCRSMTP01/CedarRapids/Collins/Rockwell(Release\n\t8.5.2FP2 HF162|May 16, 2011) at 12/19/2013 02:38:24 PM,\n\tSerialize by Router on\n\tCollinsCRSMTP01/CedarRapids/Collins/Rockwell(Release\n\t8.5.2FP2 HF162|May 16, 2011) at 12/19/2013 02:38:25 PM,\n\tSerialize complete at 12/19/2013 02:38:25 PM", "X-TNEFEvaluated": "1", "Cc": "Clayton Shotwell <clshotwe@rockwellcollins.com>", "Subject": "[Buildroot] [PATCH v5 12/20] policycoreutils: new package", "X-BeenThere": "buildroot@busybox.net", "X-Mailman-Version": "2.1.14", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.busybox.net>", "List-Unsubscribe": "<http://lists.busybox.net/mailman/options/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=unsubscribe>", "List-Archive": "<http://lists.busybox.net/pipermail/buildroot>", "List-Post": "<mailto:buildroot@busybox.net>", "List-Help": "<mailto:buildroot-request@busybox.net?subject=help>", "List-Subscribe": "<http://lists.busybox.net/mailman/listinfo/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=subscribe>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@busybox.net", "Sender": "buildroot-bounces@busybox.net" }, "content": "Signed-off-by: Clayton Shotwell <clshotwe@rockwellcollins.com>\n---\nChanges v4 -> v5:\n - No changes.\nChanges v3 -> v4:\n - Add a select for the libselinux Python bindings when debugging\n is enabled. This will cause Python to be built for the target\n (suggested by Thomas).\n - Cleaned up the configure comments (suggested by Thomas).\n - Added a dependency on BR2_USE_MMU for the debugging option\n because python requires it (suggested by Thomas).\n - Removed the dependencies on audit and linux-pam. Both packages\n are now optional dependencies based on whether or not the package\n has been selected.\n - Moved the dependency on dbus-glib to only the restorecond option\n where it is used.\n - Added a INSTALL_INIT_SYSV for the restorecond daemon rather than\n just installing it directly\n - Adding a dependency on glibc\n - Removed the clean commands.\nChanges v2 -> v3:\n - Added dependencies on BR2_TOOLCHAIN_HAS_THREADS and BR2_LARGEFILE\n (suggested by Thomas).\n - Changes patch naming convention (suggested by Thomas).\n - Added selects for linux-pam and audit.\nChanges v1 -> v2:\n - General cleanup to the mk file to conform to the standard format.\n - Fixed the patch naming to avoid using the version number.\n - Cleaned up the patch to include a signed-off-by line.\n - Changed package dependencies into selects in the config.\n---\n package/Config.in | 1 +\n package/policycoreutils/Config.in | 88 +++++\n package/policycoreutils/S15restorecond | 85 +++++\n .../policycoreutils-0001-cross-compile-fixes.patch | 332 ++++++++++++++++++++\n package/policycoreutils/policycoreutils.mk | 231 ++++++++++++++\n 5 files changed, 737 insertions(+), 0 deletions(-)\n create mode 100644 package/policycoreutils/Config.in\n create mode 100755 package/policycoreutils/S15restorecond\n create mode 100644 package/policycoreutils/policycoreutils-0001-cross-compile-fixes.patch\n create mode 100644 package/policycoreutils/policycoreutils.mk", "diff": "diff --git a/package/Config.in b/package/Config.in\nindex 071048f..7cdcaab 100644\n--- a/package/Config.in\n+++ b/package/Config.in\n@@ -951,6 +951,7 @@ source \"package/xenomai/Config.in\"\n endmenu\n \n menu \"Security\"\n+source \"package/policycoreutils/Config.in\"\n source \"package/sepolgen/Config.in\"\n source \"package/setools/Config.in\"\n endmenu\ndiff --git a/package/policycoreutils/Config.in b/package/policycoreutils/Config.in\nnew file mode 100644\nindex 0000000..ca9611b\n--- /dev/null\n+++ b/package/policycoreutils/Config.in\n@@ -0,0 +1,88 @@\n+config BR2_PACKAGE_POLICYCOREUTILS\n+\tbool \"policycoreutils\"\n+\tselect BR2_PACKAGE_LIBSEMANAGE\n+\tdepends on BR2_TOOLCHAIN_USES_GLIBC\n+\tdepends on BR2_TOOLCHAIN_HAS_THREADS # libsemanage\n+\tdepends on BR2_LARGEFILE # libsemanage\n+\thelp\n+\t Policycoreutils is a collection of policy utilities (originally\n+\t the \"core\" set of utilities needed to use SELinux, although it\n+\t has grown a bit over time), which have different dependencies.\n+\t sestatus, secon, run_init, and newrole only use libselinux.\n+\t load_policy and setfiles only use libselinux and libsepol.\n+\t semodule and semanage use libsemanage (and thus bring in\n+\t dependencies on libsepol and libselinux as well). setsebool\n+\t uses libselinux to make non-persistent boolean changes (via\n+\t the kernel interface) and uses libsemanage to make persistent\n+\t boolean changes.\n+\n+\t The base package will install the following utilities:\n+\t load_policy\n+\t newrole\n+\t restorecond\n+\t run_init\n+\t secon\n+\t semodule\n+\t semodule_deps\n+\t semodule_expand\n+\t semodule_link\n+\t semodule_package\n+\t sepolgen-ifgen\n+\t sestatus\n+\t setfiles\n+\t setsebool\n+\n+\t http://selinuxproject.org/page/Main_Page\n+\n+comment \"policycoreutils needs a toolchain w/ (e)glibc, wchar, largefile\"\n+\tdepends on !BR2_TOOLCHAIN_USES_GLIBC || !BR2_TOOLCHAIN_HAS_THREADS \\\n+\t\t|| !BR2_LARGEFILE\n+\n+if BR2_PACKAGE_POLICYCOREUTILS\n+\n+config BR2_PACKAGE_POLICYCOREUTILS_POLICY_DEBUGGING\n+\tbool \"Policy Debugging Utilities\"\n+\tselect BR2_PACKAGE_LIBSELINUX_PYTHON_BINDINGS\n+\tselect BR2_PACKAGE_PYTHON\n+\tselect BR2_PACKAGE_SEPOLGEN\n+\tselect BR2_PACKAGE_SETOOLS\n+\tdepends on BR2_USE_MMU # python\n+\thelp\n+\t Enable policy debugging packages to be built. These are being included\n+\t separately because of dependencies.\n+\t audit2allow\n+\t audit2why\n+\t semanage\n+\t sepolicy\n+\t scripts\n+\n+config BR2_PACKAGE_POLICYCOREUTILS_RESTORECOND\n+\tbool \"restorecond Utility\"\n+\tselect BR2_PACKAGE_DBUS_GLIB\n+\tdepends on BR2_USE_WCHAR # dbus-glib\n+\tdepends on BR2_USE_MMU # dbus-glib\n+\thelp\n+\t Enable restorecond to be built\n+\n+comment \"restorecond needs a toolchain w/ wchar, threads, mmu\"\n+\tdepends on !BR2_USE_WCHAR || !BR2_USE_MMU\n+\n+config BR2_PACKAGE_POLICYCOREUTILS_MCSTRANS\n+\tbool \"mcstrans Utility\"\n+\tselect BR2_PACKAGE_PCRE\n+\tselect BR2_PACKAGE_LIBCAP\n+\thelp\n+\t Enable mcstrans to be built\n+\n+config BR2_PACKAGE_POLICYCOREUTILS_SANDBOX\n+\tbool \"sandbox Utility\"\n+\tselect BR2_PACKAGE_POLICYCOREUTILS_POLICY_DEBUGGING\n+\tselect BR2_PACKAGE_LIBCGROUP\n+\tdepends on BR2_INSTALL_LIBSTDCPP # libcgroup\n+\thelp\n+\t Enable sandbox to be built\n+\n+comment \"policycoreutils sandbox needs an toolchain w/ C++\"\n+\tdepends on !BR2_INSTALL_LIBSTDCPP\n+\n+endif\ndiff --git a/package/policycoreutils/S15restorecond b/package/policycoreutils/S15restorecond\nnew file mode 100755\nindex 0000000..e408281\n--- /dev/null\n+++ b/package/policycoreutils/S15restorecond\n@@ -0,0 +1,85 @@\n+#!/bin/sh\n+#\n+# restorecond:\t\tDaemon used to maintain path file context\n+#\n+# description:\trestorecond uses inotify to look for creation of new files \\\n+# listed in the /etc/selinux/restorecond.conf file, and restores the \\\n+# correct security context.\n+#\n+# processname: /usr/sbin/restorecond\n+# config: /etc/selinux/restorecond.conf \n+# pidfile: /var/run/restorecond.pid\n+#\n+# Return values according to LSB for all commands but status:\n+# 0 - success\n+# 1 - generic or unspecified error\n+# 2 - invalid or excess argument(s)\n+# 3 - unimplemented feature (e.g. \"reload\")\n+# 4 - insufficient privilege\n+# 5 - program is not installed\n+# 6 - program is not configured\n+# 7 - program is not running\n+\n+PATH=/sbin:/bin:/usr/bin:/usr/sbin\n+\n+[ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled || exit 7\n+\n+# Check that we are root ... so non-root users stop here\n+test $EUID = 0 || exit 4\n+\n+test -x /usr/sbin/restorecond || exit 5\n+test -f /etc/selinux/restorecond.conf || exit 6\n+\n+RETVAL=0\n+\n+start() \n+{\n+\techo -n $\"Starting restorecond: \"\n+\tunset HOME MAIL USER USERNAME\n+\t/usr/sbin/restorecond \n+\tRETVAL=$?\n+\ttouch /var/lock/subsys/restorecond\n+\techo\n+\treturn $RETVAL\n+}\n+\n+stop() \n+{\n+\techo -n $\"Shutting down restorecond: \"\n+\tkillproc restorecond\n+\tRETVAL=$?\n+\trm -f /var/lock/subsys/restorecond\n+\techo\n+\treturn $RETVAL\n+}\n+\n+restart() \n+{\n+\tstop\n+\tstart\n+}\n+\n+# See how we were called.\n+case \"$1\" in\n+ start)\n+\tstart\n+\t;;\n+ stop)\n+\tstop\n+\t;;\n+ status)\n+\tstatus restorecond\n+\tRETVAL=$?\n+\t;;\n+ force-reload|restart|reload)\n+\trestart\n+\t;;\n+ condrestart)\n+\t[ -e /var/lock/subsys/restorecond ] && restart || :\n+\t;;\n+ *)\n+\techo $\"Usage: $0 {start|stop|restart|force-reload|status|condrestart}\"\n+\tRETVAL=3\n+esac\n+\n+exit $RETVAL\ndiff --git a/package/policycoreutils/policycoreutils-0001-cross-compile-fixes.patch b/package/policycoreutils/policycoreutils-0001-cross-compile-fixes.patch\nnew file mode 100644\nindex 0000000..8f47907\n--- /dev/null\n+++ b/package/policycoreutils/policycoreutils-0001-cross-compile-fixes.patch\n@@ -0,0 +1,332 @@\n+Patch to enable cross compile build and install.\n+\n+Signed-off-by Clayton Shotwell <clshotwe@rockwellcollins.com>\n+\n+diff -urN a/audit2allow/Makefile b/audit2allow/Makefile\n+--- a/audit2allow/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/audit2allow/Makefile\t2013-08-23 09:16:21.282917254 -0500\n+@@ -3,7 +3,7 @@\n+ BINDIR ?= $(PREFIX)/bin\n+ LIBDIR ?= $(PREFIX)/lib\n+ MANDIR ?= $(PREFIX)/share/man\n+-LOCALEDIR ?= /usr/share/locale\n++LOCALEDIR ?= $(DESTDIR)/usr/share/locale\n+ \n+ all: ;\n+ \n+diff -urN a/load_policy/Makefile b/load_policy/Makefile\n+--- a/load_policy/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/load_policy/Makefile\t2013-08-23 09:16:21.282917254 -0500\n+@@ -3,7 +3,7 @@\n+ SBINDIR ?= $(DESTDIR)/sbin\n+ USRSBINDIR ?= $(PREFIX)/sbin\n+ MANDIR ?= $(PREFIX)/share/man\n+-LOCALEDIR ?= /usr/share/locale\n++LOCALEDIR ?= $(DESTDIR)/usr/share/locale\n+ \n+ CFLAGS ?= -Werror -Wall -W\n+ override CFLAGS += $(LDFLAGS) -I$(PREFIX)/include -DUSE_NLS -DLOCALEDIR=\"\\\"$(LOCALEDIR)\\\"\" -DPACKAGE=\"\\\"policycoreutils\\\"\"\n+diff -urN a/Makefile b/Makefile\n+--- a/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/Makefile\t2013-08-23 09:16:21.292985286 -0500\n+@@ -1,8 +1,8 @@\n+ SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow audit2why sestatus semodule_package semodule semodule_link semodule_expand semodule_deps sepolgen-ifgen setsebool scripts po man gui\n+ \n+-INOTIFYH = $(shell ls /usr/include/sys/inotify.h 2>/dev/null)\n++INOTIFYH = $(shell ls $(DESTDIR)/usr/include/sys/inotify.h 2>/dev/null)\n+ \n+-ifeq (${INOTIFYH}, /usr/include/sys/inotify.h)\n++ifeq (${INOTIFYH}, $(DESTDIR)/usr/include/sys/inotify.h)\n+ \tSUBDIRS += restorecond\n+ endif\n+ \n+diff -urN a/mcstrans/src/Makefile b/mcstrans/src/Makefile\n+--- a/mcstrans/src/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/mcstrans/src/Makefile\t2013-08-23 09:41:18.782916946 -0500\n+@@ -1,22 +1,8 @@\n+-ARCH = $(shell uname -i)\n+-ifeq \"$(ARCH)\" \"x86_64\"\n+-\t# In case of 64 bit system, use these lines\n+-\tLIBDIR=/usr/lib64\n+-else \n+-ifeq \"$(ARCH)\" \"i686\"\n+-\t# In case of 32 bit system, use these lines\n+-\tLIBDIR=/usr/lib\n+-else\n+-ifeq \"$(ARCH)\" \"i386\"\n+-\t# In case of 32 bit system, use these lines\n+-\tLIBDIR=/usr/lib\n+-endif\n+-endif\n+-endif\n+ # Installation directories.\n+ PREFIX ?= $(DESTDIR)/usr\n+-SBINDIR ?= $(DESTDIR)/sbin\n+-INITDIR ?= $(DESTDIR)/etc/rc.d/init.d\n++LIBDIR ?= $(PREFIX)/lib\n++SBINDIR ?= $(PREFIX)/sbin\n++INITDIR ?= $(DESTDIR)/etc/init.d\n+ \n+ PROG_SRC=mcstrans.c mcscolor.c mcstransd.c mls_level.c\n+ PROG_OBJS= $(patsubst %.c,%.o,$(PROG_SRC))\n+@@ -40,5 +26,5 @@\n+ \tinstall -m 755 $(INITSCRIPT).init $(INITDIR)/$(INITSCRIPT)\n+ \n+ clean: \n+-\t-rm -f $(OBJS) $(LOBJS) $(TARGET) $(PROG) $(PROG_OBJS) *~ \\#*\n++\t-rm -f $(PROG) $(PROG_OBJS) *.o *~ \\#*\n+ \n+diff -urN a/mcstrans/utils/Makefile b/mcstrans/utils/Makefile\n+--- a/mcstrans/utils/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/mcstrans/utils/Makefile\t2013-08-23 09:16:21.292985286 -0500\n+@@ -1,24 +1,8 @@\n+ # Installation directories.\n+ PREFIX ?= $(DESTDIR)/usr\n++LIBDIR ?= $(PREFIX)/lib\n+ BINDIR ?= $(PREFIX)/sbin\n+ \n+-ARCH = $(shell uname -i)\n+-ifeq \"$(ARCH)\" \"x86_64\"\n+- # In case of 64 bit system, use these lines\n+- LIBDIR=/usr/lib64\n+-else\n+-ifeq \"$(ARCH)\" \"i686\"\n+- # In case of 32 bit system, use these lines\n+- LIBDIR=/usr/lib\n+-else\n+-ifeq \"$(ARCH)\" \"i386\"\n+- # In case of 32 bit system, use these lines\n+- LIBDIR=/usr/lib\n+-endif\n+-endif\n+-endif\n+-\n+-\n+ CFLAGS ?= -Wall\n+ override CFLAGS += -I../src -D_GNU_SOURCE\n+ LDLIBS += -L../src ../src/mcstrans.o ../src/mls_level.o -lselinux -lpcre $(LIBDIR)/libsepol.a\n+diff -urN a/newrole/Makefile b/newrole/Makefile\n+--- a/newrole/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/newrole/Makefile\t2013-08-23 09:16:21.292985286 -0500\n+@@ -3,9 +3,9 @@\n+ BINDIR ?= $(PREFIX)/bin\n+ MANDIR ?= $(PREFIX)/share/man\n+ ETCDIR ?= $(DESTDIR)/etc\n+-LOCALEDIR = /usr/share/locale\n+-PAMH = $(shell ls /usr/include/security/pam_appl.h 2>/dev/null)\n+-AUDITH = $(shell ls /usr/include/libaudit.h 2>/dev/null)\n++LOCALEDIR = $(DESTDIR)/usr/share/locale\n++PAMH = $(shell ls $(DESTDIR)/usr/include/security/pam_appl.h 2>/dev/null)\n++AUDITH = $(shell ls $(DESTDIR)/usr/include/libaudit.h 2>/dev/null)\n+ # Enable capabilities to permit newrole to generate audit records.\n+ # This will make newrole a setuid root program.\n+ # The capabilities used are: CAP_AUDIT_WRITE.\n+@@ -24,7 +24,7 @@\n+ EXTRA_OBJS =\n+ override CFLAGS += -DVERSION=\\\"$(VERSION)\\\" $(LDFLAGS) -I$(PREFIX)/include -DUSE_NLS -DLOCALEDIR=\"\\\"$(LOCALEDIR)\\\"\" -DPACKAGE=\"\\\"policycoreutils\\\"\"\n+ LDLIBS += -lselinux -L$(PREFIX)/lib\n+-ifeq ($(PAMH), /usr/include/security/pam_appl.h)\n++ifeq ($(PAMH), $(DESTDIR)/usr/include/security/pam_appl.h)\n+ \toverride CFLAGS += -DUSE_PAM\n+ \tEXTRA_OBJS += hashtab.o\n+ \tLDLIBS += -lpam -lpam_misc\n+@@ -32,7 +32,7 @@\n+ \toverride CFLAGS += -D_XOPEN_SOURCE=500\n+ \tLDLIBS += -lcrypt\n+ endif\n+-ifeq ($(AUDITH), /usr/include/libaudit.h)\n++ifeq ($(AUDITH), $(DESTDIR)/usr/include/libaudit.h)\n+ \toverride CFLAGS += -DUSE_AUDIT\n+ \tLDLIBS += -laudit\n+ endif\n+@@ -66,7 +66,7 @@\n+ \ttest -d $(MANDIR)/man1 || install -m 755 -d $(MANDIR)/man1\n+ \tinstall -m $(MODE) newrole $(BINDIR)\n+ \tinstall -m 644 newrole.1 $(MANDIR)/man1/\n+-ifeq ($(PAMH), /usr/include/security/pam_appl.h)\n++ifeq ($(PAMH), $(DESTDIR)/usr/include/security/pam_appl.h)\n+ \ttest -d $(ETCDIR)/pam.d || install -m 755 -d $(ETCDIR)/pam.d\n+ ifeq ($(LSPP_PRIV),y)\n+ \tinstall -m 644 newrole-lspp.pamd $(ETCDIR)/pam.d/newrole\n+diff -urN a/restorecond/Makefile b/restorecond/Makefile\n+--- a/restorecond/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/restorecond/Makefile\t2013-08-23 09:16:21.292985286 -0500\n+@@ -2,24 +2,29 @@\n+ PREFIX ?= $(DESTDIR)/usr\n+ SBINDIR ?= $(PREFIX)/sbin\n+ LIBDIR ?= $(PREFIX)/lib\n+-MANDIR = $(PREFIX)/share/man\n++MANDIR ?= $(PREFIX)/share/man\n+ AUTOSTARTDIR = $(DESTDIR)/etc/xdg/autostart\n+ DBUSSERVICEDIR = $(DESTDIR)/usr/share/dbus-1/services\n+ \n+ autostart_DATA = sealertauto.desktop\n+-INITDIR = $(DESTDIR)/etc/rc.d/init.d\n++INITDIR = $(DESTDIR)/etc/init.d\n+ SELINUXDIR = $(DESTDIR)/etc/selinux\n+ \n+-DBUSFLAGS = -DHAVE_DBUS -I/usr/include/dbus-1.0 -I/usr/lib64/dbus-1.0/include -I/usr/lib/dbus-1.0/include\n++DBUSFLAGS = -DHAVE_DBUS -I$(PREFIX)/include/dbus-1.0 -I$(PREFIX)/lib64/dbus-1.0/include \\\n++\t\t-I$(PREFIX)/lib/dbus-1.0/include\n+ DBUSLIB = -ldbus-glib-1 -ldbus-1\n+ \n+ CFLAGS ?= -g -Werror -Wall -W\n+-override CFLAGS += -I$(PREFIX)/include $(DBUSFLAGS) -I/usr/include/glib-2.0 -I/usr/lib64/glib-2.0/include -I/usr/lib/glib-2.0/include\n++override CFLAGS += -I$(PREFIX)/include $(DBUSFLAGS) -I$(PREFIX)/include/glib-2.0 \\\n++\t\t-I$(PREFIX)/lib64/glib-2.0/include -I$(PREFIX)/lib/glib-2.0/include\n+ \n+ LDLIBS += -lselinux $(DBUSLIB) -lglib-2.0 -L$(LIBDIR)\n+ \n+ all: restorecond\n+ \n++%.o: %.c\n++\t$(CC) $(CFLAGS) -c -o $@ $<\n++\n+ restorecond.o utmpwatcher.o stringslist.o user.o watch.o: restorecond.h\n+ \n+ restorecond: ../setfiles/restore.o restorecond.o utmpwatcher.o stringslist.o user.o watch.o\n+diff -urN a/run_init/Makefile b/run_init/Makefile\n+--- a/run_init/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/run_init/Makefile\t2013-08-23 09:16:21.292985286 -0500\n+@@ -4,21 +4,21 @@\n+ SBINDIR ?= $(PREFIX)/sbin\n+ MANDIR ?= $(PREFIX)/share/man\n+ ETCDIR ?= $(DESTDIR)/etc\n+-LOCALEDIR ?= /usr/share/locale\n+-PAMH = $(shell ls /usr/include/security/pam_appl.h 2>/dev/null)\n+-AUDITH = $(shell ls /usr/include/libaudit.h 2>/dev/null)\n++LOCALEDIR ?= $(DESTDIR)/usr/share/locale\n++PAMH = $(shell ls $(DESTDIR)/usr/include/security/pam_appl.h 2>/dev/null)\n++AUDITH = $(shell ls $(DESTDIR)/usr/include/libaudit.h 2>/dev/null)\n+ \n+ CFLAGS ?= -Werror -Wall -W\n+ override CFLAGS += -I$(PREFIX)/include -DUSE_NLS -DLOCALEDIR=\"\\\"$(LOCALEDIR)\\\"\" -DPACKAGE=\"\\\"policycoreutils\\\"\"\n+ LDLIBS += -lselinux -L$(PREFIX)/lib\n+-ifeq ($(PAMH), /usr/include/security/pam_appl.h)\n++ifeq ($(PAMH), $(DESTDIR)/usr/include/security/pam_appl.h)\n+ \toverride CFLAGS += -DUSE_PAM\n+ \tLDLIBS += -lpam -lpam_misc\n+ else\n+ \toverride CFLAGS += -D_XOPEN_SOURCE=500\n+ \tLDLIBS += -lcrypt\n+ endif\n+-ifeq ($(AUDITH), /usr/include/libaudit.h)\n++ifeq ($(AUDITH), $(DESTDIR)/usr/include/libaudit.h)\n+ \toverride CFLAGS += -DUSE_AUDIT\n+ \tLDLIBS += -laudit\n+ endif\n+@@ -38,7 +38,7 @@\n+ \tinstall -m 755 open_init_pty $(SBINDIR)\n+ \tinstall -m 644 run_init.8 $(MANDIR)/man8/\n+ \tinstall -m 644 open_init_pty.8 $(MANDIR)/man8/\n+-ifeq ($(PAMH), /usr/include/security/pam_appl.h)\n++ifeq ($(PAMH), $(DESTDIR)/usr/include/security/pam_appl.h)\n+ \tinstall -m 644 run_init.pamd $(ETCDIR)/pam.d/run_init\n+ endif\n+ \n+diff -urN a/semodule/Makefile b/semodule/Makefile\n+--- a/semodule/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/semodule/Makefile\t2013-08-23 09:16:21.302924109 -0500\n+@@ -2,7 +2,7 @@\n+ PREFIX ?= $(DESTDIR)/usr\n+ INCLUDEDIR ?= $(PREFIX)/include\n+ SBINDIR ?= $(PREFIX)/sbin\n+-MANDIR = $(PREFIX)/share/man\n++MANDIR ?= $(PREFIX)/share/man\n+ LIBDIR ?= $(PREFIX)/lib\n+ \n+ CFLAGS ?= -Werror -Wall -W\n+diff -urN a/sepolicy/Makefile b/sepolicy/Makefile\n+--- a/sepolicy/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/sepolicy/Makefile\t2013-08-23 09:16:21.302924109 -0500\n+@@ -5,25 +5,32 @@\n+ BINDIR ?= $(PREFIX)/bin\n+ SBINDIR ?= $(PREFIX)/sbin\n+ MANDIR ?= $(PREFIX)/share/man\n+-LOCALEDIR ?= /usr/share/locale\n++LOCALEDIR ?= $(DESTDIR)/usr/share/locale\n+ PYTHON ?= /usr/bin/python\n+ BASHCOMPLETIONDIR ?= $(DESTDIR)/etc/bash_completion.d/\n+ SHAREDIR ?= $(PREFIX)/share/sandbox\n+-override CFLAGS = $(LDFLAGS) -I$(PREFIX)/include -DPACKAGE=\"policycoreutils\" -Wall -Werror -Wextra -W -DSHARED -shared\n++override CFLAGS += $(LDFLAGS) -I$(PREFIX)/include -DPACKAGE=\"policycoreutils\" -Wall -Werror -Wextra -W -DSHARED -shared\n+ \n+ BASHCOMPLETIONS=sepolicy-bash-completion.sh \n+ \n++PYTHON_ARGS = LDSHARED=\"$(CC) -shared\" \\\n++\t\tCROSS_COMPILING=yes \\\n++\t\t_python_sysroot=$(DESTDIR) \\\n++\t\t_python_srcdir=$(PYTHON_SRC) \\\n++\t\t_python_prefix=/usr \\\n++\t\t_python_exec_prefix=/usr\n++\n+ all: python-build\n+ \n+ python-build: info.c search.c common.h policy.h policy.c\n+-\t$(PYTHON) setup.py build\n++\t$(PYTHON_ARGS) $(PYTHON) setup.py build\n+ \n+ clean:\n+ \t$(PYTHON) setup.py clean\n+ \t-rm -rf build *~ \\#* *pyc .#*\n+ \n+ install:\n+-\t$(PYTHON) setup.py install `test -n \"$(DESTDIR)\" && echo --root $(DESTDIR)`\n++\t$(PYTHON_ARGS) $(PYTHON) setup.py install --prefix=$(PREFIX)\n+ \t[ -d $(BINDIR) ] || mkdir -p $(BINDIR)\n+ \tinstall -m 755 sepolicy.py $(BINDIR)/sepolicy\n+ \t-mkdir -p $(MANDIR)/man8\n+diff -urN a/sestatus/Makefile b/sestatus/Makefile\n+--- a/sestatus/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/sestatus/Makefile\t2013-08-23 09:16:21.302924109 -0500\n+@@ -1,11 +1,11 @@\n+ # Installation directories.\n+ PREFIX ?= $(DESTDIR)/usr\n+ SBINDIR ?= $(PREFIX)/sbin\n+-MANDIR = $(PREFIX)/share/man\n++MANDIR ?= $(PREFIX)/share/man\n+ ETCDIR ?= $(DESTDIR)/etc\n+ LIBDIR ?= $(PREFIX)/lib\n+ \n+-CFLAGS = -Werror -Wall -W\n++CFLAGS ?= -Werror -Wall -W\n+ override CFLAGS += -I$(PREFIX)/include -D_FILE_OFFSET_BITS=64\n+ LDLIBS = -lselinux -L$(LIBDIR)\n+ \n+diff -urN a/setfiles/Makefile b/setfiles/Makefile\n+--- a/setfiles/Makefile\t2013-02-05 19:43:22.000000000 -0600\n++++ b/setfiles/Makefile\t2013-08-23 09:16:21.302924109 -0500\n+@@ -1,24 +1,27 @@\n+ # Installation directories.\n+ PREFIX ?= $(DESTDIR)/usr\n+ SBINDIR ?= $(DESTDIR)/sbin\n+-MANDIR = $(PREFIX)/share/man\n++MANDIR ?= $(PREFIX)/share/man\n+ LIBDIR ?= $(PREFIX)/lib\n+-AUDITH = $(shell ls /usr/include/libaudit.h 2>/dev/null)\n++AUDITH = $(shell ls $(DESTDIR)/usr/include/libaudit.h 2>/dev/null)\n+ \n+-PROGRESS_STEP=$(shell grep \"^\\#define STAR_COUNT\" restore.h | awk -S '{ print $$3 }')\n+-ABORT_ON_ERRORS=$(shell grep \"^\\#define ABORT_ON_ERRORS\" setfiles.c | awk -S '{ print $$3 }')\n++PROGRESS_STEP=$(shell grep \"^\\#define STAR_COUNT\" restore.h | awk '{ print $$3 }')\n++ABORT_ON_ERRORS=$(shell grep \"^\\#define ABORT_ON_ERRORS\" setfiles.c | awk '{ print $$3 }')\n+ \n+-CFLAGS = -g -Werror -Wall -W\n++CFLAGS ?= -g -Werror -Wall -W\n+ override CFLAGS += -I$(PREFIX)/include\n+ LDLIBS = -lselinux -lsepol -L$(LIBDIR)\n+ \n+-ifeq ($(AUDITH), /usr/include/libaudit.h)\n++ifeq ($(AUDITH), $(DESTDIR)/usr/include/libaudit.h)\n+ \toverride CFLAGS += -DUSE_AUDIT\n+ \tLDLIBS += -laudit\n+ endif\n+ \n+ all: setfiles restorecon man\n+ \n++%.o: %.c\n++\t$(CC) $(CFLAGS) -c -o $@ $<\n++\n+ setfiles: setfiles.o restore.o\n+ \n+ restorecon: setfiles\ndiff --git a/package/policycoreutils/policycoreutils.mk b/package/policycoreutils/policycoreutils.mk\nnew file mode 100644\nindex 0000000..67d1d25\n--- /dev/null\n+++ b/package/policycoreutils/policycoreutils.mk\n@@ -0,0 +1,231 @@\n+################################################################################\n+#\n+# policycoreutils\n+#\n+################################################################################\n+\n+POLICYCOREUTILS_VERSION = 2.1.14\n+POLICYCOREUTILS_SITE = http://userspace.selinuxproject.org/releases/20130423/\n+POLICYCOREUTILS_LICENSE = GPLv2\n+POLICYCOREUTILS_LICENSE_FILES = COPYING\n+\n+POLICYCOREUTILS_DEPENDENCIES = libsemanage libcap-ng\n+\n+ifeq ($(BR2_PACKAGE_LINUX_PAM),y)\n+\tPOLICYCOREUTILS_DEPENDENCIES += linux-pam\n+\tPOLICYCOREUTILS_DEBUGGING_MAKE_OPTS += NAMESPACE_PRIV=y\n+endif\n+\n+ifeq ($(BR2_PACKAGE_AUDIT),y)\n+\tPOLICYCOREUTILS_DEPENDENCIES += audit\n+\tPOLICYCOREUTILS_DEBUGGING_MAKE_OPTS += AUDIT_LOG_PRIV=y\n+endif\n+\n+# Enable LSPP_PRIV if both audit and linux pam are enabled\n+ifeq ($(BR2_PACKAGE_LINUX_PAM),y)\n+ifeq ($(BR2_PACKAGE_AUDIT),y)\n+\tPOLICYCOREUTILS_DEBUGGING_MAKE_OPTS += LSPP_PRIV=y\n+endif\n+endif\n+\n+# Undefining _FILE_OFFSET_BITS here because of a \"bug\" with glibc fts.h \n+# large file support.\n+# See https://bugzilla.redhat.com/show_bug.cgi?id=574992 for more information\n+POLICYCOREUTILS_MAKE_OPTS = \\\n+\t$(TARGET_CONFIGURE_OPTS) \\\n+\tCFLAGS+=\"-U_FILE_OFFSET_BITS\"\n+\n+ifeq ($(BR2_PACKAGE_POLICYCOREUTILS_POLICY_DEBUGGING),y)\n+\n+POLICYCOREUTILS_DEPENDENCIES += python host-python sepolgen setools\n+\n+POLICYCOREUTILS_DEBUGGING_MAKE_OPTS = $(TARGET_CONFIGURE_OPTS) \\\n+\tPYTHON=\"$(HOST_DIR)/usr/bin/python\" \\\n+\tPYLIBVER=\"python$(PYTHON_VERSION_MAJOR)\" \\\n+\tPYTHON_SRC=\"$(BUILD_DIR)/python$(PYTHON_VERSION)\"\n+\n+define POLICYCOREUTILS_DEBUGGING_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/audit2allow $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/audit2why $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/scripts $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semanage $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/sepolicy $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+endef\n+\n+define POLICYCOREUTILS_DEBUGGING_INSTALL_TARGET_CMDS\n+\t$(MAKE) -C $(@D)/audit2allow $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/audit2why $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/scripts $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semanage $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/sepolicy $(POLICYCOREUTILS_DEBUGGING_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+endef\n+\n+endif # End of BR2_PACKAGE_POLICYCOREUTILS_POLICY_DEBUGGING\n+\n+ifeq ($(BR2_PACKAGE_POLICYCOREUTILS_RESTORECOND),y)\n+\n+POLICYCOREUTILS_DEPENDENCIES += dbus-glib\n+\n+define POLICYCOREUTILS_RESTORECOND_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/restorecond $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+endef\n+\n+define POLICYCOREUTILS_RESTORECOND_INSTALL_TARGET_CMDS\n+\t$(MAKE) -C $(@D)/restorecond $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+\trm $(TARGET_DIR)/etc/init.d/restorecond\n+endef\n+\n+define POLICYCOREUTILS_RESTORECOND_INSTALL_INIT_SYSV\n+\t$(INSTALL) -m 0755 package/policycoreutils/S15restorecond \\\n+\t\t$(TARGET_DIR)/etc/init.d/\n+endef\n+\n+endif # End of BR2_PACKAGE_POLICYCOREUTILS_RESTORECOND\n+\n+ifeq ($(BR2_PACKAGE_POLICYCOREUTILS_MCSTRANS),y)\n+\n+POLICYCOREUTILS_DEPENDENCIES += pcre libcap\n+\n+define POLICYCOREUTILS_MCSTRANS_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/mcstrans $(TARGET_CONFIGURE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+endef\n+\n+define POLICYCOREUTILS_MCSTRANS_INSTALL_TARGET_CMDS\n+\t$(MAKE) -C $(@D)/mcstrans $(TARGET_CONFIGURE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+endef\n+\n+endif # End of BR2_PACKAGE_POLICYCOREUTILS_MCSTRANS\n+\n+ifeq ($(BR2_PACKAGE_POLICYCOREUTILS_SANDBOX),y)\n+\n+POLICYCOREUTILS_DEPENDENCIES += libcgroup\n+\n+define POLICYCOREUTILS_SANDBOX_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/sandbox $(TARGET_CONFIGURE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+endef\n+\n+define POLICYCOREUTILS_SANDBOX_INSTALL_TARGET_CMDS\n+\t$(MAKE) -C $(@D)/sandbox $(TARGET_CONFIGURE_OPTS) \\\n+\t\tDESTDIR=\"$(TARGET_DIR)\" install\n+endef\n+\n+endif # End of BR2_PACKAGE_POLICYCOREUTILS_SANDBOX\n+\n+define POLICYCOREUTILS_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/load_policy $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/newrole $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/run_init $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/secon $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semodule $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semodule_deps $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semodule_expand $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semodule_link $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/semodule_package $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/sepolgen-ifgen $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/sestatus $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/setfiles $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(MAKE) -C $(@D)/setsebool $(POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=\"$(STAGING_DIR)\" all\n+\t$(POLICYCOREUTILS_DEBUGGING_BUILD_CMDS)\n+\t$(POLICYCOREUTILS_RESTORECOND_BUILD_CMDS)\n+\t$(POLICYCOREUTILS_MCSTRANS_BUILD_CMDS)\n+\t$(POLICYCOREUTILS_SANDBOX_BUILD_CMDS)\n+endef\n+\n+define POLICYCOREUTILS_INSTALL_TARGET_CMDS\n+\t$(MAKE) -C $(@D)/load_policy DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/newrole DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/run_init DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/secon DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semodule DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semodule_deps DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semodule_expand DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semodule_link DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/semodule_package DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/sepolgen-ifgen DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/sestatus DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/setfiles DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(MAKE) -C $(@D)/setsebool DESTDIR=\"$(TARGET_DIR)\" install\n+\t$(POLICYCOREUTILS_DEBUGGING_INSTALL_TARGET_CMDS)\n+\t$(POLICYCOREUTILS_RESTORECOND_INSTALL_TARGET_CMDS)\n+\t$(POLICYCOREUTILS_MCSTRANS_INSTALL_TARGET_CMDS)\n+\t$(POLICYCOREUTILS_SANDBOX_INSTALL_TARGET_CMDS)\n+endef\n+\n+define POLICYCOREUTILS_INSTALL_INIT_SYSV\n+\t$(POLICYCOREUTILS_RESTORECOND_INSTALL_INIT_SYSV)\n+endef\n+\n+HOST_POLICYCOREUTILS_DEPENDENCIES = host-libsemanage\n+\n+# Undefining _FILE_OFFSET_BITS here because of a \"bug\" with glibc fts.h \n+# large file support.\n+# See https://bugzilla.redhat.com/show_bug.cgi?id=574992 for more information\n+HOST_POLICYCOREUTILS_MAKE_OPTS = \\\n+\t$(HOST_CONFIGURE_OPTS) \\\n+\tCFLAGS+=\"-U_FILE_OFFSET_BITS\"\n+\n+# Note: We are only building the programs required by the refpolicy build\n+define HOST_POLICYCOREUTILS_BUILD_CMDS\n+\t$(MAKE) -C $(@D)/semodule $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_package $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_link $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_expand $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_deps $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/load_policy $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/setfiles $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+endef\n+\n+define HOST_POLICYCOREUTILS_INSTALL_CMDS\n+\t$(MAKE) -C $(@D)/semodule install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_package install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_link install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_expand install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/semodule_deps install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/load_policy install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+\t$(MAKE) -C $(@D)/setfiles install $(HOST_POLICYCOREUTILS_MAKE_OPTS) \\\n+\t\tDESTDIR=$(HOST_DIR)\n+endef\n+\n+$(eval $(generic-package))\n+$(eval $(host-generic-package))\n", "prefixes": [ "v5", "12/20" ] }