selinux: update my email address

Update my email address; MAINTAINERS was updated some time ago.

Signed-off-by: Stephen Smalley <stephen.smalley.work@gmail.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
Stephen Smalley 2023-07-19 11:12:50 -04:00 committed by Paul Moore
parent e5faa839c3
commit 0fe53224bf
25 changed files with 25 additions and 25 deletions

View File

@ -2,7 +2,7 @@
/*
* Implementation of the kernel access vector cache (AVC).
*
* Authors: Stephen Smalley, <sds@tycho.nsa.gov>
* Authors: Stephen Smalley, <stephen.smalley.work@gmail.com>
* James Morris <jmorris@redhat.com>
*
* Update: KaiGai, Kohei <kaigai@ak.jp.nec.com>

View File

@ -4,7 +4,7 @@
*
* This file contains the SELinux hook function implementations.
*
* Authors: Stephen Smalley, <sds@tycho.nsa.gov>
* Authors: Stephen Smalley, <stephen.smalley.work@gmail.com>
* Chris Vance, <cvance@nai.com>
* Wayne Salamon, <wsalamon@nai.com>
* James Morris <jmorris@redhat.com>

View File

@ -2,7 +2,7 @@
/*
* Access vector cache interface for object managers.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SELINUX_AVC_H_
#define _SELINUX_AVC_H_

View File

@ -2,7 +2,7 @@
/*
* Access vector cache interface for the security server.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SELINUX_AVC_SS_H_
#define _SELINUX_AVC_SS_H_

View File

@ -4,7 +4,7 @@
*
* This file contains the SELinux security data structures for kernel objects.
*
* Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
* Author(s): Stephen Smalley, <stephen.smalley.work@gmail.com>
* Chris Vance, <cvance@nai.com>
* Wayne Salamon, <wsalamon@nai.com>
* James Morris <jmorris@redhat.com>

View File

@ -2,7 +2,7 @@
/*
* Security server interface.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*
*/

View File

@ -1,7 +1,7 @@
/*
* Implementation of the access vector table type.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>

View File

@ -6,7 +6,7 @@
* table is used to represent the type enforcement
* tables.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>

View File

@ -11,7 +11,7 @@
* process from labeling an object with a different user
* identity.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_CONSTRAINT_H_
#define _SS_CONSTRAINT_H_

View File

@ -11,7 +11,7 @@
* security server and can be changed without affecting
* clients of the security server.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_CONTEXT_H_
#define _SS_CONTEXT_H_

View File

@ -2,7 +2,7 @@
/*
* Implementation of the extensible bitmap type.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*
* Updated: Hewlett-Packard <paul@paul-moore.com>

View File

@ -10,7 +10,7 @@
* an explicitly specified starting bit position within
* the total bitmap.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_EBITMAP_H_
#define _SS_EBITMAP_H_

View File

@ -2,7 +2,7 @@
/*
* Implementation of the hash table type.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#include <linux/kernel.h>
#include <linux/slab.h>

View File

@ -6,7 +6,7 @@
* functions for hash computation and key comparison are
* provided by the creator of the table.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_HASHTAB_H_
#define _SS_HASHTAB_H_

View File

@ -2,7 +2,7 @@
/*
* Implementation of the multi-level security (MLS) policy.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>

View File

@ -2,7 +2,7 @@
/*
* Multi-level security (MLS) policy operations.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>

View File

@ -2,7 +2,7 @@
/*
* Type definitions for the multi-level security (MLS) policy.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>

View File

@ -2,7 +2,7 @@
/*
* Implementation of the policy database.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*

View File

@ -3,7 +3,7 @@
* A policy database (policydb) specifies the
* configuration data for the security policy.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
/*

View File

@ -2,7 +2,7 @@
/*
* Implementation of the security services.
*
* Authors : Stephen Smalley, <sds@tycho.nsa.gov>
* Authors : Stephen Smalley, <stephen.smalley.work@gmail.com>
* James Morris <jmorris@redhat.com>
*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>

View File

@ -2,7 +2,7 @@
/*
* Implementation of the security services.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_SERVICES_H_
#define _SS_SERVICES_H_

View File

@ -2,7 +2,7 @@
/*
* Implementation of the SID table type.
*
* Original author: Stephen Smalley, <sds@tycho.nsa.gov>
* Original author: Stephen Smalley, <stephen.smalley.work@gmail.com>
* Author: Ondrej Mosnacek, <omosnacek@gmail.com>
*
* Copyright (C) 2018 Red Hat, Inc.

View File

@ -3,7 +3,7 @@
* A security identifier table (sidtab) is a lookup table
* of security context structures indexed by SID value.
*
* Original author: Stephen Smalley, <sds@tycho.nsa.gov>
* Original author: Stephen Smalley, <stephen.smalley.work@gmail.com>
* Author: Ondrej Mosnacek, <omosnacek@gmail.com>
*
* Copyright (C) 2018 Red Hat, Inc.

View File

@ -2,7 +2,7 @@
/*
* Implementation of the symbol table type.
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#include <linux/kernel.h>
#include <linux/string.h>

View File

@ -5,7 +5,7 @@
* is arbitrary. The symbol table type is implemented
* using the hash table type (hashtab).
*
* Author : Stephen Smalley, <sds@tycho.nsa.gov>
* Author : Stephen Smalley, <stephen.smalley.work@gmail.com>
*/
#ifndef _SS_SYMTAB_H_
#define _SS_SYMTAB_H_