hooks.c (b22364c8eec89e6b0c081a237f3b6348df87796f) | hooks.c (c376222960ae91d5ffb9197ee36771aaed1d9f90) |
---|---|
1/* 2 * NSA Security-Enhanced Linux (SELinux) security module 3 * 4 * This file contains the SELinux hook function implementations. 5 * 6 * Authors: Stephen Smalley, <sds@epoch.ncsc.mil> 7 * Chris Vance, <cvance@nai.com> 8 * Wayne Salamon, <wsalamon@nai.com> --- 167 unchanged lines hidden (view full) --- 176 kfree(tsec); 177} 178 179static int inode_alloc_security(struct inode *inode) 180{ 181 struct task_security_struct *tsec = current->security; 182 struct inode_security_struct *isec; 183 | 1/* 2 * NSA Security-Enhanced Linux (SELinux) security module 3 * 4 * This file contains the SELinux hook function implementations. 5 * 6 * Authors: Stephen Smalley, <sds@epoch.ncsc.mil> 7 * Chris Vance, <cvance@nai.com> 8 * Wayne Salamon, <wsalamon@nai.com> --- 167 unchanged lines hidden (view full) --- 176 kfree(tsec); 177} 178 179static int inode_alloc_security(struct inode *inode) 180{ 181 struct task_security_struct *tsec = current->security; 182 struct inode_security_struct *isec; 183 |
184 isec = kmem_cache_alloc(sel_inode_cache, GFP_KERNEL); | 184 isec = kmem_cache_zalloc(sel_inode_cache, GFP_KERNEL); |
185 if (!isec) 186 return -ENOMEM; 187 | 185 if (!isec) 186 return -ENOMEM; 187 |
188 memset(isec, 0, sizeof(*isec)); | |
189 mutex_init(&isec->lock); 190 INIT_LIST_HEAD(&isec->list); 191 isec->inode = inode; 192 isec->sid = SECINITSID_UNLABELED; 193 isec->sclass = SECCLASS_FILE; 194 isec->task_sid = tsec->sid; 195 inode->i_security = isec; 196 --- 4807 unchanged lines hidden --- | 188 mutex_init(&isec->lock); 189 INIT_LIST_HEAD(&isec->list); 190 isec->inode = inode; 191 isec->sid = SECINITSID_UNLABELED; 192 isec->sclass = SECCLASS_FILE; 193 isec->task_sid = tsec->sid; 194 inode->i_security = isec; 195 --- 4807 unchanged lines hidden --- |