From: Denis Efremov Date: Thu, 27 Aug 2020 07:29:23 +0000 (+0300) Subject: security/keys: use kvfree_sensitive() X-Git-Tag: accepted/tizen/unified/20230118.172025~7443^2~19 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=272a121940a286d7abaf7ac3ec5a37c5dbfa7b89;p=platform%2Fkernel%2Flinux-rpi.git security/keys: use kvfree_sensitive() Use kvfree_sensitive() instead of open-coding it. Signed-off-by: Denis Efremov Signed-off-by: David Howells Reviewed-by: Jarkko Sakkinen Reviewed-by: Ben Boeckel --- diff --git a/security/keys/big_key.c b/security/keys/big_key.c index 691347d..d17e5f0 100644 --- a/security/keys/big_key.c +++ b/security/keys/big_key.c @@ -121,8 +121,7 @@ int big_key_preparse(struct key_preparsed_payload *prep) *path = file->f_path; path_get(path); fput(file); - memzero_explicit(buf, enclen); - kvfree(buf); + kvfree_sensitive(buf, enclen); } else { /* Just store the data in a buffer */ void *data = kmalloc(datalen, GFP_KERNEL); @@ -140,8 +139,7 @@ err_fput: err_enckey: kfree_sensitive(enckey); error: - memzero_explicit(buf, enclen); - kvfree(buf); + kvfree_sensitive(buf, enclen); return ret; } @@ -273,8 +271,7 @@ long big_key_read(const struct key *key, char *buffer, size_t buflen) err_fput: fput(file); error: - memzero_explicit(buf, enclen); - kvfree(buf); + kvfree_sensitive(buf, enclen); } else { ret = datalen; memcpy(buffer, key->payload.data[big_key_data], datalen);