|
@@ -213,9 +213,11 @@ retry:
|
|
|
res = -ENOKEY;
|
|
|
goto out;
|
|
|
}
|
|
|
+ down_read(&keyring_key->sem);
|
|
|
ukp = user_key_payload(keyring_key);
|
|
|
if (ukp->datalen != sizeof(struct ext4_encryption_key)) {
|
|
|
res = -EINVAL;
|
|
|
+ up_read(&keyring_key->sem);
|
|
|
goto out;
|
|
|
}
|
|
|
master_key = (struct ext4_encryption_key *)ukp->data;
|
|
@@ -226,10 +228,12 @@ retry:
|
|
|
"ext4: key size incorrect: %d\n",
|
|
|
master_key->size);
|
|
|
res = -ENOKEY;
|
|
|
+ up_read(&keyring_key->sem);
|
|
|
goto out;
|
|
|
}
|
|
|
res = ext4_derive_key_aes(ctx.nonce, master_key->raw,
|
|
|
raw_key);
|
|
|
+ up_read(&keyring_key->sem);
|
|
|
if (res)
|
|
|
goto out;
|
|
|
got_key:
|