search for: acl_name

Displaying 2 results from an estimated 2 matches for "acl_name".

2013 Jun 18
2
Crashes at login time with freshest code
...ilbox-list.c:63 alist = 0x10a45328 backend = 0x10a33a40 idx_arr = 0x10a453f8 aclobj = 0x1ffffe420 ret = 0 ret2 = 10 #5 0x00000000108cad9c in acl_mailbox_list_info_is_visible (ctx=0x10a11040) at acl-mailbox-list.c:336 info = 0x10a110a8 acl_name = 0x10a04a48 "INBOX/spam" ret = 0 __FUNCTION__ = "acl_mailbox_list_info_is_visible" #6 0x00000000108caf36 in acl_mailbox_list_iter_next (_ctx=0x10a11040) at acl-mailbox-list.c:386 _data_stack_cur_id = 8 ctx = 0x10a11040 info = 0x10a4a0c0...
2023 Mar 14
7
[PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From: Roberto Sassu <roberto.sassu at huawei.com> One of the major goals of LSM stacking is to run multiple LSMs side by side without interfering with each other. The ultimate decision will depend on individual LSM decision. Several changes need to be made to the LSM infrastructure to be able to support that. This patch set tackles one of them: gives to each LSM the ability to specify one