summaryrefslogtreecommitdiffstats
path: root/secure-boot-20121026.patch
diff options
context:
space:
mode:
authorJosh Boyer <jwboyer@redhat.com>2012-10-30 14:10:49 -0400
committerJosh Boyer <jwboyer@redhat.com>2012-10-30 14:13:23 -0400
commit23aad7f77fd1d1fd894c77db19f057728acacb02 (patch)
tree15b417b998cc8270ac1ebf64d9518adfdcdd83b8 /secure-boot-20121026.patch
parente12c503006e27ceb9a7a1f94f9c4d11f2a566b45 (diff)
downloadkernel-23aad7f77fd1d1fd894c77db19f057728acacb02.tar.gz
kernel-23aad7f77fd1d1fd894c77db19f057728acacb02.tar.xz
kernel-23aad7f77fd1d1fd894c77db19f057728acacb02.zip
Fix module blacklist patch to not leak a reference to the blacklist keyring
Diffstat (limited to 'secure-boot-20121026.patch')
-rw-r--r--secure-boot-20121026.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/secure-boot-20121026.patch b/secure-boot-20121026.patch
index 36ef7ba1d..1c5059431 100644
--- a/secure-boot-20121026.patch
+++ b/secure-boot-20121026.patch
@@ -1118,7 +1118,7 @@ index ea1b1df..602aa24 100644
+ if (!IS_ERR(blacklist)) {
+ /* module is signed with a cert in the blacklist. reject */
+ pr_err("Module key '%s' is in blacklist\n", id);
-+ /*key_put(blacklist);*/
++ key_ref_put(blacklist);
+ kfree(id);
+ return ERR_PTR(-EKEYREJECTED);
+ }
@@ -1227,7 +1227,7 @@ index 0000000..049669d
+#include <keys/asymmetric-type.h>
+#include "module-internal.h"
+
-+static void *get_cert_list(efi_char16_t *name, efi_guid_t *guid, unsigned long *size)
++static __init void *get_cert_list(efi_char16_t *name, efi_guid_t *guid, unsigned long *size)
+{
+ efi_status_t status;
+ unsigned long lsize = 4;