linux/security/tomoyo
Tetsuo Handa eae61f3c82 TOMOYO: Fix memory leak upon file open.
In tomoyo_check_open_permission() since 2.6.36, TOMOYO was by error
recalculating already calculated pathname when checking allow_rewrite
permission. As a result, memory will leak whenever a file is opened for writing
without O_APPEND flag. Also, performance will degrade because TOMOYO is
calculating pathname regardless of profile configuration.
This patch fixes the leak and performance degrade.

Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
2011-03-03 10:13:26 +11:00
..
common.c TOMOYO: Print URL information before panic(). 2010-10-21 10:12:45 +11:00
common.h TOMOYO: Don't abuse sys_getpid(), sys_getppid() 2010-09-27 10:53:18 +10:00
domain.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
file.c TOMOYO: Fix memory leak upon file open. 2011-03-03 10:13:26 +11:00
gc.c TOMOYO: Rename symbols. 2010-08-02 15:34:54 +10:00
group.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
Kconfig
load_policy.c
Makefile
memory.c TOMOYO: Rename symbols. 2010-08-02 15:34:54 +10:00
mount.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
realpath.c fs: dcache scale d_unhashed 2011-01-07 17:50:21 +11:00
securityfs_if.c TOMOYO: Explicitly set file_operations->llseek pointer. 2010-08-02 15:34:57 +10:00
tomoyo.c
util.c TOMOYO: Fix quota check. 2010-08-02 15:35:09 +10:00