kernel_optimize_test/security/safesetid
Micah Morton 21ab8580b3 LSM: SafeSetID: Stop releasing uninitialized ruleset
The first time a rule set is configured for SafeSetID, we shouldn't be
trying to release the previously configured ruleset, since there isn't
one. Currently, the pointer that would point to a previously configured
ruleset is uninitialized on first rule set configuration, leading to a
crash when we try to call release_ruleset with that pointer.

Acked-by: Jann Horn <jannh@google.com>
Signed-off-by: Micah Morton <mortonm@chromium.org>
2019-09-17 11:27:05 -07:00
..
Kconfig treewide: Add SPDX license identifier - Makefile/Kconfig 2019-05-21 10:50:46 +02:00
lsm.c LSM: SafeSetID: fix use of literal -1 in capable hook 2019-07-15 08:08:03 -07:00
lsm.h LSM: SafeSetID: add read handler 2019-07-15 08:07:40 -07:00
Makefile LSM: add SafeSetID module that gates setid calls 2019-01-25 11:22:45 -08:00
securityfs.c LSM: SafeSetID: Stop releasing uninitialized ruleset 2019-09-17 11:27:05 -07:00