original_kernel/security/selinux
Al Viro 45525b26a4 fix a leak in replace_fd() users
replace_fd() began with "eats a reference, tries to insert into
descriptor table" semantics; at some point I'd switched it to
much saner current behaviour ("try to insert into descriptor
table, grabbing a new reference if inserted; caller should do
fput() in any case"), but forgot to update the callers.
Mea culpa...

[Spotted by Pavel Roskin, who has really weird system with pipe-fed
coredumps as part of what he considers a normal boot ;-)]

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2012-10-16 13:36:50 -04:00
..
include xfrm: invalidate dst on policy insertion/deletion 2012-09-18 15:57:03 -04:00
ss userns: Convert selinux to use kuid and kgid where appropriate 2012-09-21 03:13:22 -07:00
.gitignore
Kconfig
Makefile
avc.c selinux: tag avc cache alloc as non-critical 2012-07-31 18:42:47 -07:00
exports.c
hooks.c fix a leak in replace_fd() users 2012-10-16 13:36:50 -04:00
netif.c SELinux: avc: remove the useless fields in avc_add_callback 2012-04-09 12:23:44 -04:00
netlabel.c
netlink.c netlink: hide struct module parameter in netlink_kernel_create 2012-09-08 18:46:30 -04:00
netnode.c SELinux: avc: remove the useless fields in avc_add_callback 2012-04-09 12:23:44 -04:00
netport.c SELinux: avc: remove the useless fields in avc_add_callback 2012-04-09 12:23:44 -04:00
nlmsgtab.c netfilter: remove ip_queue support 2012-05-08 20:25:42 +02:00
selinuxfs.c mm: kill vma flag VM_RESERVED and mm->reserved_vm counter 2012-10-09 16:22:19 +09:00
xfrm.c