Blame SOURCES/0064-libsepol-resolve-missing-prototypes.patch

71cd55
From 9ec061b61c97878ac4d2626803dfbdd3fcbe0c87 Mon Sep 17 00:00:00 2001
71cd55
From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= <cgzones@googlemail.com>
71cd55
Date: Tue, 8 Jun 2021 17:58:51 +0200
71cd55
Subject: [PATCH] libsepol: resolve missing prototypes
71cd55
MIME-Version: 1.0
71cd55
Content-Type: text/plain; charset=UTF-8
71cd55
Content-Transfer-Encoding: 8bit
71cd55
71cd55
Declare the functions as static or include the corresponding header
71cd55
file.
71cd55
71cd55
assertion.c:294:5: error: no previous prototype for function 'report_assertion_failures' [-Werror,-Wmissing-prototypes]
71cd55
int report_assertion_failures(sepol_handle_t *handle, policydb_t *p, avrule_t *avrule)
71cd55
    ^
71cd55
71cd55
context.c:23:5: error: no previous prototype for function 'sepol_check_context' [-Werror,-Wmissing-prototypes]
71cd55
int sepol_check_context(const char *context)
71cd55
    ^
71cd55
71cd55
expand.c:3377:5: error: no previous prototype for function 'expand_cond_av_node' [-Werror,-Wmissing-prototypes]
71cd55
int expand_cond_av_node(policydb_t * p,
71cd55
    ^
71cd55
71cd55
policydb.c:638:6: error: no previous prototype for function 'role_trans_rule_destroy' [-Werror,-Wmissing-prototypes]
71cd55
void role_trans_rule_destroy(role_trans_rule_t * x)
71cd55
     ^
71cd55
71cd55
policydb.c:1169:5: error: no previous prototype for function 'policydb_index_decls' [-Werror,-Wmissing-prototypes]
71cd55
int policydb_index_decls(sepol_handle_t * handle, policydb_t * p)
71cd55
    ^
71cd55
71cd55
policydb.c:1429:6: error: no previous prototype for function 'ocontext_selinux_free' [-Werror,-Wmissing-prototypes]
71cd55
void ocontext_selinux_free(ocontext_t **ocontexts)
71cd55
     ^
71cd55
71cd55
policydb.c:1451:6: error: no previous prototype for function 'ocontext_xen_free' [-Werror,-Wmissing-prototypes]
71cd55
void ocontext_xen_free(ocontext_t **ocontexts)
71cd55
     ^
71cd55
71cd55
policydb.c:1750:5: error: no previous prototype for function 'type_set_or' [-Werror,-Wmissing-prototypes]
71cd55
int type_set_or(type_set_t * dst, type_set_t * a, type_set_t * b)
71cd55
    ^
71cd55
71cd55
policydb.c:2524:5: error: no previous prototype for function 'role_trans_read' [-Werror,-Wmissing-prototypes]
71cd55
int role_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
    ^
71cd55
71cd55
policydb.c:2567:5: error: no previous prototype for function 'role_allow_read' [-Werror,-Wmissing-prototypes]
71cd55
int role_allow_read(role_allow_t ** r, struct policy_file *fp)
71cd55
    ^
71cd55
71cd55
policydb.c:2842:5: error: no previous prototype for function 'filename_trans_read' [-Werror,-Wmissing-prototypes]
71cd55
int filename_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
    ^
71cd55
71cd55
services.c:1027:5: error: no previous prototype for function 'sepol_validate_transition' [-Werror,-Wmissing-prototypes]
71cd55
int sepol_validate_transition(sepol_security_id_t oldsid,
71cd55
    ^
71cd55
71cd55
Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
71cd55
Acked-by: James Carter <jwcart2@gmail.com>
71cd55
---
71cd55
 libsepol/src/assertion.c        |  2 +-
71cd55
 libsepol/src/context_internal.h |  1 +
71cd55
 libsepol/src/expand.c           |  6 +++---
71cd55
 libsepol/src/policydb.c         | 16 ++++++++--------
71cd55
 libsepol/src/services.c         |  2 +-
71cd55
 5 files changed, 14 insertions(+), 13 deletions(-)
71cd55
71cd55
diff --git a/libsepol/src/assertion.c b/libsepol/src/assertion.c
71cd55
index 266f67d74c56..dd2749a09dc0 100644
71cd55
--- a/libsepol/src/assertion.c
71cd55
+++ b/libsepol/src/assertion.c
71cd55
@@ -291,7 +291,7 @@ exit:
71cd55
 	return rc;
71cd55
 }
71cd55
 
71cd55
-int report_assertion_failures(sepol_handle_t *handle, policydb_t *p, avrule_t *avrule)
71cd55
+static int report_assertion_failures(sepol_handle_t *handle, policydb_t *p, avrule_t *avrule)
71cd55
 {
71cd55
 	int rc;
71cd55
 	struct avtab_match_args args;
71cd55
diff --git a/libsepol/src/context_internal.h b/libsepol/src/context_internal.h
71cd55
index 3cae28cc1c67..3dc9cd156a9c 100644
71cd55
--- a/libsepol/src/context_internal.h
71cd55
+++ b/libsepol/src/context_internal.h
71cd55
@@ -1,6 +1,7 @@
71cd55
 #ifndef _SEPOL_CONTEXT_INTERNAL_H_
71cd55
 #define _SEPOL_CONTEXT_INTERNAL_H_
71cd55
 
71cd55
+#include <sepol/context.h>
71cd55
 #include <sepol/context_record.h>
71cd55
 
71cd55
 #endif
71cd55
diff --git a/libsepol/src/expand.c b/libsepol/src/expand.c
71cd55
index a656ffad3a71..84bfcfa36d0a 100644
71cd55
--- a/libsepol/src/expand.c
71cd55
+++ b/libsepol/src/expand.c
71cd55
@@ -3374,9 +3374,9 @@ static int expand_cond_insert(cond_av_list_t ** l,
71cd55
 	return 0;
71cd55
 }
71cd55
 
71cd55
-int expand_cond_av_node(policydb_t * p,
71cd55
-			avtab_ptr_t node,
71cd55
-			cond_av_list_t ** newl, avtab_t * expa)
71cd55
+static int expand_cond_av_node(policydb_t * p,
71cd55
+			       avtab_ptr_t node,
71cd55
+			       cond_av_list_t ** newl, avtab_t * expa)
71cd55
 {
71cd55
 	avtab_key_t *k = &node->key;
71cd55
 	avtab_datum_t *d = &node->datum;
71cd55
diff --git a/libsepol/src/policydb.c b/libsepol/src/policydb.c
71cd55
index ffa279715686..3f7ddb11a236 100644
71cd55
--- a/libsepol/src/policydb.c
71cd55
+++ b/libsepol/src/policydb.c
71cd55
@@ -635,7 +635,7 @@ void role_trans_rule_init(role_trans_rule_t * x)
71cd55
 	ebitmap_init(&x->classes);
71cd55
 }
71cd55
 
71cd55
-void role_trans_rule_destroy(role_trans_rule_t * x)
71cd55
+static void role_trans_rule_destroy(role_trans_rule_t * x)
71cd55
 {
71cd55
 	if (x != NULL) {
71cd55
 		role_set_destroy(&x->roles);
71cd55
@@ -1166,7 +1166,7 @@ int policydb_index_bools(policydb_t * p)
71cd55
 	return 0;
71cd55
 }
71cd55
 
71cd55
-int policydb_index_decls(sepol_handle_t * handle, policydb_t * p)
71cd55
+static int policydb_index_decls(sepol_handle_t * handle, policydb_t * p)
71cd55
 {
71cd55
 	avrule_block_t *curblock;
71cd55
 	avrule_decl_t *decl;
71cd55
@@ -1426,7 +1426,7 @@ static int range_tr_destroy(hashtab_key_t key, hashtab_datum_t datum,
71cd55
 	return 0;
71cd55
 }
71cd55
 
71cd55
-void ocontext_selinux_free(ocontext_t **ocontexts)
71cd55
+static void ocontext_selinux_free(ocontext_t **ocontexts)
71cd55
 {
71cd55
 	ocontext_t *c, *ctmp;
71cd55
 	int i;
71cd55
@@ -1448,7 +1448,7 @@ void ocontext_selinux_free(ocontext_t **ocontexts)
71cd55
 	}
71cd55
 }
71cd55
 
71cd55
-void ocontext_xen_free(ocontext_t **ocontexts)
71cd55
+static void ocontext_xen_free(ocontext_t **ocontexts)
71cd55
 {
71cd55
 	ocontext_t *c, *ctmp;
71cd55
 	int i;
71cd55
@@ -1747,7 +1747,7 @@ int symtab_insert(policydb_t * pol, uint32_t sym,
71cd55
 	return retval;
71cd55
 }
71cd55
 
71cd55
-int type_set_or(type_set_t * dst, type_set_t * a, type_set_t * b)
71cd55
+static int type_set_or(type_set_t * dst, type_set_t * a, type_set_t * b)
71cd55
 {
71cd55
 	type_set_init(dst);
71cd55
 
71cd55
@@ -2521,7 +2521,7 @@ static int type_read(policydb_t * p, hashtab_t h, struct policy_file *fp)
71cd55
 	return -1;
71cd55
 }
71cd55
 
71cd55
-int role_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
+static int role_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
 {
71cd55
 	role_trans_t **t = &p->role_tr;
71cd55
 	unsigned int i;
71cd55
@@ -2564,7 +2564,7 @@ int role_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
 	return 0;
71cd55
 }
71cd55
 
71cd55
-int role_allow_read(role_allow_t ** r, struct policy_file *fp)
71cd55
+static int role_allow_read(role_allow_t ** r, struct policy_file *fp)
71cd55
 {
71cd55
 	unsigned int i;
71cd55
 	uint32_t buf[2], nel;
71cd55
@@ -2839,7 +2839,7 @@ err:
71cd55
 	return -1;
71cd55
 }
71cd55
 
71cd55
-int filename_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
+static int filename_trans_read(policydb_t *p, struct policy_file *fp)
71cd55
 {
71cd55
 	unsigned int i;
71cd55
 	uint32_t buf[1], nel;
71cd55
diff --git a/libsepol/src/services.c b/libsepol/src/services.c
71cd55
index 6596431c38e2..39fbd979b095 100644
71cd55
--- a/libsepol/src/services.c
71cd55
+++ b/libsepol/src/services.c
71cd55
@@ -1024,7 +1024,7 @@ static int context_struct_compute_av(context_struct_t * scontext,
71cd55
 	return 0;
71cd55
 }
71cd55
 
71cd55
-int sepol_validate_transition(sepol_security_id_t oldsid,
71cd55
+static int sepol_validate_transition(sepol_security_id_t oldsid,
71cd55
 				     sepol_security_id_t newsid,
71cd55
 				     sepol_security_id_t tasksid,
71cd55
 				     sepol_security_class_t tclass)
71cd55
-- 
71cd55
2.32.0
71cd55