caamhash contains this weird code:

        src_nents = sg_count(req->src, req->nbytes, &chained);
        dma_map_sg_chained(jrdev, req->src, src_nents ? : 1, DMA_TO_DEVICE,
                           chained);
        ...
        edesc->src_nents = src_nents;

sg_count() returns zero when __sg_count() returns zero or one.  This
is used to mean that we don't need to use a hardware scatterlist.
However, setting src_nents to zero causes problems when we unmap:

        if (edesc->src_nents)
                dma_unmap_sg_chained(dev, req->src, edesc->src_nents,
                                     DMA_TO_DEVICE, edesc->chained);

as zero here means that we have no entries to unmap.

This can be fixed in two ways: either by writing the number of entries
that were requested of dma_map_sg_chained(), or by reworking the "no
SG required" case.

We adopt the re-work solution here - we replace sg_count() with
__sg_count(), so src_nents now contains the real number of scatterlist
entries, and we then change the test for using the hardware scatterlist
to src_nents > 1 rather than just non-zero.

This change passes my sshd, openssl tests hashing /bin and tcrypt
tests.

Signed-off-by: Russell King <rmk+ker...@arm.linux.org.uk>
---
 drivers/crypto/caam/caamhash.c | 25 ++++++++++++++++---------
 1 file changed, 16 insertions(+), 9 deletions(-)

diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
index f30c93840bba..28434ad08cb4 100644
--- a/drivers/crypto/caam/caamhash.c
+++ b/drivers/crypto/caam/caamhash.c
@@ -1095,10 +1095,13 @@ static int ahash_digest(struct ahash_request *req)
        u32 options;
        int sh_len;
 
-       src_nents = sg_count(req->src, req->nbytes, &chained);
-       dma_map_sg_chained(jrdev, req->src, src_nents ? : 1, DMA_TO_DEVICE,
+       src_nents = __sg_count(req->src, req->nbytes, &chained);
+       dma_map_sg_chained(jrdev, req->src, src_nents, DMA_TO_DEVICE,
                           chained);
-       sec4_sg_bytes = src_nents * sizeof(struct sec4_sg_entry);
+       if (src_nents > 1)
+               sec4_sg_bytes = src_nents * sizeof(struct sec4_sg_entry);
+       else
+               sec4_sg_bytes = 0;
 
        /* allocate space for base edesc and hw desc commands, link tables */
        edesc = kzalloc(sizeof(*edesc) + sec4_sg_bytes + DESC_JOB_IO_LEN,
@@ -1117,7 +1120,7 @@ static int ahash_digest(struct ahash_request *req)
        desc = edesc->hw_desc;
        init_job_desc_shared(desc, ptr, sh_len, HDR_SHARE_DEFER | HDR_REVERSE);
 
-       if (src_nents) {
+       if (src_nents > 1) {
                sg_to_sec4_sg_last(req->src, src_nents, edesc->sec4_sg, 0);
                edesc->sec4_sg_dma = dma_map_single(jrdev, edesc->sec4_sg,
                                            sec4_sg_bytes, DMA_TO_DEVICE);
@@ -1447,11 +1450,15 @@ static int ahash_update_first(struct ahash_request *req)
        to_hash = req->nbytes - *next_buflen;
 
        if (to_hash) {
-               src_nents = sg_count(req->src, req->nbytes - (*next_buflen),
-                                    &chained);
-               dma_map_sg_chained(jrdev, req->src, src_nents ? : 1,
+               src_nents = __sg_count(req->src, req->nbytes - (*next_buflen),
+                                      &chained);
+               dma_map_sg_chained(jrdev, req->src, src_nents,
                                   DMA_TO_DEVICE, chained);
-               sec4_sg_bytes = src_nents * sizeof(struct sec4_sg_entry);
+               if (src_nents > 1)
+                       sec4_sg_bytes = src_nents *
+                                       sizeof(struct sec4_sg_entry);
+               else
+                       sec4_sg_bytes = 0;
 
                /*
                 * allocate space for base edesc and hw desc commands,
@@ -1472,7 +1479,7 @@ static int ahash_update_first(struct ahash_request *req)
                                 DESC_JOB_IO_LEN;
                edesc->dst_dma = 0;
 
-               if (src_nents) {
+               if (src_nents > 1) {
                        sg_to_sec4_sg_last(req->src, src_nents,
                                           edesc->sec4_sg, 0);
                        edesc->sec4_sg_dma = dma_map_single(jrdev,
-- 
2.1.0

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to