SELinux: memory leak in security_context_to_sid_core
authorEric Paris <eparis@redhat.com>
Wed, 3 Sep 2008 15:49:47 +0000 (11:49 -0400)
committerJames Morris <jmorris@namei.org>
Wed, 3 Sep 2008 22:35:13 +0000 (08:35 +1000)
commit8e531af90f3940615623dc0aa6c94866a6773601
treed618b12f26648de917cbec53677c734362e6bfc2
parentec0c15afb41fd9ad45b53468b60db50170e22346
SELinux: memory leak in security_context_to_sid_core

Fix a bug and a philosophical decision about who handles errors.

security_context_to_sid_core() was leaking a context in the common case.
This was causing problems on fedora systems which recently have started
making extensive use of this function.

In discussion it was decided that if string_to_context_struct() had an
error it was its own responsibility to clean up any mess it created
along the way.

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
security/selinux/ss/services.c