original_kernel/security
Al Viro 45525b26a4 fix a leak in replace_fd() users
replace_fd() began with "eats a reference, tries to insert into
descriptor table" semantics; at some point I'd switched it to
much saner current behaviour ("try to insert into descriptor
table, grabbing a new reference if inserted; caller should do
fput() in any case"), but forgot to update the callers.
Mea culpa...

[Spotted by Pavel Roskin, who has really weird system with pipe-fed
coredumps as part of what he considers a normal boot ;-)]

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2012-10-16 13:36:50 -04:00
..
apparmor UAPI: (Scripted) Disintegrate include/asm-generic 2012-10-04 18:20:15 +01:00
integrity ima: fix bug in argument order 2012-10-05 22:32:16 +10:00
keys Merge branch 'modules-next' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux 2012-10-14 13:39:34 -07:00
selinux fix a leak in replace_fd() users 2012-10-16 13:36:50 -04:00
smack consitify do_mount() arguments 2012-10-11 20:02:04 -04:00
tomoyo consitify do_mount() arguments 2012-10-11 20:02:04 -04:00
yama
Kconfig
Makefile
capability.c consitify do_mount() arguments 2012-10-11 20:02:04 -04:00
commoncap.c
device_cgroup.c device_cgroup: rename whitelist to exception list 2012-10-06 03:05:14 +09:00
inode.c
lsm_audit.c
min_addr.c
security.c consitify do_mount() arguments 2012-10-11 20:02:04 -04:00