Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp108524imu; Thu, 6 Dec 2018 20:30:42 -0800 (PST) X-Google-Smtp-Source: AFSGD/V6W/wKlCSBjM5R8GDs19Qo9x7MG+tqs8Fx1Q7K8dEEOvN+8rjxJzacmk1zGFkP3b9T9gpR X-Received: by 2002:a63:5d55:: with SMTP id o21mr673626pgm.92.1544157042554; Thu, 06 Dec 2018 20:30:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544157042; cv=none; d=google.com; s=arc-20160816; b=MkEA/9AHUzRB/fXrGO7BBS1HBdhlbk+V5+3LmlRtUZC1U+hwekyBs3r8Pe6PnD71GA BNEliPwDxoezrm7y8WECjrsHn6FippTciuLj32Y3Uno4Ji+A9PEsFMVZ/mYtRMH8sf4k whhSZcWkYnJqM7ZNFjGT4DQMzd2M2JDaPZXb0UaEQVkn+Z0hEvKjSmquakszLZ4+UxI2 JiJoUk+OkVYSCLU91pFnLOI2Aqb3nUsS1e+g7o+XUsCdnVdTlSBJ5xt+c//+ulgbHUnx 23x0B/fIMJSzUsYzsKJVGLM0mdkF9KU0h8cRZPmhuRL4YsH6w53/DZwBLFWX0p4DZMpR bgAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=CRIUBtU9UlHEQQL0+GX4+bnfaew3On5R3+sytcB1aZE=; b=a2gUn3Wt5nVeaVG8a+wmevLsjr98uAS/twk5yyDo50QyCdSvzrk59asEfZOwCr+7RI fkUF94BbbyqUItqSUjci7WCM2quHWopgWOVpNRDB/IxRDJWgxNmuiHO/+7vJmHccwwN2 zSiVoAiWBgJ30v8zq5mmxRd/ZAtZfY/mdFQ+BgxgeVa/FWdxcG0wgnathOGjUPXneWbS jxxzofYZTxAshJsvQr88sLSJkIn4LqvKY+uf9wCrz9+UdRHBNJSmZTABp+ihc3VQQ6jf oeWK3CBbPtOkM1ikC+u4DPMJ70zSwfSC7e46pUCVVsv5yDRmcbC9qY3lxvSXD3z0gLWL g36A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n28si2184149pfb.88.2018.12.06.20.30.16; Thu, 06 Dec 2018 20:30:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725989AbeLGE3R (ORCPT + 99 others); Thu, 6 Dec 2018 23:29:17 -0500 Received: from mx01.hxt-semitech.com ([223.203.96.7]:56093 "EHLO barracuda.hxt-semitech.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725939AbeLGE3Q (ORCPT ); Thu, 6 Dec 2018 23:29:16 -0500 X-ASG-Debug-ID: 1544156944-093b7e716200aa0001-xx1T2L Received: from HXTBJIDCEMVIW02.hxtcorp.net ([10.128.0.15]) by barracuda.hxt-semitech.com with ESMTP id O304JibF04MvZMck (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Fri, 07 Dec 2018 12:29:04 +0800 (CST) X-Barracuda-Envelope-From: shunyong.yang@hxt-semitech.com Received: from y.localdomain (10.5.21.109) by HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 7 Dec 2018 12:28:14 +0800 From: Shunyong Yang To: CC: , , , , , , Shunyong Yang , Joey Zheng Subject: [PATCH 1/2] dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_* Date: Fri, 7 Dec 2018 12:28:56 +0800 X-ASG-Orig-Subj: [PATCH 1/2] dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_* Message-ID: <81c9fe2de4b5dac1d5b974f5305e35bf1cf5d127.1544156508.git.shunyong.yang@hxt-semitech.com> X-Mailer: git-send-email 1.8.3.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.5.21.109] X-ClientProxiedBy: HXTBJIDCEMVIW01.hxtcorp.net (10.128.0.14) To HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) X-Barracuda-Connect: UNKNOWN[10.128.0.15] X-Barracuda-Start-Time: 1544156944 X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384 X-Barracuda-URL: https://192.168.50.101:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hxt-semitech.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Bayes: INNOCENT GLOBAL 0.7368 1.0000 1.6611 X-Barracuda-Spam-Score: 1.66 X-Barracuda-Spam-Status: No, SCORE=1.66 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.63225 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In async_tx_test_ack(), it uses flags in struct dma_async_tx_descriptor to check the ACK status. As hidma reuses the descriptor in a free list when hidma_prep_dma_*(memcpy/memset) is called, the flag will keep ACKed if the descriptor has been used before. This will cause a BUG_ON in async_tx_quiesce(). kernel BUG at crypto/async_tx/async_tx.c:282! Internal error: Oops - BUG: 0 1 SMP ... task: ffff8017dd3ec000 task.stack: ffff8017dd3e8000 PC is at async_tx_quiesce+0x54/0x78 [async_tx] LR is at async_trigger_callback+0x98/0x110 [async_tx] This patch initializes flags in dma_async_tx_descriptor by the flags passed from the caller when hidma_prep_dma_*(memcpy/memset) is called. Cc: Joey Zheng Signed-off-by: Shunyong Yang --- drivers/dma/qcom/hidma.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/dma/qcom/hidma.c b/drivers/dma/qcom/hidma.c index 43d4b00b8138..9d639ed1955a 100644 --- a/drivers/dma/qcom/hidma.c +++ b/drivers/dma/qcom/hidma.c @@ -415,6 +415,7 @@ static int hidma_alloc_chan_resources(struct dma_chan *dmach) if (!mdesc) return NULL; + mdesc->desc.flags = flags; hidma_ll_set_transfer_params(mdma->lldev, mdesc->tre_ch, src, dest, len, flags, HIDMA_TRE_MEMCPY); @@ -447,6 +448,7 @@ static int hidma_alloc_chan_resources(struct dma_chan *dmach) if (!mdesc) return NULL; + mdesc->desc.flags = flags; hidma_ll_set_transfer_params(mdma->lldev, mdesc->tre_ch, value, dest, len, flags, HIDMA_TRE_MEMSET); -- 1.8.3.1