diff options
author | Herbert Xu <[email protected]> | 2024-09-12 17:57:13 +0800 |
---|---|---|
committer | Herbert Xu <[email protected]> | 2024-09-21 17:14:59 +0800 |
commit | 5124bc96162667766f6120b19f57a640c2eccb2a (patch) | |
tree | d96f475455e029c9d636af6c379f294b5748aad1 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c | |
parent | ce212d2afca47acd366a2e74c76fe82c31f785ab (diff) |
crypto: caam - Pad SG length when allocating hash edesc
Because hardware will read in multiples of 4 SG entries, ensure
the allocated length is always padded. This was already done
by some callers of ahash_edesc_alloc, but ahash_digest was conspicuously
missing.
In any case, doing it in the allocation function ensures that the
memory is always there.
Reported-by: Guangwu Zhang <[email protected]>
Fixes: a5e5c13398f3 ("crypto: caam - fix S/G table passing page boundary")
Signed-off-by: Herbert Xu <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions