Re: [PATCH] Trusted Path Execution LSM 0.2 (20050108)

From: Chris Wright
Date: Tue Jan 11 2005 - 15:38:25 EST


* Steve G (linux_4ever@xxxxxxxxx) wrote:
> This patch leaks memory in the error paths. For example:
>
> +static ssize_t trustedlistadd_read_file(struct tpe_list *list, char *buf)
> +{
> <snip>
> + char *buffer = kmalloc(400, GFP_KERNEL);
> +
> + user = (char *)__get_free_page(GFP_KERNEL);
> + if (!user)
> + return -ENOMEM;

Helps to inform the author ;-)

-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/