diff options
| author | Edward Adam Davis <eadavis@qq.com> | 2025-08-18 21:24:17 +0800 |
|---|---|---|
| committer | Herbert Xu <herbert@gondor.apana.org.au> | 2025-08-30 15:43:25 +0800 |
| commit | 9aa7e045f4af7d33684f00214a6f74e506426546 (patch) | |
| tree | 59eb9312611a32050877961eb92aa0d3124d1fcb /crypto | |
| parent | 501302d5cee0d8e8ec2c4a5919c37e0df9abc99b (diff) | |
| download | linux-9aa7e045f4af7d33684f00214a6f74e506426546.tar.gz linux-9aa7e045f4af7d33684f00214a6f74e506426546.tar.bz2 linux-9aa7e045f4af7d33684f00214a6f74e506426546.zip | |
crypto: jitter - Mark intermediary memory as clean
This is not a leak! The stack memroy is hashed and fed into the
entropy pool. We can't recover the original kernel memory from it.
Reported-by: syzbot+e8bcd7ee3db6cb5cb875@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=e8bcd7ee3db6cb5cb875
Signed-off-by: Edward Adam Davis <eadavis@qq.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
| -rw-r--r-- | crypto/jitterentropy-kcapi.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/jitterentropy-kcapi.c b/crypto/jitterentropy-kcapi.c index 1266eb790708..a53de7affe8d 100644 --- a/crypto/jitterentropy-kcapi.c +++ b/crypto/jitterentropy-kcapi.c @@ -117,6 +117,7 @@ int jent_hash_time(void *hash_state, __u64 time, u8 *addtl, pr_warn_ratelimited("Unexpected digest size\n"); return -EINVAL; } + kmsan_unpoison_memory(intermediary, sizeof(intermediary)); /* * This loop fills a buffer which is injected into the entropy pool. |
