bump(sys-apps/sandbox): sync with upstream

This commit is contained in:
Michael Marineau 2014-01-06 20:35:57 -08:00
parent 79fbbfebbd
commit 69c258cd8f
18 changed files with 1816 additions and 13 deletions

View File

@ -0,0 +1,747 @@
# ChangeLog for sys-apps/sandbox
# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/ChangeLog,v 1.181 2013/11/28 00:51:47 vapier Exp $
28 Nov 2013; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-2.6-no-pch.patch, sandbox-2.6-r1.ebuild:
Disable pch logic for now #425524 by J.C. Wren.
14 Nov 2013; Mike Frysinger <vapier@gentoo.org> sandbox-1.6-r2.ebuild,
sandbox-2.3-r1.ebuild, sandbox-2.4.ebuild, sandbox-2.5.ebuild,
sandbox-2.6-r1.ebuild:
Point HOMEPAGE to the sandbox page #475956 by Jonas Stein.
05 Sep 2013; Mike Frysinger <vapier@gentoo.org> sandbox-2.6-r1.ebuild:
Mark m68k stable #472624.
02 Jul 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for sh, wrt bug #472624
30 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for s390, wrt bug #472624
29 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for sparc, wrt bug #472624
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for arm, wrt bug #472624
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for ia64, wrt bug #472624
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for alpha, wrt bug #472624
25 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for amd64, wrt bug #472624
25 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for x86, wrt bug #472624
25 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for ppc64, wrt bug #472624
24 Jun 2013; Agostino Sarubbo <ago@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for ppc, wrt bug #472624
23 Jun 2013; Jeroen Roovers <jer@gentoo.org> sandbox-2.6-r1.ebuild:
Stable for HPPA (bug #472624).
*sandbox-2.6-r1 (23 Mar 2013)
23 Mar 2013; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-2.6-check-empty-paths-at.patch,
+files/sandbox-2.6-desktop.patch, +files/sandbox-2.6-log-var.patch,
+files/sandbox-2.6-open-nofollow.patch,
+files/sandbox-2.6-static-close-fd.patch, +sandbox-2.6-r1.ebuild,
-sandbox-2.6.ebuild:
Apply random set of bugfixes.
26 Dec 2012; Mike Frysinger <vapier@gentoo.org> sandbox-2.6.ebuild:
Add epatch_user #413441#9.
06 Jul 2012; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-2.6-trace-hppa.patch, sandbox-2.6.ebuild:
Fix building of trace code for hppa #425062 by Jeroen Roovers.
*sandbox-2.6 (03 Jul 2012)
03 Jul 2012; Mike Frysinger <vapier@gentoo.org> +sandbox-2.6.ebuild:
Various fixes, and x32 support.
24 Jun 2012; Mike Frysinger <vapier@gentoo.org> sandbox-2.5.ebuild:
Parallelize configure steps for multiple ABIs, and run tests in parallel.
30 Mar 2012; Alexis Ballier <aballier@gentoo.org> sandbox-1.6-r2.ebuild:
keyword -x86-fbsd for bug #374425, sandbox is broken of fbsd and this leaves
us with nothing.
05 Feb 2012; Mike Frysinger <vapier@gentoo.org> sandbox-1.6-r2.ebuild,
sandbox-2.3-r1.ebuild, sandbox-2.4.ebuild, sandbox-2.5.ebuild:
Move to new unpacker eclass.
02 Feb 2012; Samuli Suominen <ssuominen@gentoo.org> sandbox-2.5.ebuild:
ppc/ppc64 stable wrt #389981
03 Dec 2011; Raúl Porcel <armin76@gentoo.org> sandbox-2.5.ebuild:
alpha/ia64/m68k/s390/sh/sparc stable wrt #389981
13 Nov 2011; Markus Meier <maekke@gentoo.org> sandbox-2.5.ebuild:
arm stable, bug #389981
11 Nov 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org> sandbox-2.5.ebuild:
x86 stable wrt bug #389981
10 Nov 2011; Jeroen Roovers <jer@gentoo.org> sandbox-2.5.ebuild:
Stable for HPPA (bug #389981).
10 Nov 2011; Tony Vroon <chainsaw@gentoo.org> sandbox-2.5.ebuild:
Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo &
Elijah "Armageddon" El Lazkani in bug #389981.
10 May 2011; Jeremy Olexa <darkside@gentoo.org> sandbox-2.4.ebuild,
sandbox-2.5.ebuild:
Don't restore ownership while extracting, bug 366759
*sandbox-2.5 (14 Feb 2011)
14 Feb 2011; Mike Frysinger <vapier@gentoo.org> +sandbox-2.5.ebuild:
Version bump.
12 Feb 2011; Raúl Porcel <armin76@gentoo.org> sandbox-2.4.ebuild:
sparc stable wrt #348549
02 Jan 2011; Mike Frysinger <vapier@gentoo.org> sandbox-2.4.ebuild:
Mark alpha/ia64/s390/sh stable #348549.
21 Dec 2010; Markus Meier <maekke@gentoo.org> sandbox-2.4.ebuild:
arm stable, bug #348549
19 Dec 2010; Samuli Suominen <ssuominen@gentoo.org> sandbox-2.4.ebuild:
ppc64 stable wrt #348549
14 Dec 2010; Markos Chandras <hwoarang@gentoo.org> sandbox-2.4.ebuild:
Stable on amd64 wrt bug #348549
13 Dec 2010; Jeroen Roovers <jer@gentoo.org> sandbox-2.4.ebuild:
Stable for HPPA PPC (bug #348549).
13 Dec 2010; Jeroen Roovers <jer@gentoo.org> sandbox-2.4.ebuild:
Stable for HPPA (bug #348549).
12 Dec 2010; Pawel Hajdan jr <phajdan.jr@gentoo.org> sandbox-2.4.ebuild:
x86 stable wrt bug #348549
30 Nov 2010; Michael Weber <xmw@gentoo.org> sandbox-2.3-r1.ebuild:
sparc stable (bug 338113)
*sandbox-2.4 (24 Nov 2010)
24 Nov 2010; Mike Frysinger <vapier@gentoo.org> +sandbox-2.4.ebuild:
Fix hardened issues #339157 and flesh out *at func handling some more
#342983.
23 Nov 2010; Mike Frysinger <vapier@gentoo.org> sandbox-2.3-r1.ebuild:
Add back ~sparc since it has its ptrace disabled.
16 Oct 2010; Brent Baude <ranger@gentoo.org> sandbox-2.3-r1.ebuild:
stable ppc, bug 338113
10 Oct 2010; Samuli Suominen <ssuominen@gentoo.org> sandbox-2.3-r1.ebuild:
ppc64 stable wrt #338113
10 Oct 2010; Raúl Porcel <armin76@gentoo.org> sandbox-2.3-r1.ebuild:
alpha/arm/ia64/m68k/s390/sh stable wrt #338113
05 Oct 2010; Markus Meier <maekke@gentoo.org> sandbox-2.3-r1.ebuild:
x86 stable, bug #338113
29 Sep 2010; Jeroen Roovers <jer@gentoo.org> sandbox-2.3-r1.ebuild:
Stable for HPPA (bug #338113).
24 Sep 2010; Markos Chandras <hwoarang@gentoo.org> sandbox-2.3-r1.ebuild:
Stable on amd64 wrt bug #338113
*sandbox-2.3-r1 (17 Aug 2010)
17 Aug 2010; Mike Frysinger <vapier@gentoo.org> +sandbox-2.3-r1.ebuild:
Fix sandbox.d config install #333131 by Hans Nieser.
*sandbox-2.3 (17 Aug 2010)
17 Aug 2010; Mike Frysinger <vapier@gentoo.org> +sandbox-2.3.ebuild:
Version bump. Lots o fixes.
15 Aug 2010; Mike Frysinger <vapier@gentoo.org> sandbox-1.6-r2.ebuild,
sandbox-2.2.ebuild:
Manually decompress the lzma archive if host PM cannot #271543.
21 Nov 2009; Raúl Porcel <armin76@gentoo.org> sandbox-2.2.ebuild:
Mark 2.2 -sparc as it doesn't work very well, bug #293632
*sandbox-2.2 (26 Oct 2009)
26 Oct 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-2.2.ebuild:
Version bump (includes fixes for #202765 #288227 #288863 and SPARC
ptrace).
27 Sep 2009; Mike Frysinger <vapier@gentoo.org> sandbox-2.1.ebuild:
Fix new multilib code on non-multilib systems #286599 by Norman Yarvin.
25 Sep 2009; Thomas Sachau (Tommy[D]) <tommy@gentoo.org>
sandbox-2.1.ebuild:
Add multilib useflag for multilib building with ok from vapier
*sandbox-2.1 (25 Aug 2009)
25 Aug 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-2.1.ebuild:
Version bump.
13 Aug 2009; Mike Frysinger <vapier@gentoo.org>
sandbox-1.2.18.1-r2.ebuild, sandbox-1.2.18.1-r3.ebuild,
sandbox-1.2.20_alpha2-r1.ebuild, sandbox-1.3.0.ebuild,
sandbox-1.3.1.ebuild, sandbox-1.3.2.ebuild, sandbox-1.3.3.ebuild,
sandbox-1.3.4.ebuild, sandbox-1.3.5.ebuild, sandbox-1.3.6.ebuild,
sandbox-1.3.7.ebuild, sandbox-1.3.8.ebuild, sandbox-1.3.9.ebuild,
sandbox-1.4.ebuild, sandbox-1.5.ebuild, sandbox-1.6.ebuild,
sandbox-1.6-r1.ebuild, sandbox-1.6-r2.ebuild, sandbox-1.7.ebuild,
sandbox-1.8.ebuild, sandbox-1.9.ebuild, sandbox-2.0.ebuild:
Drop duplicate eutils inherit #279607 by Justin Lecher.
*sandbox-2.0 (04 Jun 2009)
04 Jun 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-2.0.ebuild:
Version bump to improve static tracing.
17 May 2009; Diego E. Pettenò <flameeyes@gentoo.org> sandbox-1.7.ebuild,
sandbox-1.8.ebuild, sandbox-1.9.ebuild:
Remove x86-fbsd keyword for sandbox versions that are known incompatible
with FreeBSD.
26 Apr 2009; Brent Baude <ranger@gentoo.org> sandbox-1.6-r2.ebuild:
stable ppc, bug 265376
20 Apr 2009; Raúl Porcel <armin76@gentoo.org> sandbox-1.6-r2.ebuild:
ia64 stable wrt #265376
18 Apr 2009; Mike Frysinger <vapier@gentoo.org> sandbox-1.6-r2.ebuild,
sandbox-1.9.ebuild:
Force latest stable pax-utils as some people are lazy and dont upgrade
#265376 by Jerome Potts.
18 Apr 2009; Raúl Porcel <armin76@gentoo.org> sandbox-1.6-r2.ebuild:
arm/m68k/s390/sh stable wrt #265376
15 Apr 2009; Markus Meier <maekke@gentoo.org> sandbox-1.6-r2.ebuild:
amd64/x86 stable, bug #265376
13 Apr 2009; Jeroen Roovers <jer@gentoo.org> sandbox-1.6-r2.ebuild:
Stable for HPPA (bug #265376).
12 Apr 2009; Brent Baude <ranger@gentoo.org> sandbox-1.6-r2.ebuild:
stable ppc64, bug 265376
12 Apr 2009; Tobias Klausmann <klausman@gentoo.org> sandbox-1.6-r2.ebuild:
Stable on alpha, bug #265376
09 Apr 2009; Friedrich Oslage <bluebird@gentoo.org> sandbox-1.6-r2.ebuild:
Stable on sparc, bug #265376
09 Apr 2009; Mike Frysinger <vapier@gentoo.org> sandbox-1.6-r2.ebuild,
sandbox-1.9.ebuild:
Make sure /etc/sandbox.d has 0755 perms #265376 by Friedrich Oslage.
*sandbox-1.9 (09 Apr 2009)
09 Apr 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.9.ebuild:
Version bump.
*sandbox-1.8 (05 Apr 2009)
05 Apr 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.8.ebuild:
Version bump to fix #263657 #264399 #264476 #264478 #264676.
*sandbox-1.6-r2 (02 Apr 2009)
02 Apr 2009; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-1.6-disable-pthread.patch, +sandbox-1.6-r2.ebuild:
Disable pthread locks to make 1.6 regression free #264476.
*sandbox-1.6-r1 (31 Mar 2009)
31 Mar 2009; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-1.6-disable-qa-static.patch,
+files/0001-libsandbox-handle-more-at-functions.patch,
+sandbox-1.6-r1.ebuild:
Backport a fix or two so we can stabilize this version.
*sandbox-1.7 (31 Mar 2009)
31 Mar 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.7.ebuild:
Version bump.
*sandbox-1.6 (12 Mar 2009)
12 Mar 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.6.ebuild:
Version bump.
*sandbox-1.5 (11 Mar 2009)
11 Mar 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.5.ebuild:
Version bump.
*sandbox-1.4 (08 Mar 2009)
08 Mar 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.4.ebuild:
Version bump.
*sandbox-1.3.9 (05 Mar 2009)
05 Mar 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.9.ebuild:
Version bump.
*sandbox-1.3.8 (20 Feb 2009)
20 Feb 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.8.ebuild:
Version bump.
*sandbox-1.3.7 (14 Feb 2009)
14 Feb 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.7.ebuild:
Version bump
*sandbox-1.3.6 (11 Feb 2009)
11 Feb 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.6.ebuild:
Version bump.
*sandbox-1.3.5 (08 Feb 2009)
08 Feb 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.5.ebuild:
Version bump for regressions.
07 Feb 2009; Mike Frysinger <vapier@gentoo.org>
+files/0001-sandbox-fix-typo-in-struct-sandbox_info_t-decl.patch,
sandbox-1.3.4.ebuild:
Fix for hardened systems #258031.
*sandbox-1.3.4 (07 Feb 2009)
07 Feb 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.4.ebuild:
Version bump.
29 Jan 2009; Javier Villavicencio <the_paya@gentoo.org>
sandbox-1.3.3.ebuild:
Keyword -sparc/x86-fbsd til next version bump, bug 256741.
*sandbox-1.3.3 (28 Jan 2009)
28 Jan 2009; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.3.ebuild:
Version bump.
26 Dec 2008; Mike Frysinger <vapier@gentoo.org> sandbox-1.3.2.ebuild:
Add lzma-utils to DEPEND #252598 by Albert W. Hopkins.
*sandbox-1.3.2 (23 Dec 2008)
23 Dec 2008; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.2.ebuild:
Fix some portability issues and more *at updates.
09 Dec 2008; Alexis Ballier <aballier@gentoo.org> sandbox-1.3.0.ebuild,
sandbox-1.3.1.ebuild:
Keyword -sparc/x86-fbsd versions that do not build there, lets keep with
the half broken but half working old version, bug #250366
*sandbox-1.3.1 (29 Nov 2008)
29 Nov 2008; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.1.ebuild:
Fix up #248254 and #248263.
*sandbox-1.3.0 (16 Nov 2008)
16 Nov 2008; Mike Frysinger <vapier@gentoo.org> +sandbox-1.3.0.ebuild:
Version bump.
09 Nov 2008; Mike Frysinger <vapier@gentoo.org>
sandbox-1.2.20_alpha2-r1.ebuild:
Use EBUILD_DEATH_HOOKS #113780 by Petteri Räty.
09 Nov 2008; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-1.2.20_alpha2-parallel.patch,
sandbox-1.2.20_alpha2-r1.ebuild:
Rewrite multilib handling and apply parallel build fix by Jose Luis Rivero
#190051 by David Pykee.
09 Nov 2008; Harald van Dijk <truedfx@gentoo.org>
sandbox-1.2.18.1-r3.ebuild, sandbox-1.2.20_alpha2-r1.ebuild:
Avoid bashism in configure script (#236868)
*sandbox-1.2.18.1-r3 (27 Jun 2008)
27 Jun 2008; Robin H. Johnson <robbat2@gentoo.org>
+files/sandbox-1.2.18.1-rtld-validation.patch,
+sandbox-1.2.18.1-r3.ebuild:
Fix for bug #206678. Variations of it have been running on infra boxes for
two months now, we seem to have traced it down to RTLD_NEXT not always
having a usable value under hardened on new libc.
*sandbox-1.2.20_alpha2-r1 (04 Nov 2007)
04 Nov 2007; Diego Pettenò <flameeyes@gentoo.org>
+sandbox-1.2.20_alpha2-r1.ebuild:
Fix the problem with GLIBC 2.7 even for the alpha version.
27 Oct 2007; Jose Luis Rivero <yoswink@gentoo.org>
sandbox-1.2.18.1-r2.ebuild:
Stable on alpha wrt #182361
27 Oct 2007; Raúl Porcel <armin76@gentoo.org> sandbox-1.2.18.1-r2.ebuild:
ia64 stable wrt #182361
26 Oct 2007; nixnut <nixnut@gentoo.org> sandbox-1.2.18.1-r2.ebuild:
Stable on ppc wrt bug 182361
25 Oct 2007; Dawid Węgliński <cla@gentoo.org>
sandbox-1.2.18.1-r2.ebuild:
Stable on x86 (bug #182361)
25 Oct 2007; Daniel Gryniewicz <dang@gentoo.org>
sandbox-1.2.18.1-r2.ebuild:
Marked stable on amd64 for bug #182361
25 Oct 2007; Markus Rothe <corsair@gentoo.org> sandbox-1.2.18.1-r2.ebuild:
Stable on ppc64; bug #182361
25 Oct 2007; Christian Faulhammer <opfer@gentoo.org>
sandbox-1.2.18.1-r1.ebuild:
stable x86, bug 180985
25 Oct 2007; Jeroen Roovers <jer@gentoo.org> sandbox-1.2.18.1-r2.ebuild:
Stable for SPARC (bug #182361).
25 Oct 2007; Jeroen Roovers <jer@gentoo.org> sandbox-1.2.18.1-r2.ebuild:
Stable for HPPA (bug #182361). Fixed quoting issues.
*sandbox-1.2.18.1-r2 (23 Oct 2007)
23 Oct 2007; Mike Frysinger <vapier@gentoo.org>
+files/sandbox-1.2.18.1-open-cloexec.patch, +sandbox-1.2.18.1-r2.ebuild:
Work with new "e" fopen() flag in glibc-2.7 #196720.
*sandbox-1.2.18.1-r1 (17 Oct 2007)
17 Oct 2007; Daniel Drake <dsd@gentoo.org>
+files/sandbox-1.2.18.1-open-normal-fail.patch,
+sandbox-1.2.18.1-r1.ebuild:
Allow open() on non-existent files to fail in the normal way without
violation. Fixes bug #135745.
15 Oct 2007; Markus Rothe <corsair@gentoo.org> sandbox-1.2.18.1.ebuild:
Stable on ppc64
06 Jul 2007; Jose Luis Rivero <yoswink@gentoo.org>
sandbox-1.2.18.1.ebuild:
Stable on alpha. See bug #183673
01 Jul 2007; Piotr Jaroszyński <peper@gentoo.org> sandbox-1.2.12.ebuild,
sandbox-1.2.16.ebuild, sandbox-1.2.17.ebuild, sandbox-1.2.18.ebuild,
sandbox-1.2.18.1.ebuild, sandbox-1.2.20_alpha1-r2.ebuild,
sandbox-1.2.20_alpha2.ebuild:
(QA) RESTRICT="multilib-pkg-force" -> EMULTILIB_PKG="true"
24 Jun 2007; Piotr Jaroszyński <peper@gentoo.org> sandbox-1.2.18.ebuild:
(QA) Don't use KEYWORDS="-*". bug #160519.
22 Nov 2006; Diego Pettenò <flameeyes@gentoo.org>
sandbox-1.2.20_alpha2.ebuild:
Add ~sparc-fbsd keyword.
04 Sep 2006; Diego Pettenò <flameeyes@gentoo.org>
sandbox-1.2.20_alpha2.ebuild:
Add ~x86-fbsd keyword.
*sandbox-1.2.20_alpha2 (11 Jul 2006)
11 Jul 2006; Martin Schlemmer <azarah@gentoo.org>
+sandbox-1.2.20_alpha2.ebuild:
New testing version.
09 Jul 2006; Joshua Kinard <kumba@gentoo.org> sandbox-1.2.17.ebuild:
Marked stable on mips (even though it doesn't even work, best to keep up...)
*sandbox-1.2.20_alpha1-r2 (08 Jul 2006)
*sandbox-1.2.20_alpha1-r1 (08 Jul 2006)
08 Jul 2006; Martin Schlemmer <azarah@gentoo.org>
+files/sandbox-1.2.20_alpha1-double-free.patch,
+sandbox-1.2.20_alpha1-r1.ebuild, +sandbox-1.2.20_alpha1-r2.ebuild:
More bugfixes.
*sandbox-1.2.20_alpha1 (07 Jul 2006)
07 Jul 2006; Martin Schlemmer <azarah@gentoo.org> +files/09sandbox,
+sandbox-1.2.20_alpha1.ebuild:
Testing release for feedback. Check package.mask for details.
20 May 2006; Bryan Østergaard <kloeri@gentoo.org> sandbox-1.2.17.ebuild:
Stable on ia64.
20 May 2006; Bryan Østergaard <kloeri@gentoo.org> sandbox-1.2.17.ebuild:
Stable on alpha.
*sandbox-1.2.18.1 (19 May 2006)
19 May 2006; Martin Schlemmer <azarah@gentoo.org>
+sandbox-1.2.18.1.ebuild:
New bugfix release.
11 May 2006; Joshua Jackson <tsunam@gentoo.org> sandbox-1.2.17.ebuild:
stable x86; bug #132025
10 May 2006; Martin Schlemmer <azarah@gentoo.org> sandbox-1.2.18.ebuild:
Mask 1.2.18 for now, as it have a double-free issue.
03 May 2006; Joseph Jezak <josejx@gentoo.org> sandbox-1.2.17.ebuild:
Marked ppc stable for bug #132025.
03 May 2006; Patrick McLean <chutzpah@gentoo.org> sandbox-1.2.17.ebuild:
Stable on amd64 (bug #132025)
03 May 2006; Gustavo Zacarias <gustavoz@gentoo.org> sandbox-1.2.17.ebuild:
Stable on hppa wrt #132025
*sandbox-1.2.18 (03 May 2006)
03 May 2006; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.18.ebuild:
New release.
03 May 2006; Markus Rothe <corsair@gentoo.org> sandbox-1.2.17.ebuild:
Stable on ppc64; bug #132025
02 May 2006; Gustavo Zacarias <gustavoz@gentoo.org> sandbox-1.2.17.ebuild:
Stable on sparc wrt #132025
19 Feb 2006; Joshua Kinard <kumba@gentoo.org> sandbox-1.2.12.ebuild:
Marked stable on mips (doesn't actually work well, but we disable it in
profiles).
06 Feb 2006; Martin Schlemmer <azarah@gentoo.org> sandbox-1.2.17.ebuild:
Fix docs installation.
*sandbox-1.2.17 (05 Dec 2005)
05 Dec 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.17.ebuild:
New release.
*sandbox-1.2.16 (02 Dec 2005)
02 Dec 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.16.ebuild:
New release.
*sandbox-1.2.15 (01 Dec 2005)
01 Dec 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.15.ebuild:
New release.
*sandbox-1.2.14 (28 Nov 2005)
28 Nov 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.14.ebuild:
New release.
14 Nov 2005; Martin Schlemmer <azarah@gentoo.org> sandbox-1.2.13.ebuild:
Simplify multilib building logic. Other cleanups.
13 Oct 2005; Martin Schlemmer <azarah@gentoo.org> sandbox-1.2.12.ebuild,
sandbox-1.2.13.ebuild:
Add workaround for bug #109036.
07 Oct 2005; Jeremy Huddleston <eradicator@gentoo.org>
sandbox-1.2.9.ebuild, sandbox-1.2.10.ebuild, sandbox-1.2.11.ebuild,
sandbox-1.2.12.ebuild, sandbox-1.2.13.ebuild:
Some changes for amd64 2006.0.
*sandbox-1.2.13 (12 Sep 2005)
12 Sep 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.13.ebuild:
New release.
30 Aug 2005; Fernando J. Pereda <ferdy@gentoo.org> sandbox-1.2.12.ebuild:
stable on alpha wrt bug #101433
16 Aug 2005; Gustavo Zacarias <gustavoz@gentoo.org> sandbox-1.2.12.ebuild:
Stable on sparc wrt #101433
15 Aug 2005; Danny van Dyk <kugelfang@gentoo.org> sandbox-1.2.12.ebuild:
Marked stable on amd64.
15 Aug 2005; Michael Hanselmann <hansmi@gentoo.org> sandbox-1.2.12.ebuild:
Stable on ppc and hppa.
15 Aug 2005; Ian Leitch <port001@gentoo.org> sandbox-1.2.12.ebuild:
Stable on x86, #101433
15 Aug 2005; Markus Rothe <corsair@gentoo.org> sandbox-1.2.12.ebuild:
Stable on ppc64 (bug #101433)
*sandbox-1.2.12 (05 Aug 2005)
05 Aug 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.12.ebuild:
New release.
23 Jul 2005; MATSUU Takuto <matsuu@gentoo.org> sandbox-1.2.11.ebuild:
Stable on sh.
22 Jul 2005; Jason Stubbs <jstubbs@gentoo.org> sandbox-1.2.11.ebuild:
Stable on mips per hardave's request. #96782
21 Jul 2005; Rene Nussbaumer <killerfox@gentoo.org> sandbox-1.2.11.ebuild:
Stable on hppa. bug #96782
21 Jul 2005; Aron Griffis <agriffis@gentoo.org> sandbox-1.2.11.ebuild:
stable on alpha
21 Jul 2005; Aron Griffis <agriffis@gentoo.org> sandbox-1.2.11.ebuild:
stable on ia64
21 Jul 2005; Chris Gianelloni <wolf31o2@gentoo.org> sandbox-1.2.11.ebuild:
Marking stable on x86 for bug #96782.
21 Jul 2005; Joseph Jezak <josejx@gentoo.org> sandbox-1.2.11.ebuild:
Marked ppc stable for bug #96782.
20 Jul 2005; Markus Rothe <corsair@gentoo.org> sandbox-1.2.11.ebuild:
Stable on ppc64 (bug #96782)
20 Jul 2005; Gustavo Zacarias <gustavoz@gentoo.org> sandbox-1.2.11.ebuild:
Stable on sparc wrt #96782
20 Jul 2005; Danny van Dyk <kugelfang@gentoo.org> sandbox-1.2.11.ebuild:
Marked stable on amd64.
18 Jul 2005; Guy Martin <gmsoft@gentoo.org> sandbox-1.2.10.ebuild:
Stable on hppa.
15 Jul 2005; Bryan Østergaard <kloeri@gentoo.org> sandbox-1.2.10.ebuild:
Stable on alpha + ia64, bug 99019.
14 Jul 2005; Gustavo Zacarias <gustavoz@gentoo.org> sandbox-1.2.10.ebuild:
Stable on sparc wrt #99019
14 Jul 2005; Joseph Jezak <josejx@gentoo.org> sandbox-1.2.10.ebuild:
Marked ppc stable for bug #99019.
15 Jul 2005; Jason Stubbs <jstubbs@gentoo.org> sandbox-1.2.9.ebuild,
sandbox-1.2.10.ebuild, sandbox-1.2.11.ebuild:
Removed ppc-macos from keywords as sandbox does not work there yet.
*sandbox-1.2.11 (14 Jul 2005)
14 Jul 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.11.ebuild:
New release.
14 Jul 2005; Jeremy Huddleston <eradicator@gentoo.org>
sandbox-1.2.10.ebuild:
Stable amd64.
12 Jul 2005; Markus Rothe <corsair@gentoo.org> sandbox-1.2.10.ebuild:
Stable on ppc64
10 Jul 2005; Martin Schlemmer <azarah@gentoo.org>
+files/sandbox-1.2.9-uclibc-getcwd.patch,
+files/sandbox-1.2.10-uclibc-getcwd.patch, sandbox-1.2.9.ebuild,
sandbox-1.2.10.ebuild:
Add some fixes to the getcwd implementation, bug #98419.
05 Jul 2005; Jeremy Huddleston <eradicator@gentoo.org>
sandbox-1.2.9.ebuild:
Stable amd64 for 2005.1
*sandbox-1.2.10 (03 Jul 2005)
03 Jul 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.10.ebuild:
Update version.
*sandbox-1.2.9 (09 Jun 2005)
09 Jun 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.9.ebuild:
Update version.
*sandbox-1.2.8 (13 May 2005)
13 May 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.8.ebuild:
Cleanups and hopefully finally kill bug #91541. Fix bug #92478.
*sandbox-1.2.7 (12 May 2005)
12 May 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.7.ebuild:
Lots of cleanups and fixes - see ChangeLog in /usr/share/doc.
*sandbox-1.2.6 (10 May 2005)
10 May 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.6.ebuild:
Workaround for tsocks incompatability, bug #91541.
*sandbox-1.2.5-r2 (09 May 2005)
09 May 2005; Jeremy Huddleston <eradicator@gentoo.org>
+sandbox-1.2.5-r2.ebuild:
On some versions of portage, CFLAGS_* do not survive across ebuild.sh
stages, so we must ensure the multilib setup always gets rerun for each
stage.
*sandbox-1.2.5-r1 (06 May 2005)
06 May 2005; Jeremy Huddleston <eradicator@gentoo.org>
+sandbox-1.2.5-r1.ebuild:
Revbump to fix problems with amd64 2004.3's multilib. Cleaned up multilib
handling in general. 2004.3 amd64 users should have working 32bit sandbox
again.
04 May 2005; Mike Frysinger <vapier@gentoo.org> sandbox-1.2.5.ebuild:
Fix multilib building on amd64/2004.3 profiles.
*sandbox-1.2.5 (04 May 2005)
04 May 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.5.ebuild:
General fixes. Fix for bug #91431.
*sandbox-1.2.4 (03 May 2005)
03 May 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.4.ebuild:
Some speedups (bug #91040) and uclibc fixes.
*sandbox-1.2.3 (29 Apr 2005)
29 Apr 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.3.ebuild:
Fixup libc detection. Fix bug or two.
*sandbox-1.2.2 (28 Apr 2005)
28 Apr 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.2.ebuild:
Bug fixes for bug #90592.
*sandbox-1.2.1-r3 (24 Apr 2005)
24 Apr 2005; Jeremy Huddleston <eradicator@gentoo.org>
+sandbox-1.2.1-r3.ebuild:
Fix multilib.
*sandbox-1.2.1 (24 Apr 2005)
24 Apr 2005; Brian Harring <ferringb@gentoo.org> +sandbox-1.2.1-r2.ebuild:
Amd64 fix for 90135.
*sandbox-1.2.1 (24 Apr 2005)
24 Apr 2005; Jason Stubbs <jstubbs@gentoo.org> +sandbox-1.2.1-r1.ebuild:
Added missing check_multilib function.
*sandbox-1.2.1 (23 Apr 2005)
23 Apr 2005; Martin Schlemmer <azarah@gentoo.org> +sandbox-1.2.1.ebuild:
Fix for bug #90153.
*sandbox-1.2 (Apr 23 2005)
23 Apr 2005; Brian Harring <ferringb@gentoo.org>; sandbox-1.2.ebuild
Initial import of cvs head sandbox code. Multilib portion of it
could stand testing.

View File

@ -1 +1,23 @@
DIST sandbox-2.4.tar.xz 344664 RMD160 43593c13c27881ebe17ae47c6ea0c40870f8351c SHA1 8d8b7ccc61baa881a90071c4cdc533f6918d21f4 SHA256 450599cb3052296d42f81a04dbbda82d220415fc2d16f5dc6e26b042d580fd3e
AUX 0001-libsandbox-handle-more-at-functions.patch 1473 SHA256 7681e867bb4dea26d165f9a066dca798519e2fd57b49c7b31c0c2fc254037523 SHA512 ec3655a6fd12347ffd454648428be16a02394f6dfd592075753bb794771a15824675f612ed22206b0e14665706aa24405f8d9aa94a099238344c1525803de72a WHIRLPOOL dc4918171f8501cdab072cb8dc953056bfcb24c1b4f78e683fb01902a7029d1aed4fd47f42e6e0d493bceacbed99535c2ef9bf4c4df57fdb6d789821b1479888
AUX 09sandbox 37 SHA256 73e9e9d12ba54f1c649813ec86107924050528852c890a8ba1e2853796781bbe SHA512 4e8a9c58debde6480224a45559c5f2db4765213d151e47937f9142f110cac3681bf6402acaf21249a37bb17398e7bc00ae7feee68ecdb5b9363c432eac1b052a WHIRLPOOL 80d55a34d3faf3314f2b9de2200d4b46a800128514be9e30eb59e5f03fb7a0a5197a9e5b5ab33d6b68d35bf83c86a1bd7ba734a33ccd382fe0af3b2c2a11d0bd
AUX sandbox-1.6-disable-pthread.patch 959 SHA256 c4fefddab05d440b3b1c2df766c5b2abd7c543cd2aa4cf1e61c0d3c3dd905f0c SHA512 3cbb244f7c8e77030dd2194770a2dcae7b052c302d9b4cb0549465ebfb18f719d93daefbd6d1cdee2a630fc077b04e83c5b7c7f72b667adb6b8e322dee6d7056 WHIRLPOOL 1c603db0b7d810715dc5461740103ac29061e1eace2459bfb59ed576f45f81aadb9883a1afedf0ddde51bcda56b23abd26936426fd2a6ae3becb7e0c6054fc9e
AUX sandbox-1.6-disable-qa-static.patch 332 SHA256 060afa33dcfb6836676dc0febd5bc272b66b55e3753f739b56664e9ebce0eb20 SHA512 8839d4e279be41f1ee118b897c7eae8fd4058e4b7ecc1b5872450c177e09b5eefe569964efc294bd6f3e4ea92a3b4ba9840852d2be8db14810cd4578640ca6c4 WHIRLPOOL 6730b53afc16033911527492b0bf14a35f0e4b0b7cf3d42b1af299e9caa4a82f5e424e514aec81720da53a497cbc31b4f3928fc85dc8b04f979b726dce5ff2d8
AUX sandbox-2.6-check-empty-paths-at.patch 7454 SHA256 a48759a4d3e9a70713473b6fad59bdd750b5cd37e7d632c786205ff20004ae2c SHA512 5eba7915dedf57f44c37881e9c6b48db8733d1493779a33127d08bb9ea77056d788ec9ace72c13eb101f42f01c95309c7cebca6c76212a8c99a8655372c0b7d7 WHIRLPOOL 46eb3a8ef8f22030cd793f3b16adc190b5750019c0df83e161c6918f08555a8ad890c1425b03cbf7e53ebcd34a07a9dd9b594d0c0fe31834656ffce3d58fa284
AUX sandbox-2.6-desktop.patch 875 SHA256 2eecf67790aeac210f9aa899a86f7664776ed65d9b55159e1b359162dfb9ff74 SHA512 b72ec7f414d19bf513dfb1aea10523fa5dc07a1375d8f08f664d204b64b23c891a79ca14987528c595936f441e1f595b366aabbc57313667c7639d73d089ed9a WHIRLPOOL 7f787b8be9b5712eb2b2a0cd2ff825df1045ebf1cc4e73a50f610e620d30752045690a5c28835465d0ab0c3c4a9eaf8b92a5c123cd741ad69dfedb31aa457fa0
AUX sandbox-2.6-log-var.patch 2039 SHA256 f464a29cdd9de0c510277310f4febc8f96515ff2ff03fc92df1c75b9cbd75619 SHA512 cf6f900b4078eff5870b63b2bc7c81c5b00488e030d7e9ce3007693e9d1339ac6201ddacfaff552c6c9b99b6d32383229133c80190404b7e4fde06ad376b2050 WHIRLPOOL db99737a6567788194f7b37b12b92fcfb4c263df40f40aef9e0a3ef2b6a1523331313b791fffa2b26775b646795364ab1db1711eb4329cda3337df27aebfeffa
AUX sandbox-2.6-no-pch.patch 702 SHA256 d95a65ffe23c6c81f6b1e695f27cffc1cb617ebf62ca467c8eae5e4c3771089b SHA512 2269b806c2b04c0891644c694d2e0cb87b3ad9236457add50df58d3af62ca5daf17e8b599d0190b4efcae7e84ba99308ea4b0f4a1482d08314d4f3b64bdaf884 WHIRLPOOL 343b62bcf88b0491d69b507eb2feb02b21e9e66cb9006c2043fcaee87f461b3228d37e9053f092e32fff4eb73b14db32a262b79c7430cddf0ddde6f90958e21b
AUX sandbox-2.6-open-nofollow.patch 2027 SHA256 c8816ae4e1991f9941abd43ec4bfdbf4e99cf36ee90694f77ab88754c53785ce SHA512 dd5222f32a40def38c9719363a24c48d5b112e3560b44c5f32afc3daa0614fe9bc5cb68ca8ac69032cc8d6299f09b25d4d7c72e16892188b42768ffb28c19f07 WHIRLPOOL 03cb5fb9df04a8d7f92855c292a6c431d01d330fecae198f2c4b95d824454f10ce1ad66db1a9d54d1bef5f74989cf6debb2d98de28ee0c2c6a09c1a0752b5519
AUX sandbox-2.6-static-close-fd.patch 2945 SHA256 807eb4dc1ba6543c94a90a9a53bb89f42079ea20ed7c196f82d65f280e5de96a SHA512 e2f57c4d80816241f3ba4828c2b27c67d1d604b14b2d575888a978e5c4e8e47e60e3a609d81e59c615bc5b7cee6194cc362e255ae8508f632862a35180c30de8 WHIRLPOOL e08f60227fe954894d3a3a01297e9988f4d7722ea75ffbd2b0f3971d38c8ce00af230fcaecb1f53243a868d54f48bb680e2d547bbeb2ee3e5a11f8942d2084fd
AUX sandbox-2.6-trace-hppa.patch 850 SHA256 20688b2f33162f95af4af5e3c7d3700f2e7776e454b785ac1398f0870f84efa9 SHA512 fb7bf2202f960e952edc1e52fe4b6b085042158223d96b9baa899e871abcdef711ede3122c971120f55f71cc1aad71496a6079222dbaaa6c14b0c6f7ea182454 WHIRLPOOL 80f7fb529b912d19d81b9d71ee4a648db7b217583f2e8f2054cc666839030ea7d0112d69d52a2bf35c4d3549ffbd81dbd0cd39d5993bfabbb43bcb6a4455ade4
DIST sandbox-1.6.tar.lzma 307014 SHA256 52cfd286da3d5d51f3b6e012e409e931b21e32b4f2f16ba5677e46328680f4f4 SHA512 f470599a67443fa107612fef1cc73b64b3146003ae21bb5ae5abd852c4c37aec93ac09be646fda9d55d4c3aeef0cf28a42fa675f2acbb53c1d903e400538ba4c WHIRLPOOL 7c7fbe57cc831d0eb7853476e264a85bb8113620948e761563a872d3d55fd3c0ff063332397199001ea9dcb8258f348b827f337b876b2a26f727f10abbc8f712
DIST sandbox-2.3.tar.xz 344260 SHA256 8670f7508453c2fd300ca29ad2eb457691c3df01c4c22fa27d4a7c880fd291d5 SHA512 06ddaa6dc0822474c263650e95284af6cb69c60c9443b5caaf95af8140283f937d5594849064847fe3a4ad89b29b6ef6d6e909a9b85bb5d7fcf8b427d0e9c7e4 WHIRLPOOL 5d3f45a0bbb1aeffb8c83f8978bea65764aa438a5abcb50c66b5f66232d972bde84013694f6806fcc0026cd6d37420c69655d66ec5984a1c6f71a68dcfc95d11
DIST sandbox-2.4.tar.xz 344664 SHA256 450599cb3052296d42f81a04dbbda82d220415fc2d16f5dc6e26b042d580fd3e SHA512 c0f8b789bcabd48e03a20a97c9daa82c48f264d7641ecfa51dff7a2d2c34be398cf1db6235eb0211bf0fa78b07bd6e633e06bc102904bf9dd8a95f9fde1ca615 WHIRLPOOL 22f0f55f6e638275781ab5afa29b1a7f5e7f3335a3d2ff37d9fcce0bf9284b271bf1d69b98bcd4b06fdb9ff1528d044f9fb111a58c2a1a5ce33cbe28c0cb869d
DIST sandbox-2.5.tar.xz 355680 SHA256 c0e98767fb70750d79591a6d08f81d5c2f13ce783bf94bd90677022e9103878a SHA512 7b870295bb78c1da5550b650a3983d93e503935a8e8452a29a5c6310cc2c2d569a898ea1534e2c670b4a3e5607504fac55f69da6878e0adc9c2c65a5476b4fb0 WHIRLPOOL 887d36638111b09d77674002c07ebad84c24bc4f645d9fb78e180a6c6e7407eb3fb6857877bc152e0cefb676f01df60b20857b8487ce28ff3e4438aef744fe53
DIST sandbox-2.6.tar.xz 366356 SHA256 95615c5879dfc419713f22ba5506a2802a50ea0ce8a2f57c656354f2e50b1c4d SHA512 32ba7fb675c67fdc8bc52da1db7ed6878e5fea8753accb30d9aca00f708e0dde03287b5962caf5ef031bea6934d6ef3e18404b015c70ebd551d3fd8109ad2371 WHIRLPOOL bab2d015fb0de92a2266408ca7941c8fb66b599179040cfc727ffce5b2424a9722dc55ba89d198e3361044d8cb357314205488d2a980c7b8af063fd8940f0c03
EBUILD sandbox-1.6-r2.ebuild 2698 SHA256 8009ef1c543c35eb4bf9ad02000c9facf24693e8539e94cdd155c846f6d52452 SHA512 eece242ef812d1ff3678fc131f0e261599afa89bfcb13ba91d2b3a395d262d42230c2fa90ed24ed0b03375b8c39267bdbc0ab3acbdd638cf38414a61e5ee1b0c WHIRLPOOL 94bc932d8a08b788affe8d6f016993dd837d4958bf7c4e61b43a7acfc69aca3efca96d85fc56f0b6e3f03faf9699b969d53e9257105c4af2cf118f3c8857e645
EBUILD sandbox-2.3-r1.ebuild 2737 SHA256 6e00ef844e302a4b6624e0c338820edb450bc0031862797e6f93b88c3debc7e7 SHA512 43245163ad47b5062002f58d34611a63ed2500bff12883aed476b29be9cfaf876dd977df57438c886b105174b4bef79c299945252c6d4edaa5c4a84eb5201294 WHIRLPOOL 99f920efc06109d580141507927ed6f4cc9634830ade2600649bb0841487c3ab59b78a7b894e16d223a94c92c112bd8e5d7d172e5595d5a4895248fc94901a0d
EBUILD sandbox-2.4.ebuild 2663 SHA256 3e8223119db75ef1624e1aef40a4c42fca0bd9bae94c446f892f4aa6e519b6e0 SHA512 e5016d9e548eeb4db1817955646463c9cb503a8b1a4b44352683b6fd3639e5d80a09ce19c0b22d7221eddeb8d62d6e8dba80f77eaa90cbb80cdb8542da1cf8fa WHIRLPOOL fd2f3f2ac4401a1f67cb8c9eb392aa57ec60c8cdf73da1bfb0c72dd37152ab280dc1a62420a713788a5cdb02da2ce85df9d9e2b4577ddc763543b360b8f890f2
EBUILD sandbox-2.5.ebuild 2715 SHA256 236a1edd16571aa802fd6da0d9751b53d3354b865857d247b065ccf69e5ccb14 SHA512 ab65669bb0bc19d7fc0295d60970e75d4967a18d4a258ee9aa92c7afd7aead86f966e38c4741c8d5f9c7d4f3070da43fac09701112a7f24da945735244f798a0 WHIRLPOOL d51b5a8cfd3b745159d6e61e0c5137e778442bd8926ec65b9d6290d1fc24b40b2ea1339a4b3bc1f915f6e38dabc09d1b1508288270bb126c746c1d223fdbe7ee
EBUILD sandbox-2.6-r1.ebuild 3134 SHA256 1a2a5261c73787a10b0e83e60ea5cec36fbb3a96cad16b6b6e11ef671ad38a51 SHA512 2f63e7449bd0b47a2e36a01679f9c7e3e740b6e2f6e5882774b73e9965dc1bfd05d1c69855fd1f993b39ba3e36bd0f770b20db3eefd585edd54049bbfd68e413 WHIRLPOOL 798115b62cf128574fbfb3183439358a918427f0034458333d2e31a27d59483f47a9c815d8e7e176e70f44adcb38262687578074959fac9f40a17af690dbbb1c
MISC ChangeLog 25101 SHA256 6da358c06c5ed14a791dae877adb28d4b53b92bdd52b751966afbf693307d9f0 SHA512 740f65853d5faa1b2615eba780e377d5e3afc7bf1055a55bd62064b046011bb7a6c619670cb43e4e45a3c4ec88fbbc9291cf8c4189305c6b6ac0b4b7d6de4e5d WHIRLPOOL 05ce207ab55c8be5d7a4f4cee5e4d4537b70e45032f56bb5b4e96f80e79f552bfd3e90fe20d910ee96626b00c1a0d373c02e9bb69c7c8708e8a42f4a9bb4497b
MISC metadata.xml 316 SHA256 488f8a1ba1e1d07a159d22ac198aefee5dfa9ded04de2969019f177161abef1b SHA512 2b4ddea0bb5a40cac834a09b89624049b8561a4a4f648b4d5072c413d4eca78b5cc24859664fa746be36c8b60188e88f2ae38c2c5af30d91dc6273c0f85de278 WHIRLPOOL 64ed27fc7abb1b3b82621f6bb91f03d0070933d0423f9d323ac803354fc6acf2182df1dd85a083fa047d63561a5e92d44287ef4935a11a733244d4393edf8f6f

View File

@ -0,0 +1,42 @@
From 25425878243c5ca1ff21e6f479e585c60b943930 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Mon, 30 Mar 2009 19:56:29 -0400
Subject: [PATCH] libsandbox: handle more *at functions
Add some more *at functions to the main checking code.
URL: http://bugs.gentoo.org/264320
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
Reported-by: Harald van Dijk <truedfx@gentoo.org>
---
libsandbox/libsandbox.c | 5 +++++
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/libsandbox/libsandbox.c b/libsandbox/libsandbox.c
index 88248af..c3f0b55 100644
--- a/libsandbox/libsandbox.c
+++ b/libsandbox/libsandbox.c
@@ -681,15 +681,20 @@ static int check_access(sbcontext_t *sbcontext, int sb_nr, const char *func,
sb_nr == SB_NR_CREAT ||
sb_nr == SB_NR_CREAT64 ||
sb_nr == SB_NR_MKDIR ||
+ sb_nr == SB_NR_MKDIRAT ||
sb_nr == SB_NR_MKNOD ||
sb_nr == SB_NR_MKNODAT ||
sb_nr == SB_NR__XMKNOD ||
sb_nr == SB_NR___XMKNOD ||
sb_nr == SB_NR___XMKNODAT ||
sb_nr == SB_NR_MKFIFO ||
+ sb_nr == SB_NR_MKFIFOAT ||
sb_nr == SB_NR_LINK ||
+ sb_nr == SB_NR_LINKAT ||
sb_nr == SB_NR_SYMLINK ||
+ sb_nr == SB_NR_SYMLINKAT ||
sb_nr == SB_NR_RENAME ||
+ sb_nr == SB_NR_RENAMEAT ||
sb_nr == SB_NR_LUTIMES ||
sb_nr == SB_NR_UTIMENSAT ||
sb_nr == SB_NR_UTIME ||
--
1.6.2

View File

@ -0,0 +1,37 @@
http://bugs.gentoo.org/263657
disable pthread locks ... this is how stable has always worked, so there
wont be any regressions ...
diff --git a/libsandbox/libsandbox.c b/libsandbox/libsandbox.c
index 034d0e7..595d17f 100644
--- a/libsandbox/libsandbox.c
+++ b/libsandbox/libsandbox.c
@@ -814,9 +814,6 @@
return result;
}
-/* Need to protect the global sbcontext structure */
-static pthread_mutex_t sb_syscall_lock = PTHREAD_MUTEX_INITIALIZER;
-
bool before_syscall(int dirfd, int sb_nr, const char *func, const char *file, int flags)
{
int old_errno = errno;
@@ -843,8 +840,6 @@
file = at_file_buf;
}
- pthread_mutex_lock(&sb_syscall_lock);
-
if (!sb_init) {
init_context(&sbcontext);
sb_init = true;
@@ -885,8 +880,6 @@
result = check_syscall(&sbcontext, sb_nr, func, file, flags);
- pthread_mutex_unlock(&sb_syscall_lock);
-
if (0 == result) {
if ((NULL != getenv(ENV_SANDBOX_PID)) && (is_env_on(ENV_SANDBOX_ABORT)))

View File

@ -0,0 +1,13 @@
sandbox-1.7 traces static apps so disable the qa notice as it just scares
users ... dont want scary stuff in stable!
--- libsandbox/wrapper-funcs/__wrapper_exec.c
+++ libsandbox/wrapper-funcs/__wrapper_exec.c
@@ -221,7 +221,6 @@
if (!FUNCTION_SANDBOX_SAFE(path))
return result;
- sb_check_exec(path, argv);
}
#endif

View File

@ -0,0 +1,201 @@
From dd726dcc6a95355d0e0cc949018d9c8aefc89a02 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Mon, 24 Dec 2012 19:41:49 -0500
Subject: [PATCH 1/2] libsandbox: reject "" paths with *at funcs before
checking the dirfd
When it comes to processing errors, an empty path is checked before
an invalid dirfd. Make sure sandbox matches that behavior for the
random testsuites out there that look for this.
URL: https://bugs.gentoo.org/346929
Reported-by: Marien Zwart <marienz@gentoo.org>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsandbox/wrapper-funcs/__pre_check.c | 2 ++
libsandbox/wrapper-funcs/mkdirat_pre_check.c | 17 +++++------------
libsandbox/wrapper-funcs/openat_pre_check.c | 15 ++++-----------
libsandbox/wrapper-funcs/unlinkat_pre_check.c | 17 +++++------------
libsandbox/wrappers.h | 2 ++
tests/mkdirat-3.sh | 7 +++++++
tests/mkdirat.at | 1 +
tests/openat-2.sh | 9 +++++++++
tests/openat.at | 1 +
tests/unlinkat-4.sh | 7 +++++++
tests/unlinkat.at | 1 +
11 files changed, 44 insertions(+), 35 deletions(-)
create mode 100755 tests/mkdirat-3.sh
create mode 100755 tests/openat-2.sh
create mode 100755 tests/unlinkat-4.sh
diff --git a/libsandbox/wrapper-funcs/__pre_check.c b/libsandbox/wrapper-funcs/__pre_check.c
index 2d5711f..28ad91f 100644
--- a/libsandbox/wrapper-funcs/__pre_check.c
+++ b/libsandbox/wrapper-funcs/__pre_check.c
@@ -20,3 +20,5 @@
#if SB_NR_UNLINK != SB_NR_UNDEF && SB_NR_UNLINKAT == SB_NR_UNDEF
# include "unlinkat_pre_check.c"
#endif
+
+#include "__pre_at_check.c"
diff --git a/libsandbox/wrapper-funcs/mkdirat_pre_check.c b/libsandbox/wrapper-funcs/mkdirat_pre_check.c
index 77a65df..0b48d1f 100644
--- a/libsandbox/wrapper-funcs/mkdirat_pre_check.c
+++ b/libsandbox/wrapper-funcs/mkdirat_pre_check.c
@@ -1,20 +1,13 @@
bool sb_mkdirat_pre_check(const char *func, const char *pathname, int dirfd)
{
char canonic[SB_PATH_MAX];
- char dirfd_path[SB_PATH_MAX];
save_errno();
- /* Expand the dirfd path first */
- switch (resolve_dirfd_path(dirfd, pathname, dirfd_path, sizeof(dirfd_path))) {
- case -1:
- sb_debug_dyn("EARLY FAIL: %s(%s) @ resolve_dirfd_path: %s\n",
- func, pathname, strerror(errno));
- return false;
- case 0:
- pathname = dirfd_path;
- break;
- }
+ /* Check incoming args against common *at issues */
+ char dirfd_path[SB_PATH_MAX];
+ if (!sb_common_at_pre_check(func, &pathname, dirfd, dirfd_path, sizeof(dirfd_path)))
+ return false;
/* Then break down any relative/symlink paths */
if (-1 == canonicalize(pathname, canonic))
diff --git a/libsandbox/wrapper-funcs/openat_pre_check.c b/libsandbox/wrapper-funcs/openat_pre_check.c
index 0127708..5fd5eaa 100644
--- a/libsandbox/wrapper-funcs/openat_pre_check.c
+++ b/libsandbox/wrapper-funcs/openat_pre_check.c
@@ -15,17 +15,10 @@ bool sb_openat_pre_check(const char *func, const char *pathname, int dirfd, int
save_errno();
- /* Expand the dirfd path first */
+ /* Check incoming args against common *at issues */
char dirfd_path[SB_PATH_MAX];
- switch (resolve_dirfd_path(dirfd, pathname, dirfd_path, sizeof(dirfd_path))) {
- case -1:
- sb_debug_dyn("EARLY FAIL: %s(%s) @ resolve_dirfd_path: %s\n",
- func, pathname, strerror(errno));
- return false;
- case 0:
- pathname = dirfd_path;
- break;
- }
+ if (!sb_common_at_pre_check(func, &pathname, dirfd, dirfd_path, sizeof(dirfd_path)))
+ return false;
/* Doesn't exist -> skip permission checks */
struct stat st;
diff --git a/libsandbox/wrapper-funcs/unlinkat_pre_check.c b/libsandbox/wrapper-funcs/unlinkat_pre_check.c
index 9f5e7d7..c004d15 100644
--- a/libsandbox/wrapper-funcs/unlinkat_pre_check.c
+++ b/libsandbox/wrapper-funcs/unlinkat_pre_check.c
@@ -1,20 +1,13 @@
bool sb_unlinkat_pre_check(const char *func, const char *pathname, int dirfd)
{
char canonic[SB_PATH_MAX];
- char dirfd_path[SB_PATH_MAX];
save_errno();
- /* Expand the dirfd path first */
- switch (resolve_dirfd_path(dirfd, pathname, dirfd_path, sizeof(dirfd_path))) {
- case -1:
- sb_debug_dyn("EARLY FAIL: %s(%s) @ resolve_dirfd_path: %s\n",
- func, pathname, strerror(errno));
- return false;
- case 0:
- pathname = dirfd_path;
- break;
- }
+ /* Check incoming args against common *at issues */
+ char dirfd_path[SB_PATH_MAX];
+ if (!sb_common_at_pre_check(func, &pathname, dirfd, dirfd_path, sizeof(dirfd_path)))
+ return false;
/* Then break down any relative/symlink paths */
if (-1 == canonicalize(pathname, canonic))
diff --git a/libsandbox/wrappers.h b/libsandbox/wrappers.h
index 5b97787..0aa58bb 100644
--- a/libsandbox/wrappers.h
+++ b/libsandbox/wrappers.h
@@ -28,5 +28,7 @@ attribute_hidden bool sb_mkdirat_pre_check (const char *func, const char *pathn
attribute_hidden bool sb_openat_pre_check (const char *func, const char *pathname, int dirfd, int flags);
attribute_hidden bool sb_openat64_pre_check (const char *func, const char *pathname, int dirfd, int flags);
attribute_hidden bool sb_unlinkat_pre_check (const char *func, const char *pathname, int dirfd);
+attribute_hidden bool sb_common_at_pre_check(const char *func, const char **pathname, int dirfd,
+ char *dirfd_path, size_t dirfd_path_len);
#endif
--
1.8.1.2
From 0b8a6d9773cc0e6d86bf1187f46817d5716698fe Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Mon, 24 Dec 2012 19:41:49 -0500
Subject: [PATCH 2/2] libsandbox: reject "" paths with *at funcs before
checking the dirfd [missing file]
When it comes to processing errors, an empty path is checked before
an invalid dirfd. Make sure sandbox matches that behavior for the
random testsuites out there that look for this.
Forgot to `git add` in the previous commit :/.
URL: https://bugs.gentoo.org/346929
Reported-by: Marien Zwart <marienz@gentoo.org>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsandbox/wrapper-funcs/__pre_at_check.c | 34 +++++++++++++++++++++++++++++++
1 file changed, 34 insertions(+)
create mode 100644 libsandbox/wrapper-funcs/__pre_at_check.c
diff --git a/libsandbox/wrapper-funcs/__pre_at_check.c b/libsandbox/wrapper-funcs/__pre_at_check.c
new file mode 100644
index 0000000..f72c40c
--- /dev/null
+++ b/libsandbox/wrapper-funcs/__pre_at_check.c
@@ -0,0 +1,34 @@
+/*
+ * common *at() pre-checks.
+ *
+ * Copyright 1999-2012 Gentoo Foundation
+ * Licensed under the GPL-2
+ */
+
+/* We assume the parent has nested use with save/restore errno */
+bool sb_common_at_pre_check(const char *func, const char **pathname, int dirfd,
+ char *dirfd_path, size_t dirfd_path_len)
+{
+ /* the empty path name should fail with ENOENT before any dirfd
+ * checks get a chance to run #346929
+ */
+ if (*pathname && *pathname[0] == '\0') {
+ errno = ENOENT;
+ sb_debug_dyn("EARLY FAIL: %s(%s): %s\n",
+ func, *pathname, strerror(errno));
+ return false;
+ }
+
+ /* Expand the dirfd path first */
+ switch (resolve_dirfd_path(dirfd, *pathname, dirfd_path, dirfd_path_len)) {
+ case -1:
+ sb_debug_dyn("EARLY FAIL: %s(%s) @ resolve_dirfd_path: %s\n",
+ func, *pathname, strerror(errno));
+ return false;
+ case 0:
+ *pathname = dirfd_path;
+ break;
+ }
+
+ return true;
+}
--
1.8.1.2

View File

@ -0,0 +1,30 @@
From 00044ab0c8aaaabf048b5ff0ec2da5b3d7d25752 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Sat, 17 Nov 2012 14:14:26 -0500
Subject: [PATCH] sandbox.desktop: drop .svg from Icon field
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
URL: http://bugs.gentoo.org/443672
Reported-by: Petteri Räty <betelgeuse@gentoo.org>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
data/sandbox.desktop | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/data/sandbox.desktop b/data/sandbox.desktop
index 5b5b576..27a887e 100644
--- a/data/sandbox.desktop
+++ b/data/sandbox.desktop
@@ -5,6 +5,6 @@ Type=Application
Comment=launch a sandboxed shell ... useful for debugging ebuilds
Exec=sandbox
TryExec=sandbox
-Icon=sandbox.svg
+Icon=sandbox
Categories=Development;
Terminal=true
--
1.8.1.2

View File

@ -0,0 +1,51 @@
From 853b42c86432eefc6d4cfba86197fb37d446366d Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Sun, 3 Mar 2013 05:34:09 -0500
Subject: [PATCH] sandbox: accept SANDBOX_LOG vars whatever their values
Commit 40abb498ca4a24495fe34e133379382ce8c3eaca subtly broke the sandbox
with portage. It changed how the sandbox log env var was accessed by
moving from getenv() to get_sandbox_log(). The latter has path checking
and will kick out values that contain a slash. That means every time a
new process starts, a new sandbox log path will be generated, and when a
program triggers a violation, it'll write to the new file. Meanwhile,
portage itself watches the original one which never gets updated.
This code has been around forever w/out documentation, and I can't think
of a reason we need it. So punt it.
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsbutil/get_sandbox_log.c | 14 +++++---------
1 file changed, 5 insertions(+), 9 deletions(-)
diff --git a/libsbutil/get_sandbox_log.c b/libsbutil/get_sandbox_log.c
index a79b399..bdb4278 100644
--- a/libsbutil/get_sandbox_log.c
+++ b/libsbutil/get_sandbox_log.c
@@ -21,17 +21,13 @@ static void _get_sb_log(char *path, const char *tmpdir, const char *env, const c
sandbox_log_env = getenv(env);
- if (sandbox_log_env && is_env_on(ENV_SANDBOX_TESTING)) {
- /* When testing, just use what the env says to */
+ if (sandbox_log_env) {
+ /* If the env is viable, roll with it. We aren't really
+ * about people breaking the security of the sandbox by
+ * exporting SANDBOX_LOG=/dev/null.
+ */
strncpy(path, sandbox_log_env, SB_PATH_MAX);
} else {
- /* THIS CHUNK BREAK THINGS BY DOING THIS:
- * SANDBOX_LOG=/tmp/sandbox-app-admin/superadduser-1.0.7-11063.log
- */
- if ((NULL != sandbox_log_env) &&
- (NULL != strchr(sandbox_log_env, '/')))
- sandbox_log_env = NULL;
-
snprintf(path, SB_PATH_MAX, "%s%s%s%s%d%s",
SANDBOX_LOG_LOCATION, prefix,
(sandbox_log_env == NULL ? "" : sandbox_log_env),
--
1.8.1.2

View File

@ -0,0 +1,29 @@
gcc crashes when trying to use pch under hardened kernels
http://bugs.gentoo.org/425524
--- Makefile.in
+++ Makefile.in
@@ -300,7 +300,7 @@
src \
tests
-SANDBOX_PCH = headers.h.gch libsandbox/headers.h.gch libsbutil/headers.h.gch
+SANDBOX_PCH =
BUILT_SOURCES = $(SANDBOX_PCH)
noinst_LTLIBRARIES = libpch.la
nodist_libpch_la_SOURCES = $(SANDBOX_PCH)
@@ -862,10 +862,9 @@
$(builddir)/headers.h.gch: headers.h
$(AM_V_GEN)$(COMPILE) -c -o $@.o $< && $(GCH_CP)
-libsbutil: libsbutil/headers.h.gch
-libsandbox: libsbutil libsandbox/headers.h.gch
-src: libsbutil headers.h.gch
-tests: src headers.h.gch
+libsandbox: libsbutil
+src: libsbutil
+tests: src
ChangeLog:
touch ChangeLog

View File

@ -0,0 +1,54 @@
From 45fa8714a1d35e6555083d88a71851ada2aacac4 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Mon, 24 Dec 2012 18:46:29 -0500
Subject: [PATCH] libsandbox: handle open(O_NOFOLLOW)
We don't check for O_NOFOLLOW in the open wrappers, so we end up
returning the wrong error when operating on broken symlinks.
URL: https://bugs.gentoo.org/413441
Reported-by: Marien Zwart <marienz@gentoo.org>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsandbox/wrapper-funcs/__64_post.h | 1 +
libsandbox/wrapper-funcs/__64_pre.h | 1 +
libsandbox/wrapper-funcs/openat_pre_check.c | 2 +-
tests/open-2.sh | 10 ++++++++++
tests/open.at | 1 +
5 files changed, 14 insertions(+), 1 deletion(-)
create mode 100755 tests/open-2.sh
diff --git a/libsandbox/wrapper-funcs/__64_post.h b/libsandbox/wrapper-funcs/__64_post.h
index 2fd2182..82d2a16 100644
--- a/libsandbox/wrapper-funcs/__64_post.h
+++ b/libsandbox/wrapper-funcs/__64_post.h
@@ -1,3 +1,4 @@
#undef SB64
#undef stat
+#undef lstat
#undef off_t
diff --git a/libsandbox/wrapper-funcs/__64_pre.h b/libsandbox/wrapper-funcs/__64_pre.h
index 2132110..0b34b25 100644
--- a/libsandbox/wrapper-funcs/__64_pre.h
+++ b/libsandbox/wrapper-funcs/__64_pre.h
@@ -1,3 +1,4 @@
#define SB64
#define stat stat64
+#define lstat lstat64
#define off_t off64_t
diff --git a/libsandbox/wrapper-funcs/openat_pre_check.c b/libsandbox/wrapper-funcs/openat_pre_check.c
index c827ee6..0127708 100644
--- a/libsandbox/wrapper-funcs/openat_pre_check.c
+++ b/libsandbox/wrapper-funcs/openat_pre_check.c
@@ -29,7 +29,7 @@ bool sb_openat_pre_check(const char *func, const char *pathname, int dirfd, int
/* Doesn't exist -> skip permission checks */
struct stat st;
- if (-1 == stat(pathname, &st)) {
+ if (((flags & O_NOFOLLOW) ? lstat(pathname, &st) : stat(pathname, &st)) == -1) {
sb_debug_dyn("EARLY FAIL: %s(%s): %s\n",
func, pathname, strerror(errno));
return false;
--
1.8.1.2

View File

@ -0,0 +1,93 @@
From a3ff1534945c3898332b2481c9fd355dfbd56e1f Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Sat, 23 Jun 2012 11:52:51 -0700
Subject: [PATCH] libsandbox: clean up open file handles in parent tracing
process
Currently, if a non-static app sets up a pipe (with cloexec enabled) and
executes a static app, the handle to that pipe is left open in the parent
process. This causes trouble when the parent is waiting for that to be
closed immediately.
Since none of the fds in the forked parent process matter to us, we can
just go ahead and clean up all fds before we start tracing the child.
URL: http://bugs.gentoo.org/364877
Reported-by: Victor Stinner <victor.stinner@haypocalc.com>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsandbox/trace.c | 3 +-
libsbutil/sb_close.c | 26 +++++++++++-
libsbutil/sbutil.h | 1 +
tests/Makefile.am | 2 +
tests/pipe-fork_static_tst.c | 18 +++++++++
tests/pipe-fork_tst.c | 95 ++++++++++++++++++++++++++++++++++++++++++++
tests/script-9.sh | 5 +++
tests/script.at | 1 +
8 files changed, 149 insertions(+), 2 deletions(-)
create mode 100644 tests/pipe-fork_static_tst.c
create mode 100644 tests/pipe-fork_tst.c
create mode 100755 tests/script-9.sh
diff --git a/libsandbox/trace.c b/libsandbox/trace.c
index 32ad2d6..dfbab18 100644
--- a/libsandbox/trace.c
+++ b/libsandbox/trace.c
@@ -504,8 +504,9 @@ void trace_main(const char *filename, char *const argv[])
/* Not all kernel versions support this, so ignore return */
ptrace(PTRACE_SETOPTIONS, trace_pid, NULL, (void *)PTRACE_O_TRACESYSGOOD);
#endif
+ sb_close_all_fds();
trace_loop();
- return;
+ sb_ebort("ISE: child should have quit, as should we\n");
}
sb_debug("child setting up ...");
diff --git a/libsbutil/sb_close.c b/libsbutil/sb_close.c
index 17a4560..5379197 100644
--- a/libsbutil/sb_close.c
+++ b/libsbutil/sb_close.c
@@ -29,3 +29,27 @@ int sb_close(int fd)
return res;
}
+
+/* Quickly close all the open fds (good for daemonization) */
+void sb_close_all_fds(void)
+{
+ DIR *dirp;
+ struct dirent *de;
+ int dfd, fd;
+ const char *fd_dir = sb_get_fd_dir();
+
+ dirp = opendir(fd_dir);
+ if (!dirp)
+ sb_ebort("could not process %s\n", fd_dir);
+ dfd = dirfd(dirp);
+
+ while ((de = readdir(dirp)) != NULL) {
+ if (de->d_name[0] == '.')
+ continue;
+ fd = atoi(de->d_name);
+ if (fd != dfd)
+ close(fd);
+ }
+
+ closedir(dirp);
+}
diff --git a/libsbutil/sbutil.h b/libsbutil/sbutil.h
index 02b88cb..479734b 100644
--- a/libsbutil/sbutil.h
+++ b/libsbutil/sbutil.h
@@ -97,6 +97,7 @@ int sb_open(const char *path, int flags, mode_t mode);
size_t sb_read(int fd, void *buf, size_t count);
size_t sb_write(int fd, const void *buf, size_t count);
int sb_close(int fd);
+void sb_close_all_fds(void);
int sb_copy_file_to_fd(const char *file, int ofd);
/* Reliable output */
--
1.8.1.2

View File

@ -0,0 +1,27 @@
From 7b01f6103a9baddaf0252e7f850a4cef91a48b67 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <vapier@gentoo.org>
Date: Fri, 6 Jul 2012 14:58:16 -0400
Subject: [PATCH] libsandbox: fix hppa trace code
URL: https://bugs.gentoo.org/425062
Reported-by: Jeroen Roovers <jer@gentoo.org>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
---
libsandbox/trace/linux/hppa.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/libsandbox/trace/linux/hppa.c b/libsandbox/trace/linux/hppa.c
index d23b0d1..5414354 100644
--- a/libsandbox/trace/linux/hppa.c
+++ b/libsandbox/trace/linux/hppa.c
@@ -1,5 +1,5 @@
-#define trace_reg_sysnum (20 * 4) /* PT_GR20 */
-#define trace_reg_ret (28 * 4) /* PT_GR28 */
+#define trace_reg_sysnum gr[20]
+#define trace_reg_ret gr[28]
static unsigned long trace_arg(void *vregs, int num)
{
--
1.7.9.7

View File

@ -0,0 +1,11 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<!-- portage lacks a herd. correct this when we have one. -->
<maintainer>
<email>sandbox@gentoo.org</email>
<description>Sandbox Maintainers</description>
</maintainer>
</pkgmetadata>

View File

@ -0,0 +1,104 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-1.6-r2.ebuild,v 1.18 2013/11/14 21:36:59 vapier Exp $
#
# don't monkey with this ebuild unless contacting portage devs.
# period.
#
inherit eutils flag-o-matic toolchain-funcs multilib unpacker
DESCRIPTION="sandbox'd LD_PRELOAD hack"
HOMEPAGE="http://www.gentoo.org/proj/en/portage/sandbox/"
SRC_URI="mirror://gentoo/${P}.tar.lzma
http://dev.gentoo.org/~vapier/dist/${P}.tar.lzma"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd -x86-fbsd"
IUSE=""
DEPEND="app-arch/xz-utils
>=app-misc/pax-utils-0.1.19" #265376
RDEPEND=""
EMULTILIB_PKG="true"
has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
sandbox_death_notice() {
ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:"
ewarn "FEATURES=-sandbox emerge sandbox"
}
src_unpack() {
unpacker_src_unpack
cd "${S}"
epatch "${FILESDIR}"/${P}-disable-qa-static.patch
epatch "${FILESDIR}"/${P}-disable-pthread.patch
epatch "${FILESDIR}"/0001-libsandbox-handle-more-at-functions.patch
}
src_compile() {
filter-lfs-flags #90228
local OABI=${ABI}
for ABI in $(get_install_abis) ; do
mkdir "${WORKDIR}/build-${ABI}"
cd "${WORKDIR}/build-${ABI}"
multilib_toolchain_setup ${ABI}
einfo "Configuring sandbox for ABI=${ABI}..."
ECONF_SOURCE="../${P}/" \
econf ${myconf} || die
einfo "Building sandbox for ABI=${ABI}..."
emake || die
done
ABI=${OABI}
}
src_test() {
local OABI=${ABI}
for ABI in $(get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Checking sandbox for ABI=${ABI}..."
emake check || die "make check failed for ${ABI}"
done
ABI=${OABI}
}
src_install() {
local OABI=${ABI}
for ABI in $(get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Installing sandbox for ABI=${ABI}..."
emake DESTDIR="${D}" install || die "make install failed for ${ABI}"
done
ABI=${OABI}
doenvd "${FILESDIR}"/09sandbox
keepdir /var/log/sandbox
fowners root:portage /var/log/sandbox
fperms 0770 /var/log/sandbox
cd "${S}"
dodoc AUTHORS ChangeLog* NEWS README
}
pkg_preinst() {
chown root:portage "${D}"/var/log/sandbox
chmod 0770 "${D}"/var/log/sandbox
local old=$(find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*')
if [[ -n ${old} ]] ; then
elog "Removing old sandbox libraries for you:"
elog ${old//${ROOT}}
find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -exec rm -fv {} \;
fi
}
pkg_postinst() {
chmod 0755 "${ROOT}"/etc/sandbox.d #265376
}

View File

@ -0,0 +1,103 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-2.3-r1.ebuild,v 1.11 2013/11/14 21:36:59 vapier Exp $
#
# don't monkey with this ebuild unless contacting portage devs.
# period.
#
inherit eutils flag-o-matic toolchain-funcs multilib unpacker
DESCRIPTION="sandbox'd LD_PRELOAD hack"
HOMEPAGE="http://www.gentoo.org/proj/en/portage/sandbox/"
SRC_URI="mirror://gentoo/${P}.tar.xz
http://dev.gentoo.org/~vapier/dist/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd -x86-fbsd"
IUSE="multilib"
DEPEND="app-arch/xz-utils
>=app-misc/pax-utils-0.1.19" #265376
RDEPEND=""
EMULTILIB_PKG="true"
has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
sandbox_death_notice() {
ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:"
ewarn "FEATURES=-sandbox emerge sandbox"
}
sb_get_install_abis() { use multilib && get_install_abis || echo ${ABI:-default} ; }
src_compile() {
filter-lfs-flags #90228
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
mkdir "${WORKDIR}/build-${ABI}"
cd "${WORKDIR}/build-${ABI}"
use multilib && multilib_toolchain_setup ${ABI}
einfo "Configuring sandbox for ABI=${ABI}..."
ECONF_SOURCE="../${P}/" \
econf ${myconf} || die
einfo "Building sandbox for ABI=${ABI}..."
emake || die
done
ABI=${OABI}
}
src_test() {
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Checking sandbox for ABI=${ABI}..."
emake check || die "make check failed for ${ABI}"
done
ABI=${OABI}
}
src_install() {
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Installing sandbox for ABI=${ABI}..."
emake DESTDIR="${D}" install || die "make install failed for ${ABI}"
insinto /etc/sandbox.d #333131
doins etc/sandbox.d/00default || die
done
ABI=${OABI}
doenvd "${FILESDIR}"/09sandbox
# fix 00default install #333131
rm "${D}"/etc/sandbox.d/*.in || die
keepdir /var/log/sandbox
fowners root:portage /var/log/sandbox
fperms 0770 /var/log/sandbox
cd "${S}"
dodoc AUTHORS ChangeLog* NEWS README
}
pkg_preinst() {
chown root:portage "${D}"/var/log/sandbox
chmod 0770 "${D}"/var/log/sandbox
local old=$(find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*')
if [[ -n ${old} ]] ; then
elog "Removing old sandbox libraries for you:"
elog ${old//${ROOT}}
find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -exec rm -fv {} \;
fi
}
pkg_postinst() {
chmod 0755 "${ROOT}"/etc/sandbox.d #265376
}

View File

@ -1,16 +1,16 @@
# Copyright 1999-2011 Gentoo Foundation
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-2.4.ebuild,v 1.10 2011/05/10 16:00:47 darkside Exp $
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-2.4.ebuild,v 1.12 2013/11/14 21:36:59 vapier Exp $
#
# don't monkey with this ebuild unless contacting portage devs.
# period.
#
inherit eutils flag-o-matic toolchain-funcs multilib
inherit eutils flag-o-matic toolchain-funcs multilib unpacker
DESCRIPTION="sandbox'd LD_PRELOAD hack"
HOMEPAGE="http://www.gentoo.org/"
HOMEPAGE="http://www.gentoo.org/proj/en/portage/sandbox/"
SRC_URI="mirror://gentoo/${P}.tar.xz
http://dev.gentoo.org/~vapier/dist/${P}.tar.xz"
@ -33,14 +33,6 @@ sandbox_death_notice() {
sb_get_install_abis() { use multilib && get_install_abis || echo ${ABI:-default} ; }
src_unpack() {
unpack ${A}
if [[ ! -d ${S} ]] ; then
# When upgrading from older version, xz unpack may not work #271543
xz -dc "${DISTDIR}/${A}" | tar xof - || die
fi
}
src_compile() {
filter-lfs-flags #90228

View File

@ -0,0 +1,117 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-2.5.ebuild,v 1.11 2013/11/14 21:36:59 vapier Exp $
#
# don't monkey with this ebuild unless contacting portage devs.
# period.
#
inherit eutils flag-o-matic toolchain-funcs multilib unpacker multiprocessing
DESCRIPTION="sandbox'd LD_PRELOAD hack"
HOMEPAGE="http://www.gentoo.org/proj/en/portage/sandbox/"
SRC_URI="mirror://gentoo/${P}.tar.xz
http://dev.gentoo.org/~vapier/dist/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd -x86-fbsd"
IUSE="multilib"
DEPEND="app-arch/xz-utils
>=app-misc/pax-utils-0.1.19" #265376
RDEPEND=""
EMULTILIB_PKG="true"
has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
sandbox_death_notice() {
ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:"
ewarn "FEATURES=-sandbox emerge sandbox"
}
sb_get_install_abis() { use multilib && get_install_abis || echo ${ABI:-default} ; }
sb_foreach_abi() {
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Running $1 for ABI=${ABI}..."
"$@"
done
ABI=${OABI}
}
sb_configure() {
mkdir "${WORKDIR}/build-${ABI}"
cd "${WORKDIR}/build-${ABI}"
use multilib && multilib_toolchain_setup ${ABI}
einfo "Configuring sandbox for ABI=${ABI}..."
ECONF_SOURCE="../${P}/" \
econf ${myconf} || die
}
sb_compile() {
emake || die
}
src_compile() {
filter-lfs-flags #90228
# Run configures in parallel!
multijob_init
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
multijob_child_init sb_configure
done
ABI=${OABI}
multijob_finish
sb_foreach_abi sb_compile
}
sb_test() {
emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" || die
}
src_test() {
sb_foreach_abi sb_test
}
sb_install() {
emake DESTDIR="${D}" install || die
insinto /etc/sandbox.d #333131
doins etc/sandbox.d/00default || die
}
src_install() {
sb_foreach_abi sb_install
doenvd "${FILESDIR}"/09sandbox
keepdir /var/log/sandbox
fowners root:portage /var/log/sandbox
fperms 0770 /var/log/sandbox
cd "${S}"
dodoc AUTHORS ChangeLog* NEWS README
}
pkg_preinst() {
chown root:portage "${D}"/var/log/sandbox
chmod 0770 "${D}"/var/log/sandbox
local old=$(find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*')
if [[ -n ${old} ]] ; then
elog "Removing old sandbox libraries for you:"
elog ${old//${ROOT}}
find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -exec rm -fv {} \;
fi
}
pkg_postinst() {
chmod 0755 "${ROOT}"/etc/sandbox.d #265376
}

View File

@ -0,0 +1,130 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/sandbox/sandbox-2.6-r1.ebuild,v 1.15 2013/11/28 00:51:47 vapier Exp $
#
# don't monkey with this ebuild unless contacting portage devs.
# period.
#
inherit eutils flag-o-matic toolchain-funcs multilib unpacker multiprocessing
DESCRIPTION="sandbox'd LD_PRELOAD hack"
HOMEPAGE="http://www.gentoo.org/proj/en/portage/sandbox/"
SRC_URI="mirror://gentoo/${P}.tar.xz
http://dev.gentoo.org/~vapier/dist/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd -x86-fbsd"
IUSE="multilib"
DEPEND="app-arch/xz-utils
>=app-misc/pax-utils-0.1.19" #265376
RDEPEND=""
EMULTILIB_PKG="true"
has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
sandbox_death_notice() {
ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:"
ewarn "FEATURES=-sandbox emerge sandbox"
}
sb_get_install_abis() { use multilib && get_install_abis || echo ${ABI:-default} ; }
sb_foreach_abi() {
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
cd "${WORKDIR}/build-${ABI}"
einfo "Running $1 for ABI=${ABI}..."
"$@"
done
ABI=${OABI}
}
src_unpack() {
unpacker
cd "${S}"
epatch "${FILESDIR}"/${P}-trace-hppa.patch #425062
epatch "${FILESDIR}"/${P}-log-var.patch
epatch "${FILESDIR}"/${P}-static-close-fd.patch #364877
epatch "${FILESDIR}"/${P}-desktop.patch #443672
epatch "${FILESDIR}"/${P}-open-nofollow.patch #413441
epatch "${FILESDIR}"/${P}-check-empty-paths-at.patch #346929
epatch "${FILESDIR}"/${P}-no-pch.patch #425524
epatch_user
}
sb_configure() {
mkdir "${WORKDIR}/build-${ABI}"
cd "${WORKDIR}/build-${ABI}"
use multilib && multilib_toolchain_setup ${ABI}
einfo "Configuring sandbox for ABI=${ABI}..."
ECONF_SOURCE="../${P}/" \
econf ${myconf} || die
}
sb_compile() {
emake || die
}
src_compile() {
filter-lfs-flags #90228
# Run configures in parallel!
multijob_init
local OABI=${ABI}
for ABI in $(sb_get_install_abis) ; do
multijob_child_init sb_configure
done
ABI=${OABI}
multijob_finish
sb_foreach_abi sb_compile
}
sb_test() {
emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" || die
}
src_test() {
sb_foreach_abi sb_test
}
sb_install() {
emake DESTDIR="${D}" install || die
insinto /etc/sandbox.d #333131
doins etc/sandbox.d/00default || die
}
src_install() {
sb_foreach_abi sb_install
doenvd "${FILESDIR}"/09sandbox
keepdir /var/log/sandbox
fowners root:portage /var/log/sandbox
fperms 0770 /var/log/sandbox
cd "${S}"
dodoc AUTHORS ChangeLog* NEWS README
}
pkg_preinst() {
chown root:portage "${D}"/var/log/sandbox
chmod 0770 "${D}"/var/log/sandbox
local old=$(find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*')
if [[ -n ${old} ]] ; then
elog "Removing old sandbox libraries for you:"
elog ${old//${ROOT}}
find "${ROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -exec rm -fv {} \;
fi
}
pkg_postinst() {
chmod 0755 "${ROOT}"/etc/sandbox.d #265376
}