KEYS: Fix stale key registration at error path
authorTakashi Iwai <tiwai@suse.de>
Thu, 4 Dec 2014 17:25:19 +0000 (18:25 +0100)
committerMimi Zohar <zohar@linux.vnet.ibm.com>
Sun, 7 Dec 2014 02:50:36 +0000 (21:50 -0500)
When loading encrypted-keys module, if the last check of
aes_get_sizes() in init_encrypted() fails, the driver just returns an
error without unregistering its key type.  This results in the stale
entry in the list.  In addition to memory leaks, this leads to a kernel
crash when registering a new key type later.

This patch fixes the problem by swapping the calls of aes_get_sizes()
and register_key_type(), and releasing resources properly at the error
paths.

Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=908163
Cc: <stable@vger.kernel.org>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
security/keys/encrypted-keys/encrypted.c

index db9675d..7bed4ad 100644 (file)
@@ -1017,10 +1017,13 @@ static int __init init_encrypted(void)
        ret = encrypted_shash_alloc();
        if (ret < 0)
                return ret;
+       ret = aes_get_sizes();
+       if (ret < 0)
+               goto out;
        ret = register_key_type(&key_type_encrypted);
        if (ret < 0)
                goto out;
-       return aes_get_sizes();
+       return 0;
 out:
        encrypted_shash_release();
        return ret;