Commit 23224e45 authored by Eric Biggers's avatar Eric Biggers Committed by Linus Torvalds

mm: remove kzfree() compatibility definition

Commit 453431a5 ("mm, treewide: rename kzfree() to
kfree_sensitive()") renamed kzfree() to kfree_sensitive(),
but it left a compatibility definition of kzfree() to avoid
being too disruptive.

Since then a few more instances of kzfree() have slipped in.

Just get rid of them and remove the compatibility definition
once and for all.
Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent 0f7f635b
...@@ -100,7 +100,7 @@ static void rtllib_tkip_deinit(void *priv) ...@@ -100,7 +100,7 @@ static void rtllib_tkip_deinit(void *priv)
crypto_free_shash(_priv->tx_tfm_michael); crypto_free_shash(_priv->tx_tfm_michael);
crypto_free_shash(_priv->rx_tfm_michael); crypto_free_shash(_priv->rx_tfm_michael);
} }
kzfree(priv); kfree_sensitive(priv);
} }
......
...@@ -49,7 +49,7 @@ static void *prism2_wep_init(int keyidx) ...@@ -49,7 +49,7 @@ static void *prism2_wep_init(int keyidx)
static void prism2_wep_deinit(void *priv) static void prism2_wep_deinit(void *priv)
{ {
kzfree(priv); kfree_sensitive(priv);
} }
/* Perform WEP encryption on given skb that has at least 4 bytes of headroom /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
......
...@@ -107,7 +107,7 @@ static void ieee80211_tkip_deinit(void *priv) ...@@ -107,7 +107,7 @@ static void ieee80211_tkip_deinit(void *priv)
crypto_free_shash(_priv->tx_tfm_michael); crypto_free_shash(_priv->tx_tfm_michael);
crypto_free_shash(_priv->rx_tfm_michael); crypto_free_shash(_priv->rx_tfm_michael);
} }
kzfree(priv); kfree_sensitive(priv);
} }
......
...@@ -54,7 +54,7 @@ static void *prism2_wep_init(int keyidx) ...@@ -54,7 +54,7 @@ static void *prism2_wep_init(int keyidx)
static void prism2_wep_deinit(void *priv) static void prism2_wep_deinit(void *priv)
{ {
kzfree(priv); kfree_sensitive(priv);
} }
/* Perform WEP encryption on given skb that has at least 4 bytes of headroom /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
......
...@@ -187,8 +187,6 @@ void kfree_sensitive(const void *); ...@@ -187,8 +187,6 @@ void kfree_sensitive(const void *);
size_t __ksize(const void *); size_t __ksize(const void *);
size_t ksize(const void *); size_t ksize(const void *);
#define kzfree(x) kfree_sensitive(x) /* For backward compatibility */
#ifdef CONFIG_HAVE_HARDENED_USERCOPY_ALLOCATOR #ifdef CONFIG_HAVE_HARDENED_USERCOPY_ALLOCATOR
void __check_heap_object(const void *ptr, unsigned long n, struct page *page, void __check_heap_object(const void *ptr, unsigned long n, struct page *page,
bool to_user); bool to_user);
......
...@@ -418,7 +418,7 @@ static void tipc_aead_free(struct rcu_head *rp) ...@@ -418,7 +418,7 @@ static void tipc_aead_free(struct rcu_head *rp)
kfree(head); kfree(head);
} }
free_percpu(aead->tfm_entry); free_percpu(aead->tfm_entry);
kzfree(aead->key); kfree_sensitive(aead->key);
kfree(aead); kfree(aead);
} }
...@@ -2452,7 +2452,7 @@ static void tipc_crypto_work_tx(struct work_struct *work) ...@@ -2452,7 +2452,7 @@ static void tipc_crypto_work_tx(struct work_struct *work)
tipc_crypto_key_init(tx, skey, PER_NODE_KEY, false); tipc_crypto_key_init(tx, skey, PER_NODE_KEY, false);
if (likely(rc > 0)) if (likely(rc > 0))
rc = tipc_crypto_key_distr(tx, rc, NULL); rc = tipc_crypto_key_distr(tx, rc, NULL);
kzfree(skey); kfree_sensitive(skey);
} }
if (unlikely(rc)) if (unlikely(rc))
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment