From: Herbert Xu Date: Sat, 10 May 2025 10:41:31 +0000 (+0800) Subject: crypto: marvell/cesa - Handle zero-length skcipher requests X-Git-Tag: v5.10.239~338 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=c064ae2881d839709bd72d484d5f2af157f46024;p=thirdparty%2Fkernel%2Fstable.git crypto: marvell/cesa - Handle zero-length skcipher requests [ Upstream commit 8a4e047c6cc07676f637608a9dd675349b5de0a7 ] Do not access random memory for zero-length skcipher requests. Just return 0. Fixes: f63601fd616a ("crypto: marvell/cesa - add a new driver for Marvell's CESA") Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- diff --git a/drivers/crypto/marvell/cesa/cipher.c b/drivers/crypto/marvell/cesa/cipher.c index 8dc10f9988948..051a661a63eeb 100644 --- a/drivers/crypto/marvell/cesa/cipher.c +++ b/drivers/crypto/marvell/cesa/cipher.c @@ -449,6 +449,9 @@ static int mv_cesa_skcipher_queue_req(struct skcipher_request *req, struct mv_cesa_skcipher_req *creq = skcipher_request_ctx(req); struct mv_cesa_engine *engine; + if (!req->cryptlen) + return 0; + ret = mv_cesa_skcipher_req_init(req, tmpl); if (ret) return ret;