[DSE-Dev] Bug#1063135: libselinux: NMU diff for 64-bit time_t transition

Steve Langasek vorlon at debian.org
Mon Feb 5 08:25:52 GMT 2024


Source: libselinux
Version: 3.5-2
Severity: serious
Tags: patch pending sid trixie
Justification: library ABI skew on upgrade
User: debian-arm at lists.debian.org
Usertags: time-t

NOTICE: these changes must not be uploaded to unstable yet!

Dear maintainer,

As part of the 64-bit time_t transition required to support 32-bit
architectures in 2038 and beyond
(https://wiki.debian.org/ReleaseGoals/64bit-time), we have identified
libselinux as a source package shipping runtime libraries whose ABI
either is affected by the change in size of time_t, or could not be
analyzed via abi-compliance-checker (and therefore to be on the safe
side we assume is affected).

To ensure that inconsistent combinations of libraries with their
reverse-dependencies are never installed together, it is necessary to
have a library transition, which is most easily done by renaming the
runtime library package.

Since turning on 64-bit time_t is being handled centrally through a change
to the default dpkg-buildflags (https://bugs.debian.org/1037136), it is
important that libraries affected by this ABI change all be uploaded close
together in time.  Therefore I have prepared a 0-day NMU for libselinux
which will initially be uploaded to experimental if possible, then to
unstable after packages have cleared binary NEW.

Please find the patch for this NMU attached.

If you have any concerns about this patch, please reach out ASAP.  Although
this package will be uploaded to experimental immediately, there will be a
period of several days before we begin uploads to unstable; so if information
becomes available that your package should not be included in the transition,
there is time for us to amend the planned uploads.



-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-14-generic (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
-------------- next part --------------
diff -Nru libselinux-3.5/debian/changelog libselinux-3.5/debian/changelog
--- libselinux-3.5/debian/changelog	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/changelog	2024-02-05 08:22:28.000000000 +0000
@@ -1,3 +1,10 @@
+libselinux (3.5-2.1) experimental; urgency=medium
+
+  * Non-maintainer upload.
+  * Rename libraries for 64-bit time_t transition.
+
+ -- Steve Langasek <vorlon at debian.org>  Mon, 05 Feb 2024 08:22:28 +0000
+
 libselinux (3.5-2) unstable; urgency=medium
 
   [ Michael Biebl ]
diff -Nru libselinux-3.5/debian/control libselinux-3.5/debian/control
--- libselinux-3.5/debian/control	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/control	2024-02-05 08:22:28.000000000 +0000
@@ -35,7 +35,10 @@
  provides utility programs to get and set process and file security
  contexts and to obtain security policy decisions.
 
-Package: libselinux1
+Package: libselinux1t64
+Provides: ${t64:Provides}
+Replaces: libselinux1
+Breaks: libselinux1 (<< ${source:Version})
 Architecture: linux-any
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
@@ -54,7 +57,7 @@
  control policies, including those based on the concepts of Type
  Enforcement, Role-based Access Control, and Multi-level Security.
  .
- libselinux1 provides an API for SELinux applications to get and set
+ libselinux1t64 provides an API for SELinux applications to get and set
  process and file security contexts and to obtain security policy
  decisions.  Required for any applications that use the SELinux
  API. libselinux may use the shared libsepol to manipulate the binary
@@ -63,7 +66,7 @@
 
 Package: libselinux1-dev
 Architecture: linux-any
-Depends: libselinux1 (= ${binary:Version}),
+Depends: libselinux1t64 (= ${binary:Version}),
          libsepol-dev (>= 3.5),
          libpcre2-dev,
          ${misc:Depends}
diff -Nru libselinux-3.5/debian/libselinux1.install libselinux-3.5/debian/libselinux1.install
--- libselinux-3.5/debian/libselinux1.install	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/libselinux1.install	1970-01-01 00:00:00.000000000 +0000
@@ -1 +0,0 @@
-usr/lib/*/*.so.*
diff -Nru libselinux-3.5/debian/libselinux1.symbols libselinux-3.5/debian/libselinux1.symbols
--- libselinux-3.5/debian/libselinux1.symbols	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/libselinux1.symbols	1970-01-01 00:00:00.000000000 +0000
@@ -1,246 +0,0 @@
-libselinux.so.1 libselinux1 #MINVER#
-* Build-Depends-Package: libselinux1-dev
- LIBSELINUX_1.0 at LIBSELINUX_1.0 3.1~
- LIBSELINUX_3.4 at LIBSELINUX_3.4 3.4
- LIBSELINUX_3.5 at LIBSELINUX_3.5 3.5
- avc_add_callback at LIBSELINUX_1.0 3.1~
- avc_audit at LIBSELINUX_1.0 3.1~
- avc_av_stats at LIBSELINUX_1.0 3.1~
- avc_cache_stats at LIBSELINUX_1.0 3.1~
- avc_cleanup at LIBSELINUX_1.0 3.1~
- avc_compute_create at LIBSELINUX_1.0 3.1~
- avc_compute_member at LIBSELINUX_1.0 3.1~
- avc_context_to_sid at LIBSELINUX_1.0 3.1~
- avc_context_to_sid_raw at LIBSELINUX_1.0 3.1~
- avc_destroy at LIBSELINUX_1.0 3.1~
- avc_get_initial_sid at LIBSELINUX_1.0 3.1~
- avc_has_perm at LIBSELINUX_1.0 3.1~
- avc_has_perm_noaudit at LIBSELINUX_1.0 3.1~
- avc_init at LIBSELINUX_1.0 3.1~
- avc_netlink_acquire_fd at LIBSELINUX_1.0 3.1~
- avc_netlink_check_nb at LIBSELINUX_1.0 3.1~
- avc_netlink_close at LIBSELINUX_1.0 3.1~
- avc_netlink_loop at LIBSELINUX_1.0 3.1~
- avc_netlink_open at LIBSELINUX_1.0 3.1~
- avc_netlink_release_fd at LIBSELINUX_1.0 3.1~
- avc_open at LIBSELINUX_1.0 3.1~
- avc_reset at LIBSELINUX_1.0 3.1~
- avc_sid_stats at LIBSELINUX_1.0 3.1~
- avc_sid_to_context at LIBSELINUX_1.0 3.1~
- avc_sid_to_context_raw at LIBSELINUX_1.0 3.1~
- checkPasswdAccess at LIBSELINUX_1.0 3.1~
- context_free at LIBSELINUX_1.0 3.1~
- context_new at LIBSELINUX_1.0 3.1~
- context_range_get at LIBSELINUX_1.0 3.1~
- context_range_set at LIBSELINUX_1.0 3.1~
- context_role_get at LIBSELINUX_1.0 3.1~
- context_role_set at LIBSELINUX_1.0 3.1~
- context_str at LIBSELINUX_1.0 3.1~
- context_type_get at LIBSELINUX_1.0 3.1~
- context_type_set at LIBSELINUX_1.0 3.1~
- context_user_get at LIBSELINUX_1.0 3.1~
- context_user_set at LIBSELINUX_1.0 3.1~
- fgetfilecon at LIBSELINUX_1.0 3.1~
- fini_selinuxmnt at LIBSELINUX_1.0 3.1~
- fgetfilecon_raw at LIBSELINUX_1.0 3.1~
- freecon at LIBSELINUX_1.0 3.1~
- freeconary at LIBSELINUX_1.0 3.1~
- fsetfilecon at LIBSELINUX_1.0 3.1~
- fsetfilecon_raw at LIBSELINUX_1.0 3.1~
- get_default_context at LIBSELINUX_1.0 3.1~
- get_default_context_with_level at LIBSELINUX_1.0 3.1~
- get_default_context_with_role at LIBSELINUX_1.0 3.1~
- get_default_context_with_rolelevel at LIBSELINUX_1.0 3.1~
- get_default_type at LIBSELINUX_1.0 3.1~
- get_ordered_context_list at LIBSELINUX_1.0 3.1~
- get_ordered_context_list_with_level at LIBSELINUX_1.0 3.1~
- getcon at LIBSELINUX_1.0 3.1~
- getcon_raw at LIBSELINUX_1.0 3.1~
- getexeccon at LIBSELINUX_1.0 3.1~
- getexeccon_raw at LIBSELINUX_1.0 3.1~
- getfilecon at LIBSELINUX_1.0 3.1~
- getfilecon_raw at LIBSELINUX_1.0 3.1~
- getfscreatecon at LIBSELINUX_1.0 3.1~
- getfscreatecon_raw at LIBSELINUX_1.0 3.1~
- getkeycreatecon at LIBSELINUX_1.0 3.1~
- getkeycreatecon_raw at LIBSELINUX_1.0 3.1~
- getpeercon at LIBSELINUX_1.0 3.1~
- getpeercon_raw at LIBSELINUX_1.0 3.1~
- getpidcon at LIBSELINUX_1.0 3.1~
- getpidcon_raw at LIBSELINUX_1.0 3.1~
- getpidprevcon at LIBSELINUX_3.5 3.5
- getpidprevcon_raw at LIBSELINUX_3.5 3.5
- getprevcon at LIBSELINUX_1.0 3.1~
- getprevcon_raw at LIBSELINUX_1.0 3.1~
- getseuser at LIBSELINUX_1.0 3.1~
- getseuserbyname at LIBSELINUX_1.0 3.1~
- getsockcreatecon at LIBSELINUX_1.0 3.1~
- getsockcreatecon_raw at LIBSELINUX_1.0 3.1~
- is_context_customizable at LIBSELINUX_1.0 3.1~
- is_selinux_enabled at LIBSELINUX_1.0 3.1~
- is_selinux_mls_enabled at LIBSELINUX_1.0 3.1~
- lgetfilecon at LIBSELINUX_1.0 3.1~
- lgetfilecon_raw at LIBSELINUX_1.0 3.1~
- lsetfilecon at LIBSELINUX_1.0 3.1~
- lsetfilecon_raw at LIBSELINUX_1.0 3.1~
- manual_user_enter_context at LIBSELINUX_1.0 3.1~
- matchmediacon at LIBSELINUX_1.0 3.1~
- matchpathcon at LIBSELINUX_1.0 3.1~
- matchpathcon_checkmatches at LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_add at LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_destroy at LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_eval at LIBSELINUX_1.0 3.1~
- matchpathcon_fini at LIBSELINUX_1.0 3.1~
- matchpathcon_index at LIBSELINUX_1.0 3.1~
- matchpathcon_init at LIBSELINUX_1.0 3.1~
- matchpathcon_init_prefix at LIBSELINUX_1.0 3.1~
- mode_to_security_class at LIBSELINUX_1.0 3.1~
- print_access_vector at LIBSELINUX_1.0 3.1~
- query_user_context at LIBSELINUX_1.0 3.1~
- realpath_not_final at LIBSELINUX_1.0 3.1~
- rpm_execcon at LIBSELINUX_1.0 3.1~
- security_av_perm_to_string at LIBSELINUX_1.0 3.1~
- security_av_string at LIBSELINUX_1.0 3.1~
- security_canonicalize_context at LIBSELINUX_1.0 3.1~
- security_canonicalize_context_raw at LIBSELINUX_1.0 3.1~
- security_check_context at LIBSELINUX_1.0 3.1~
- security_check_context_raw at LIBSELINUX_1.0 3.1~
- security_class_to_string at LIBSELINUX_1.0 3.1~
- security_commit_booleans at LIBSELINUX_1.0 3.1~
- security_compute_av at LIBSELINUX_1.0 3.1~
- security_compute_av_flags at LIBSELINUX_1.0 3.1~
- security_compute_av_flags_raw at LIBSELINUX_1.0 3.1~
- security_compute_av_raw at LIBSELINUX_1.0 3.1~
- security_compute_create at LIBSELINUX_1.0 3.1~
- security_compute_create_name at LIBSELINUX_1.0 3.1~
- security_compute_create_name_raw at LIBSELINUX_1.0 3.1~
- security_compute_create_raw at LIBSELINUX_1.0 3.1~
- security_compute_member at LIBSELINUX_1.0 3.1~
- security_compute_member_raw at LIBSELINUX_1.0 3.1~
- security_compute_relabel at LIBSELINUX_1.0 3.1~
- security_compute_relabel_raw at LIBSELINUX_1.0 3.1~
- security_compute_user at LIBSELINUX_1.0 3.1~
- security_compute_user_raw at LIBSELINUX_1.0 3.1~
- security_deny_unknown at LIBSELINUX_1.0 3.1~
- security_disable at LIBSELINUX_1.0 3.1~
- security_get_boolean_active at LIBSELINUX_1.0 3.1~
- security_get_boolean_names at LIBSELINUX_1.0 3.1~
- security_get_boolean_pending at LIBSELINUX_1.0 3.1~
- security_get_checkreqprot at LIBSELINUX_1.0 3.1~
- security_get_initial_context at LIBSELINUX_1.0 3.1~
- security_get_initial_context_raw at LIBSELINUX_1.0 3.1~
- security_getenforce at LIBSELINUX_1.0 3.1~
- security_load_booleans at LIBSELINUX_1.0 3.1~
- security_load_policy at LIBSELINUX_1.0 3.1~
- security_policyvers at LIBSELINUX_1.0 3.1~
- security_reject_unknown at LIBSELINUX_1.0 3.1~
- security_set_boolean at LIBSELINUX_1.0 3.1~
- security_set_boolean_list at LIBSELINUX_1.0 3.1~
- security_setenforce at LIBSELINUX_1.0 3.1~
- security_validatetrans at LIBSELINUX_1.0 3.1~
- security_validatetrans_raw at LIBSELINUX_1.0 3.1~
- selabel_close at LIBSELINUX_1.0 3.1~
- selabel_cmp at LIBSELINUX_1.0 3.1~
- selabel_digest at LIBSELINUX_1.0 3.1~
- selabel_get_digests_all_partial_matches at LIBSELINUX_1.0 3.1~
- selabel_hash_all_partial_matches at LIBSELINUX_1.0 3.1~
- selabel_lookup at LIBSELINUX_1.0 3.1~
- selabel_lookup_best_match at LIBSELINUX_1.0 3.1~
- selabel_lookup_best_match_raw at LIBSELINUX_1.0 3.1~
- selabel_lookup_raw at LIBSELINUX_1.0 3.1~
- selabel_open at LIBSELINUX_1.0 3.1~
- selabel_partial_match at LIBSELINUX_1.0 3.1~
- selabel_stats at LIBSELINUX_1.0 3.1~
- selinux_binary_policy_path at LIBSELINUX_1.0 3.1~
- selinux_boolean_sub at LIBSELINUX_1.0 3.1~
- selinux_booleans_path at LIBSELINUX_1.0 3.1~
- selinux_booleans_subs_path at LIBSELINUX_1.0 3.1~
- selinux_check_access at LIBSELINUX_1.0 3.1~
- selinux_check_passwd_access at LIBSELINUX_1.0 3.1~
- selinux_check_securetty_context at LIBSELINUX_1.0 3.1~
- selinux_colors_path at LIBSELINUX_1.0 3.1~
- selinux_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_current_policy_path at LIBSELINUX_1.0 3.1~
- selinux_customizable_types_path at LIBSELINUX_1.0 3.1~
- selinux_default_context_path at LIBSELINUX_1.0 3.1~
- selinux_default_type_path at LIBSELINUX_1.0 3.1~
- selinux_failsafe_context_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_cmp at LIBSELINUX_1.0 3.1~
- selinux_file_context_homedir_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_local_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_subs_dist_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_subs_path at LIBSELINUX_1.0 3.1~
- selinux_file_context_verify at LIBSELINUX_1.0 3.1~
- selinux_flush_class_cache at LIBSELINUX_1.0 3.1~
- selinux_get_callback at LIBSELINUX_1.0 3.1~
- selinux_getenforcemode at LIBSELINUX_1.0 3.1~
- selinux_getpolicytype at LIBSELINUX_1.0 3.1~
- selinux_homedir_context_path at LIBSELINUX_1.0 3.1~
- selinux_init_load_policy at LIBSELINUX_1.0 3.1~
- selinux_lsetfilecon_default at LIBSELINUX_1.0 3.1~
- selinux_lxc_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_media_context_path at LIBSELINUX_1.0 3.1~
- selinux_mkload_policy at LIBSELINUX_1.0 3.1~
- selinux_mnt at LIBSELINUX_1.0 3.1~
- selinux_netfilter_context_path at LIBSELINUX_1.0 3.1~
- selinux_openrc_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_openssh_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_path at LIBSELINUX_1.0 3.1~
- selinux_policy_root at LIBSELINUX_1.0 3.1~
- selinux_raw_context_to_color at LIBSELINUX_1.0 3.1~
- selinux_raw_to_trans_context at LIBSELINUX_1.0 3.1~
- selinux_removable_context_path at LIBSELINUX_1.0 3.1~
- selinux_reset_config at LIBSELINUX_1.0 3.1~
- selinux_restorecon at LIBSELINUX_1.0 3.1~
- selinux_restorecon_default_handle at LIBSELINUX_1.0 3.1~
- selinux_restorecon_get_skipped_errors at LIBSELINUX_3.4 3.4
- selinux_restorecon_parallel at LIBSELINUX_3.4 3.4
- selinux_restorecon_set_alt_rootpath at LIBSELINUX_1.0 3.1~
- selinux_restorecon_set_exclude_list at LIBSELINUX_1.0 3.1~
- selinux_restorecon_set_sehandle at LIBSELINUX_1.0 3.1~
- selinux_restorecon_xattr at LIBSELINUX_1.0 3.1~
- selinux_securetty_types_path at LIBSELINUX_1.0 3.1~
- selinux_sepgsql_context_path at LIBSELINUX_1.0 3.1~
- selinux_set_callback at LIBSELINUX_1.0 3.1~
- selinux_set_mapping at LIBSELINUX_1.0 3.1~
- selinux_set_policy_root at LIBSELINUX_1.0 3.1~
- selinux_snapperd_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_status_close at LIBSELINUX_1.0 3.1~
- selinux_status_deny_unknown at LIBSELINUX_1.0 3.1~
- selinux_status_getenforce at LIBSELINUX_1.0 3.1~
- selinux_status_open at LIBSELINUX_1.0 3.1~
- selinux_status_policyload at LIBSELINUX_1.0 3.1~
- selinux_status_updated at LIBSELINUX_1.0 3.1~
- selinux_systemd_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_trans_to_raw_context at LIBSELINUX_1.0 3.1~
- selinux_translations_path at LIBSELINUX_1.0 3.1~
- selinux_user_contexts_path at LIBSELINUX_1.0 3.1~
- selinux_users_path at LIBSELINUX_1.0 3.1~
- selinux_usersconf_path at LIBSELINUX_1.0 3.1~
- selinux_virtual_domain_context_path at LIBSELINUX_1.0 3.1~
- selinux_virtual_image_context_path at LIBSELINUX_1.0 3.1~
- selinux_x_context_path at LIBSELINUX_1.0 3.1~
- selinuxfs_exists at LIBSELINUX_1.0 3.1~
- set_matchpathcon_canoncon at LIBSELINUX_1.0 3.1~
- set_matchpathcon_flags at LIBSELINUX_1.0 3.1~
- set_matchpathcon_invalidcon at LIBSELINUX_1.0 3.1~
- set_matchpathcon_printf at LIBSELINUX_1.0 3.1~
- set_selinuxmnt at LIBSELINUX_1.0 3.1~
- setcon at LIBSELINUX_1.0 3.1~
- setcon_raw at LIBSELINUX_1.0 3.1~
- setexeccon at LIBSELINUX_1.0 3.1~
- setexeccon_raw at LIBSELINUX_1.0 3.1~
- setexecfilecon at LIBSELINUX_1.0 3.1~
- setfilecon at LIBSELINUX_1.0 3.1~
- setfilecon_raw at LIBSELINUX_1.0 3.1~
- setfscreatecon at LIBSELINUX_1.0 3.1~
- setfscreatecon_raw at LIBSELINUX_1.0 3.1~
- setkeycreatecon at LIBSELINUX_1.0 3.1~
- setkeycreatecon_raw at LIBSELINUX_1.0 3.1~
- setsockcreatecon at LIBSELINUX_1.0 3.1~
- setsockcreatecon_raw at LIBSELINUX_1.0 3.1~
- sidget at LIBSELINUX_1.0 3.1~
- sidput at LIBSELINUX_1.0 3.1~
- string_to_av_perm at LIBSELINUX_1.0 3.1~
- string_to_security_class at LIBSELINUX_1.0 3.1~
diff -Nru libselinux-3.5/debian/libselinux1.tmpfiles libselinux-3.5/debian/libselinux1.tmpfiles
--- libselinux-3.5/debian/libselinux1.tmpfiles	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/libselinux1.tmpfiles	1970-01-01 00:00:00.000000000 +0000
@@ -1,4 +0,0 @@
-# See tmpfiles.d(5) for details
-
-# Type Path    Mode UID  GID  Age Argument
-d /run/setrans 0755 root root -   -
diff -Nru libselinux-3.5/debian/libselinux1t64.install libselinux-3.5/debian/libselinux1t64.install
--- libselinux-3.5/debian/libselinux1t64.install	1970-01-01 00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.install	2024-01-24 20:23:37.000000000 +0000
@@ -0,0 +1 @@
+usr/lib/*/*.so.*
diff -Nru libselinux-3.5/debian/libselinux1t64.lintian-overrides libselinux-3.5/debian/libselinux1t64.lintian-overrides
--- libselinux-3.5/debian/libselinux1t64.lintian-overrides	1970-01-01 00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.lintian-overrides	2024-02-05 08:22:28.000000000 +0000
@@ -0,0 +1 @@
+libselinux1t64: package-name-doesnt-match-sonames libselinux1
diff -Nru libselinux-3.5/debian/libselinux1t64.symbols libselinux-3.5/debian/libselinux1t64.symbols
--- libselinux-3.5/debian/libselinux1t64.symbols	1970-01-01 00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.symbols	2024-02-05 08:22:28.000000000 +0000
@@ -0,0 +1,246 @@
+libselinux.so.1 libselinux1t64 #MINVER#
+* Build-Depends-Package: libselinux1-dev
+ LIBSELINUX_1.0 at LIBSELINUX_1.0 3.1~
+ LIBSELINUX_3.4 at LIBSELINUX_3.4 3.4
+ LIBSELINUX_3.5 at LIBSELINUX_3.5 3.5
+ avc_add_callback at LIBSELINUX_1.0 3.1~
+ avc_audit at LIBSELINUX_1.0 3.1~
+ avc_av_stats at LIBSELINUX_1.0 3.1~
+ avc_cache_stats at LIBSELINUX_1.0 3.1~
+ avc_cleanup at LIBSELINUX_1.0 3.1~
+ avc_compute_create at LIBSELINUX_1.0 3.1~
+ avc_compute_member at LIBSELINUX_1.0 3.1~
+ avc_context_to_sid at LIBSELINUX_1.0 3.1~
+ avc_context_to_sid_raw at LIBSELINUX_1.0 3.1~
+ avc_destroy at LIBSELINUX_1.0 3.1~
+ avc_get_initial_sid at LIBSELINUX_1.0 3.1~
+ avc_has_perm at LIBSELINUX_1.0 3.1~
+ avc_has_perm_noaudit at LIBSELINUX_1.0 3.1~
+ avc_init at LIBSELINUX_1.0 3.1~
+ avc_netlink_acquire_fd at LIBSELINUX_1.0 3.1~
+ avc_netlink_check_nb at LIBSELINUX_1.0 3.1~
+ avc_netlink_close at LIBSELINUX_1.0 3.1~
+ avc_netlink_loop at LIBSELINUX_1.0 3.1~
+ avc_netlink_open at LIBSELINUX_1.0 3.1~
+ avc_netlink_release_fd at LIBSELINUX_1.0 3.1~
+ avc_open at LIBSELINUX_1.0 3.1~
+ avc_reset at LIBSELINUX_1.0 3.1~
+ avc_sid_stats at LIBSELINUX_1.0 3.1~
+ avc_sid_to_context at LIBSELINUX_1.0 3.1~
+ avc_sid_to_context_raw at LIBSELINUX_1.0 3.1~
+ checkPasswdAccess at LIBSELINUX_1.0 3.1~
+ context_free at LIBSELINUX_1.0 3.1~
+ context_new at LIBSELINUX_1.0 3.1~
+ context_range_get at LIBSELINUX_1.0 3.1~
+ context_range_set at LIBSELINUX_1.0 3.1~
+ context_role_get at LIBSELINUX_1.0 3.1~
+ context_role_set at LIBSELINUX_1.0 3.1~
+ context_str at LIBSELINUX_1.0 3.1~
+ context_type_get at LIBSELINUX_1.0 3.1~
+ context_type_set at LIBSELINUX_1.0 3.1~
+ context_user_get at LIBSELINUX_1.0 3.1~
+ context_user_set at LIBSELINUX_1.0 3.1~
+ fgetfilecon at LIBSELINUX_1.0 3.1~
+ fini_selinuxmnt at LIBSELINUX_1.0 3.1~
+ fgetfilecon_raw at LIBSELINUX_1.0 3.1~
+ freecon at LIBSELINUX_1.0 3.1~
+ freeconary at LIBSELINUX_1.0 3.1~
+ fsetfilecon at LIBSELINUX_1.0 3.1~
+ fsetfilecon_raw at LIBSELINUX_1.0 3.1~
+ get_default_context at LIBSELINUX_1.0 3.1~
+ get_default_context_with_level at LIBSELINUX_1.0 3.1~
+ get_default_context_with_role at LIBSELINUX_1.0 3.1~
+ get_default_context_with_rolelevel at LIBSELINUX_1.0 3.1~
+ get_default_type at LIBSELINUX_1.0 3.1~
+ get_ordered_context_list at LIBSELINUX_1.0 3.1~
+ get_ordered_context_list_with_level at LIBSELINUX_1.0 3.1~
+ getcon at LIBSELINUX_1.0 3.1~
+ getcon_raw at LIBSELINUX_1.0 3.1~
+ getexeccon at LIBSELINUX_1.0 3.1~
+ getexeccon_raw at LIBSELINUX_1.0 3.1~
+ getfilecon at LIBSELINUX_1.0 3.1~
+ getfilecon_raw at LIBSELINUX_1.0 3.1~
+ getfscreatecon at LIBSELINUX_1.0 3.1~
+ getfscreatecon_raw at LIBSELINUX_1.0 3.1~
+ getkeycreatecon at LIBSELINUX_1.0 3.1~
+ getkeycreatecon_raw at LIBSELINUX_1.0 3.1~
+ getpeercon at LIBSELINUX_1.0 3.1~
+ getpeercon_raw at LIBSELINUX_1.0 3.1~
+ getpidcon at LIBSELINUX_1.0 3.1~
+ getpidcon_raw at LIBSELINUX_1.0 3.1~
+ getpidprevcon at LIBSELINUX_3.5 3.5
+ getpidprevcon_raw at LIBSELINUX_3.5 3.5
+ getprevcon at LIBSELINUX_1.0 3.1~
+ getprevcon_raw at LIBSELINUX_1.0 3.1~
+ getseuser at LIBSELINUX_1.0 3.1~
+ getseuserbyname at LIBSELINUX_1.0 3.1~
+ getsockcreatecon at LIBSELINUX_1.0 3.1~
+ getsockcreatecon_raw at LIBSELINUX_1.0 3.1~
+ is_context_customizable at LIBSELINUX_1.0 3.1~
+ is_selinux_enabled at LIBSELINUX_1.0 3.1~
+ is_selinux_mls_enabled at LIBSELINUX_1.0 3.1~
+ lgetfilecon at LIBSELINUX_1.0 3.1~
+ lgetfilecon_raw at LIBSELINUX_1.0 3.1~
+ lsetfilecon at LIBSELINUX_1.0 3.1~
+ lsetfilecon_raw at LIBSELINUX_1.0 3.1~
+ manual_user_enter_context at LIBSELINUX_1.0 3.1~
+ matchmediacon at LIBSELINUX_1.0 3.1~
+ matchpathcon at LIBSELINUX_1.0 3.1~
+ matchpathcon_checkmatches at LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_add at LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_destroy at LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_eval at LIBSELINUX_1.0 3.1~
+ matchpathcon_fini at LIBSELINUX_1.0 3.1~
+ matchpathcon_index at LIBSELINUX_1.0 3.1~
+ matchpathcon_init at LIBSELINUX_1.0 3.1~
+ matchpathcon_init_prefix at LIBSELINUX_1.0 3.1~
+ mode_to_security_class at LIBSELINUX_1.0 3.1~
+ print_access_vector at LIBSELINUX_1.0 3.1~
+ query_user_context at LIBSELINUX_1.0 3.1~
+ realpath_not_final at LIBSELINUX_1.0 3.1~
+ rpm_execcon at LIBSELINUX_1.0 3.1~
+ security_av_perm_to_string at LIBSELINUX_1.0 3.1~
+ security_av_string at LIBSELINUX_1.0 3.1~
+ security_canonicalize_context at LIBSELINUX_1.0 3.1~
+ security_canonicalize_context_raw at LIBSELINUX_1.0 3.1~
+ security_check_context at LIBSELINUX_1.0 3.1~
+ security_check_context_raw at LIBSELINUX_1.0 3.1~
+ security_class_to_string at LIBSELINUX_1.0 3.1~
+ security_commit_booleans at LIBSELINUX_1.0 3.1~
+ security_compute_av at LIBSELINUX_1.0 3.1~
+ security_compute_av_flags at LIBSELINUX_1.0 3.1~
+ security_compute_av_flags_raw at LIBSELINUX_1.0 3.1~
+ security_compute_av_raw at LIBSELINUX_1.0 3.1~
+ security_compute_create at LIBSELINUX_1.0 3.1~
+ security_compute_create_name at LIBSELINUX_1.0 3.1~
+ security_compute_create_name_raw at LIBSELINUX_1.0 3.1~
+ security_compute_create_raw at LIBSELINUX_1.0 3.1~
+ security_compute_member at LIBSELINUX_1.0 3.1~
+ security_compute_member_raw at LIBSELINUX_1.0 3.1~
+ security_compute_relabel at LIBSELINUX_1.0 3.1~
+ security_compute_relabel_raw at LIBSELINUX_1.0 3.1~
+ security_compute_user at LIBSELINUX_1.0 3.1~
+ security_compute_user_raw at LIBSELINUX_1.0 3.1~
+ security_deny_unknown at LIBSELINUX_1.0 3.1~
+ security_disable at LIBSELINUX_1.0 3.1~
+ security_get_boolean_active at LIBSELINUX_1.0 3.1~
+ security_get_boolean_names at LIBSELINUX_1.0 3.1~
+ security_get_boolean_pending at LIBSELINUX_1.0 3.1~
+ security_get_checkreqprot at LIBSELINUX_1.0 3.1~
+ security_get_initial_context at LIBSELINUX_1.0 3.1~
+ security_get_initial_context_raw at LIBSELINUX_1.0 3.1~
+ security_getenforce at LIBSELINUX_1.0 3.1~
+ security_load_booleans at LIBSELINUX_1.0 3.1~
+ security_load_policy at LIBSELINUX_1.0 3.1~
+ security_policyvers at LIBSELINUX_1.0 3.1~
+ security_reject_unknown at LIBSELINUX_1.0 3.1~
+ security_set_boolean at LIBSELINUX_1.0 3.1~
+ security_set_boolean_list at LIBSELINUX_1.0 3.1~
+ security_setenforce at LIBSELINUX_1.0 3.1~
+ security_validatetrans at LIBSELINUX_1.0 3.1~
+ security_validatetrans_raw at LIBSELINUX_1.0 3.1~
+ selabel_close at LIBSELINUX_1.0 3.1~
+ selabel_cmp at LIBSELINUX_1.0 3.1~
+ selabel_digest at LIBSELINUX_1.0 3.1~
+ selabel_get_digests_all_partial_matches at LIBSELINUX_1.0 3.1~
+ selabel_hash_all_partial_matches at LIBSELINUX_1.0 3.1~
+ selabel_lookup at LIBSELINUX_1.0 3.1~
+ selabel_lookup_best_match at LIBSELINUX_1.0 3.1~
+ selabel_lookup_best_match_raw at LIBSELINUX_1.0 3.1~
+ selabel_lookup_raw at LIBSELINUX_1.0 3.1~
+ selabel_open at LIBSELINUX_1.0 3.1~
+ selabel_partial_match at LIBSELINUX_1.0 3.1~
+ selabel_stats at LIBSELINUX_1.0 3.1~
+ selinux_binary_policy_path at LIBSELINUX_1.0 3.1~
+ selinux_boolean_sub at LIBSELINUX_1.0 3.1~
+ selinux_booleans_path at LIBSELINUX_1.0 3.1~
+ selinux_booleans_subs_path at LIBSELINUX_1.0 3.1~
+ selinux_check_access at LIBSELINUX_1.0 3.1~
+ selinux_check_passwd_access at LIBSELINUX_1.0 3.1~
+ selinux_check_securetty_context at LIBSELINUX_1.0 3.1~
+ selinux_colors_path at LIBSELINUX_1.0 3.1~
+ selinux_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_current_policy_path at LIBSELINUX_1.0 3.1~
+ selinux_customizable_types_path at LIBSELINUX_1.0 3.1~
+ selinux_default_context_path at LIBSELINUX_1.0 3.1~
+ selinux_default_type_path at LIBSELINUX_1.0 3.1~
+ selinux_failsafe_context_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_cmp at LIBSELINUX_1.0 3.1~
+ selinux_file_context_homedir_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_local_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_subs_dist_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_subs_path at LIBSELINUX_1.0 3.1~
+ selinux_file_context_verify at LIBSELINUX_1.0 3.1~
+ selinux_flush_class_cache at LIBSELINUX_1.0 3.1~
+ selinux_get_callback at LIBSELINUX_1.0 3.1~
+ selinux_getenforcemode at LIBSELINUX_1.0 3.1~
+ selinux_getpolicytype at LIBSELINUX_1.0 3.1~
+ selinux_homedir_context_path at LIBSELINUX_1.0 3.1~
+ selinux_init_load_policy at LIBSELINUX_1.0 3.1~
+ selinux_lsetfilecon_default at LIBSELINUX_1.0 3.1~
+ selinux_lxc_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_media_context_path at LIBSELINUX_1.0 3.1~
+ selinux_mkload_policy at LIBSELINUX_1.0 3.1~
+ selinux_mnt at LIBSELINUX_1.0 3.1~
+ selinux_netfilter_context_path at LIBSELINUX_1.0 3.1~
+ selinux_openrc_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_openssh_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_path at LIBSELINUX_1.0 3.1~
+ selinux_policy_root at LIBSELINUX_1.0 3.1~
+ selinux_raw_context_to_color at LIBSELINUX_1.0 3.1~
+ selinux_raw_to_trans_context at LIBSELINUX_1.0 3.1~
+ selinux_removable_context_path at LIBSELINUX_1.0 3.1~
+ selinux_reset_config at LIBSELINUX_1.0 3.1~
+ selinux_restorecon at LIBSELINUX_1.0 3.1~
+ selinux_restorecon_default_handle at LIBSELINUX_1.0 3.1~
+ selinux_restorecon_get_skipped_errors at LIBSELINUX_3.4 3.4
+ selinux_restorecon_parallel at LIBSELINUX_3.4 3.4
+ selinux_restorecon_set_alt_rootpath at LIBSELINUX_1.0 3.1~
+ selinux_restorecon_set_exclude_list at LIBSELINUX_1.0 3.1~
+ selinux_restorecon_set_sehandle at LIBSELINUX_1.0 3.1~
+ selinux_restorecon_xattr at LIBSELINUX_1.0 3.1~
+ selinux_securetty_types_path at LIBSELINUX_1.0 3.1~
+ selinux_sepgsql_context_path at LIBSELINUX_1.0 3.1~
+ selinux_set_callback at LIBSELINUX_1.0 3.1~
+ selinux_set_mapping at LIBSELINUX_1.0 3.1~
+ selinux_set_policy_root at LIBSELINUX_1.0 3.1~
+ selinux_snapperd_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_status_close at LIBSELINUX_1.0 3.1~
+ selinux_status_deny_unknown at LIBSELINUX_1.0 3.1~
+ selinux_status_getenforce at LIBSELINUX_1.0 3.1~
+ selinux_status_open at LIBSELINUX_1.0 3.1~
+ selinux_status_policyload at LIBSELINUX_1.0 3.1~
+ selinux_status_updated at LIBSELINUX_1.0 3.1~
+ selinux_systemd_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_trans_to_raw_context at LIBSELINUX_1.0 3.1~
+ selinux_translations_path at LIBSELINUX_1.0 3.1~
+ selinux_user_contexts_path at LIBSELINUX_1.0 3.1~
+ selinux_users_path at LIBSELINUX_1.0 3.1~
+ selinux_usersconf_path at LIBSELINUX_1.0 3.1~
+ selinux_virtual_domain_context_path at LIBSELINUX_1.0 3.1~
+ selinux_virtual_image_context_path at LIBSELINUX_1.0 3.1~
+ selinux_x_context_path at LIBSELINUX_1.0 3.1~
+ selinuxfs_exists at LIBSELINUX_1.0 3.1~
+ set_matchpathcon_canoncon at LIBSELINUX_1.0 3.1~
+ set_matchpathcon_flags at LIBSELINUX_1.0 3.1~
+ set_matchpathcon_invalidcon at LIBSELINUX_1.0 3.1~
+ set_matchpathcon_printf at LIBSELINUX_1.0 3.1~
+ set_selinuxmnt at LIBSELINUX_1.0 3.1~
+ setcon at LIBSELINUX_1.0 3.1~
+ setcon_raw at LIBSELINUX_1.0 3.1~
+ setexeccon at LIBSELINUX_1.0 3.1~
+ setexeccon_raw at LIBSELINUX_1.0 3.1~
+ setexecfilecon at LIBSELINUX_1.0 3.1~
+ setfilecon at LIBSELINUX_1.0 3.1~
+ setfilecon_raw at LIBSELINUX_1.0 3.1~
+ setfscreatecon at LIBSELINUX_1.0 3.1~
+ setfscreatecon_raw at LIBSELINUX_1.0 3.1~
+ setkeycreatecon at LIBSELINUX_1.0 3.1~
+ setkeycreatecon_raw at LIBSELINUX_1.0 3.1~
+ setsockcreatecon at LIBSELINUX_1.0 3.1~
+ setsockcreatecon_raw at LIBSELINUX_1.0 3.1~
+ sidget at LIBSELINUX_1.0 3.1~
+ sidput at LIBSELINUX_1.0 3.1~
+ string_to_av_perm at LIBSELINUX_1.0 3.1~
+ string_to_security_class at LIBSELINUX_1.0 3.1~
diff -Nru libselinux-3.5/debian/libselinux1t64.tmpfiles libselinux-3.5/debian/libselinux1t64.tmpfiles
--- libselinux-3.5/debian/libselinux1t64.tmpfiles	1970-01-01 00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.tmpfiles	2024-01-24 20:23:37.000000000 +0000
@@ -0,0 +1,4 @@
+# See tmpfiles.d(5) for details
+
+# Type Path    Mode UID  GID  Age Argument
+d /run/setrans 0755 root root -   -
diff -Nru libselinux-3.5/debian/rules libselinux-3.5/debian/rules
--- libselinux-3.5/debian/rules	2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/rules	2024-02-05 08:22:28.000000000 +0000
@@ -95,5 +95,5 @@
 	dh_gencontrol -- -VBuilt-Using="$(BUILT_USING)"
 
 override_dh_makeshlibs:
-	dh_makeshlibs -plibselinux1 --add-udeb="libselinux1-udeb" -V
+	dh_makeshlibs -plibselinux1t64 --add-udeb="libselinux1-udeb" -V
 	dh_makeshlibs --remaining-packages


More information about the SELinux-devel mailing list