From: "Rahul Sandhu" <nvraxn@gmail.com>
To: "Jason Zaman" <jason@perfinion.com>, <selinux@vger.kernel.org>
Subject: Re: SELinux userspace release 3.10
Date: Mon, 02 Feb 2026 02:40:28 +0000 [thread overview]
Message-ID: <DG44N7XQP94D.2E7L9CFJ7PTXR@gmail.com> (raw)
In-Reply-To: <aYAKEjlKxwVWGgrw@anduin.perfinion.com>
Earlier on the ML, I think we concluded that once 3.10 was released,
we would format all the code in the repo with clang-format[1]. Should
we do this now? After, we should be able to merge the formatting CI
patch[2].
[1] https://lore.kernel.org/selinux/CAEjxPJ7T-xTyPhbNnC5GgC4d9wMtMD+pkPF0JgRmOdMvM6opUg@mail.gmail.com/
[2] https://lore.kernel.org/selinux/CAEjxPJ4jsZ_bWrLF=1si18f09p2Q_TEPWf1rd_a9=_kCb6iTEw@mail.gmail.com/
Best Regards,
Rahul
On Mon Feb 2, 2026 at 2:21 AM GMT, Jason Zaman wrote:
> Hi All,
>
> The SELinux userspace 3.10 release is now on github:
> https://github.com/SELinuxProject/selinux/releases/tag/3.10
>
> Thanks to everyone that contributed to this release!
>
> With Kind Regards,
> Jason Zaman
>
> RELEASE 3.10
> ============
>
> User-visible changes since 3.9
> ------------------------------
>
> * libsepol: fix TARGET and LIBSO on Darwin
>
> * secilc: use correct long option name for -X
>
> * Fix problem with bounds statements in optional blocks
>
> * libsepol: Fix processing of levels for user rule in an optional block
>
> * libsepol: Fix problem with handling type attributes in role-types rule
>
> * libsepol: Fix expand_role_attributes_in_attributes()
>
> * Allow type attributes to be associated with other type attributes
>
> * libsepol: Support functionfs_seclabel policycap
>
> * improve semanage man pages: Add examples for -r RANGE flag usage
>
> * libselinux: fix parsing of the enforcing kernel cmdline parameter
>
> * seunshare: always use translations when printing
>
> * treewide: add .clang-format configuration file
>
> * setfiles: Add -A option to disable SELINUX_RESTORECON_ADD_ASSOC
>
> * libsepol: add memfd_class capability
>
> * semanage: Reset active value when deleting boolean customizations
>
> * python/sepolicy: Add support for DNF5
>
> * sandbox/seunshare: Replace system() with execv() to prevent shell injection
>
> * libsepol: Tighten checks on MLS range and level when validating
>
> * libsepol: Fix potential NULL dereference in policydb_read()
>
> * libsepol: Fix potential use of an uninitialized value in link.c
>
> * libsepol: add bpf_token_perms polcap
>
> * libsepol: Fix possible use-after-free when expanding attributes
>
> * libselinux/src/Makefile: build python module without isolation
>
> * restorecon: Add option to count relabeled files
>
> * Bug fixes
next prev parent reply other threads:[~2026-02-02 2:40 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-26 2:19 SELinux userspace release 3.10-rc2 Jason Zaman
2026-02-02 2:21 ` SELinux userspace release 3.10 Jason Zaman
2026-02-02 2:40 ` Rahul Sandhu [this message]
2026-02-04 19:08 ` James Carter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DG44N7XQP94D.2E7L9CFJ7PTXR@gmail.com \
--to=nvraxn@gmail.com \
--cc=jason@perfinion.com \
--cc=selinux@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox