Commit 187c38d0 authored by Takashi Iwai's avatar Takashi Iwai Committed by Zefan Li

KEYS: Fix stale key registration at error path

commit b26bdde5 upstream.

When loading encrypted-keys module, if the last check of
aes_get_sizes() in init_encrypted() fails, the driver just returns an
error without unregistering its key type.  This results in the stale
entry in the list.  In addition to memory leaks, this leads to a kernel
crash when registering a new key type later.

This patch fixes the problem by swapping the calls of aes_get_sizes()
and register_key_type(), and releasing resources properly at the error
paths.

Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=908163Signed-off-by: default avatarTakashi Iwai <tiwai@suse.de>
Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: default avatarZefan Li <lizefan@huawei.com>
parent db84e0af
...@@ -1016,10 +1016,13 @@ static int __init init_encrypted(void) ...@@ -1016,10 +1016,13 @@ static int __init init_encrypted(void)
ret = encrypted_shash_alloc(); ret = encrypted_shash_alloc();
if (ret < 0) if (ret < 0)
return ret; return ret;
ret = aes_get_sizes();
if (ret < 0)
goto out;
ret = register_key_type(&key_type_encrypted); ret = register_key_type(&key_type_encrypted);
if (ret < 0) if (ret < 0)
goto out; goto out;
return aes_get_sizes(); return 0;
out: out:
encrypted_shash_release(); encrypted_shash_release();
return ret; return ret;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment