Hi Linus, Only three SELinux patches for v5.5, all passing the test suite and listed below, please merge them for v5.5. - Remove the size limit on SELinux policies, the limitation was a lingering vestige and no longer necessary. - Allow file labeling before the policy is loaded. This should ease some of the burden when the policy is initially loaded (no need to relabel files), but it should also help enable some new system concepts which dynamically create the root filesystem in the initrd. - Add support for the "greatest lower bound" policy construct which is defined as the intersection of the MLS range of two SELinux labels. Thanks, -Paul -- The following changes since commit 54ecb8f7028c5eb3d740bb82b0f1d90f2df63c5c: Linux 5.4-rc1 (2019-09-30 10:35:40 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux-pr-20191126 for you to fetch changes up to 42345b68c2e3e2b6549fc34b937ff44240dfc3b6: selinux: default_range glblub implementation (2019-10-07 19:01:35 -0400) ---------------------------------------------------------------- selinux/stable-5.5 PR 20191126 ---------------------------------------------------------------- Jonathan Lebon (1): selinux: allow labeling before policy is loaded Joshua Brindle (1): selinux: default_range glblub implementation zhanglin (1): selinux: remove load size limit security/selinux/hooks.c | 12 ++++++++++++ security/selinux/include/security.h | 3 ++- security/selinux/selinuxfs.c | 4 ---- security/selinux/ss/context.h | 32 ++++++++++++++++++++++++++++++++ security/selinux/ss/ebitmap.c | 18 ++++++++++++++++++ security/selinux/ss/ebitmap.h | 1 + security/selinux/ss/mls.c | 3 +++ security/selinux/ss/policydb.c | 5 +++++ security/selinux/ss/policydb.h | 1 + 9 files changed, 74 insertions(+), 5 deletions(-) -- paul moore www.paul-moore.com