[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20230717074112.6580-1-duminjie@vivo.com>
Date: Mon, 17 Jul 2023 15:41:12 +0800
From: Minjie Du <duminjie@...o.com>
To: Herbert Xu <herbert@...dor.apana.org.au>,
"David S. Miller" <davem@...emloft.net>,
Heiko Carstens <hca@...ux.ibm.com>,
Vasily Gorbik <gor@...ux.ibm.com>,
Alexander Gordeev <agordeev@...ux.ibm.com>,
Christian Borntraeger <borntraeger@...ux.ibm.com>,
Sven Schnelle <svens@...ux.ibm.com>,
linux-crypto@...r.kernel.org (open list:CRYPTO API),
linux-s390@...r.kernel.org (open list:S390 ARCHITECTURE),
linux-kernel@...r.kernel.org (open list)
Cc: opensource.kernel@...o.com, Minjie Du <duminjie@...o.com>
Subject: [PATCH v1] s390/crypto: use kfree_sensitive in _free_kb_keybuf()
key might contain private part of the key, so better use
kfree_sensitive to free it.
Signed-off-by: Minjie Du <duminjie@...o.com>
---
arch/s390/crypto/paes_s390.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/s390/crypto/paes_s390.c b/arch/s390/crypto/paes_s390.c
index d29a9d908..38349150c 100644
--- a/arch/s390/crypto/paes_s390.c
+++ b/arch/s390/crypto/paes_s390.c
@@ -103,7 +103,7 @@ static inline void _free_kb_keybuf(struct key_blob *kb)
{
if (kb->key && kb->key != kb->keybuf
&& kb->keylen > sizeof(kb->keybuf)) {
- kfree(kb->key);
+ kfree_sensitive(kb->key);
kb->key = NULL;
}
}
--
2.39.0
Powered by blists - more mailing lists