)]}'
{
  "commit": "c8d46f17c2fc7d25c18e60c008928aecab26184d",
  "tree": "ff785f85d923c5866d290c917720bbe63667b13f",
  "parents": [
    "57ad0d4a00f5d3e80f33ba2da8d560c73d83dc22"
  ],
  "author": {
    "name": "Harald Freudenberger",
    "email": "freude@linux.ibm.com",
    "time": "Thu Mar 19 09:06:52 2026 +0100"
  },
  "committer": {
    "name": "Vasily Gorbik",
    "email": "gor@linux.ibm.com",
    "time": "Tue Mar 24 20:57:31 2026 +0100"
  },
  "message": "s390/zcrypt: Fix memory leak with CCA cards used as accelerator\n\nTests showed that there is a memory leak if CCA cards are used as\naccelerator for clear key RSA requests (ME and CRT). With the last\nrework for the memory allocation the AP messages are allocated by\nap_init_apmsg() but for some reason on two places (ME and CRT) the\nolder allocation was still in place. So the first allocation simple\nwas never freed.\n\nFixes: 57db62a130ce (\"s390/ap/zcrypt: Rework AP message buffer allocation\")\nReported-by: Yi Zhang \u003cyi.zhang@redhat.com\u003e\nCloses: https://lore.kernel.org/linux-s390/CAHj4cs9H67Uz0iVaRQv447p7JFPRPy3TKAT4\u003dY6_e\u003dwSHCZM5w@mail.gmail.com/\nReported-by: Nadja Hariz \u003cNadia.Hariz@ibm.com\u003e\nCc: stable@vger.kernel.org\nReviewed-by: Ingo Franzki \u003cifranzki@linux.ibm.com\u003e\nReviewed-by: Holger Dengler \u003cdengler@linux.ibm.com\u003e\nAcked-by: Heiko Carstens \u003chca@linux.ibm.com\u003e\nSigned-off-by: Harald Freudenberger \u003cfreude@linux.ibm.com\u003e\nSigned-off-by: Vasily Gorbik \u003cgor@linux.ibm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a0dcab5dc4f2f7a1409eaa80b522563aac10b9db",
      "old_mode": 33188,
      "old_path": "drivers/s390/crypto/zcrypt_msgtype6.c",
      "new_id": "23a32221e41a77586f638c773afebbd839c840eb",
      "new_mode": 33188,
      "new_path": "drivers/s390/crypto/zcrypt_msgtype6.c"
    }
  ]
}
