lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 29 Mar 2012 10:41:31 -0400 From: Mimi Zohar <zohar@...ux.vnet.ibm.com> To: linux-security-module@...r.kernel.org Cc: Dmitry Kasatkin <dmitry.kasatkin@...el.com>, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, Al Viro <viro@...IV.linux.org.uk>, David Safford <safford@...ux.vnet.ibm.com>, Mimi Zohar <zohar@...ibm.com> Subject: [PATCH v4 03/12] ima: free securityfs violations file From: Dmitry Kasatkin <dmitry.kasatkin@...el.com> On ima_fs_init() error, free securityfs violations file. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@...el.com> Signed-off-by: Mimi Zohar <zohar@...ibm.com> --- security/integrity/ima/ima_fs.c | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/security/integrity/ima/ima_fs.c b/security/integrity/ima/ima_fs.c index e1aa2b4..3fccc06 100644 --- a/security/integrity/ima/ima_fs.c +++ b/security/integrity/ima/ima_fs.c @@ -367,6 +367,7 @@ int __init ima_fs_init(void) return 0; out: + securityfs_remove(violations); securityfs_remove(runtime_measurements_count); securityfs_remove(ascii_runtime_measurements); securityfs_remove(binary_runtime_measurements); -- 1.7.6.5 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists