Commit Graph

1031 Commits

Author SHA1 Message Date
João Marcos Costa
1db6bf1b57 initscripts: fix incompatibility with read-only-rootfs
When the read-only-rootfs feature (in IMAGE_FEATURES) is enabled, the
populate-volatile.sh script runs at build time. This compensates for the
fact that certain essential directories and files cannot be created at
runtime, since the root filesystem is read-only. This is handled in
oe-core's rootfs-postcommands.bbclass, in read_only_rootfs_hook.

However, initscripts-1.0_selinux.inc appends some shell code to
populate-volatile.sh considering it will be run in the target, not on
the host machine. So, if one uses both read-only-rootfs and selinux (in
DISTRO_FEATURES), the recursive call to restorecon is run in the host
machine, since populate-volatile.sh is called in build time. This leads
to errors such as:

| NOTE: Executing read_only_rootfs_hook ...
| DEBUG: Executing shell function read_only_rootfs_hook
| /sbin/restorecon: Could not read /var/lib/AccountsService/users: Permission denied.
| /sbin/restorecon: Could not read /var/lib/NetworkManager: Permission denied.
| /sbin/restorecon: Could not read /var/lib/bluetooth: Permission denied.
| /sbin/restorecon: Could not read /var/lib/chrony: Permission denied.

As a matter of fact, this scenario is a fair reminder not to call
bitbake with sudo.

This change makes sure the append is only performed if the
read-only-rootfs feature is not used.

Signed-off-by: João Marcos Costa <joaomarcos.costa@bootlin.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-11-14 21:02:23 +08:00
Clayton Casciato
7df9cb7fca refpolicy: files - add files_delete_var_chr_files interface
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-24 14:39:22 +08:00
Clayton Casciato
bc0f6e1a10 refpolicy: systemd - allow systemd_logind_t unconfined_t:fd use
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-24 00:03:29 +08:00
Clayton Casciato
55870f828e refpolicy: dbus - allow system_dbusd_t unconfined_t:fd use
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-23 15:30:26 +08:00
Clayton Casciato
5ea7d0c7ee refpolicy: ssh - allow sshd_t userdomain:key search
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-23 10:11:19 +08:00
Clayton Casciato
70408e3905 refpolicy: ssh - allow sshd_t kernel_t:system module_request
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-22 11:21:12 +08:00
Clayton Casciato
590b3c1b00 refpolicy: chronyd - allow chronyd_t kernel_t:system module_request
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-21 14:28:14 +08:00
Clayton Casciato
a3883736e2 refpolicy: unconfined - allow firewalld_t unconfined_t:dbus send_msg
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-17 16:14:25 +08:00
Clayton Casciato
2681e5093f refpolicy: systemd - allow systemd_generator_t use user ttys
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-15 10:21:12 +08:00
Clayton Casciato
4aebbafb86 refpolicy: oddjob - allow oddjob_mkhomedir_t user_terminals
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-10-15 00:16:29 +08:00
Yi Zhao
c999577d7a openssh: update sshd_config
Synchronize sshd_config with that in oe-core.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-09-19 10:02:25 +08:00
Yi Zhao
85a97cd9fc refpolicy: fix build for refpolicy-minimum
Backport 2 patches to fix build for refpolicy-minimum when INIT_MANAGER
is set to sysvinit.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-09-19 10:02:22 +08:00
Poonam Jadhav
30a49ab129 libselinux-python: Add native support
Add native support for libselinux-python
to fix build error for setools-native

ERROR: Nothing RPROVIDES 'libselinux-python-native'
(but virtual:native: meta-selinux/recipes-security/setools/setools_4.5.1.bb
RDEPENDS on or otherwise requires it)

Signed-off-by: Poonam Jadhav <poonam.jadhav@kpit.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-07-13 20:50:27 +08:00
Poonam Jadhav
66496127e3 setools: Add native support
Enable using setools native for analyzing
the built SELinux policy during the build.

Signed-off-by: Poonam Jadhav <poonam.jadhav@kpit.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-07-13 20:50:12 +08:00
Clayton Casciato
c4b0592620 refpolicy: oddjob - allow oddjob_mkhomedir_t privfd:fd use
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-05-02 20:39:46 +08:00
Yi Zhao
01feb3d9c7 refpolicy: refresh patch
Refresh 0001-refpolicy-minimum-make-sysadmin-module-optional.patch

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-05-01 22:32:44 +08:00
Clayton Casciato
b7a64b98ad refpolicy: locallogin - allow sulogin_t user_tty_device_t rw
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-05-01 22:32:35 +08:00
Clayton Casciato
0eb1efe8af refpolicy: locallogin - allow sulogin_t unconfined domtrans
Signed-off-by: Clayton Casciato <majortomtosourecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-10 11:51:24 +08:00
Clayton Casciato
7e5776c00c refpolicy: locallogin - dontaudit sulogin_t checkpoint_restore
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-09 21:25:43 +08:00
Clayton Casciato
928c820a1d refpolicy: files, init - filetrans /run/machine-id etc_runtime_t
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-08 09:52:51 +08:00
Clayton Casciato
311c945900 refpolicy: firewalld - fix firewalld_t firewalld_tmpfs_t exec
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-07 14:13:47 +08:00
Clayton Casciato
bd1238adbf refpolicy: firewalld - fix lib_t Python cache denial auditing
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-06 23:14:51 +08:00
Clayton Casciato
5162fcb880 refpolicy: unconfined - fix oddjob security_compute_sid
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-04-05 18:45:59 +08:00
Clayton Casciato
bd203c94bf refpolicy: chronyd - fix dac_read_search denials
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
2025-04-04 13:37:05 +08:00
Clayton Casciato
4fbbcab2cb refpolicy: authlogin - allow unix_chkpwd to run
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2025-03-16 17:23:01 +08:00
Madhu Marri
23472df161 selinux: Mark CVE-2020-10751 as Patched
Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10751
Type: Security Advisory
CVE: CVE-2020-10751
Score: 6.1
Patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff

Analysis:
- This is a selinux cve which is addressed in kernel.
- The fix is available at [1].
- Hence, marking the CVE as patched.

Reference:
[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff

Signed-off-by: Madhu Marri <madmarri@cisco.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2025-03-07 14:46:37 -05:00
Joe MacDonald
1d4fd0208a selinux: upgrade to core 3.7 and setools to 4.5.1
These two patches:

https://lists.yoctoproject.org/g/yocto-patches/message/392
https://lists.yoctoproject.org/g/yocto-patches/message/393

were missed earlier this year but we definitely want these updates.
Recreating them manually since I'm unable to find the original patches
anywhere.

Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-12-10 12:36:25 -05:00
Yi Zhao
3aff015697 selinux-python: fix sepolicy runtime error
For some distributions (e.g. Yocto) that do not provide
system-release/distribution-release file, libdnf can not get releasever
variable, causing conf.substitutions['releasever'] to not be set.
This will cause 'sepolicy generate' command to fail with the following
error on these distributions:

$ sepolicy generate --init /usr/local/bin/foo
Traceback (most recent call last):
  File "/usr/bin/sepolicy", line 702, in <module>
    args.func(args)
  File "/usr/bin/sepolicy", line 569, in generate
    mypolicy.gen_writeable()
  File "/usr/lib/python3.12/site-packages/sepolicy/generate.py", line 1302, in gen_writeable
    self.__extract_rpms()
  File "/usr/lib/python3.12/site-packages/sepolicy/generate.py", line 1268, in __extract_rpms
    base.read_all_repos()
  File "/usr/lib/python3.12/site-packages/dnf/base.py", line 554, in read_all_repos
    for repo in reader:
                ^^^^^^
  File "/usr/lib/python3.12/site-packages/dnf/conf/read.py", line 42, in __iter__
    for r in self._get_repos(self.conf.config_file_path):
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/site-packages/dnf/conf/read.py", line 109, in _get_repos
    parser.setSubstitutions(substs)
  File "/usr/lib/python3.12/site-packages/libdnf/conf.py", line 1643, in setSubstitutions
    return _conf.ConfigParser_setSubstitutions(self, substitutions)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
TypeError: in method 'ConfigParser_setSubstitutions', argument 2 of type 'std::map< std::string,std::string,std::less< std::string >,std::allocator< std::pair< std::string const,std::string > > > const &'

Set conf.substitutions['releasever'] to empty str if releasever is None.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-10-10 17:48:27 -04:00
Yi Zhao
9f5a46620a refpolicy: update to latest git rev
* a6cf20736 filesystem, devices: move gadgetfs to usbfs_t
* 75492f95f systemd: make xdg optional
* 097d688ff sshd: label sshd-session as sshd_exec_t
* b57b6005c Setting bluetooth helper domain for bluetoothctl
* 30f451d6a Adding Sepolicy rules to allow pulseaudio to access
            bluetooth sockets.
* 7037c341f systemd: allow logind to use locallogin pidfds
* 5f7f494d1 userdomain: allow administrative user to get attributes of
            shadow history file
* 0126cb1e6 node_exporter: allow reading RPC sysctls
* 9c90f9f7d asterisk: allow reading certbot lib
* bfcaec9ba postfix: allow postfix pipe to watch mail spool
* 06a80c3d8 netutils: allow ping to read net sysctls
* 2e0509c9e node_exporter: allow reading localization
* 50a8cddd1 container: allow containers to execute tmpfs files
* 09a747a16 sysadm: make haproxy admin
* c8c3ae2cb haproxy: initial policy
* 4e97f87ce init: use pidfds from local login
* 7fd9032d8 dbus, init: add interface for pidfd usage
* a6d6921a9 asterisk: allow watching spool dirs
* 72c1d912f su, sudo: allow sudo to signal all su domains
* 8b3178248 sudo: allow systemd-logind to read cgroup state of sudo
* 871f0b0dd postfix: allow smtpd to mmap SASL keytab files
* 578375480 sysnetwork: allow ifconfig to read usr files
* 6916e9b20 systemd: allow systemd-logind to use sshd pidfds
* 96ebb7c4e Reorder perms and classes
* cb68df087 tests.yml: Add policy diff on PRs.
* 99258825c tests.yml: Divide into reusable workflows.
* 1e4b68930 Reorder perms and classes

Drop 0002-refpolicy-minimum-make-xdg-module-optional.patch and
0040-policy-modules-system-systemd-allow-systemd-logind-t.patch which
have been merged upstream.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-07-24 09:22:31 -04:00
Yi Zhao
bd03ed5695 packagegroup-selinux-minimal: add missing runtime dependency selinux-autorelabel
Add selinux-autorelabel to reset the SELinux label on the root
filesystem at boot time.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-06-26 10:11:14 -04:00
Yi Zhao
914c4adb79 refpolicy: fixes for auditctl and rsyslog
* Allow auditctl to read symlink of var/log directory.
* Grant getpcap capability to syslogd_t.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-06-19 13:45:47 -04:00
Yi Zhao
17c7cd4621 refpolicy: update to latest git rev
* 2102055d4 devices: Change dev_rw_uhid() to use a policy pattern
* 1cbe455a5 device: Move dev_rw_uhid definition
* 7a33b4bc8 Sepolicy changes for bluez to access uhid
* c6dd4087d selinuxutil: make policykit optional
* 10feb47e5 newrole: allow newrole to search faillock runtime directory
* bf34d3e5e sysnetwork: fixes for dhcpcd
* 4663e613f Adding Sepolicy rules to allow bluetoothctl and dbus-daemon
            to access unix stream sockets
* 27602a932 various: various fixes
* 63d50bbaa container, crio, kubernetes: minor fixes
* 11e729e27 container, podman: various fixes
* ef5954a0e systemd: allow systemd-sysctl to search tmpfs
* 472e0442e container: allow containers to getcap
* 7876e5151 container: allow system container engines to mmap runtime
            files
* d917092a8 matrixd: add tunable for binding to all unreserved ports
* 3dba91dd4 bootloader: allow systemd-boot to manage EFI binaries
* ddf395d5d asterisk: allow binding to all unreserved UDP ports
* 3bad3696b postgres: add a standalone execmem tunable
* ef28f7879 userdom: allow users to read user home dir symlinks
* 03711caea dovecot: allow dovecot-auth to read SASL keytab
* cd781e783 fail2ban: allow reading net sysctls
* ddc6ac493 init: allow systemd to use sshd pidfds
* b9c457d80 files context for merged-usr profile on gentoo
* 5040dd3b6 Need map perm for cockpit 300.4
* 2ef9838db tests.yml: Add sechecker testing
* c62bd5c6c cockpit: Change $1_cockpit_tmpfs_t to a tmpfs file type
* 1c694125b certbot: Drop execmem
* 349411d55 xen: Drop xend/xm stack
* 2a261f916 Allow systemd to pass down sig mask
* 2577feb83 cups: Remove PTAL
* 5b02b44e5 xen: Revoke kernel module loading permissions
* 1c20c002c minissdpd: Revoke kernel module loading permissions
* 5671390e2 docker: Fix dockerc typo in container_engine_executable_file
* e1bc4830d cron: Use raw entrypoint rule for system_cronjob_t
* 0f71792c8 uml: Remove excessive access from user domains on
            uml_exec_t
* 511223e2d Set the type on /etc/machine-info to net_conf_t so
            hostnamectl can manipulate it (CRUD)
* 72fc1b2a3 fix: minor correction in MCS_CATS range comment
* cbf56c8ae systemd: allow notify client to stat socket

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-06-19 13:45:47 -04:00
Yi Zhao
07f3233374 refpolicy: update to latest git rev
* 0aff1990e quote: read localization
* ab13c0421 getty: grant checkpoint_restore
* 3643773ae Update SOS report to work on RHEL9
* 523b279bd Setup domain for dbus selinux interface

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-04-20 15:20:56 -04:00
Yi Zhao
a33da501e4 MAINTAINERS: update to new yocto-patches mailing list
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
2024-04-20 15:20:56 -04:00
Philip Lorenz
5006df6137 busybox: Fix wrapper creation
`PACKAGEBUILDPKGD` was dropped in Yocto 4.2 and
`PACKAGE_PREPROCESS_FUNCS` should be used instead. The only requirement
for wrapper creation is that it is executed before any of the
`update-alternatives` hooks are executed. This continues to hold as the
call to `create_sh_wrapper_reset_alternative_vars` is prepended only
after the `update-alternatives` class has been inherited.

Additionally, this also fixes a race condition leading to
non-deterministic buildhistory entries in busybox's `sysroot` files.
The race condition was caused by the creation of the wrapper files
inside `D` (i.e. the image directory) which is also consumed by other
tasks such as `do_populate_sysroot` which may be executing in parallel
to `do_package`.

Signed-off-by: Philip Lorenz <philip.lorenz@bmw.de>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-03-28 10:01:42 -04:00
Joe MacDonald
b1eddc23d6 MAINTAINERS: Update contact email address
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-03-20 07:33:49 -04:00
Yi Zhao
1d702c31ea layer.conf: update for the scarthgap release series
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-03-20 07:32:53 -04:00
Yi Zhao
7fc76cf77b refpolicy: upgrade 20231002+git -> 20240226+git
ChangeLog:
https://github.com/SELinuxProject/refpolicy/blob/main/Changelog

Notable Changes:
  Many systemd updates up to v255
  RPM and dnf fixes
  Tighten private key handling for Apache
  Many container and kubernetes improvements
  Add support for Cilium
  Update object class definitions up to io_uring:cmd
  Add additional rules to cloud-init based on sysadm_t

* Update to latest git rev.
* Refresh patches.
* Add a patch to fix reboot timeout error.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-03-12 08:34:35 -04:00
Yi Zhao
4544e817a1 refpolicy: drop ${SRCPV} usage
Drop SRCPV as this variable is no longer needed in PV[1].

[1] https://git.openembedded.org/openembedded-core/commit/?id=a8e7b0f932b9ea69b3a218fca18041676c65aba0

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-02-28 07:49:48 -05:00
Yi Zhao
6fcfb3a600 refpolicy: update to latest git rev
Update to latest rev to fix policy for systemd 255.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-02-27 12:30:21 -05:00
Yi Zhao
f4f7ef11cd eudev: remove PACKAGECONFIG[selinux]
Drop PACKAGECONFIG[selinux] as it was added to eudev recipe in
oe-core[1].

[1] https://git.openembedded.org/openembedded-core/commit/?id=e6c18c9d9d0e11a6a93cca14dbe622707cf25515

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-02-27 12:30:20 -05:00
Yi Zhao
95113a29c7 rpm: remove PACKAGECONFIG[selinux]
Drop PACKAGECONFIG[selinux] as it was added to rpm recipe in oe-core[1].

[1] https://git.openembedded.org/openembedded-core/commit/?id=38549d462b399e3a63335f60a44c8bbced98639a

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-02-27 12:30:20 -05:00
Yi Zhao
39a5525a22 libselinux-python: add recipe
We merged libselinux recipe and libselinux-python recipe in commit[1]
because we thought the circular dependency was gone. But unfortunately,
it still exists.

Here are the steps to reproduce:
$ echo "DISTRO_FEATURES:append = \" x11\"" >> conf/local.conf
$ echo "PACKAGECONFIG:append:pn-python3 = \" tk\"" >> conf/local.conf
$ bitbake core-image-selinux -n

So we still need to split the libselinux recipe into two recipes:
libselinux and libselinux-python.

[1] https://git.yoctoproject.org/meta-selinux/commit/?id=62b9c816a5000dc01b28e78213bde26b58cbca9d

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2024-01-24 10:20:31 -05:00
Yi Zhao
7d5dc44b35 setools: upgrade 4.4.3 -> 4.4.4
ChangeLog:
https://github.com/SELinuxProject/setools/releases/tag/4.4.4

* Refresh local patch

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
8950bef26c semodule-utils: upgrade 3.5 -> 3.6
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
085abdcf42 selinux-sandbox: upgrade 3.5 -> 3.6
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
24e994955d selinux-gui: upgrade 3.5 -> 3.6
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
a14ae01ba9 selinux-dbus: upgrade 3.5 -> 3.6
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
94ee9d0a42 selinux-python: upgrade 3.5 -> 3.6
* Refresh patch

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00
Yi Zhao
527b6649e9 restorecond: upgrade 3.5 -> 3.6
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
2023-12-18 11:06:31 -05:00