summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorEdward Adam Davis <eadavis@qq.com>2025-08-18 21:24:17 +0800
committerHerbert Xu <herbert@gondor.apana.org.au>2025-08-30 15:43:25 +0800
commit9aa7e045f4af7d33684f00214a6f74e506426546 (patch)
tree59eb9312611a32050877961eb92aa0d3124d1fcb /crypto
parent501302d5cee0d8e8ec2c4a5919c37e0df9abc99b (diff)
downloadlinux-9aa7e045f4af7d33684f00214a6f74e506426546.tar.gz
linux-9aa7e045f4af7d33684f00214a6f74e506426546.tar.bz2
linux-9aa7e045f4af7d33684f00214a6f74e506426546.zip
crypto: jitter - Mark intermediary memory as clean
This is not a leak! The stack memroy is hashed and fed into the entropy pool. We can't recover the original kernel memory from it. Reported-by: syzbot+e8bcd7ee3db6cb5cb875@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=e8bcd7ee3db6cb5cb875 Signed-off-by: Edward Adam Davis <eadavis@qq.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/jitterentropy-kcapi.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/jitterentropy-kcapi.c b/crypto/jitterentropy-kcapi.c
index 1266eb790708..a53de7affe8d 100644
--- a/crypto/jitterentropy-kcapi.c
+++ b/crypto/jitterentropy-kcapi.c
@@ -117,6 +117,7 @@ int jent_hash_time(void *hash_state, __u64 time, u8 *addtl,
pr_warn_ratelimited("Unexpected digest size\n");
return -EINVAL;
}
+ kmsan_unpoison_memory(intermediary, sizeof(intermediary));
/*
* This loop fills a buffer which is injected into the entropy pool.