Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp110570pxb; Mon, 13 Sep 2021 14:23:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy52vUv7xZ1ZowqsLo0TR3Drtkh4/xn9qAbKBA8M7UbZw83dtQbhSwdZHfrYuZTWr9U6QX2 X-Received: by 2002:a5e:da44:: with SMTP id o4mr10384945iop.147.1631568233450; Mon, 13 Sep 2021 14:23:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631568233; cv=none; d=google.com; s=arc-20160816; b=TKWIia+fw68HRDYI+M8Wrn3VLbN2sW3YkmAJwzwO3ZClBidCwHjVS6IO20yjbr44xt LDOY0uO9douRQvoxUCxkCXo8Fwqu40PZvf4E3DaIMN7l92/a/yxbnYmbMktev6puDzbi 1w4vsnHRf4ygGc6nVOXSOTTUIeVDbcydQm5un1DCEC0CPd7QTKmufnbO9cm4r62xZ25x 1+H55Zod6rNEp85qd0WYlkvJX3pekeAQddaLvmsjv50pI3i7I5qdG/gPWwDRLcZfjATn OCM9LEyrQkpBC+QVmL1ohONfBY6/UvBn/au4GZbjaLBh8mrPT2e67LhwEDObuulzDLjs 8zXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NNui1pth2f0jo1KSPt0yt+7Uta9XCfZCYoTU3qMyVqY=; b=RfaEphiBIUt2tTrSQp7HQrmbVGIlrtsdmtDOoAo0vqZpidRfjKokTq//s3sxUio0Pv 1RV+doGA0k3jPoa0nnXop+SuOyBNIkD01DOCbmrfLXKk0vkhAOC1bMs2JVLVML2YebKs ltLSJAnujFu3Cps223H8OeBjn+Kfkvbf+f8Z+hHITjRxFzNyej7ZQwTe2h1xl4PiQEpB xviYWY3qxzhW08CLkMugaqWtrRUMxYyd22BoTNGpR5Jj6b5/Ua1fCmpbEndmNTNdxFm5 am6w9nQsLyToqjC/hgygUBWmaAsc23LtTVuFZKwQG40+nlYLb8unxKUWJ83Pb6dsPjNj 94mw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c715RtvL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y20si7790708ilc.24.2021.09.13.14.23.41; Mon, 13 Sep 2021 14:23:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c715RtvL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245186AbhIMNyS (ORCPT + 99 others); Mon, 13 Sep 2021 09:54:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:34858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244893AbhIMNu5 (ORCPT ); Mon, 13 Sep 2021 09:50:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 80F4161374; Mon, 13 Sep 2021 13:33:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540035; bh=DFAVZxXRAa+D3V546z9wILqrJwBcG36WPT1TXdpcMBY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c715RtvLwKSer8sTWvooO99VTGoMsQRb6frG3rgmLgU5Uj/Dh5zLUJM8lD1ccT8yE l6iygCZI99fdBzuxN8CWTafh2zTON4uxSYXxM9xqpPmAWJGn2x8TnnDtFEBGW1deYx 7yuN+uf22ksoOSEhGXh5mOaXbt2qPBbcRqSYwFjs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lokesh Vutla , Tero Kristo , Tony Lindgren , Herbert Xu , Sasha Levin Subject: [PATCH 5.13 007/300] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop() Date: Mon, 13 Sep 2021 15:11:08 +0200 Message-Id: <20210913131109.535255325@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131109.253835823@linuxfoundation.org> References: <20210913131109.253835823@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tony Lindgren [ Upstream commit fe28140b3393b0ba1eb95cc109f974a7e58b26fd ] We should not clear FLAGS_DMA_ACTIVE before omap_sham_update_dma_stop() is done calling dma_unmap_sg(). We already clear FLAGS_DMA_ACTIVE at the end of omap_sham_update_dma_stop(). The early clearing of FLAGS_DMA_ACTIVE is not causing issues as we do not need to defer anything based on FLAGS_DMA_ACTIVE currently. So this can be applied as clean-up. Cc: Lokesh Vutla Cc: Tero Kristo Signed-off-by: Tony Lindgren Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/omap-sham.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/omap-sham.c b/drivers/crypto/omap-sham.c index dd53ad9987b0..a47ac60a4ee1 100644 --- a/drivers/crypto/omap-sham.c +++ b/drivers/crypto/omap-sham.c @@ -1736,7 +1736,7 @@ static void omap_sham_done_task(unsigned long data) if (test_and_clear_bit(FLAGS_OUTPUT_READY, &dd->flags)) goto finish; } else if (test_bit(FLAGS_DMA_READY, &dd->flags)) { - if (test_and_clear_bit(FLAGS_DMA_ACTIVE, &dd->flags)) { + if (test_bit(FLAGS_DMA_ACTIVE, &dd->flags)) { omap_sham_update_dma_stop(dd); if (dd->err) { err = dd->err; -- 2.30.2