From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from verein.lst.de ([213.95.11.211]:47449 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728714AbeLSOlG (ORCPT ); Wed, 19 Dec 2018 09:41:06 -0500 Date: Wed, 19 Dec 2018 15:41:05 +0100 From: Christoph Hellwig To: Horia =?utf-8?Q?Geant=C4=83?= Cc: Herbert Xu , "David S. Miller" , Aymen Sghaier , Christoph Hellwig , linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-imx@nxp.com Subject: Re: [PATCH] crypto: caam - fix zero-length buffer DMA mapping Message-ID: <20181219144105.GA23389@lst.de> References: <20181219143644.22089-1-horia.geanta@nxp.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181219143644.22089-1-horia.geanta@nxp.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: Yes, we should never do zero-length dma mappings, so this looks good: Reviewed-by: Christoph Hellwig