summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--recipes-security/selinux/checkpolicy_3.8.bb (renamed from recipes-security/selinux/checkpolicy_3.7.bb)0
-rw-r--r--recipes-security/selinux/libselinux-python_3.8.bb (renamed from recipes-security/selinux/libselinux-python_3.7.bb)1
-rw-r--r--recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch6
-rw-r--r--recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch91
-rw-r--r--recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch6
-rw-r--r--recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch8
-rw-r--r--recipes-security/selinux/libselinux_3.8.bb (renamed from recipes-security/selinux/libselinux_3.7.bb)0
-rw-r--r--recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch422
-rw-r--r--recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch6
-rw-r--r--recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch14
-rw-r--r--recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch2
-rw-r--r--recipes-security/selinux/libsemanage_3.8.bb (renamed from recipes-security/selinux/libsemanage_3.7.bb)3
-rw-r--r--recipes-security/selinux/libsepol_3.8.bb (renamed from recipes-security/selinux/libsepol_3.7.bb)0
-rw-r--r--recipes-security/selinux/mcstrans_3.8.bb (renamed from recipes-security/selinux/mcstrans_3.7.bb)2
-rw-r--r--recipes-security/selinux/policycoreutils_3.8.bb (renamed from recipes-security/selinux/policycoreutils_3.7.bb)0
-rw-r--r--recipes-security/selinux/restorecond_3.8.bb (renamed from recipes-security/selinux/restorecond_3.7.bb)0
-rw-r--r--recipes-security/selinux/secilc_3.8.bb (renamed from recipes-security/selinux/secilc_3.7.bb)0
-rw-r--r--recipes-security/selinux/selinux-dbus_3.8.bb (renamed from recipes-security/selinux/selinux-dbus_3.7.bb)0
-rw-r--r--recipes-security/selinux/selinux-gui_3.8.bb (renamed from recipes-security/selinux/selinux-gui_3.7.bb)0
-rw-r--r--recipes-security/selinux/selinux-python_3.8.bb (renamed from recipes-security/selinux/selinux-python_3.7.bb)0
-rw-r--r--recipes-security/selinux/selinux-sandbox_3.8.bb (renamed from recipes-security/selinux/selinux-sandbox_3.7.bb)0
-rw-r--r--recipes-security/selinux/selinux_common.inc2
-rw-r--r--recipes-security/selinux/semodule-utils_3.8.bb (renamed from recipes-security/selinux/semodule-utils_3.7.bb)0
23 files changed, 24 insertions, 539 deletions
diff --git a/recipes-security/selinux/checkpolicy_3.7.bb b/recipes-security/selinux/checkpolicy_3.8.bb
index 60f506d..60f506d 100644
--- a/recipes-security/selinux/checkpolicy_3.7.bb
+++ b/recipes-security/selinux/checkpolicy_3.8.bb
diff --git a/recipes-security/selinux/libselinux-python_3.7.bb b/recipes-security/selinux/libselinux-python_3.8.bb
index 5099e55..3c5c489 100644
--- a/recipes-security/selinux/libselinux-python_3.7.bb
+++ b/recipes-security/selinux/libselinux-python_3.8.bb
@@ -15,7 +15,6 @@ SRC_URI += "\
15 file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \ 15 file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \
16 file://0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \ 16 file://0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \
17 file://0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch \ 17 file://0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch \
18 file://0001-libselinux-fix-swig-bindings-for-4.3.0.patch \
19 " 18 "
20 19
21S = "${WORKDIR}/git/libselinux" 20S = "${WORKDIR}/git/libselinux"
diff --git a/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch b/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch
index b307b6f..28a2cc0 100644
--- a/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch
+++ b/recipes-security/selinux/libselinux/0001-Makefile-fix-python-modules-install-path-for-multili.patch
@@ -1,4 +1,4 @@
1From dff260851ccecf9723a6ddfce0103e09f3ba4613 Mon Sep 17 00:00:00 2001 1From 626d07afcb8e8b3a68158e8a3ea1654620769644 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com> 2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 13 Apr 2020 12:44:23 +0800 3Date: Mon, 13 Apr 2020 12:44:23 +0800
4Subject: [PATCH] Makefile: fix python modules install path for multilib 4Subject: [PATCH] Makefile: fix python modules install path for multilib
@@ -11,10 +11,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11 1 file changed, 1 insertion(+), 1 deletion(-) 11 1 file changed, 1 insertion(+), 1 deletion(-)
12 12
13diff --git a/src/Makefile b/src/Makefile 13diff --git a/src/Makefile b/src/Makefile
14index d3b981f..265f1be 100644 14index 213c7d3..92227cb 100644
15--- a/src/Makefile 15--- a/src/Makefile
16+++ b/src/Makefile 16+++ b/src/Makefile
17@@ -191,7 +191,7 @@ install: all 17@@ -193,7 +193,7 @@ install: all
18 ln -sf --relative $(DESTDIR)$(SHLIBDIR)/$(LIBSO) $(DESTDIR)$(LIBDIR)/$(TARGET) 18 ln -sf --relative $(DESTDIR)$(SHLIBDIR)/$(LIBSO) $(DESTDIR)$(LIBDIR)/$(TARGET)
19 19
20 install-pywrap: pywrap 20 install-pywrap: pywrap
diff --git a/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch b/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch
deleted file mode 100644
index 277c36c..0000000
--- a/recipes-security/selinux/libselinux/0001-libselinux-fix-swig-bindings-for-4.3.0.patch
+++ /dev/null
@@ -1,91 +0,0 @@
1From 8e0e718bae53fff30831b92cd784151d475a20da Mon Sep 17 00:00:00 2001
2From: Petr Lautrbach <lautrbach@redhat.com>
3Date: Wed, 16 Oct 2024 20:48:11 +0200
4Subject: [PATCH] libselinux: fix swig bindings for 4.3.0
5MIME-Version: 1.0
6Content-Type: text/plain; charset=UTF-8
7Content-Transfer-Encoding: 8bit
8
9https://github.com/swig/swig/blob/master/CHANGES.current
10
11"[Python] #2907 Fix returning null from functions with output
12parameters. Ensures OUTPUT and INOUT typemaps are handled
13consistently wrt return type.
14
15New declaration of SWIG_Python_AppendOutput is now:
16
17 SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void);
18
19The 3rd parameter is new and the new $isvoid special variable
20should be passed to it, indicating whether or not the wrapped
21function returns void.
22
23Also consider replacing with:
24
25 SWIG_AppendOutput(PyObject* result, PyObject* obj);
26
27which calls SWIG_Python_AppendOutput with same parameters but adding $isvoid
28for final parameter."
29
30Fixes: https://github.com/SELinuxProject/selinux/issues/447
31
32 selinuxswig_python_wrap.c: In function ‘_wrap_security_compute_user’:
33 selinuxswig_python_wrap.c:11499:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’
34 11499 | resultobj = SWIG_Python_AppendOutput(resultobj, plist);
35 | ^~~~~~~~~~~~~~~~~~~~~~~~
36 selinuxswig_python_wrap.c:1248:1: note: declared here
37 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) {
38 | ^~~~~~~~~~~~~~~~~~~~~~~~
39 selinuxswig_python_wrap.c: In function ‘_wrap_security_compute_user_raw’:
40 selinuxswig_python_wrap.c:11570:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’
41 11570 | resultobj = SWIG_Python_AppendOutput(resultobj, plist);
42 | ^~~~~~~~~~~~~~~~~~~~~~~~
43 selinuxswig_python_wrap.c:1248:1: note: declared here
44 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) {
45 | ^~~~~~~~~~~~~~~~~~~~~~~~
46 selinuxswig_python_wrap.c: In function ‘_wrap_security_get_boolean_names’:
47 selinuxswig_python_wrap.c:12470:17: error: too few arguments to function ‘SWIG_Python_AppendOutput’
48 12470 | resultobj = SWIG_Python_AppendOutput(resultobj, list);
49 | ^~~~~~~~~~~~~~~~~~~~~~~~
50 selinuxswig_python_wrap.c:1248:1: note: declared here
51 1248 | SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void) {
52 | ^~~~~~~~~~~~~~~~~~~~~~~~
53 error: command '/usr/bin/gcc' failed with exit code 1
54
55Suggested-by: Jitka Plesnikova <jplesnik@redhat.com>
56Signed-off-by: Petr Lautrbach <lautrbach@redhat.com>
57Acked-by: James Carter <jwcart2@gmail.com>
58
59Upstream-Status: Backport
60[https://github.com/SELinuxProject/selinux/commit/8e0e718bae53fff30831b92cd784151d475a20da]
61
62Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
63---
64 src/selinuxswig_python.i | 4 ++--
65 1 file changed, 2 insertions(+), 2 deletions(-)
66
67diff --git a/src/selinuxswig_python.i b/src/selinuxswig_python.i
68index 17e03b9e..03ed296d 100644
69--- a/src/selinuxswig_python.i
70+++ b/src/selinuxswig_python.i
71@@ -71,7 +71,7 @@ def install(src, dest):
72 for (i = 0; i < *$2; i++) {
73 PyList_SetItem(list, i, PyString_FromString((*$1)[i]));
74 }
75- $result = SWIG_Python_AppendOutput($result, list);
76+ $result = SWIG_AppendOutput($result, list);
77 }
78
79 /* return a sid along with the result */
80@@ -108,7 +108,7 @@ def install(src, dest):
81 plist = PyList_New(0);
82 }
83
84- $result = SWIG_Python_AppendOutput($result, plist);
85+ $result = SWIG_AppendOutput($result, plist);
86 }
87
88 /* Makes functions in get_context_list.h return a Python list of contexts */
89--
902.25.1
91
diff --git a/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch b/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch
index 7ebe64f..ae0da8b 100644
--- a/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch
+++ b/recipes-security/selinux/libselinux/0002-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch
@@ -1,4 +1,4 @@
1From 303d8dfe53fcd02ea5818f976369cdb629bc1114 Mon Sep 17 00:00:00 2001 1From 1048b80be8fe800fa343f26db833a6e89b5ba9ab Mon Sep 17 00:00:00 2001
2From: Thomas Petazzoni <thomas.petazzoni@bootlin.com> 2From: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
3Date: Fri, 25 Oct 2019 13:37:14 +0200 3Date: Fri, 25 Oct 2019 13:37:14 +0200
4Subject: [PATCH] Do not use PYCEXT, and rely on the installed file name 4Subject: [PATCH] Do not use PYCEXT, and rely on the installed file name
@@ -27,7 +27,7 @@ Signed-off-by: Changqing Li <changqing.li@windriver.com>
27 1 file changed, 1 insertion(+), 2 deletions(-) 27 1 file changed, 1 insertion(+), 2 deletions(-)
28 28
29diff --git a/src/Makefile b/src/Makefile 29diff --git a/src/Makefile b/src/Makefile
30index 265f1be..47e51d6 100644 30index 92227cb..7c71c65 100644
31--- a/src/Makefile 31--- a/src/Makefile
32+++ b/src/Makefile 32+++ b/src/Makefile
33@@ -15,7 +15,6 @@ INCLUDEDIR ?= $(PREFIX)/include 33@@ -15,7 +15,6 @@ INCLUDEDIR ?= $(PREFIX)/include
@@ -38,7 +38,7 @@ index 265f1be..47e51d6 100644
38 RUBYINC ?= $(shell $(RUBY) -e 'puts "-I" + RbConfig::CONFIG["rubyarchhdrdir"] + " -I" + RbConfig::CONFIG["rubyhdrdir"]') 38 RUBYINC ?= $(shell $(RUBY) -e 'puts "-I" + RbConfig::CONFIG["rubyarchhdrdir"] + " -I" + RbConfig::CONFIG["rubyhdrdir"]')
39 RUBYLIBS ?= $(shell $(RUBY) -e 'puts "-L" + RbConfig::CONFIG["libdir"] + " -L" + RbConfig::CONFIG["archlibdir"] + " " + RbConfig::CONFIG["LIBRUBYARG_SHARED"]') 39 RUBYLIBS ?= $(shell $(RUBY) -e 'puts "-L" + RbConfig::CONFIG["libdir"] + " -L" + RbConfig::CONFIG["archlibdir"] + " " + RbConfig::CONFIG["LIBRUBYARG_SHARED"]')
40 RUBYINSTALL ?= $(shell $(RUBY) -e 'puts RbConfig::CONFIG["vendorarchdir"]') 40 RUBYINSTALL ?= $(shell $(RUBY) -e 'puts RbConfig::CONFIG["vendorarchdir"]')
41@@ -193,7 +192,7 @@ install: all 41@@ -195,7 +194,7 @@ install: all
42 install-pywrap: pywrap 42 install-pywrap: pywrap
43 CFLAGS="$(CPPFLAGS) $(CFLAGS) $(SWIG_CFLAGS)" $(PYTHON) -m pip install --prefix=$(PREFIX) --root $(DESTDIR) --ignore-installed --no-deps $(PYTHON_SETUP_ARGS) . 43 CFLAGS="$(CPPFLAGS) $(CFLAGS) $(SWIG_CFLAGS)" $(PYTHON) -m pip install --prefix=$(PREFIX) --root $(DESTDIR) --ignore-installed --no-deps $(PYTHON_SETUP_ARGS) .
44 install -m 644 $(SWIGPYOUT) $(DESTDIR)$(PYTHONLIBDIR)/selinux/__init__.py 44 install -m 644 $(SWIGPYOUT) $(DESTDIR)$(PYTHONLIBDIR)/selinux/__init__.py
diff --git a/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch b/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch
index 0cd8f20..39edb6c 100644
--- a/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch
+++ b/recipes-security/selinux/libselinux/0003-libselinux-restore-drop-the-obsolete-LSF-transitiona.patch
@@ -1,4 +1,4 @@
1From 6c2af45ec8cff9b282d599dc098db0ca127bdc59 Mon Sep 17 00:00:00 2001 1From f33b426680492629d3d8ed664049cbe584f26f18 Mon Sep 17 00:00:00 2001
2From: Renato Caldas <renato@calgera.com> 2From: Renato Caldas <renato@calgera.com>
3Date: Thu, 29 Jun 2023 13:59:11 +0100 3Date: Thu, 29 Jun 2023 13:59:11 +0100
4Subject: [PATCH] libselinux: restore: drop the obsolete LSF transitional API. 4Subject: [PATCH] libselinux: restore: drop the obsolete LSF transitional API.
@@ -14,10 +14,10 @@ Signed-off-by: Renato Caldas <renato@calgera.com>
14 1 file changed, 2 insertions(+), 2 deletions(-) 14 1 file changed, 2 insertions(+), 2 deletions(-)
15 15
16diff --git a/src/selinux_restorecon.c b/src/selinux_restorecon.c 16diff --git a/src/selinux_restorecon.c b/src/selinux_restorecon.c
17index 38f10f1..5b3d035 100644 17index bc6ed93..3bc0d8d 100644
18--- a/src/selinux_restorecon.c 18--- a/src/selinux_restorecon.c
19+++ b/src/selinux_restorecon.c 19+++ b/src/selinux_restorecon.c
20@@ -436,7 +436,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, 20@@ -438,7 +438,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file,
21 file_spec_t *prevfl, *fl; 21 file_spec_t *prevfl, *fl;
22 uint32_t h; 22 uint32_t h;
23 int ret; 23 int ret;
@@ -26,7 +26,7 @@ index 38f10f1..5b3d035 100644
26 26
27 __pthread_mutex_lock(&fl_mutex); 27 __pthread_mutex_lock(&fl_mutex);
28 28
29@@ -450,7 +450,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file, 29@@ -452,7 +452,7 @@ static int filespec_add(ino_t ino, const char *con, const char *file,
30 for (prevfl = &fl_head[h], fl = fl_head[h].next; fl; 30 for (prevfl = &fl_head[h], fl = fl_head[h].next; fl;
31 prevfl = fl, fl = fl->next) { 31 prevfl = fl, fl = fl->next) {
32 if (ino == fl->ino) { 32 if (ino == fl->ino) {
diff --git a/recipes-security/selinux/libselinux_3.7.bb b/recipes-security/selinux/libselinux_3.8.bb
index b0dcde6..b0dcde6 100644
--- a/recipes-security/selinux/libselinux_3.7.bb
+++ b/recipes-security/selinux/libselinux_3.8.bb
diff --git a/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch b/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch
deleted file mode 100644
index cba77c9..0000000
--- a/recipes-security/selinux/libsemanage/0001-libsemanage-fix-swig-bindings-for-4.3.0.patch
+++ /dev/null
@@ -1,422 +0,0 @@
1From e38815d7b44cac435195c82a54d2bf2517bc4b1a Mon Sep 17 00:00:00 2001
2From: Petr Lautrbach <lautrbach@redhat.com>
3Date: Wed, 16 Oct 2024 20:48:12 +0200
4Subject: [PATCH] libsemanage: fix swig bindings for 4.3.0
5
6https://github.com/swig/swig/blob/master/CHANGES.current
7
8"[Python] #2907 Fix returning null from functions with output
9parameters. Ensures OUTPUT and INOUT typemaps are handled
10consistently wrt return type.
11
12New declaration of SWIG_Python_AppendOutput is now:
13
14 SWIG_Python_AppendOutput(PyObject* result, PyObject* obj, int is_void);
15
16The 3rd parameter is new and the new $isvoid special variable
17should be passed to it, indicating whether or not the wrapped
18function returns void.
19
20Also consider replacing with:
21
22 SWIG_AppendOutput(PyObject* result, PyObject* obj);
23
24which calls SWIG_Python_AppendOutput with same parameters but adding $isvoid
25for final parameter."
26
27Fixes: https://github.com/SELinuxProject/selinux/issues/447
28
29Suggested-by: Jitka Plesnikova <jplesnik@redhat.com>
30Signed-off-by: Petr Lautrbach <lautrbach@redhat.com>
31Acked-by: James Carter <jwcart2@gmail.com>
32
33Upstream-Status: Backport
34[https://github.com/SELinuxProject/selinux/commit/e38815d7b44cac435195c82a54d2bf2517bc4b1a]
35
36Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
37---
38 src/semanageswig_python.i | 64 +++++++++++++--------------
39 src/semanageswig_ruby.i | 32 +++++++-------
40 2 files changed, 48 insertions(+), 48 deletions(-)
41
42diff --git a/src/semanageswig_python.i b/src/semanageswig_python.i
43index 5f011396..0e27424f 100644
44--- a/src/semanageswig_python.i
45+++ b/src/semanageswig_python.i
46@@ -111,7 +111,7 @@
47 }
48
49 %typemap(argout) char** {
50- $result = SWIG_Python_AppendOutput($result, SWIG_FromCharPtr(*$1));
51+ $result = SWIG_AppendOutput($result, SWIG_FromCharPtr(*$1));
52 free(*$1);
53 }
54
55@@ -134,7 +134,7 @@
56 NULL, NULL, &plist) < 0)
57 $result = SWIG_From_int(STATUS_ERR);
58 else
59- $result = SWIG_Python_AppendOutput($result, plist);
60+ $result = SWIG_AppendOutput($result, plist);
61 }
62 }
63 }
64@@ -148,7 +148,7 @@
65 }
66
67 %typemap(argout) semanage_module_info_t ** {
68- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
69+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
70 }
71
72 /** module key typemaps **/
73@@ -160,7 +160,7 @@
74 }
75
76 %typemap(argout) semanage_module_key_t ** {
77- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
78+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
79 }
80
81 /** context typemaps **/
82@@ -172,7 +172,7 @@
83 }
84
85 %typemap(argout) semanage_context_t** {
86- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
87+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
88 }
89
90 /** boolean typemaps **/
91@@ -197,7 +197,7 @@
92 (void (*) (void*)) &semanage_bool_free, &plist) < 0)
93 $result = SWIG_From_int(STATUS_ERR);
94 else
95- $result = SWIG_Python_AppendOutput($result, plist);
96+ $result = SWIG_AppendOutput($result, plist);
97 }
98 }
99 }
100@@ -207,11 +207,11 @@
101 }
102
103 %typemap(argout) semanage_bool_t ** {
104- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
105+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
106 }
107
108 %typemap(argout) semanage_bool_key_t ** {
109- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
110+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
111 }
112
113 %typemap(in, numinputs=0) semanage_bool_key_t **(semanage_bool_key_t *temp=NULL) {
114@@ -240,7 +240,7 @@
115 (void (*) (void*)) &semanage_fcontext_free, &plist) < 0)
116 $result = SWIG_From_int(STATUS_ERR);
117 else
118- $result = SWIG_Python_AppendOutput($result, plist);
119+ $result = SWIG_AppendOutput($result, plist);
120 }
121 }
122 }
123@@ -250,11 +250,11 @@
124 }
125
126 %typemap(argout) semanage_fcontext_t ** {
127- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
128+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
129 }
130
131 %typemap(argout) semanage_fcontext_key_t ** {
132- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
133+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
134 }
135
136 %typemap(in, numinputs=0) semanage_fcontext_key_t **(semanage_fcontext_key_t *temp=NULL) {
137@@ -284,7 +284,7 @@
138 (void (*) (void*)) &semanage_iface_free, &plist) < 0)
139 $result = SWIG_From_int(STATUS_ERR);
140 else
141- $result = SWIG_Python_AppendOutput($result, plist);
142+ $result = SWIG_AppendOutput($result, plist);
143 }
144 }
145 }
146@@ -294,11 +294,11 @@
147 }
148
149 %typemap(argout) semanage_iface_t ** {
150- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
151+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
152 }
153
154 %typemap(argout) semanage_iface_key_t ** {
155- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
156+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
157 }
158
159 %typemap(in, numinputs=0) semanage_iface_key_t **(semanage_iface_key_t *temp=NULL) {
160@@ -328,7 +328,7 @@
161 (void (*) (void*)) &semanage_seuser_free, &plist) < 0)
162 $result = SWIG_From_int(STATUS_ERR);
163 else
164- $result = SWIG_Python_AppendOutput($result, plist);
165+ $result = SWIG_AppendOutput($result, plist);
166 }
167 }
168 }
169@@ -338,11 +338,11 @@
170 }
171
172 %typemap(argout) semanage_seuser_t ** {
173- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
174+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
175 }
176
177 %typemap(argout) semanage_seuser_key_t ** {
178- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
179+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
180 }
181
182 %typemap(in, numinputs=0) semanage_seuser_key_t **(semanage_seuser_key_t *temp=NULL) {
183@@ -371,7 +371,7 @@
184 (void (*) (void*)) &semanage_user_free, &plist) < 0)
185 $result = SWIG_From_int(STATUS_ERR);
186 else
187- $result = SWIG_Python_AppendOutput($result, plist);
188+ $result = SWIG_AppendOutput($result, plist);
189 }
190 }
191 }
192@@ -381,11 +381,11 @@
193 }
194
195 %typemap(argout) semanage_user_t ** {
196- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
197+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
198 }
199
200 %typemap(argout) semanage_user_key_t ** {
201- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
202+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
203 }
204
205 %typemap(in, numinputs=0) semanage_user_key_t **(semanage_user_key_t *temp=NULL) {
206@@ -414,7 +414,7 @@
207 (void (*) (void*)) &semanage_port_free, &plist) < 0)
208 $result = SWIG_From_int(STATUS_ERR);
209 else
210- $result = SWIG_Python_AppendOutput($result, plist);
211+ $result = SWIG_AppendOutput($result, plist);
212 }
213 }
214 }
215@@ -424,11 +424,11 @@
216 }
217
218 %typemap(argout) semanage_port_t ** {
219- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
220+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
221 }
222
223 %typemap(argout) semanage_port_key_t ** {
224- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
225+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
226 }
227
228 %typemap(in, numinputs=0) semanage_port_key_t **(semanage_port_key_t *temp=NULL) {
229@@ -457,7 +457,7 @@
230 (void (*) (void*)) &semanage_ibpkey_free, &plist) < 0)
231 $result = SWIG_From_int(STATUS_ERR);
232 else
233- $result = SWIG_Python_AppendOutput($result, plist);
234+ $result = SWIG_AppendOutput($result, plist);
235 }
236 }
237 }
238@@ -467,11 +467,11 @@
239 }
240
241 %typemap(argout) semanage_ibpkey_t ** {
242- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
243+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
244 }
245
246 %typemap(argout) semanage_ibpkey_key_t ** {
247- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
248+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
249 }
250
251 %typemap(in, numinputs=0) semanage_ibpkey_key_t **(semanage_ibpkey_key_t *temp=NULL) {
252@@ -500,7 +500,7 @@
253 (void (*) (void*)) &semanage_ibendport_free, &plist) < 0)
254 $result = SWIG_From_int(STATUS_ERR);
255 else
256- $result = SWIG_Python_AppendOutput($result, plist);
257+ $result = SWIG_AppendOutput($result, plist);
258 }
259 }
260 }
261@@ -510,11 +510,11 @@
262 }
263
264 %typemap(argout) semanage_ibendport_t ** {
265- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
266+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
267 }
268
269 %typemap(argout) semanage_ibendport_key_t ** {
270- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
271+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
272 }
273
274 %typemap(in, numinputs=0) semanage_ibendport_key_t **(semanage_ibendport_key_t *temp=NULL) {
275@@ -543,7 +543,7 @@
276 (void (*) (void*)) &semanage_node_free, &plist) < 0)
277 $result = SWIG_From_int(STATUS_ERR);
278 else
279- $result = SWIG_Python_AppendOutput($result, plist);
280+ $result = SWIG_AppendOutput($result, plist);
281 }
282 }
283 }
284@@ -553,12 +553,12 @@
285 }
286
287 %typemap(argout) semanage_node_t ** {
288- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
289+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
290 }
291
292
293 %typemap(argout) semanage_node_key_t ** {
294- $result = SWIG_Python_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
295+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
296 }
297
298 %typemap(in, numinputs=0) semanage_node_key_t **(semanage_node_key_t *temp=NULL) {
299diff --git a/src/semanageswig_ruby.i b/src/semanageswig_ruby.i
300index e030e4ae..9010b545 100644
301--- a/src/semanageswig_ruby.i
302+++ b/src/semanageswig_ruby.i
303@@ -38,7 +38,7 @@
304 }
305
306 %typemap(argout) semanage_module_info_t ** {
307- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
308+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
309 }
310
311 /** context typemaps **/
312@@ -50,7 +50,7 @@
313 }
314
315 %typemap(argout) semanage_context_t** {
316- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
317+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
318 }
319
320 /** boolean typemaps **/
321@@ -66,11 +66,11 @@
322 }
323
324 %typemap(argout) semanage_bool_t ** {
325- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
326+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
327 }
328
329 %typemap(argout) semanage_bool_key_t ** {
330- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
331+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
332 }
333
334 %typemap(in, numinputs=0) semanage_bool_key_t **(semanage_bool_key_t *temp=NULL) {
335@@ -90,11 +90,11 @@
336 }
337
338 %typemap(argout) semanage_fcontext_t ** {
339- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
340+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
341 }
342
343 %typemap(argout) semanage_fcontext_key_t ** {
344- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
345+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
346 }
347
348 %typemap(in, numinputs=0) semanage_fcontext_key_t **(semanage_fcontext_key_t *temp=NULL) {
349@@ -114,11 +114,11 @@
350 }
351
352 %typemap(argout) semanage_iface_t ** {
353- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
354+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
355 }
356
357 %typemap(argout) semanage_iface_key_t ** {
358- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
359+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
360 }
361
362 %typemap(in, numinputs=0) semanage_iface_key_t **(semanage_iface_key_t *temp=NULL) {
363@@ -138,11 +138,11 @@
364 }
365
366 %typemap(argout) semanage_seuser_t ** {
367- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
368+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
369 }
370
371 %typemap(argout) semanage_seuser_key_t ** {
372- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
373+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
374 }
375
376 %typemap(in, numinputs=0) semanage_seuser_key_t **(semanage_seuser_key_t *temp=NULL) {
377@@ -162,11 +162,11 @@
378 }
379
380 %typemap(argout) semanage_user_t ** {
381- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
382+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
383 }
384
385 %typemap(argout) semanage_user_key_t ** {
386- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
387+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
388 }
389
390 %typemap(in, numinputs=0) semanage_user_key_t **(semanage_user_key_t *temp=NULL) {
391@@ -186,11 +186,11 @@
392 }
393
394 %typemap(argout) semanage_port_t ** {
395- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
396+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
397 }
398
399 %typemap(argout) semanage_port_key_t ** {
400- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
401+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
402 }
403
404 %typemap(in, numinputs=0) semanage_port_key_t **(semanage_port_key_t *temp=NULL) {
405@@ -210,12 +210,12 @@
406 }
407
408 %typemap(argout) semanage_node_t ** {
409- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
410+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
411 }
412
413
414 %typemap(argout) semanage_node_key_t ** {
415- $result = SWIG_Ruby_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
416+ $result = SWIG_AppendOutput($result, SWIG_NewPointerObj(*$1, $*1_descriptor, 0));
417 }
418
419 %typemap(in, numinputs=0) semanage_node_key_t **(semanage_node_key_t *temp=NULL) {
420--
4212.25.1
422
diff --git a/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch b/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch
index daaeb3b..3cab867 100644
--- a/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch
+++ b/recipes-security/selinux/libsemanage/libsemanage-Fix-execve-segfaults-on-Ubuntu.patch
@@ -1,4 +1,4 @@
1From a91134e98ba4b3b6645d12bb68a07976b60f86c8 Mon Sep 17 00:00:00 2001 1From 418a2736fd7da15758ab84f9448e7517e3ad82c1 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Mon, 26 Mar 2012 15:15:16 +0800 3Date: Mon, 26 Mar 2012 15:15:16 +0800
4Subject: [PATCH] libsemanage: Fix execve segfaults on Ubuntu. 4Subject: [PATCH] libsemanage: Fix execve segfaults on Ubuntu.
@@ -17,10 +17,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17 1 file changed, 1 insertion(+), 1 deletion(-) 17 1 file changed, 1 insertion(+), 1 deletion(-)
18 18
19diff --git a/src/semanage_store.c b/src/semanage_store.c 19diff --git a/src/semanage_store.c b/src/semanage_store.c
20index 27c5d34..519f298 100644 20index 2ca2e90..914d720 100644
21--- a/src/semanage_store.c 21--- a/src/semanage_store.c
22+++ b/src/semanage_store.c 22+++ b/src/semanage_store.c
23@@ -1470,7 +1470,7 @@ static int semanage_exec_prog(semanage_handle_t * sh, 23@@ -1445,7 +1445,7 @@ static int semanage_exec_prog(semanage_handle_t * sh,
24 if (forkval == 0) { 24 if (forkval == 0) {
25 /* child process. file descriptors will be closed 25 /* child process. file descriptors will be closed
26 * because they were set as close-on-exec. */ 26 * because they were set as close-on-exec. */
diff --git a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
index e9df8be..8abf847 100644
--- a/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
+++ b/recipes-security/selinux/libsemanage/libsemanage-allow-to-disable-audit-support.patch
@@ -1,4 +1,4 @@
1From c96010440e7a2a87787a535fd0f9ccf26a2b4a5e Mon Sep 17 00:00:00 2001 1From 0fddb654b4193e91b8534cbbeaa5fd9b6aa1ead2 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com> 2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Mon, 20 Jan 2014 03:53:48 -0500 3Date: Mon, 20 Jan 2014 03:53:48 -0500
4Subject: [PATCH] libsemanage: allow to disable audit support 4Subject: [PATCH] libsemanage: allow to disable audit support
@@ -13,7 +13,7 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
13 3 files changed, 31 insertions(+), 2 deletions(-) 13 3 files changed, 31 insertions(+), 2 deletions(-)
14 14
15diff --git a/src/Makefile b/src/Makefile 15diff --git a/src/Makefile b/src/Makefile
16index d525996..2f5e159 100644 16index 8dfbd76..4012f28 100644
17--- a/src/Makefile 17--- a/src/Makefile
18+++ b/src/Makefile 18+++ b/src/Makefile
19@@ -27,6 +27,14 @@ ifeq ($(DEBUG),1) 19@@ -27,6 +27,14 @@ ifeq ($(DEBUG),1)
@@ -41,7 +41,7 @@ index d525996..2f5e159 100644
41 41
42 $(LIBPC): $(LIBPC).in ../VERSION 42 $(LIBPC): $(LIBPC).in ../VERSION
43diff --git a/src/seusers_local.c b/src/seusers_local.c 43diff --git a/src/seusers_local.c b/src/seusers_local.c
44index 795a33d..6539cdf 100644 44index eb3f82b..45da825 100644
45--- a/src/seusers_local.c 45--- a/src/seusers_local.c
46+++ b/src/seusers_local.c 46+++ b/src/seusers_local.c
47@@ -8,7 +8,11 @@ typedef struct semanage_seuser record_t; 47@@ -8,7 +8,11 @@ typedef struct semanage_seuser record_t;
@@ -72,7 +72,7 @@ index 795a33d..6539cdf 100644
72 72
73 int semanage_seuser_modify_local(semanage_handle_t * handle, 73 int semanage_seuser_modify_local(semanage_handle_t * handle,
74 const semanage_seuser_key_t * key, 74 const semanage_seuser_key_t * key,
75@@ -164,8 +170,11 @@ int semanage_seuser_modify_local(semanage_handle_t * handle, 75@@ -165,8 +171,11 @@ int semanage_seuser_modify_local(semanage_handle_t * handle,
76 (void) semanage_seuser_query(handle, key, &previous); 76 (void) semanage_seuser_query(handle, key, &previous);
77 handle->msg_callback = callback; 77 handle->msg_callback = callback;
78 rc = dbase_modify(handle, dconfig, key, new); 78 rc = dbase_modify(handle, dconfig, key, new);
@@ -84,7 +84,7 @@ index 795a33d..6539cdf 100644
84 err: 84 err:
85 if (previous) 85 if (previous)
86 semanage_seuser_free(previous); 86 semanage_seuser_free(previous);
87@@ -181,8 +190,12 @@ int semanage_seuser_del_local(semanage_handle_t * handle, 87@@ -182,8 +191,12 @@ int semanage_seuser_del_local(semanage_handle_t * handle,
88 dbase_config_t *dconfig = semanage_seuser_dbase_local(handle); 88 dbase_config_t *dconfig = semanage_seuser_dbase_local(handle);
89 rc = dbase_del(handle, dconfig, key); 89 rc = dbase_del(handle, dconfig, key);
90 semanage_seuser_query(handle, key, &seuser); 90 semanage_seuser_query(handle, key, &seuser);
@@ -98,7 +98,7 @@ index 795a33d..6539cdf 100644
98 semanage_seuser_free(seuser); 98 semanage_seuser_free(seuser);
99 return rc; 99 return rc;
100diff --git a/tests/Makefile b/tests/Makefile 100diff --git a/tests/Makefile b/tests/Makefile
101index 69f49a3..f914492 100644 101index 241ff17..fa03fb6 100644
102--- a/tests/Makefile 102--- a/tests/Makefile
103+++ b/tests/Makefile 103+++ b/tests/Makefile
104@@ -4,10 +4,18 @@ CILS = $(sort $(wildcard *.cil)) 104@@ -4,10 +4,18 @@ CILS = $(sort $(wildcard *.cil))
@@ -114,7 +114,7 @@ index 69f49a3..f914492 100644
114+endif 114+endif
115+ 115+
116 EXECUTABLE = libsemanage-tests 116 EXECUTABLE = libsemanage-tests
117 CFLAGS += -g -O0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute -Wno-unused-parameter 117 CFLAGS += -g -O0 -Wall -W -Wundef -Wmissing-noreturn -Wmissing-format-attribute
118 override CFLAGS += -I../src -I../include 118 override CFLAGS += -I../src -I../include
119-override LDLIBS += -lcunit -lbz2 -laudit -lselinux -lsepol 119-override LDLIBS += -lcunit -lbz2 -laudit -lselinux -lsepol
120+override LDLIBS += -lcunit -lbz2 $(LIBAUDIT) -lselinux -lsepol 120+override LDLIBS += -lcunit -lbz2 $(LIBAUDIT) -lselinux -lsepol
diff --git a/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch b/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch
index d880e1e..4b1d3cc 100644
--- a/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch
+++ b/recipes-security/selinux/libsemanage/libsemanage-disable-expand-check-on-policy-load.patch
@@ -1,4 +1,4 @@
1From 7af73c1684ce0e30ce0cd58b51708bde1e3a1984 Mon Sep 17 00:00:00 2001 1From af4948d5a1cfb41338a7539dcd80735b5c250e58 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe@deserted.net> 2From: Joe MacDonald <joe@deserted.net>
3Date: Wed, 7 May 2014 11:36:27 -0400 3Date: Wed, 7 May 2014 11:36:27 -0400
4Subject: [PATCH] libsemanage: disable expand-check on policy load 4Subject: [PATCH] libsemanage: disable expand-check on policy load
diff --git a/recipes-security/selinux/libsemanage_3.7.bb b/recipes-security/selinux/libsemanage_3.8.bb
index 7e6c91f..ef22957 100644
--- a/recipes-security/selinux/libsemanage_3.7.bb
+++ b/recipes-security/selinux/libsemanage_3.8.bb
@@ -5,7 +5,7 @@ as by programs like load_policy that need to perform specific transformations \
5on binary policies such as customizing policy boolean settings." 5on binary policies such as customizing policy boolean settings."
6SECTION = "base" 6SECTION = "base"
7LICENSE = "LGPL-2.1-or-later" 7LICENSE = "LGPL-2.1-or-later"
8LIC_FILES_CHKSUM = "file://${S}/LICENSE;md5=a6f89e2100d9b6cdffcea4f398e37343" 8LIC_FILES_CHKSUM = "file://${S}/LICENSE;md5=03068f550c635f6520e0f0252da412fc"
9 9
10require selinux_common.inc 10require selinux_common.inc
11 11
@@ -14,7 +14,6 @@ inherit lib_package python3native
14SRC_URI += "file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ 14SRC_URI += "file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \
15 file://libsemanage-allow-to-disable-audit-support.patch \ 15 file://libsemanage-allow-to-disable-audit-support.patch \
16 file://libsemanage-disable-expand-check-on-policy-load.patch \ 16 file://libsemanage-disable-expand-check-on-policy-load.patch \
17 file://0001-libsemanage-fix-swig-bindings-for-4.3.0.patch \
18 " 17 "
19 18
20DEPENDS = "libsepol libselinux python3 bison-native swig-native" 19DEPENDS = "libsepol libselinux python3 bison-native swig-native"
diff --git a/recipes-security/selinux/libsepol_3.7.bb b/recipes-security/selinux/libsepol_3.8.bb
index 0c28e9b..0c28e9b 100644
--- a/recipes-security/selinux/libsepol_3.7.bb
+++ b/recipes-security/selinux/libsepol_3.8.bb
diff --git a/recipes-security/selinux/mcstrans_3.7.bb b/recipes-security/selinux/mcstrans_3.8.bb
index 4a8482f..4c8aed3 100644
--- a/recipes-security/selinux/mcstrans_3.7.bb
+++ b/recipes-security/selinux/mcstrans_3.8.bb
@@ -31,7 +31,7 @@ do_install:append() {
31 31
32 if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then 32 if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then
33 install -d ${D}${sysconfdir}/tmpfiles.d 33 install -d ${D}${sysconfdir}/tmpfiles.d
34 echo "d ${localstatedir}/run/setrans - - - -" \ 34 echo "d ${runtimedir}/setrans - - - -" \
35 > ${D}${sysconfdir}/tmpfiles.d/setrans.conf 35 > ${D}${sysconfdir}/tmpfiles.d/setrans.conf
36 else 36 else
37 install -d ${D}${sysconfdir}/default/volatiles 37 install -d ${D}${sysconfdir}/default/volatiles
diff --git a/recipes-security/selinux/policycoreutils_3.7.bb b/recipes-security/selinux/policycoreutils_3.8.bb
index 9e59c4b..9e59c4b 100644
--- a/recipes-security/selinux/policycoreutils_3.7.bb
+++ b/recipes-security/selinux/policycoreutils_3.8.bb
diff --git a/recipes-security/selinux/restorecond_3.7.bb b/recipes-security/selinux/restorecond_3.8.bb
index 8e57283..8e57283 100644
--- a/recipes-security/selinux/restorecond_3.7.bb
+++ b/recipes-security/selinux/restorecond_3.8.bb
diff --git a/recipes-security/selinux/secilc_3.7.bb b/recipes-security/selinux/secilc_3.8.bb
index 5e0da3f..5e0da3f 100644
--- a/recipes-security/selinux/secilc_3.7.bb
+++ b/recipes-security/selinux/secilc_3.8.bb
diff --git a/recipes-security/selinux/selinux-dbus_3.7.bb b/recipes-security/selinux/selinux-dbus_3.8.bb
index b1198af..b1198af 100644
--- a/recipes-security/selinux/selinux-dbus_3.7.bb
+++ b/recipes-security/selinux/selinux-dbus_3.8.bb
diff --git a/recipes-security/selinux/selinux-gui_3.7.bb b/recipes-security/selinux/selinux-gui_3.8.bb
index fbd5e70..fbd5e70 100644
--- a/recipes-security/selinux/selinux-gui_3.7.bb
+++ b/recipes-security/selinux/selinux-gui_3.8.bb
diff --git a/recipes-security/selinux/selinux-python_3.7.bb b/recipes-security/selinux/selinux-python_3.8.bb
index e2dc932..e2dc932 100644
--- a/recipes-security/selinux/selinux-python_3.7.bb
+++ b/recipes-security/selinux/selinux-python_3.8.bb
diff --git a/recipes-security/selinux/selinux-sandbox_3.7.bb b/recipes-security/selinux/selinux-sandbox_3.8.bb
index 2cb55d6..2cb55d6 100644
--- a/recipes-security/selinux/selinux-sandbox_3.7.bb
+++ b/recipes-security/selinux/selinux-sandbox_3.8.bb
diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/selinux/selinux_common.inc
index 8dd6c2e..30109b9 100644
--- a/recipes-security/selinux/selinux_common.inc
+++ b/recipes-security/selinux/selinux_common.inc
@@ -1,7 +1,7 @@
1HOMEPAGE = "https://github.com/SELinuxProject" 1HOMEPAGE = "https://github.com/SELinuxProject"
2 2
3SRC_URI = "git://github.com/SELinuxProject/selinux.git;branch=main;protocol=https" 3SRC_URI = "git://github.com/SELinuxProject/selinux.git;branch=main;protocol=https"
4SRCREV = "2eb286bc0841791043567437ba5413f3014fb94e" 4SRCREV = "71aec30d068789e856e7cc429b620ae1cfa890f1"
5 5
6UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" 6UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)"
7 7
diff --git a/recipes-security/selinux/semodule-utils_3.7.bb b/recipes-security/selinux/semodule-utils_3.8.bb
index 0c1c189..0c1c189 100644
--- a/recipes-security/selinux/semodule-utils_3.7.bb
+++ b/recipes-security/selinux/semodule-utils_3.8.bb