提交 0f8983cf 编写于 作者: C Casey Schaufler

Smack: Fix memory leak in smack_inode_getsecctx

Fix memory leak in smack_inode_getsecctx

The implementation of smack_inode_getsecctx() made
incorrect assumptions about how Smack presents a security
context. Smack does not need to allocate memory to support
security contexts, so "releasing" a Smack context is a no-op.
The code made an unnecessary copy and returned that as a
context, which was never freed. The revised implementation
returns the context correctly.
Signed-off-by: NCasey Schaufler <casey@schaufler-ca.com>
Reported-by: NCHANDAN VN <chandan.vn@samsung.com>
Tested-by: NCHANDAN VN <chandan.vn@samsung.com>
上级 b3859ee1
......@@ -1545,9 +1545,9 @@ static int smack_inode_listsecurity(struct inode *inode, char *buffer,
*/
static void smack_inode_getsecid(struct inode *inode, u32 *secid)
{
struct inode_smack *isp = inode->i_security;
struct smack_known *skp = smk_of_inode(inode);
*secid = isp->smk_inode->smk_secid;
*secid = skp->smk_secid;
}
/*
......@@ -4538,12 +4538,10 @@ static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen)
{
int len = 0;
len = smack_inode_getsecurity(inode, XATTR_SMACK_SUFFIX, ctx, true);
struct smack_known *skp = smk_of_inode(inode);
if (len < 0)
return len;
*ctxlen = len;
*ctx = skp->smk_known;
*ctxlen = strlen(skp->smk_known);
return 0;
}
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册