android_kernel_google_msm/security/keys/encrypted-keys
Takashi Iwai 187c38d0b6 KEYS: Fix stale key registration at error path
commit b26bdde5bb27f3f900e25a95e33a0c476c8c2c48 upstream.

When loading encrypted-keys module, if the last check of
aes_get_sizes() in init_encrypted() fails, the driver just returns an
error without unregistering its key type.  This results in the stale
entry in the list.  In addition to memory leaks, this leads to a kernel
crash when registering a new key type later.

This patch fixes the problem by swapping the calls of aes_get_sizes()
and register_key_type(), and releasing resources properly at the error
paths.

Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=908163
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: Zefan Li <lizefan@huawei.com>
2015-04-14 17:33:45 +08:00
..
ecryptfs_format.c
ecryptfs_format.h
encrypted.c KEYS: Fix stale key registration at error path 2015-04-14 17:33:45 +08:00
encrypted.h encrypted-keys: module build fixes 2011-11-16 14:23:14 -05:00
Makefile encrypted-keys: module build fixes 2011-11-16 14:23:14 -05:00
masterkey_trusted.c encrypted-keys: fix rcu and sparse messages 2012-01-18 10:41:30 +11:00