diff options
author | Shunyong Yang <shunyong.yang@hxt-semitech.com> | 2019-01-07 09:32:14 +0800 |
---|---|---|
committer | Vinod Koul <vkoul@kernel.org> | 2019-01-20 10:43:34 +0530 |
commit | 875aac8a46424e5b73a9ff7f40b83311b609e407 (patch) | |
tree | 79e6d49561b4f5b8a8749f19204114bdfd29f27f /drivers/uwb/i1480 | |
parent | edd3c389999678ddff93e72d04368ed576bf36f8 (diff) | |
download | linux-875aac8a46424e5b73a9ff7f40b83311b609e407.tar.bz2 |
dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_*
In async_tx_test_ack(), it uses flags in struct dma_async_tx_descriptor
to check the ACK status. As hidma reuses the descriptor in a free list
when hidma_prep_dma_*(memcpy/memset) is called, the flag will keep ACKed
if the descriptor has been used before. This will cause a BUG_ON in
async_tx_quiesce().
kernel BUG at crypto/async_tx/async_tx.c:282!
Internal error: Oops - BUG: 0 1 SMP
...
task: ffff8017dd3ec000 task.stack: ffff8017dd3e8000
PC is at async_tx_quiesce+0x54/0x78 [async_tx]
LR is at async_trigger_callback+0x98/0x110 [async_tx]
This patch initializes flags in dma_async_tx_descriptor by the flags
passed from the caller when hidma_prep_dma_*(memcpy/memset) is called.
Cc: Joey Zheng <yu.zheng@hxt-semitech.com>
Reviewed-by: Sinan Kaya <okaya@kernel.org>
Signed-off-by: Shunyong Yang <shunyong.yang@hxt-semitech.com>
Signed-off-by: Vinod Koul <vkoul@kernel.org>
Diffstat (limited to 'drivers/uwb/i1480')
0 files changed, 0 insertions, 0 deletions