aboutsummaryrefslogtreecommitdiffstats
path: root/security/keys/encrypted-keys
diff options
context:
space:
mode:
authorTakashi Iwai <tiwai@suse.de>2014-12-04 12:25:19 -0500
committerMimi Zohar <zohar@linux.vnet.ibm.com>2014-12-06 21:50:36 -0500
commitb26bdde5bb27f3f900e25a95e33a0c476c8c2c48 (patch)
treee635750c82fe5e60db3c6cebb99ca8b61fad0661 /security/keys/encrypted-keys
parentb2d1965dcea148100ffc4e7199470bf5fad13871 (diff)
KEYS: Fix stale key registration at error path
When loading encrypted-keys module, if the last check of aes_get_sizes() in init_encrypted() fails, the driver just returns an error without unregistering its key type. This results in the stale entry in the list. In addition to memory leaks, this leads to a kernel crash when registering a new key type later. This patch fixes the problem by swapping the calls of aes_get_sizes() and register_key_type(), and releasing resources properly at the error paths. Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=908163 Cc: <stable@vger.kernel.org> Signed-off-by: Takashi Iwai <tiwai@suse.de> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'security/keys/encrypted-keys')
-rw-r--r--security/keys/encrypted-keys/encrypted.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/security/keys/encrypted-keys/encrypted.c b/security/keys/encrypted-keys/encrypted.c
index db9675db1026..7bed4ad7cd76 100644
--- a/security/keys/encrypted-keys/encrypted.c
+++ b/security/keys/encrypted-keys/encrypted.c
@@ -1017,10 +1017,13 @@ static int __init init_encrypted(void)
1017 ret = encrypted_shash_alloc(); 1017 ret = encrypted_shash_alloc();
1018 if (ret < 0) 1018 if (ret < 0)
1019 return ret; 1019 return ret;
1020 ret = aes_get_sizes();
1021 if (ret < 0)
1022 goto out;
1020 ret = register_key_type(&key_type_encrypted); 1023 ret = register_key_type(&key_type_encrypted);
1021 if (ret < 0) 1024 if (ret < 0)
1022 goto out; 1025 goto out;
1023 return aes_get_sizes(); 1026 return 0;
1024out: 1027out:
1025 encrypted_shash_release(); 1028 encrypted_shash_release();
1026 return ret; 1029 return ret;