Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752724AbbFPDmw (ORCPT ); Mon, 15 Jun 2015 23:42:52 -0400 Received: from mail-bn1bbn0104.outbound.protection.outlook.com ([157.56.111.104]:51567 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751120AbbFPDmp convert rfc822-to-8bit (ORCPT ); Mon, 15 Jun 2015 23:42:45 -0400 From: Victoria Milhoan To: Herbert Xu , Steffen Trumtrar CC: "linux-kernel@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "linux-crypto@vger.kernel.org" , Ruchika Gupta , "kernel@pengutronix.de" , Geanta Neag Horia , Kim Phillips Subject: RE: [BUG?] crypto: caam: little/big endianness on ARM vs PPC Thread-Topic: [BUG?] crypto: caam: little/big endianness on ARM vs PPC Thread-Index: AQHQp4Q+kwP2iYCsTUSf4YJ09wO/X52uH6MAgABZwVA= Date: Tue, 16 Jun 2015 03:27:54 +0000 Message-ID: References: <20150615155907.GC7947@pengutronix.de> <20150615220506.GA15134@gondor.apana.org.au> In-Reply-To: <20150615220506.GA15134@gondor.apana.org.au> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: gondor.apana.org.au; dkim=none (message not signed) header.d=none; x-originating-ip: [192.88.158.1] x-microsoft-exchange-diagnostics: 1;BLUPR03MB392;5:+MBzvGnfxD22FW49UF1opyoH5SFJ2gvnffIeSiTqwsYUItmaxcPYAcO8XMZbC4h5LqlBFN3H33I8sDAuw27VMRcBAY2HNW5ZDPPuKNTO2iqyyo6xzmq+RXZk7UfFEhEmdv63gOViW9yRpYu/T6ghrA==;24:LMCMdLXypkHSlqjaV3d3g7kM8NbISU90V94/KSDHUDbEEx/yrjRYPKjn/1Z5YNiyqExN039/OT+32Tk0rYQ63tXPrTf0K5UbsraC0mzBfMs=;20:F8lNH51yZhL9/CfI3cN6OF5yEiC5MyWF4vxaXGN99SNtHnjVX6/WNTnvC4fA+HHchlmnghFOzLjMeF7QZ2GR0g== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(42134001)(42139001);SRVR:BLUPR03MB392; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(601004)(5005006)(3002001);SRVR:BLUPR03MB392;BCL:0;PCL:0;RULEID:;SRVR:BLUPR03MB392; x-forefront-prvs: 06098A2863 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(76104003)(13464003)(24454002)(164054003)(51704005)(377454003)(54356999)(76176999)(77156002)(19580405001)(33656002)(50986999)(87936001)(2900100001)(122556002)(40100003)(5001770100001)(19580395003)(62966003)(86362001)(2950100001)(5002640100001)(5003600100002)(46102003)(74316001)(102836002)(15975445007)(106116001)(66066001)(76576001)(2656002)(77096005)(5001960100002)(92566002)(189998001)(107886002)(4001430100001)(422495003);DIR:OUT;SFP:1102;SCL:1;SRVR:BLUPR03MB392;H:BLUPR03MB391.namprd03.prod.outlook.com;FPR:;SPF:None;MLV:sfv;LANG:en; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jun 2015 03:27:54.6072 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 710a03f5-10f6-4d38-9ff4-a80b81da590d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR03MB392 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3453 Lines: 76 All, Freescale has been adding i.MX6 support to the CAAM driver and testing on both i.MX6 and QorIQ platforms. The patch series is now available for review. Your feedback for the provided patches is appreciated. Thanks, Victoria -----Original Message----- From: linux-crypto-owner@vger.kernel.org [mailto:linux-crypto-owner@vger.kernel.org] On Behalf Of Herbert Xu Sent: Monday, June 15, 2015 3:05 PM To: Steffen Trumtrar Cc: linux-kernel@vger.kernel.org; linux-arm-kernel@lists.infradead.org; linux-crypto@vger.kernel.org; Gupta Ruchika-R66431; kernel@pengutronix.de; Geanta Neag Horia Ioan-B05471; Kim Phillips Subject: Re: [BUG?] crypto: caam: little/big endianness on ARM vs PPC On Mon, Jun 15, 2015 at 05:59:07PM +0200, Steffen Trumtrar wrote: > Hi! > > I'm working on CAAM support for the ARM-based i.MX6 SoCs. The current > drivers/crypto/caam driver only works for PowerPC AFAIK. > Actually, there isn't that much to do, to get support for the i.MX6 > but one patch breaks the driver severely: > > commit ef94b1d834aace7101de77c3a7c2631b9ae9c5f6 > crypto: caam - Add definition of rd/wr_reg64 for little endian > platform > > This patch adds > > +#ifdef __LITTLE_ENDIAN > +static inline void wr_reg64(u64 __iomem *reg, u64 data) { > + wr_reg32((u32 __iomem *)reg + 1, (data & 0xffffffff00000000ull) >> 32); > + wr_reg32((u32 __iomem *)reg, data & 0x00000000ffffffffull); } > > The wr_reg64 function is only used in one place in the > drivers/crypto/caam/jr.c > driver: to write the dma_addr_t to the register. Without that patch > everything works fine on ARM (little endian, 32bit), with that patch > the driver will write 0's into the register that holds the DMA address (the numerically-higher) -> kernel hangs. > Also, from my understanding, the comment above the defines, stating > that you have to first write the numerically-lower and then the > numerically-higher address on 32bit systems doesn't match with the implementation. > > What I don't know/understand is if this makes any sense for any PowerPC implementation. > > So, the question is, how to fix this? I'd prefer to do it directly in > the jr driver instead of the ifdef-ery. > > Something like > if (sizeof(dma_addr_t) == sizeof(u32)) > wr_reg32(&jrp->rregs->inpring_base + 1, inpbusaddr); > else if (sizeof(dma_addr_t) == sizeof(u64)) > wr_reg64(...) > > or just go by DT compatible and then remove the inline function definitions. > > As far as I can tell, the compatible wouldn't be needed for anything > else in the jr driver, so maybe that is not optimal. On the other hand > the sizeof(..) solution would only catch little endian on 32bit and > not big endian (?!) I however don't know what combinations actually > *have* to be caught, as I don't know, which exist. > > So, what do you think people? I'm adding a couple of CCs. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/