All of lore.kernel.org
 help / color / mirror / Atom feed
* SELinux tree updates
@ 2015-06-05 18:40 Paul Moore
  0 siblings, 0 replies; 2+ messages in thread
From: Paul Moore @ 2015-06-05 18:40 UTC (permalink / raw)
  To: selinux; +Cc: linux-security-module

Hello All,

While I try to keep rebases to the SELinux tree at a minimum, they are 
occasionally necessary to sync with upstream development; Casey's LSM stacking 
patches merit a rebase.  You may have noticed this starting yesterday, but in 
case you haven't, this serves as notice that I've rebased the SELinux upstream 
and next branches.  I apologize for any inconvenience this may have caused.  
Once Linux 4.1 is released, I will resume my usual process of updating the 
SELinux tree (described below).

* SELinux Tree
  -> git://git.infradead.org/users/pcmoore/selinux
  -> http://git.infradead.org/users/pcmoore/selinux

* SELinux Tree Process

  1. Create a new branch, stable-X.XX, set to the upstream branch that
  was sent during the merge window.

  2. Reset the next branch to the upstream branch that was sent during
  the merge window.

  3. Accept new features into the next branch and fixes into the
  stable-X.XX branch.

  4. As necessary, merge stable-X.XX into upstream and send pull
  requests upstream.

  5. When vX.XX is released, merge next into upstream and send a pull
  request for the upstream branch.  Leave stable-X.XX untouched for
  future stable fixes.

  6. Goto step #1.

-- 
paul moore
security @ redhat

^ permalink raw reply	[flat|nested] 2+ messages in thread

* SELinux tree updates
@ 2015-07-10 21:45 Paul Moore
  0 siblings, 0 replies; 2+ messages in thread
From: Paul Moore @ 2015-07-10 21:45 UTC (permalink / raw)
  To: selinux

Hello All,

Just a quick heads-up that I've rebased selinux#next to the current 
selinux#upstream and added the SELinux next-queue on top of that.  Please take 
a look and make sure I haven't forgotten your favorite patch, if I have, let 
me know; bonus points for the most creative use of the word "shenanigans" in 
the reply.

Here is what is currently in selinux#next:

    selinux: Create a common helper to determine an inode label [ver #3]
    selinux: Augment BUG_ON assertion for secclass_map.
    selinux: initialize sock security class to default value
    selinux: reduce locking overhead in inode_free_security()
    selinux: extended permissions for ioctls
    security: add ioctl specific auditing to lsm_audit
    selinux: do not remap unknown SIDs to the unlabeled context

-- 
paul moore
security @ redhat

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-07-10 21:45 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-06-05 18:40 SELinux tree updates Paul Moore
  -- strict thread matches above, loose matches on Subject: below --
2015-07-10 21:45 Paul Moore

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.