Displaying 2 results from an estimated 2 matches for "acl_name".
2013 Jun 18
2
Crashes at login time with freshest code
...ilbox-list.c:63
alist = 0x10a45328
backend = 0x10a33a40
idx_arr = 0x10a453f8
aclobj = 0x1ffffe420
ret = 0
ret2 = 10
#5 0x00000000108cad9c in acl_mailbox_list_info_is_visible
(ctx=0x10a11040) at acl-mailbox-list.c:336
info = 0x10a110a8
acl_name = 0x10a04a48 "INBOX/spam"
ret = 0
__FUNCTION__ = "acl_mailbox_list_info_is_visible"
#6 0x00000000108caf36 in acl_mailbox_list_iter_next (_ctx=0x10a11040)
at acl-mailbox-list.c:386
_data_stack_cur_id = 8
ctx = 0x10a11040
info = 0x10a4a0c0...
2023 Mar 14
7
[PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From: Roberto Sassu <roberto.sassu at huawei.com>
One of the major goals of LSM stacking is to run multiple LSMs side by side
without interfering with each other. The ultimate decision will depend on
individual LSM decision.
Several changes need to be made to the LSM infrastructure to be able to
support that. This patch set tackles one of them: gives to each LSM the
ability to specify one