Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2248536ybd; Mon, 24 Jun 2019 03:16:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqxBfUTyqUp+zt4ZfGobAoq4mFnw//Dct//jgpFYzrWWfT7FtxLPU7DFCwFRC1+tEyqnp8R9 X-Received: by 2002:a17:90a:7d04:: with SMTP id g4mr24102751pjl.41.1561371385272; Mon, 24 Jun 2019 03:16:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561371385; cv=none; d=google.com; s=arc-20160816; b=gI/yEqdbD84L93Vclf++CjH6rNjfZ1WcBH/gJJAAnE6srEc2QcJpxMw9wVWUHPOHXh g5pDjph0lxdvN4aedCH5H5tOALa5QCQBtsVjJZinU8571YrqdROFvBPS0HO15Ol3dTJr 7YIUjhUD4k4Og7Tm2WPePZCkrI5xfFpEEfuDqRyCFeVwhBLvgv6pN4WwxDJP9TyRRdUd yceSm+2xlvHFF9suFxi4Y8ILChY/PUG1kpiPbffcIe6PT+2OwzLbRqjZ0H0t+4XJY6tZ bWWmioY3j/KrrPTb2SUmgsW5DfdGNT3kLxtYyuFnDT0hBsGBupvemfpOR5/3SVkgnR2K JhNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FthGq98gIpBuYF0gK1IqX6A1tlgDSTnEw6eH653vKV0=; b=yMbC3CEtldpfXT1ASbQMpFPreM+U7AqAhSxf7y3JTBWVP593mrpluX7FRQAubfSOHz uAuyUtJABgJpcVCeJzBCyEUHaiAL211rOOwCU+GAFM+s4RZ5DGnoOUs1tGGzS7ANpSzK SNBsv7LtpH7r6AJ6omlH8fJrhGpgWEGhLwtwxLYxEyBeSCOmupHwwSTqjJgdcvcZZWxA tOEopelbhOQSMLxNfFkVyWO33n1pLlF4d6uoNUMXYYSdQB0+fjqSEaKGHsLRY2sXc3t1 RZpF9v7Mlq8gpCJ0QQZqidveS+if7d+nS7dUic+iaWtL2o9y6z1Hbex/ZUDfLgS0HKsS kUeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Tups/nlv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h19si1822965pgm.379.2019.06.24.03.16.09; Mon, 24 Jun 2019 03:16:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Tups/nlv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729567AbfFXKDv (ORCPT + 99 others); Mon, 24 Jun 2019 06:03:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:35138 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728730AbfFXKDt (ORCPT ); Mon, 24 Jun 2019 06:03:49 -0400 Received: from localhost (f4.8f.5177.ip4.static.sl-reverse.com [119.81.143.244]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3D012208E3; Mon, 24 Jun 2019 10:03:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561370628; bh=TGBsQJwB/9SZ4dCxM9rwwKRyxINEMNBpivPmqFGJXCU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Tups/nlvmHyd5UX6sCP3yD478I1G1u5ljnk9maHiCCc6wGLDuebhW2e9YQx+giHUO 35lhDtROw+A7IwMaqcb9co2UEeLAnOGUTTP7aJj6MNmUH3LZdhMJwRLZpMlENAMqao cUAbTJ3MoTuFzkG7D4n69q/8zyeS21qfnQUafA+A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Long , Baolin Wang , Vinod Koul , Sasha Levin Subject: [PATCH 4.19 32/90] dmaengine: sprd: Fix block length overflow Date: Mon, 24 Jun 2019 17:56:22 +0800 Message-Id: <20190624092316.417766707@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190624092313.788773607@linuxfoundation.org> References: <20190624092313.788773607@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 89d03b3c126d683f7b2cd5b07178493993d12448 ] The maximum value of block length is 0xffff, so if the configured transfer length is more than 0xffff, that will cause block length overflow to lead a configuration error. Thus we can set block length as the maximum burst length to avoid this issue, since the maximum burst length will not be a big value which is more than 0xffff. Signed-off-by: Eric Long Signed-off-by: Baolin Wang Signed-off-by: Vinod Koul Signed-off-by: Sasha Levin --- drivers/dma/sprd-dma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/dma/sprd-dma.c b/drivers/dma/sprd-dma.c index 55df0d41355b..1ed1c7efa288 100644 --- a/drivers/dma/sprd-dma.c +++ b/drivers/dma/sprd-dma.c @@ -663,7 +663,7 @@ static int sprd_dma_fill_desc(struct dma_chan *chan, temp |= slave_cfg->src_maxburst & SPRD_DMA_FRG_LEN_MASK; hw->frg_len = temp; - hw->blk_len = len & SPRD_DMA_BLK_LEN_MASK; + hw->blk_len = slave_cfg->src_maxburst & SPRD_DMA_BLK_LEN_MASK; hw->trsc_len = len & SPRD_DMA_TRSC_LEN_MASK; temp = (dst_step & SPRD_DMA_TRSF_STEP_MASK) << SPRD_DMA_DEST_TRSF_STEP_OFFSET; -- 2.20.1