android_kernel_xiaomi_sm8350/security/selinux/ss
Paul Moore e1770d97a7 [SELinux]: Fix double free in selinux_netlbl_sock_setsid()
As pointed out by Adrian Bunk, commit
45c950e0f8 ("fix memory leak in netlabel
code") caused a double-free when security_netlbl_sid_to_secattr()
fails.  This patch fixes this by removing the netlbl_secattr_destroy()
call from that function since we are already releasing the secattr
memory in selinux_netlbl_sock_setsid().

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-01-31 19:27:04 -08:00
..
avtab.c security/selinux: Add missing "space" 2008-01-25 11:29:44 +11:00
avtab.h
conditional.c
conditional.h
constraint.h
context.h
ebitmap.c
ebitmap.h
hashtab.c
hashtab.h
Makefile
mls_types.h
mls.c NetLabel: Add secid token support to the NetLabel secattr struct 2008-01-30 08:17:19 +11:00
mls.h
policydb.c SELinux: Add a capabilities bitmap to SELinux policy version 22 2008-01-30 08:17:23 +11:00
policydb.h SELinux: Add a capabilities bitmap to SELinux policy version 22 2008-01-30 08:17:23 +11:00
services.c [SELinux]: Fix double free in selinux_netlbl_sock_setsid() 2008-01-31 19:27:04 -08:00
services.h
sidtab.c
sidtab.h
symtab.c
symtab.h