Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4861960imu; Sat, 19 Jan 2019 21:17:14 -0800 (PST) X-Google-Smtp-Source: ALg8bN5UrevUAd3klXB+cxrvWarPiEDBGZ1A9DItdIxt+4f3or2RTyKysZWJ0WPCIZuSqBY/8eyD X-Received: by 2002:a17:902:e18d:: with SMTP id cd13mr25144659plb.262.1547961434198; Sat, 19 Jan 2019 21:17:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547961434; cv=none; d=google.com; s=arc-20160816; b=T8t2rgNWTFGHyo4yF+zebhYu0uwhEw+aUpaP0DCMcMtOb7FLpvXDLGC2aunnp0afTE wmXerxQ/+vZ3nOhMqJzFw04/E2o/aar/QqMfdinId2OURQBaMY73myAYnQbvu7Te+x3g xtmXpHbAqdTIbjDK0SBp9kfsDCz7VdpjHQvJqLoHc7IAZ2XdBfT1niKtgnq6z6k9O8q6 bcHM33EOEc+RSGsLlagneN0A9wQ6SzaqyumaA0/h8BcyktbA7swJ4Bc3kevbMNAqo1RC B7LbV2LCbUW5bdiB1p/lt9ZHiNn8zHJjlXMPz1542SIBewqQ5fREkNzCB0aAyOTBBCKy HaaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=m3OHw0W0qjEJzlP1kwai++CFSD6kmdhsJAGOKQvl4Nk=; b=ZXb3RYHjWVAl6tV92hDXd2gHvFitpAVW8Zce6ckTC8SaKU4WqpC//noGwoDUD7wuQo c9b/4H6Sj3gCMa1rTbe2BJ9Nh3ghCDxXd+Sh6tbyJ2Bw1kKYNqvoNaRzUOzQAKW9Xz5K EQxZN/gC6w0Ss8I5a516SVi/dAzZIRnXj8cpHY65/3Xpiz7lyGW3sqUDF6p0xzJ2e5F3 DEPGDC6wqDMiBVEWCwzaRKDe4YWvUzgj7Ttw+PzN36qgnTA2z5+6woHuREGxF+GKDMYM 5U+cCbAIGz7VCaJMnobJCvZvW8CrcpNqfxZ+pHe9lbwpXHPqcgI4iHyx9bR+6EsX6Cv2 dBtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IcqByOJa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p12si8017523plk.77.2019.01.19.21.16.58; Sat, 19 Jan 2019 21:17:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IcqByOJa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726136AbfATFPj (ORCPT + 99 others); Sun, 20 Jan 2019 00:15:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:51250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725923AbfATFPj (ORCPT ); Sun, 20 Jan 2019 00:15:39 -0500 Received: from localhost (unknown [122.178.235.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2C31A2084A; Sun, 20 Jan 2019 05:15:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547961338; bh=N3Safwsq+5lbAEx2AAtM926+JbI8/1L3k+2+SjSdlRQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IcqByOJaOaVdPFdHIUhnzL/6haJ+DbXvohLQoZTIoeJ1nzjuhkA3sfTaNrPG3aSlH eHQ1GN7Xxb5D6q0b+r8cXdkyEBL00rAGzpeP0zJgsolGWOVYDHsHGuOh10TC3JHlo9 zBkTh+xcscbXfsfXH2rdGgbFybfr2Po0AR+TiYaA= Date: Sun, 20 Jan 2019 10:44:05 +0530 From: Vinod Koul To: Shunyong Yang Cc: okaya@kernel.org, andy.gross@linaro.org, david.brown@linaro.org, dan.j.williams@intel.com, dmaengine@vger.kernel.org, linux-kernel@vger.kernel.org, Joey Zheng Subject: Re: [PATCH v2 1/2] dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_* Message-ID: <20190120051405.GI4635@vkoul-mobl> References: <8109d1ab70fe6dbacdbe89fda38d8dcb450c884c.1546823811.git.shunyong.yang@hxt-semitech.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8109d1ab70fe6dbacdbe89fda38d8dcb450c884c.1546823811.git.shunyong.yang@hxt-semitech.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07-01-19, 09:32, Shunyong Yang wrote: > In async_tx_test_ack(), it uses flags in struct dma_async_tx_descriptor > to check the ACK status. As hidma reuses the descriptor in a free list > when hidma_prep_dma_*(memcpy/memset) is called, the flag will keep ACKed > if the descriptor has been used before. This will cause a BUG_ON in > async_tx_quiesce(). > > kernel BUG at crypto/async_tx/async_tx.c:282! > Internal error: Oops - BUG: 0 1 SMP > ... > task: ffff8017dd3ec000 task.stack: ffff8017dd3e8000 > PC is at async_tx_quiesce+0x54/0x78 [async_tx] > LR is at async_trigger_callback+0x98/0x110 [async_tx] > > This patch initializes flags in dma_async_tx_descriptor by the flags > passed from the caller when hidma_prep_dma_*(memcpy/memset) is called. Applied both, thanks -- ~Vinod