Re: [PATCH] Trusted Path Execution LSM 0.2 (20050108)

From: Lorenzo Hernández García-Hierro
Date: Tue Jan 11 2005 - 16:19:00 EST


Hi,

El mar, 11-01-2005 a las 12:33 -0800, Chris Wright escribió:
> * Steve G (linux_4ever@xxxxxxxxx) wrote:
> > This patch leaks memory in the error paths. For example:
> >
> > +static ssize_t trustedlistadd_read_file(struct tpe_list *list, char *buf)
> > +{
> > <snip>
> > + char *buffer = kmalloc(400, GFP_KERNEL);
> > +
> > + user = (char *)__get_free_page(GFP_KERNEL);
> > + if (!user)
> > + return -ENOMEM;
>
> Helps to inform the author ;-)

It's fixed now and i will update the patches ASAP.

Next time it would be better to CC me directly, but anyway, thanks for
reporting this, as much as you mess it up, it's as much as i will work
to make it better ;).

Cheers,
--
Lorenzo Hernández García-Hierro <lorenzo@xxxxxxx> [1024D/6F2B2DEC]
[2048g/9AE91A22] Hardened Debian head developer & project manager

Attachment: signature.asc
Description: Esta parte del mensaje =?ISO-8859-1?Q?est=E1?= firmadadigitalmente