Source: libselinux
Version: 3.5-2
Severity: serious
Tags: patch pending sid trixie
Justification: library ABI skew on upgrade
User: debian-...@lists.debian.org
Usertags: time-t

NOTICE: these changes must not be uploaded to unstable yet!

Dear maintainer,

As part of the 64-bit time_t transition required to support 32-bit
architectures in 2038 and beyond
(https://wiki.debian.org/ReleaseGoals/64bit-time), we have identified
libselinux as a source package shipping runtime libraries whose ABI
either is affected by the change in size of time_t, or could not be
analyzed via abi-compliance-checker (and therefore to be on the safe
side we assume is affected).

To ensure that inconsistent combinations of libraries with their
reverse-dependencies are never installed together, it is necessary to
have a library transition, which is most easily done by renaming the
runtime library package.

Since turning on 64-bit time_t is being handled centrally through a change
to the default dpkg-buildflags (https://bugs.debian.org/1037136), it is
important that libraries affected by this ABI change all be uploaded close
together in time.  Therefore I have prepared a 0-day NMU for libselinux
which will initially be uploaded to experimental if possible, then to
unstable after packages have cleared binary NEW.

Please find the patch for this NMU attached.

If you have any concerns about this patch, please reach out ASAP.  Although
this package will be uploaded to experimental immediately, there will be a
period of several days before we begin uploads to unstable; so if information
becomes available that your package should not be included in the transition,
there is time for us to amend the planned uploads.



-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-14-generic (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru libselinux-3.5/debian/changelog libselinux-3.5/debian/changelog
--- libselinux-3.5/debian/changelog     2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/changelog     2024-02-05 08:22:28.000000000 +0000
@@ -1,3 +1,10 @@
+libselinux (3.5-2.1) experimental; urgency=medium
+
+  * Non-maintainer upload.
+  * Rename libraries for 64-bit time_t transition.
+
+ -- Steve Langasek <vor...@debian.org>  Mon, 05 Feb 2024 08:22:28 +0000
+
 libselinux (3.5-2) unstable; urgency=medium
 
   [ Michael Biebl ]
diff -Nru libselinux-3.5/debian/control libselinux-3.5/debian/control
--- libselinux-3.5/debian/control       2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/control       2024-02-05 08:22:28.000000000 +0000
@@ -35,7 +35,10 @@
  provides utility programs to get and set process and file security
  contexts and to obtain security policy decisions.
 
-Package: libselinux1
+Package: libselinux1t64
+Provides: ${t64:Provides}
+Replaces: libselinux1
+Breaks: libselinux1 (<< ${source:Version})
 Architecture: linux-any
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
@@ -54,7 +57,7 @@
  control policies, including those based on the concepts of Type
  Enforcement, Role-based Access Control, and Multi-level Security.
  .
- libselinux1 provides an API for SELinux applications to get and set
+ libselinux1t64 provides an API for SELinux applications to get and set
  process and file security contexts and to obtain security policy
  decisions.  Required for any applications that use the SELinux
  API. libselinux may use the shared libsepol to manipulate the binary
@@ -63,7 +66,7 @@
 
 Package: libselinux1-dev
 Architecture: linux-any
-Depends: libselinux1 (= ${binary:Version}),
+Depends: libselinux1t64 (= ${binary:Version}),
          libsepol-dev (>= 3.5),
          libpcre2-dev,
          ${misc:Depends}
diff -Nru libselinux-3.5/debian/libselinux1.install 
libselinux-3.5/debian/libselinux1.install
--- libselinux-3.5/debian/libselinux1.install   2024-01-24 20:23:37.000000000 
+0000
+++ libselinux-3.5/debian/libselinux1.install   1970-01-01 00:00:00.000000000 
+0000
@@ -1 +0,0 @@
-usr/lib/*/*.so.*
diff -Nru libselinux-3.5/debian/libselinux1.symbols 
libselinux-3.5/debian/libselinux1.symbols
--- libselinux-3.5/debian/libselinux1.symbols   2024-01-24 20:23:37.000000000 
+0000
+++ libselinux-3.5/debian/libselinux1.symbols   1970-01-01 00:00:00.000000000 
+0000
@@ -1,246 +0,0 @@
-libselinux.so.1 libselinux1 #MINVER#
-* Build-Depends-Package: libselinux1-dev
- LIBSELINUX_1.0@LIBSELINUX_1.0 3.1~
- LIBSELINUX_3.4@LIBSELINUX_3.4 3.4
- LIBSELINUX_3.5@LIBSELINUX_3.5 3.5
- avc_add_callback@LIBSELINUX_1.0 3.1~
- avc_audit@LIBSELINUX_1.0 3.1~
- avc_av_stats@LIBSELINUX_1.0 3.1~
- avc_cache_stats@LIBSELINUX_1.0 3.1~
- avc_cleanup@LIBSELINUX_1.0 3.1~
- avc_compute_create@LIBSELINUX_1.0 3.1~
- avc_compute_member@LIBSELINUX_1.0 3.1~
- avc_context_to_sid@LIBSELINUX_1.0 3.1~
- avc_context_to_sid_raw@LIBSELINUX_1.0 3.1~
- avc_destroy@LIBSELINUX_1.0 3.1~
- avc_get_initial_sid@LIBSELINUX_1.0 3.1~
- avc_has_perm@LIBSELINUX_1.0 3.1~
- avc_has_perm_noaudit@LIBSELINUX_1.0 3.1~
- avc_init@LIBSELINUX_1.0 3.1~
- avc_netlink_acquire_fd@LIBSELINUX_1.0 3.1~
- avc_netlink_check_nb@LIBSELINUX_1.0 3.1~
- avc_netlink_close@LIBSELINUX_1.0 3.1~
- avc_netlink_loop@LIBSELINUX_1.0 3.1~
- avc_netlink_open@LIBSELINUX_1.0 3.1~
- avc_netlink_release_fd@LIBSELINUX_1.0 3.1~
- avc_open@LIBSELINUX_1.0 3.1~
- avc_reset@LIBSELINUX_1.0 3.1~
- avc_sid_stats@LIBSELINUX_1.0 3.1~
- avc_sid_to_context@LIBSELINUX_1.0 3.1~
- avc_sid_to_context_raw@LIBSELINUX_1.0 3.1~
- checkPasswdAccess@LIBSELINUX_1.0 3.1~
- context_free@LIBSELINUX_1.0 3.1~
- context_new@LIBSELINUX_1.0 3.1~
- context_range_get@LIBSELINUX_1.0 3.1~
- context_range_set@LIBSELINUX_1.0 3.1~
- context_role_get@LIBSELINUX_1.0 3.1~
- context_role_set@LIBSELINUX_1.0 3.1~
- context_str@LIBSELINUX_1.0 3.1~
- context_type_get@LIBSELINUX_1.0 3.1~
- context_type_set@LIBSELINUX_1.0 3.1~
- context_user_get@LIBSELINUX_1.0 3.1~
- context_user_set@LIBSELINUX_1.0 3.1~
- fgetfilecon@LIBSELINUX_1.0 3.1~
- fini_selinuxmnt@LIBSELINUX_1.0 3.1~
- fgetfilecon_raw@LIBSELINUX_1.0 3.1~
- freecon@LIBSELINUX_1.0 3.1~
- freeconary@LIBSELINUX_1.0 3.1~
- fsetfilecon@LIBSELINUX_1.0 3.1~
- fsetfilecon_raw@LIBSELINUX_1.0 3.1~
- get_default_context@LIBSELINUX_1.0 3.1~
- get_default_context_with_level@LIBSELINUX_1.0 3.1~
- get_default_context_with_role@LIBSELINUX_1.0 3.1~
- get_default_context_with_rolelevel@LIBSELINUX_1.0 3.1~
- get_default_type@LIBSELINUX_1.0 3.1~
- get_ordered_context_list@LIBSELINUX_1.0 3.1~
- get_ordered_context_list_with_level@LIBSELINUX_1.0 3.1~
- getcon@LIBSELINUX_1.0 3.1~
- getcon_raw@LIBSELINUX_1.0 3.1~
- getexeccon@LIBSELINUX_1.0 3.1~
- getexeccon_raw@LIBSELINUX_1.0 3.1~
- getfilecon@LIBSELINUX_1.0 3.1~
- getfilecon_raw@LIBSELINUX_1.0 3.1~
- getfscreatecon@LIBSELINUX_1.0 3.1~
- getfscreatecon_raw@LIBSELINUX_1.0 3.1~
- getkeycreatecon@LIBSELINUX_1.0 3.1~
- getkeycreatecon_raw@LIBSELINUX_1.0 3.1~
- getpeercon@LIBSELINUX_1.0 3.1~
- getpeercon_raw@LIBSELINUX_1.0 3.1~
- getpidcon@LIBSELINUX_1.0 3.1~
- getpidcon_raw@LIBSELINUX_1.0 3.1~
- getpidprevcon@LIBSELINUX_3.5 3.5
- getpidprevcon_raw@LIBSELINUX_3.5 3.5
- getprevcon@LIBSELINUX_1.0 3.1~
- getprevcon_raw@LIBSELINUX_1.0 3.1~
- getseuser@LIBSELINUX_1.0 3.1~
- getseuserbyname@LIBSELINUX_1.0 3.1~
- getsockcreatecon@LIBSELINUX_1.0 3.1~
- getsockcreatecon_raw@LIBSELINUX_1.0 3.1~
- is_context_customizable@LIBSELINUX_1.0 3.1~
- is_selinux_enabled@LIBSELINUX_1.0 3.1~
- is_selinux_mls_enabled@LIBSELINUX_1.0 3.1~
- lgetfilecon@LIBSELINUX_1.0 3.1~
- lgetfilecon_raw@LIBSELINUX_1.0 3.1~
- lsetfilecon@LIBSELINUX_1.0 3.1~
- lsetfilecon_raw@LIBSELINUX_1.0 3.1~
- manual_user_enter_context@LIBSELINUX_1.0 3.1~
- matchmediacon@LIBSELINUX_1.0 3.1~
- matchpathcon@LIBSELINUX_1.0 3.1~
- matchpathcon_checkmatches@LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_add@LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_destroy@LIBSELINUX_1.0 3.1~
- matchpathcon_filespec_eval@LIBSELINUX_1.0 3.1~
- matchpathcon_fini@LIBSELINUX_1.0 3.1~
- matchpathcon_index@LIBSELINUX_1.0 3.1~
- matchpathcon_init@LIBSELINUX_1.0 3.1~
- matchpathcon_init_prefix@LIBSELINUX_1.0 3.1~
- mode_to_security_class@LIBSELINUX_1.0 3.1~
- print_access_vector@LIBSELINUX_1.0 3.1~
- query_user_context@LIBSELINUX_1.0 3.1~
- realpath_not_final@LIBSELINUX_1.0 3.1~
- rpm_execcon@LIBSELINUX_1.0 3.1~
- security_av_perm_to_string@LIBSELINUX_1.0 3.1~
- security_av_string@LIBSELINUX_1.0 3.1~
- security_canonicalize_context@LIBSELINUX_1.0 3.1~
- security_canonicalize_context_raw@LIBSELINUX_1.0 3.1~
- security_check_context@LIBSELINUX_1.0 3.1~
- security_check_context_raw@LIBSELINUX_1.0 3.1~
- security_class_to_string@LIBSELINUX_1.0 3.1~
- security_commit_booleans@LIBSELINUX_1.0 3.1~
- security_compute_av@LIBSELINUX_1.0 3.1~
- security_compute_av_flags@LIBSELINUX_1.0 3.1~
- security_compute_av_flags_raw@LIBSELINUX_1.0 3.1~
- security_compute_av_raw@LIBSELINUX_1.0 3.1~
- security_compute_create@LIBSELINUX_1.0 3.1~
- security_compute_create_name@LIBSELINUX_1.0 3.1~
- security_compute_create_name_raw@LIBSELINUX_1.0 3.1~
- security_compute_create_raw@LIBSELINUX_1.0 3.1~
- security_compute_member@LIBSELINUX_1.0 3.1~
- security_compute_member_raw@LIBSELINUX_1.0 3.1~
- security_compute_relabel@LIBSELINUX_1.0 3.1~
- security_compute_relabel_raw@LIBSELINUX_1.0 3.1~
- security_compute_user@LIBSELINUX_1.0 3.1~
- security_compute_user_raw@LIBSELINUX_1.0 3.1~
- security_deny_unknown@LIBSELINUX_1.0 3.1~
- security_disable@LIBSELINUX_1.0 3.1~
- security_get_boolean_active@LIBSELINUX_1.0 3.1~
- security_get_boolean_names@LIBSELINUX_1.0 3.1~
- security_get_boolean_pending@LIBSELINUX_1.0 3.1~
- security_get_checkreqprot@LIBSELINUX_1.0 3.1~
- security_get_initial_context@LIBSELINUX_1.0 3.1~
- security_get_initial_context_raw@LIBSELINUX_1.0 3.1~
- security_getenforce@LIBSELINUX_1.0 3.1~
- security_load_booleans@LIBSELINUX_1.0 3.1~
- security_load_policy@LIBSELINUX_1.0 3.1~
- security_policyvers@LIBSELINUX_1.0 3.1~
- security_reject_unknown@LIBSELINUX_1.0 3.1~
- security_set_boolean@LIBSELINUX_1.0 3.1~
- security_set_boolean_list@LIBSELINUX_1.0 3.1~
- security_setenforce@LIBSELINUX_1.0 3.1~
- security_validatetrans@LIBSELINUX_1.0 3.1~
- security_validatetrans_raw@LIBSELINUX_1.0 3.1~
- selabel_close@LIBSELINUX_1.0 3.1~
- selabel_cmp@LIBSELINUX_1.0 3.1~
- selabel_digest@LIBSELINUX_1.0 3.1~
- selabel_get_digests_all_partial_matches@LIBSELINUX_1.0 3.1~
- selabel_hash_all_partial_matches@LIBSELINUX_1.0 3.1~
- selabel_lookup@LIBSELINUX_1.0 3.1~
- selabel_lookup_best_match@LIBSELINUX_1.0 3.1~
- selabel_lookup_best_match_raw@LIBSELINUX_1.0 3.1~
- selabel_lookup_raw@LIBSELINUX_1.0 3.1~
- selabel_open@LIBSELINUX_1.0 3.1~
- selabel_partial_match@LIBSELINUX_1.0 3.1~
- selabel_stats@LIBSELINUX_1.0 3.1~
- selinux_binary_policy_path@LIBSELINUX_1.0 3.1~
- selinux_boolean_sub@LIBSELINUX_1.0 3.1~
- selinux_booleans_path@LIBSELINUX_1.0 3.1~
- selinux_booleans_subs_path@LIBSELINUX_1.0 3.1~
- selinux_check_access@LIBSELINUX_1.0 3.1~
- selinux_check_passwd_access@LIBSELINUX_1.0 3.1~
- selinux_check_securetty_context@LIBSELINUX_1.0 3.1~
- selinux_colors_path@LIBSELINUX_1.0 3.1~
- selinux_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_current_policy_path@LIBSELINUX_1.0 3.1~
- selinux_customizable_types_path@LIBSELINUX_1.0 3.1~
- selinux_default_context_path@LIBSELINUX_1.0 3.1~
- selinux_default_type_path@LIBSELINUX_1.0 3.1~
- selinux_failsafe_context_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_cmp@LIBSELINUX_1.0 3.1~
- selinux_file_context_homedir_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_local_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_subs_dist_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_subs_path@LIBSELINUX_1.0 3.1~
- selinux_file_context_verify@LIBSELINUX_1.0 3.1~
- selinux_flush_class_cache@LIBSELINUX_1.0 3.1~
- selinux_get_callback@LIBSELINUX_1.0 3.1~
- selinux_getenforcemode@LIBSELINUX_1.0 3.1~
- selinux_getpolicytype@LIBSELINUX_1.0 3.1~
- selinux_homedir_context_path@LIBSELINUX_1.0 3.1~
- selinux_init_load_policy@LIBSELINUX_1.0 3.1~
- selinux_lsetfilecon_default@LIBSELINUX_1.0 3.1~
- selinux_lxc_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_media_context_path@LIBSELINUX_1.0 3.1~
- selinux_mkload_policy@LIBSELINUX_1.0 3.1~
- selinux_mnt@LIBSELINUX_1.0 3.1~
- selinux_netfilter_context_path@LIBSELINUX_1.0 3.1~
- selinux_openrc_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_openssh_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_path@LIBSELINUX_1.0 3.1~
- selinux_policy_root@LIBSELINUX_1.0 3.1~
- selinux_raw_context_to_color@LIBSELINUX_1.0 3.1~
- selinux_raw_to_trans_context@LIBSELINUX_1.0 3.1~
- selinux_removable_context_path@LIBSELINUX_1.0 3.1~
- selinux_reset_config@LIBSELINUX_1.0 3.1~
- selinux_restorecon@LIBSELINUX_1.0 3.1~
- selinux_restorecon_default_handle@LIBSELINUX_1.0 3.1~
- selinux_restorecon_get_skipped_errors@LIBSELINUX_3.4 3.4
- selinux_restorecon_parallel@LIBSELINUX_3.4 3.4
- selinux_restorecon_set_alt_rootpath@LIBSELINUX_1.0 3.1~
- selinux_restorecon_set_exclude_list@LIBSELINUX_1.0 3.1~
- selinux_restorecon_set_sehandle@LIBSELINUX_1.0 3.1~
- selinux_restorecon_xattr@LIBSELINUX_1.0 3.1~
- selinux_securetty_types_path@LIBSELINUX_1.0 3.1~
- selinux_sepgsql_context_path@LIBSELINUX_1.0 3.1~
- selinux_set_callback@LIBSELINUX_1.0 3.1~
- selinux_set_mapping@LIBSELINUX_1.0 3.1~
- selinux_set_policy_root@LIBSELINUX_1.0 3.1~
- selinux_snapperd_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_status_close@LIBSELINUX_1.0 3.1~
- selinux_status_deny_unknown@LIBSELINUX_1.0 3.1~
- selinux_status_getenforce@LIBSELINUX_1.0 3.1~
- selinux_status_open@LIBSELINUX_1.0 3.1~
- selinux_status_policyload@LIBSELINUX_1.0 3.1~
- selinux_status_updated@LIBSELINUX_1.0 3.1~
- selinux_systemd_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_trans_to_raw_context@LIBSELINUX_1.0 3.1~
- selinux_translations_path@LIBSELINUX_1.0 3.1~
- selinux_user_contexts_path@LIBSELINUX_1.0 3.1~
- selinux_users_path@LIBSELINUX_1.0 3.1~
- selinux_usersconf_path@LIBSELINUX_1.0 3.1~
- selinux_virtual_domain_context_path@LIBSELINUX_1.0 3.1~
- selinux_virtual_image_context_path@LIBSELINUX_1.0 3.1~
- selinux_x_context_path@LIBSELINUX_1.0 3.1~
- selinuxfs_exists@LIBSELINUX_1.0 3.1~
- set_matchpathcon_canoncon@LIBSELINUX_1.0 3.1~
- set_matchpathcon_flags@LIBSELINUX_1.0 3.1~
- set_matchpathcon_invalidcon@LIBSELINUX_1.0 3.1~
- set_matchpathcon_printf@LIBSELINUX_1.0 3.1~
- set_selinuxmnt@LIBSELINUX_1.0 3.1~
- setcon@LIBSELINUX_1.0 3.1~
- setcon_raw@LIBSELINUX_1.0 3.1~
- setexeccon@LIBSELINUX_1.0 3.1~
- setexeccon_raw@LIBSELINUX_1.0 3.1~
- setexecfilecon@LIBSELINUX_1.0 3.1~
- setfilecon@LIBSELINUX_1.0 3.1~
- setfilecon_raw@LIBSELINUX_1.0 3.1~
- setfscreatecon@LIBSELINUX_1.0 3.1~
- setfscreatecon_raw@LIBSELINUX_1.0 3.1~
- setkeycreatecon@LIBSELINUX_1.0 3.1~
- setkeycreatecon_raw@LIBSELINUX_1.0 3.1~
- setsockcreatecon@LIBSELINUX_1.0 3.1~
- setsockcreatecon_raw@LIBSELINUX_1.0 3.1~
- sidget@LIBSELINUX_1.0 3.1~
- sidput@LIBSELINUX_1.0 3.1~
- string_to_av_perm@LIBSELINUX_1.0 3.1~
- string_to_security_class@LIBSELINUX_1.0 3.1~
diff -Nru libselinux-3.5/debian/libselinux1.tmpfiles 
libselinux-3.5/debian/libselinux1.tmpfiles
--- libselinux-3.5/debian/libselinux1.tmpfiles  2024-01-24 20:23:37.000000000 
+0000
+++ libselinux-3.5/debian/libselinux1.tmpfiles  1970-01-01 00:00:00.000000000 
+0000
@@ -1,4 +0,0 @@
-# See tmpfiles.d(5) for details
-
-# Type Path    Mode UID  GID  Age Argument
-d /run/setrans 0755 root root -   -
diff -Nru libselinux-3.5/debian/libselinux1t64.install 
libselinux-3.5/debian/libselinux1t64.install
--- libselinux-3.5/debian/libselinux1t64.install        1970-01-01 
00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.install        2024-01-24 
20:23:37.000000000 +0000
@@ -0,0 +1 @@
+usr/lib/*/*.so.*
diff -Nru libselinux-3.5/debian/libselinux1t64.lintian-overrides 
libselinux-3.5/debian/libselinux1t64.lintian-overrides
--- libselinux-3.5/debian/libselinux1t64.lintian-overrides      1970-01-01 
00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.lintian-overrides      2024-02-05 
08:22:28.000000000 +0000
@@ -0,0 +1 @@
+libselinux1t64: package-name-doesnt-match-sonames libselinux1
diff -Nru libselinux-3.5/debian/libselinux1t64.symbols 
libselinux-3.5/debian/libselinux1t64.symbols
--- libselinux-3.5/debian/libselinux1t64.symbols        1970-01-01 
00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.symbols        2024-02-05 
08:22:28.000000000 +0000
@@ -0,0 +1,246 @@
+libselinux.so.1 libselinux1t64 #MINVER#
+* Build-Depends-Package: libselinux1-dev
+ LIBSELINUX_1.0@LIBSELINUX_1.0 3.1~
+ LIBSELINUX_3.4@LIBSELINUX_3.4 3.4
+ LIBSELINUX_3.5@LIBSELINUX_3.5 3.5
+ avc_add_callback@LIBSELINUX_1.0 3.1~
+ avc_audit@LIBSELINUX_1.0 3.1~
+ avc_av_stats@LIBSELINUX_1.0 3.1~
+ avc_cache_stats@LIBSELINUX_1.0 3.1~
+ avc_cleanup@LIBSELINUX_1.0 3.1~
+ avc_compute_create@LIBSELINUX_1.0 3.1~
+ avc_compute_member@LIBSELINUX_1.0 3.1~
+ avc_context_to_sid@LIBSELINUX_1.0 3.1~
+ avc_context_to_sid_raw@LIBSELINUX_1.0 3.1~
+ avc_destroy@LIBSELINUX_1.0 3.1~
+ avc_get_initial_sid@LIBSELINUX_1.0 3.1~
+ avc_has_perm@LIBSELINUX_1.0 3.1~
+ avc_has_perm_noaudit@LIBSELINUX_1.0 3.1~
+ avc_init@LIBSELINUX_1.0 3.1~
+ avc_netlink_acquire_fd@LIBSELINUX_1.0 3.1~
+ avc_netlink_check_nb@LIBSELINUX_1.0 3.1~
+ avc_netlink_close@LIBSELINUX_1.0 3.1~
+ avc_netlink_loop@LIBSELINUX_1.0 3.1~
+ avc_netlink_open@LIBSELINUX_1.0 3.1~
+ avc_netlink_release_fd@LIBSELINUX_1.0 3.1~
+ avc_open@LIBSELINUX_1.0 3.1~
+ avc_reset@LIBSELINUX_1.0 3.1~
+ avc_sid_stats@LIBSELINUX_1.0 3.1~
+ avc_sid_to_context@LIBSELINUX_1.0 3.1~
+ avc_sid_to_context_raw@LIBSELINUX_1.0 3.1~
+ checkPasswdAccess@LIBSELINUX_1.0 3.1~
+ context_free@LIBSELINUX_1.0 3.1~
+ context_new@LIBSELINUX_1.0 3.1~
+ context_range_get@LIBSELINUX_1.0 3.1~
+ context_range_set@LIBSELINUX_1.0 3.1~
+ context_role_get@LIBSELINUX_1.0 3.1~
+ context_role_set@LIBSELINUX_1.0 3.1~
+ context_str@LIBSELINUX_1.0 3.1~
+ context_type_get@LIBSELINUX_1.0 3.1~
+ context_type_set@LIBSELINUX_1.0 3.1~
+ context_user_get@LIBSELINUX_1.0 3.1~
+ context_user_set@LIBSELINUX_1.0 3.1~
+ fgetfilecon@LIBSELINUX_1.0 3.1~
+ fini_selinuxmnt@LIBSELINUX_1.0 3.1~
+ fgetfilecon_raw@LIBSELINUX_1.0 3.1~
+ freecon@LIBSELINUX_1.0 3.1~
+ freeconary@LIBSELINUX_1.0 3.1~
+ fsetfilecon@LIBSELINUX_1.0 3.1~
+ fsetfilecon_raw@LIBSELINUX_1.0 3.1~
+ get_default_context@LIBSELINUX_1.0 3.1~
+ get_default_context_with_level@LIBSELINUX_1.0 3.1~
+ get_default_context_with_role@LIBSELINUX_1.0 3.1~
+ get_default_context_with_rolelevel@LIBSELINUX_1.0 3.1~
+ get_default_type@LIBSELINUX_1.0 3.1~
+ get_ordered_context_list@LIBSELINUX_1.0 3.1~
+ get_ordered_context_list_with_level@LIBSELINUX_1.0 3.1~
+ getcon@LIBSELINUX_1.0 3.1~
+ getcon_raw@LIBSELINUX_1.0 3.1~
+ getexeccon@LIBSELINUX_1.0 3.1~
+ getexeccon_raw@LIBSELINUX_1.0 3.1~
+ getfilecon@LIBSELINUX_1.0 3.1~
+ getfilecon_raw@LIBSELINUX_1.0 3.1~
+ getfscreatecon@LIBSELINUX_1.0 3.1~
+ getfscreatecon_raw@LIBSELINUX_1.0 3.1~
+ getkeycreatecon@LIBSELINUX_1.0 3.1~
+ getkeycreatecon_raw@LIBSELINUX_1.0 3.1~
+ getpeercon@LIBSELINUX_1.0 3.1~
+ getpeercon_raw@LIBSELINUX_1.0 3.1~
+ getpidcon@LIBSELINUX_1.0 3.1~
+ getpidcon_raw@LIBSELINUX_1.0 3.1~
+ getpidprevcon@LIBSELINUX_3.5 3.5
+ getpidprevcon_raw@LIBSELINUX_3.5 3.5
+ getprevcon@LIBSELINUX_1.0 3.1~
+ getprevcon_raw@LIBSELINUX_1.0 3.1~
+ getseuser@LIBSELINUX_1.0 3.1~
+ getseuserbyname@LIBSELINUX_1.0 3.1~
+ getsockcreatecon@LIBSELINUX_1.0 3.1~
+ getsockcreatecon_raw@LIBSELINUX_1.0 3.1~
+ is_context_customizable@LIBSELINUX_1.0 3.1~
+ is_selinux_enabled@LIBSELINUX_1.0 3.1~
+ is_selinux_mls_enabled@LIBSELINUX_1.0 3.1~
+ lgetfilecon@LIBSELINUX_1.0 3.1~
+ lgetfilecon_raw@LIBSELINUX_1.0 3.1~
+ lsetfilecon@LIBSELINUX_1.0 3.1~
+ lsetfilecon_raw@LIBSELINUX_1.0 3.1~
+ manual_user_enter_context@LIBSELINUX_1.0 3.1~
+ matchmediacon@LIBSELINUX_1.0 3.1~
+ matchpathcon@LIBSELINUX_1.0 3.1~
+ matchpathcon_checkmatches@LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_add@LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_destroy@LIBSELINUX_1.0 3.1~
+ matchpathcon_filespec_eval@LIBSELINUX_1.0 3.1~
+ matchpathcon_fini@LIBSELINUX_1.0 3.1~
+ matchpathcon_index@LIBSELINUX_1.0 3.1~
+ matchpathcon_init@LIBSELINUX_1.0 3.1~
+ matchpathcon_init_prefix@LIBSELINUX_1.0 3.1~
+ mode_to_security_class@LIBSELINUX_1.0 3.1~
+ print_access_vector@LIBSELINUX_1.0 3.1~
+ query_user_context@LIBSELINUX_1.0 3.1~
+ realpath_not_final@LIBSELINUX_1.0 3.1~
+ rpm_execcon@LIBSELINUX_1.0 3.1~
+ security_av_perm_to_string@LIBSELINUX_1.0 3.1~
+ security_av_string@LIBSELINUX_1.0 3.1~
+ security_canonicalize_context@LIBSELINUX_1.0 3.1~
+ security_canonicalize_context_raw@LIBSELINUX_1.0 3.1~
+ security_check_context@LIBSELINUX_1.0 3.1~
+ security_check_context_raw@LIBSELINUX_1.0 3.1~
+ security_class_to_string@LIBSELINUX_1.0 3.1~
+ security_commit_booleans@LIBSELINUX_1.0 3.1~
+ security_compute_av@LIBSELINUX_1.0 3.1~
+ security_compute_av_flags@LIBSELINUX_1.0 3.1~
+ security_compute_av_flags_raw@LIBSELINUX_1.0 3.1~
+ security_compute_av_raw@LIBSELINUX_1.0 3.1~
+ security_compute_create@LIBSELINUX_1.0 3.1~
+ security_compute_create_name@LIBSELINUX_1.0 3.1~
+ security_compute_create_name_raw@LIBSELINUX_1.0 3.1~
+ security_compute_create_raw@LIBSELINUX_1.0 3.1~
+ security_compute_member@LIBSELINUX_1.0 3.1~
+ security_compute_member_raw@LIBSELINUX_1.0 3.1~
+ security_compute_relabel@LIBSELINUX_1.0 3.1~
+ security_compute_relabel_raw@LIBSELINUX_1.0 3.1~
+ security_compute_user@LIBSELINUX_1.0 3.1~
+ security_compute_user_raw@LIBSELINUX_1.0 3.1~
+ security_deny_unknown@LIBSELINUX_1.0 3.1~
+ security_disable@LIBSELINUX_1.0 3.1~
+ security_get_boolean_active@LIBSELINUX_1.0 3.1~
+ security_get_boolean_names@LIBSELINUX_1.0 3.1~
+ security_get_boolean_pending@LIBSELINUX_1.0 3.1~
+ security_get_checkreqprot@LIBSELINUX_1.0 3.1~
+ security_get_initial_context@LIBSELINUX_1.0 3.1~
+ security_get_initial_context_raw@LIBSELINUX_1.0 3.1~
+ security_getenforce@LIBSELINUX_1.0 3.1~
+ security_load_booleans@LIBSELINUX_1.0 3.1~
+ security_load_policy@LIBSELINUX_1.0 3.1~
+ security_policyvers@LIBSELINUX_1.0 3.1~
+ security_reject_unknown@LIBSELINUX_1.0 3.1~
+ security_set_boolean@LIBSELINUX_1.0 3.1~
+ security_set_boolean_list@LIBSELINUX_1.0 3.1~
+ security_setenforce@LIBSELINUX_1.0 3.1~
+ security_validatetrans@LIBSELINUX_1.0 3.1~
+ security_validatetrans_raw@LIBSELINUX_1.0 3.1~
+ selabel_close@LIBSELINUX_1.0 3.1~
+ selabel_cmp@LIBSELINUX_1.0 3.1~
+ selabel_digest@LIBSELINUX_1.0 3.1~
+ selabel_get_digests_all_partial_matches@LIBSELINUX_1.0 3.1~
+ selabel_hash_all_partial_matches@LIBSELINUX_1.0 3.1~
+ selabel_lookup@LIBSELINUX_1.0 3.1~
+ selabel_lookup_best_match@LIBSELINUX_1.0 3.1~
+ selabel_lookup_best_match_raw@LIBSELINUX_1.0 3.1~
+ selabel_lookup_raw@LIBSELINUX_1.0 3.1~
+ selabel_open@LIBSELINUX_1.0 3.1~
+ selabel_partial_match@LIBSELINUX_1.0 3.1~
+ selabel_stats@LIBSELINUX_1.0 3.1~
+ selinux_binary_policy_path@LIBSELINUX_1.0 3.1~
+ selinux_boolean_sub@LIBSELINUX_1.0 3.1~
+ selinux_booleans_path@LIBSELINUX_1.0 3.1~
+ selinux_booleans_subs_path@LIBSELINUX_1.0 3.1~
+ selinux_check_access@LIBSELINUX_1.0 3.1~
+ selinux_check_passwd_access@LIBSELINUX_1.0 3.1~
+ selinux_check_securetty_context@LIBSELINUX_1.0 3.1~
+ selinux_colors_path@LIBSELINUX_1.0 3.1~
+ selinux_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_current_policy_path@LIBSELINUX_1.0 3.1~
+ selinux_customizable_types_path@LIBSELINUX_1.0 3.1~
+ selinux_default_context_path@LIBSELINUX_1.0 3.1~
+ selinux_default_type_path@LIBSELINUX_1.0 3.1~
+ selinux_failsafe_context_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_cmp@LIBSELINUX_1.0 3.1~
+ selinux_file_context_homedir_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_local_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_subs_dist_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_subs_path@LIBSELINUX_1.0 3.1~
+ selinux_file_context_verify@LIBSELINUX_1.0 3.1~
+ selinux_flush_class_cache@LIBSELINUX_1.0 3.1~
+ selinux_get_callback@LIBSELINUX_1.0 3.1~
+ selinux_getenforcemode@LIBSELINUX_1.0 3.1~
+ selinux_getpolicytype@LIBSELINUX_1.0 3.1~
+ selinux_homedir_context_path@LIBSELINUX_1.0 3.1~
+ selinux_init_load_policy@LIBSELINUX_1.0 3.1~
+ selinux_lsetfilecon_default@LIBSELINUX_1.0 3.1~
+ selinux_lxc_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_media_context_path@LIBSELINUX_1.0 3.1~
+ selinux_mkload_policy@LIBSELINUX_1.0 3.1~
+ selinux_mnt@LIBSELINUX_1.0 3.1~
+ selinux_netfilter_context_path@LIBSELINUX_1.0 3.1~
+ selinux_openrc_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_openssh_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_path@LIBSELINUX_1.0 3.1~
+ selinux_policy_root@LIBSELINUX_1.0 3.1~
+ selinux_raw_context_to_color@LIBSELINUX_1.0 3.1~
+ selinux_raw_to_trans_context@LIBSELINUX_1.0 3.1~
+ selinux_removable_context_path@LIBSELINUX_1.0 3.1~
+ selinux_reset_config@LIBSELINUX_1.0 3.1~
+ selinux_restorecon@LIBSELINUX_1.0 3.1~
+ selinux_restorecon_default_handle@LIBSELINUX_1.0 3.1~
+ selinux_restorecon_get_skipped_errors@LIBSELINUX_3.4 3.4
+ selinux_restorecon_parallel@LIBSELINUX_3.4 3.4
+ selinux_restorecon_set_alt_rootpath@LIBSELINUX_1.0 3.1~
+ selinux_restorecon_set_exclude_list@LIBSELINUX_1.0 3.1~
+ selinux_restorecon_set_sehandle@LIBSELINUX_1.0 3.1~
+ selinux_restorecon_xattr@LIBSELINUX_1.0 3.1~
+ selinux_securetty_types_path@LIBSELINUX_1.0 3.1~
+ selinux_sepgsql_context_path@LIBSELINUX_1.0 3.1~
+ selinux_set_callback@LIBSELINUX_1.0 3.1~
+ selinux_set_mapping@LIBSELINUX_1.0 3.1~
+ selinux_set_policy_root@LIBSELINUX_1.0 3.1~
+ selinux_snapperd_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_status_close@LIBSELINUX_1.0 3.1~
+ selinux_status_deny_unknown@LIBSELINUX_1.0 3.1~
+ selinux_status_getenforce@LIBSELINUX_1.0 3.1~
+ selinux_status_open@LIBSELINUX_1.0 3.1~
+ selinux_status_policyload@LIBSELINUX_1.0 3.1~
+ selinux_status_updated@LIBSELINUX_1.0 3.1~
+ selinux_systemd_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_trans_to_raw_context@LIBSELINUX_1.0 3.1~
+ selinux_translations_path@LIBSELINUX_1.0 3.1~
+ selinux_user_contexts_path@LIBSELINUX_1.0 3.1~
+ selinux_users_path@LIBSELINUX_1.0 3.1~
+ selinux_usersconf_path@LIBSELINUX_1.0 3.1~
+ selinux_virtual_domain_context_path@LIBSELINUX_1.0 3.1~
+ selinux_virtual_image_context_path@LIBSELINUX_1.0 3.1~
+ selinux_x_context_path@LIBSELINUX_1.0 3.1~
+ selinuxfs_exists@LIBSELINUX_1.0 3.1~
+ set_matchpathcon_canoncon@LIBSELINUX_1.0 3.1~
+ set_matchpathcon_flags@LIBSELINUX_1.0 3.1~
+ set_matchpathcon_invalidcon@LIBSELINUX_1.0 3.1~
+ set_matchpathcon_printf@LIBSELINUX_1.0 3.1~
+ set_selinuxmnt@LIBSELINUX_1.0 3.1~
+ setcon@LIBSELINUX_1.0 3.1~
+ setcon_raw@LIBSELINUX_1.0 3.1~
+ setexeccon@LIBSELINUX_1.0 3.1~
+ setexeccon_raw@LIBSELINUX_1.0 3.1~
+ setexecfilecon@LIBSELINUX_1.0 3.1~
+ setfilecon@LIBSELINUX_1.0 3.1~
+ setfilecon_raw@LIBSELINUX_1.0 3.1~
+ setfscreatecon@LIBSELINUX_1.0 3.1~
+ setfscreatecon_raw@LIBSELINUX_1.0 3.1~
+ setkeycreatecon@LIBSELINUX_1.0 3.1~
+ setkeycreatecon_raw@LIBSELINUX_1.0 3.1~
+ setsockcreatecon@LIBSELINUX_1.0 3.1~
+ setsockcreatecon_raw@LIBSELINUX_1.0 3.1~
+ sidget@LIBSELINUX_1.0 3.1~
+ sidput@LIBSELINUX_1.0 3.1~
+ string_to_av_perm@LIBSELINUX_1.0 3.1~
+ string_to_security_class@LIBSELINUX_1.0 3.1~
diff -Nru libselinux-3.5/debian/libselinux1t64.tmpfiles 
libselinux-3.5/debian/libselinux1t64.tmpfiles
--- libselinux-3.5/debian/libselinux1t64.tmpfiles       1970-01-01 
00:00:00.000000000 +0000
+++ libselinux-3.5/debian/libselinux1t64.tmpfiles       2024-01-24 
20:23:37.000000000 +0000
@@ -0,0 +1,4 @@
+# See tmpfiles.d(5) for details
+
+# Type Path    Mode UID  GID  Age Argument
+d /run/setrans 0755 root root -   -
diff -Nru libselinux-3.5/debian/rules libselinux-3.5/debian/rules
--- libselinux-3.5/debian/rules 2024-01-24 20:23:37.000000000 +0000
+++ libselinux-3.5/debian/rules 2024-02-05 08:22:28.000000000 +0000
@@ -95,5 +95,5 @@
        dh_gencontrol -- -VBuilt-Using="$(BUILT_USING)"
 
 override_dh_makeshlibs:
-       dh_makeshlibs -plibselinux1 --add-udeb="libselinux1-udeb" -V
+       dh_makeshlibs -plibselinux1t64 --add-udeb="libselinux1-udeb" -V
        dh_makeshlibs --remaining-packages

Reply via email to