semodule-utils-dev-2.7-r0.core2-32
Signed-off-by: George McCollister
---
recipes-security/selinux/semodule-utils.inc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/recipes-security/selinux/semodule-utils.inc
b/recipes-security/selinux/semodule-utils.inc
index 1e92745..2c75c48 100644
---
-r0 needed by
semodule-utils-dev-2.7-r0.core2-32
Signed-off-by: George McCollister
---
recipes-security/selinux/semodule-utils.inc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/recipes-security/selinux/semodule-utils.inc
b/recipes-security/selinux/semodule-utils.inc
index 1e92745
/f2e77865e144ab2e1313aa78d99b969f8f48695e#diff-2de9aefdd8fc5bc6a8740533e5d1cc2e
Signed-off-by: George McCollister <george.mccollis...@gmail.com>
---
classes/selinux-image.bbclass | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/classes/selinux-image.bbclass b/classes/selinux-image.bbclass
index 90ead2f..5
Is anyone else finding that selinux_set_labels no longer sets selinux
labels after everything selinux related was upreved to 2.6 in early
January?
setfiles appears to be excluding everything in the image rootfs directory.
Regards,
George McCollister
Software Architect
NovaTech LLC
On Fri, Jan 20, 2017 at 10:59 AM, Bruce Ashfield
<bruce.ashfi...@windriver.com> wrote:
> On 2017-01-20 09:19 AM, George McCollister wrote:
>>
>> On Thu, Jan 19, 2017 at 5:24 PM, Bruce Ashfield
>> <bruce.ashfi...@windriver.com> wrote:
>>>
>>&
On Thu, Jan 19, 2017 at 5:24 PM, Bruce Ashfield
<bruce.ashfi...@windriver.com> wrote:
> On 2017-01-19 6:20 PM, George McCollister wrote:
>>
>> What's the correct way to use a custom bsp .scc file located in my
>> custom bsp layer? For purposes of this email let's say
,
George McCollister
--
___
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto
Commit 626ceac135fa66277c2fa53197be33cc9d4d7614 broke the error check in
process_file by adding in three lines that stomp on $? which print the
output file when verbose is set.
Move output file on verbose print to an elif after the error check.
Signed-off-by: George McCollister <george.mccol
capability. In most cases if the process isn't running as root
this will fail and setcap will exit with an error. Because setxattr is
intercepted by pseudo it's unnecessary for setcap to call capset().
Override capset with a pseudo function that does nothing and always
returns 0.
Signed-off-by: George
On Mon, Apr 18, 2016 at 2:34 AM, wenzong fan wrote:
> On 04/18/2016 05:02 AM, Philip Tricca wrote:
>>
>> Hello Wenzong,
>>
>> On 04/08/2016 01:19 AM, wenzong@windriver.com wrote:
>>>
>>> From: Wenzong Fan
>>>
>>> Apply the changes to
10 matches
Mail list logo