Re: [PATCH] security: hooks : Prevent security to persist in memory (PR #31)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Apr 22, 2017 at 8:53 PM, Pirabarlen-Cheenaramen
<selven@xxxxxxxxxx> wrote:
> Signed-off-by: Pirabarlen-Cheenaramen <selven@xxxxxxxxxx>
> ---
>  security/selinux/hooks.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index d98550a..9f82908 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -4944,7 +4944,7 @@ static int selinux_tun_dev_alloc_security(void **security)
>
>  static void selinux_tun_dev_free_security(void *security)
>  {
> -       kfree(security);
> +       kzfree(security);

As a general rule we don't zero out memory before free'ing it, you
need to provide some additional information as to why this is required
here.

>  }
>
>  static int selinux_tun_dev_create(void)
> --
> 1.9.1

-- 
paul moore
www.paul-moore.com



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux