diff options
author | Stephan Mueller <smueller@chronox.de> | 2017-08-10 08:06:18 +0200 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-08-22 14:45:01 +0800 |
commit | dea3eb8b452e36cf2dd572b0a797915ccf452ae6 (patch) | |
tree | 8d4fe3412cd76e3bcd7959aa635e71ab80b622f8 /crypto/chacha20_generic.c | |
parent | 8861249c740fc4af9ddc5aee321eafefb960d7c6 (diff) | |
download | linux-dea3eb8b452e36cf2dd572b0a797915ccf452ae6.tar.bz2 |
lib/mpi: kunmap after finishing accessing buffer
Using sg_miter_start and sg_miter_next, the buffer of an SG is kmap'ed
to *buff. The current code calls sg_miter_stop (and thus kunmap) on the
SG entry before the last access of *buff.
The patch moves the sg_miter_stop call after the last access to *buff to
ensure that the memory pointed to by *buff is still mapped.
Fixes: 4816c9406430 ("lib/mpi: Fix SG miter leak")
Cc: <stable@vger.kernel.org>
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/chacha20_generic.c')
0 files changed, 0 insertions, 0 deletions