crypto: qat - do not offload zero length requests
authorGiovanni Cabiddu <giovanni.cabiddu@intel.com>
Mon, 29 Apr 2019 15:43:21 +0000 (16:43 +0100)
committerHerbert Xu <herbert@gondor.apana.org.au>
Thu, 23 May 2019 06:01:03 +0000 (14:01 +0800)
If a zero length request is submitted through the skcipher api,
do not offload it and return success.

Reviewed-by: Conor Mcloughlin <conor.mcloughlin@intel.com>
Tested-by: Sergey Portnoy <sergey.portnoy@intel.com>
Signed-off-by: Giovanni Cabiddu <giovanni.cabiddu@intel.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
drivers/crypto/qat/qat_common/qat_algs.c

index 868fefa..2842b2c 100644 (file)
@@ -1058,6 +1058,9 @@ static int qat_alg_ablkcipher_encrypt(struct ablkcipher_request *req)
        struct device *dev = &GET_DEV(ctx->inst->accel_dev);
        int ret, ctr = 0;
 
+       if (req->nbytes == 0)
+               return 0;
+
        qat_req->iv = dma_alloc_coherent(dev, AES_BLOCK_SIZE,
                                         &qat_req->iv_paddr, GFP_ATOMIC);
        if (!qat_req->iv)
@@ -1115,6 +1118,9 @@ static int qat_alg_ablkcipher_decrypt(struct ablkcipher_request *req)
        struct device *dev = &GET_DEV(ctx->inst->accel_dev);
        int ret, ctr = 0;
 
+       if (req->nbytes == 0)
+               return 0;
+
        qat_req->iv = dma_alloc_coherent(dev, AES_BLOCK_SIZE,
                                         &qat_req->iv_paddr, GFP_ATOMIC);
        if (!qat_req->iv)