diff options
author | Shunyong Yang <shunyong.yang@hxt-semitech.com> | 2019-01-07 09:32:14 +0800 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-04-05 22:34:50 +0200 |
commit | d7e6e93b95f2ba9f328f1976c4ada11548eb15fa (patch) | |
tree | 8338329dd433bba5f3521da1ccfe88bd5cbd223c /security/selinux/hooks.c | |
parent | 1bac8b82d95cfe1d43fc30236f99da224ceccc2a (diff) | |
download | talos-obmc-linux-d7e6e93b95f2ba9f328f1976c4ada11548eb15fa.tar.gz talos-obmc-linux-d7e6e93b95f2ba9f328f1976c4ada11548eb15fa.zip |
dmaengine: qcom_hidma: initialize tx flags in hidma_prep_dma_*
[ Upstream commit 875aac8a46424e5b73a9ff7f40b83311b609e407 ]
In async_tx_test_ack(), it uses flags in struct dma_async_tx_descriptor
to check the ACK status. As hidma reuses the descriptor in a free list
when hidma_prep_dma_*(memcpy/memset) is called, the flag will keep ACKed
if the descriptor has been used before. This will cause a BUG_ON in
async_tx_quiesce().
kernel BUG at crypto/async_tx/async_tx.c:282!
Internal error: Oops - BUG: 0 1 SMP
...
task: ffff8017dd3ec000 task.stack: ffff8017dd3e8000
PC is at async_tx_quiesce+0x54/0x78 [async_tx]
LR is at async_trigger_callback+0x98/0x110 [async_tx]
This patch initializes flags in dma_async_tx_descriptor by the flags
passed from the caller when hidma_prep_dma_*(memcpy/memset) is called.
Cc: Joey Zheng <yu.zheng@hxt-semitech.com>
Reviewed-by: Sinan Kaya <okaya@kernel.org>
Signed-off-by: Shunyong Yang <shunyong.yang@hxt-semitech.com>
Signed-off-by: Vinod Koul <vkoul@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions