Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3053305imu; Sun, 6 Jan 2019 17:36:55 -0800 (PST) X-Google-Smtp-Source: ALg8bN54ip6P2v24ZJGq9l3PM++poKtEAlYBnPMfoFQuYfSgRMpKML+671mIvEjWegyKbuMW6SOT X-Received: by 2002:aa7:84d3:: with SMTP id x19mr60826555pfn.220.1546825015177; Sun, 06 Jan 2019 17:36:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546825015; cv=none; d=google.com; s=arc-20160816; b=Frj1xImB4qnYvoEeJKD2cGjad6QMUu21lD636W19esDpdbA5/9kkkMvSvYDE8YXH6s vCn+nkD1YUrYkR/yKS++QeTtK7ovj0k7b71Ko+JvgGnNwMrn0GdmAhg8urmunvUd5hIx RCF9hdCXgSQ0ncP18v/WvwTbuaVvGvboYJ79+AQd7yjXkhAe6t/8C/VbKsd6AZcUd7IL /E91XAYLAvpLOUVXAcVHGqQGqNk8y+ZzmljkU2YekDCFv4Oa0rn8za/LCY4awzUPNPUl +YwptmwYiEZrnYr+aPdvMHcmnkOPlorRYjaOyeamyUsXPa3fDwCd0o8bX4VSThFwQ2wW LJDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=y2YvgzX8EM6Q7ynoDfHjAV6dpJsP9G824/UK/KkQS4g=; b=Tn1swP98GkrLjhVc/pICmdA7AYj8eGXd+nYKTN6bM3yZY56FDG+qBNHqyeTwEHZWIk TVvzT/ZLWQDJT7wZfm1fzeZiSZTWNrEosA6GrUaHsOJAiYwS7dLGUiQDFSQlt4czL2jP ausTenhgp3U/hRX5bih2+i/Zpn8rdok2FwsyzWXNUPf9vyYduPeT8YoIUOCwWh4avL+D t4rFtpqAs14ABYrQTkBW285IJCQnJ/gw1fFQwFQKE5n4PaXQhBelXtCFhW3HgiPkJT0a qNNdsEwB/us4Eq11i81fp2U64TCNW/wRYMfMubO9t1KN5lZy1T1GoY/U5oE84TRGcEcT bfvQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x32si34206258pgk.309.2019.01.06.17.36.40; Sun, 06 Jan 2019 17:36:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726227AbfAGBeD (ORCPT + 99 others); Sun, 6 Jan 2019 20:34:03 -0500 Received: from mx01.hxt-semitech.com ([223.203.96.7]:50947 "EHLO barracuda.hxt-semitech.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726163AbfAGBeD (ORCPT ); Sun, 6 Jan 2019 20:34:03 -0500 X-ASG-Debug-ID: 1546824836-093b7e2d88461f0001-xx1T2L Received: from HXTBJIDCEMVIW02.hxtcorp.net ([10.128.0.15]) by barracuda.hxt-semitech.com with ESMTP id nWtwUO3HFt2XpM8S (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Mon, 07 Jan 2019 09:33:56 +0800 (CST) X-Barracuda-Envelope-From: shunyong.yang@hxt-semitech.com Received: from y.localdomain (10.5.21.109) by HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 7 Jan 2019 09:33:51 +0800 From: Shunyong Yang To: CC: , , , , , , Shunyong Yang , Joey Zheng Subject: [PATCH v2 1/2] dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_* Date: Mon, 7 Jan 2019 09:32:14 +0800 X-ASG-Orig-Subj: [PATCH v2 1/2] dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_* Message-ID: <8109d1ab70fe6dbacdbe89fda38d8dcb450c884c.1546823811.git.shunyong.yang@hxt-semitech.com> X-Mailer: git-send-email 1.8.3.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.5.21.109] X-ClientProxiedBy: HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) To HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) X-Barracuda-Connect: UNKNOWN[10.128.0.15] X-Barracuda-Start-Time: 1546824836 X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384 X-Barracuda-URL: https://192.168.50.101:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hxt-semitech.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Bayes: INNOCENT GLOBAL 0.5309 1.0000 0.7500 X-Barracuda-Spam-Score: 0.75 X-Barracuda-Spam-Status: No, SCORE=0.75 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.65247 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In async_tx_test_ack(), it uses flags in struct dma_async_tx_descriptor to check the ACK status. As hidma reuses the descriptor in a free list when hidma_prep_dma_*(memcpy/memset) is called, the flag will keep ACKed if the descriptor has been used before. This will cause a BUG_ON in async_tx_quiesce(). kernel BUG at crypto/async_tx/async_tx.c:282! Internal error: Oops - BUG: 0 1 SMP ... task: ffff8017dd3ec000 task.stack: ffff8017dd3e8000 PC is at async_tx_quiesce+0x54/0x78 [async_tx] LR is at async_trigger_callback+0x98/0x110 [async_tx] This patch initializes flags in dma_async_tx_descriptor by the flags passed from the caller when hidma_prep_dma_*(memcpy/memset) is called. Cc: Joey Zheng Reviewed-by: Sinan Kaya Signed-off-by: Shunyong Yang --- v2: add Reviewed-by: Sinan Kaya --- drivers/dma/qcom/hidma.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/dma/qcom/hidma.c b/drivers/dma/qcom/hidma.c index 43d4b00b8138..9d639ed1955a 100644 --- a/drivers/dma/qcom/hidma.c +++ b/drivers/dma/qcom/hidma.c @@ -415,6 +415,7 @@ static int hidma_alloc_chan_resources(struct dma_chan *dmach) if (!mdesc) return NULL; + mdesc->desc.flags = flags; hidma_ll_set_transfer_params(mdma->lldev, mdesc->tre_ch, src, dest, len, flags, HIDMA_TRE_MEMCPY); @@ -447,6 +448,7 @@ static int hidma_alloc_chan_resources(struct dma_chan *dmach) if (!mdesc) return NULL; + mdesc->desc.flags = flags; hidma_ll_set_transfer_params(mdma->lldev, mdesc->tre_ch, value, dest, len, flags, HIDMA_TRE_MEMSET); -- 1.8.3.1