Toggle navigation
Patchwork
SELinux Development list
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Casey Schaufler
| Archived =
No
| 1765 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
asi123
andmike
cvaroqui
nomura
jbrassow
dtor
kueda
bmarzins
tmlind
jmberg
jmberg
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
Apply
«
1
2
3
4
…
17
18
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v2] LSM: general protection fault in legacy_parse_param
[v2] LSM: general protection fault in legacy_parse_param
2 - -
-
-
-
2022-01-27
Casey Schaufler
pcmoore
Accepted
[RFC] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
[RFC] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- - -
-
-
-
2020-11-10
Casey Schaufler
Accepted
Bad file pattern in 'SELINUX SECURITY MODULE'
Bad file pattern in 'SELINUX SECURITY MODULE'
- - -
-
-
-
2019-03-25
Casey Schaufler
Rejected
LSM: Reorder security_capset to do access checks properly
- - -
-
-
-
2016-06-01
Casey Schaufler
Rejected
[v34,29/29] AppArmor: Remove the exclusive flag
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,28/29] LSM: Add /proc attr entry for full LSM context
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,27/29] Audit: Add record for multiple object contexts
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,26/29] Audit: Add record for multiple task security contexts
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,25/29] Audit: Allow multiple records in an audit_buffer
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,24/29] LSM: Add a function to report multiple LSMs
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,23/29] Audit: Create audit_stamp structure
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,22/29] Audit: Keep multiple LSM data in audit_names
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,21/29] LSM: Extend security_secid_to_secctx to include module selection
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,20/29] binder: Pass LSM identifier for confirmation
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,19/29] NET: Store LSM netlabel data in a lsmblob
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,18/29] LSM: security_secid_to_secctx in netlink netfilter
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,17/29] LSM: Use lsmcontext in security_inode_getsecctx
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,16/29] LSM: Use lsmcontext in security_secid_to_secctx
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,15/29] LSM: Ensure the correct LSM context releaser
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
3 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,14/29] LSM: Specify which LSM to display
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,13/29] LSM: Use lsmblob in security_cred_getsecid
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,12/29] LSM: Use lsmblob in security_inode_getsecid
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,11/29] LSM: Use lsmblob in security_current_getsecid
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,10/29] LSM: Use lsmblob in security_ipc_getsecid
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,09/29] LSM: Use lsmblob in security_secid_to_secctx
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,08/29] LSM: Use lsmblob in security_secctx_to_secid
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,07/29] LSM: Use lsmblob in security_kernel_act_as
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,06/29] LSM: Use lsmblob in security_audit_rule_match
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,05/29] IMA: avoid label collisions with stacked LSMs
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,04/29] LSM: provide lsm name and id slot mappings
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,03/29] LSM: Add the lsmblob data structure.
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- 1 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,02/29] LSM: Infrastructure management of the sock security
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
2 2 -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule
1 - -
-
-
-
2022-04-15
Casey Schaufler
Not Applicable
[81/90] Netlabel: Return the labeling type on socket
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[80/90] Smack: Let netlabel do the work on connections
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[79/90] Smack: Don't set the socket label on each send
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[78/90] Smack: Let netlabel do the work on the ambient domain
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[77/90] Netlabel: Add a secattr comparison API function
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[76/90] Smack: Set netlabel flags properly on new label import
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[75/90] Smack: Fix setting of the CIPSO MLS_CAT flags
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[74/90] LSM: Change error detection for UDP peer security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[73/90] Smack: Advertise the secid to netlabel
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[72/90] LSM: Fix for security_init_inode_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[71/90] LSM: Infrastructure security blobs for mount options
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[70/90] LSM: Correct handling of ENOSYS in inode_setxattr
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[69/90] LSM: Use full security context in security_inode_setsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[68/90] LSM: Support multiple LSMs using inode_init_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[67/90] Smack: Detect if secmarks can be safely used
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[66/90] LSM: refactor security_setprocattr
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[65/90] LSM: Add secmark refcounting to call_one list
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[64/90] netfilter: Remove unnecessary NULL check in lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[63/90] Smack: Consolidate secmark conversions
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[62/90] netfilter: Fix memory leak introduced with lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[61/90] LSM: Make getting the secmark right cleaner
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[60/90] LSM: Add secmark_relabel_packet to the set of one call hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[59/90] AppArmor: Remove the exclusive flag
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[58/90] LSM: Specify which LSM to display
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[57/90] SELinux: Use blob offset in current_sid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[56/90] LSM: Special handling for secctx lsm hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[55/90] LSM: Remove unused macro
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[54/90] kernfs: remove lsm_context scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[53/90] LSM: Use lsm_context in security_inode_setsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[52/90] LSM: Use lsm_context in inode_setsecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[51/90] LSM: Add the release function to the lsm_context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[50/90] fs: remove lsm_context scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[49/90] LSM: Use lsm_context in security_secid_to_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[48/90] LSM: Use lsm_context in security_release_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[47/90] LSM: Use lsm_context in release_secctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[46/90] LSM: Use lsm_context in security_secctx_to_secid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[45/90] LSM: Use lsm_context in security_inode_getsecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[44/90] LSM: Use lsm_context in security_inode_notifysecctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[43/90] LSM: Use lsm_context in security_dentry_init_security
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[42/90] LSM: Use lsm_context in dentry_init_security hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[41/90] LSM: Use lsm_context in inode_notifysecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[40/90] LSM: Use lsm_context in inode_getsecctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[39/90] LSM: Use lsm_context in secctx_to_secid hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[38/90] LSM: Use lsm_context in secid_to_secctx hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[37/90] LSM: Create a data structure for a security context
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[36/90] LSM: Limit calls to certain module hooks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[35/90] AppArmor: Remove unnecessary hook stub
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[34/90] Smack: Restore the release_secctx hook
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[33/90] IMA: FIXUP prototype using lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[32/90] LSM: Remove lsm_export scaffolding functions
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[31/90] Netlabel: Replace secids with lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[30/90] NET: Remove netfilter scaffolding for lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[29/90] NET: Remove scaffolding on new secmarks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[28/90] NET: Remove scaffolding on secmarks
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[27/90] NET: Change the UNIXCB from a secid to an lsm_export
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[26/90] IMA: Clean out lsm_export scaffolding
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[25/90] Audit: Convert osid to an lsm_export structure
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[24/90] Audit: Convert target_sid to an lsm_export structure
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[23/90] Audit: Change audit_sig_sid to audit_sig_lsm
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[22/90] LSM: Use lsm_export in security_cred_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[21/90] LSM: Use lsm_export in security_inode_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[20/90] LSM: Use lsm_export in security_task_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[19/90] LSM: Use lsm_export in security_ipc_getsecid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[18/90] LSM: Use lsm_export in security_secid_to_secctx
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[17/90] LSM: Use lsm_export in security_secctx_to_secid
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
[15/90] LSM: Use lsm_export in security_kernel_act_as
LSM: Module stacking for all
- - -
-
-
-
2019-04-19
Casey Schaufler
Not Applicable
«
1
2
3
4
…
17
18
»