Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp273261yba; Mon, 20 May 2019 08:28:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqx8oSzp54vCM2EtFKMVph4gW8DF8spFT+dtzRXu7CmSg1KUJhSS0o2HCA2IJiqKfou6D/LG X-Received: by 2002:a17:902:446:: with SMTP id 64mr75916367ple.322.1558366125945; Mon, 20 May 2019 08:28:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558366125; cv=none; d=google.com; s=arc-20160816; b=GF1KhBQjkmBYCdfdcVWnIRoSm9Dc7t49b2b7P5sfW5pj4WWqECWJaQHzcF8ydNRUHl ymHE3km6Osy7LLvX/IAPZaA3pnC4gnAVuiH9pGlRAHJTyxmT6b5mbtw1ydAIuBOzh0Aq EtSsdU1Rb0Kwp1IMPRC1EQPbTStLl4UyKpoOIyVrXVaItscrJ6DIAOD34GhAObtU4EQ3 lxWbyyj2viK5GgeeZ0bZjwNqJCdwnMG3ACQJfkdM+46U9SV5bIUT3dnstyftse/HsmUg arDG3o6zbF3EHa7miRuDRTM36DGB7Qt2vDUt2oFpIIKwfRR03WY5q2WLOpTnyCnqCwpz VnBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=onXJrtrrFUifzA0xQhXttWqEYQmT6Qq2smkc+ZYSk0Y=; b=M0+/z7SDz0UclUIBdtbBPaPsGmTq3hVliifO1WWvKXPMljFZZc+ku4fxY2VkvvNtur D5e1MVVyT45mn2C7bhoux8FQeP85fTyWI47RaZGa2eTWHp129vtOMVg+FAs8PQ7MOK8M cmwJbVkXuQdPCITcwto5jqL4JyuiIWyoPAleHlXx7Oy1eJ9T46g5zzsNuNgCDf97m3x9 EjM20nYJrirAZMS91HvjiOrV4RXqHRtmOleTprnHeHi1LhuM5ofkpcE2INlwCDGr3rLq ULL+nO1eqhrazJO2Lrf/jL+8i7Tx77C/RZIYOc52tJRjq01cezYbTzZFKhj9mDeCHQKy S8lw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GrSDFbcQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n184si16053877pgn.574.2019.05.20.08.28.31; Mon, 20 May 2019 08:28:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GrSDFbcQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388452AbfETMWh (ORCPT + 99 others); Mon, 20 May 2019 08:22:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:36614 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388439AbfETMWe (ORCPT ); Mon, 20 May 2019 08:22:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7D29120675; Mon, 20 May 2019 12:22:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558354954; bh=/B/0EtqfRBrUENRKPP4M3U8Yy6d259wygfXGgcBSuao=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GrSDFbcQqpfNZmOE2thh60MLcaMmnmofsi/0/J67vUe5UfWTLWK2zoPLLbMbZyjCu RuWtJxQJikWlbQhrovDcxH0i/Zalk3qLb0mHjpyaT0DUiRGcgQuaGyNbEoZE0Dz35A pghHEsG9l/z+EtFG58glttVLUmhK65dMKLyUacLg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Curtis Malainey , Ben Zhang , Mark Brown Subject: [PATCH 4.19 040/105] ASoC: RT5677-SPI: Disable 16Bit SPI Transfers Date: Mon, 20 May 2019 14:13:46 +0200 Message-Id: <20190520115249.797162351@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190520115247.060821231@linuxfoundation.org> References: <20190520115247.060821231@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Curtis Malainey commit a46eb523220e242affb9a6bc9bb8efc05f4f7459 upstream. The current algorithm allows 3 types of transfers, 16bit, 32bit and burst. According to Realtek, 16bit transfers have a special restriction in that it is restricted to the memory region of 0x18020000 ~ 0x18021000. This region is the memory location of the I2C registers. The current algorithm does not uphold this restriction and therefore fails to complete writes. Since this has been broken for some time it likely no one is using it. Better to simply disable the 16 bit writes. This will allow users to properly load firmware over SPI without data corruption. Signed-off-by: Curtis Malainey Reviewed-by: Ben Zhang Signed-off-by: Mark Brown Cc: stable@vger.kernel.org Signed-off-by: Greg Kroah-Hartman --- sound/soc/codecs/rt5677-spi.c | 35 ++++++++++++++++------------------- 1 file changed, 16 insertions(+), 19 deletions(-) --- a/sound/soc/codecs/rt5677-spi.c +++ b/sound/soc/codecs/rt5677-spi.c @@ -58,13 +58,15 @@ static DEFINE_MUTEX(spi_mutex); * RT5677_SPI_READ/WRITE_32: Transfer 4 bytes * RT5677_SPI_READ/WRITE_BURST: Transfer any multiples of 8 bytes * - * For example, reading 260 bytes at 0x60030002 uses the following commands: - * 0x60030002 RT5677_SPI_READ_16 2 bytes + * Note: + * 16 Bit writes and reads are restricted to the address range + * 0x18020000 ~ 0x18021000 + * + * For example, reading 256 bytes at 0x60030004 uses the following commands: * 0x60030004 RT5677_SPI_READ_32 4 bytes * 0x60030008 RT5677_SPI_READ_BURST 240 bytes * 0x600300F8 RT5677_SPI_READ_BURST 8 bytes * 0x60030100 RT5677_SPI_READ_32 4 bytes - * 0x60030104 RT5677_SPI_READ_16 2 bytes * * Input: * @read: true for read commands; false for write commands @@ -79,15 +81,13 @@ static u8 rt5677_spi_select_cmd(bool rea { u8 cmd; - if (align == 2 || align == 6 || remain == 2) { - cmd = RT5677_SPI_READ_16; - *len = 2; - } else if (align == 4 || remain <= 6) { + if (align == 4 || remain <= 4) { cmd = RT5677_SPI_READ_32; *len = 4; } else { cmd = RT5677_SPI_READ_BURST; - *len = min_t(u32, remain & ~7, RT5677_SPI_BURST_LEN); + *len = (((remain - 1) >> 3) + 1) << 3; + *len = min_t(u32, *len, RT5677_SPI_BURST_LEN); } return read ? cmd : cmd + 1; } @@ -108,7 +108,7 @@ static void rt5677_spi_reverse(u8 *dst, } } -/* Read DSP address space using SPI. addr and len have to be 2-byte aligned. */ +/* Read DSP address space using SPI. addr and len have to be 4-byte aligned. */ int rt5677_spi_read(u32 addr, void *rxbuf, size_t len) { u32 offset; @@ -124,7 +124,7 @@ int rt5677_spi_read(u32 addr, void *rxbu if (!g_spi) return -ENODEV; - if ((addr & 1) || (len & 1)) { + if ((addr & 3) || (len & 3)) { dev_err(&g_spi->dev, "Bad read align 0x%x(%zu)\n", addr, len); return -EACCES; } @@ -159,13 +159,13 @@ int rt5677_spi_read(u32 addr, void *rxbu } EXPORT_SYMBOL_GPL(rt5677_spi_read); -/* Write DSP address space using SPI. addr has to be 2-byte aligned. - * If len is not 2-byte aligned, an extra byte of zero is written at the end +/* Write DSP address space using SPI. addr has to be 4-byte aligned. + * If len is not 4-byte aligned, then extra zeros are written at the end * as padding. */ int rt5677_spi_write(u32 addr, const void *txbuf, size_t len) { - u32 offset, len_with_pad = len; + u32 offset; int status = 0; struct spi_transfer t; struct spi_message m; @@ -178,22 +178,19 @@ int rt5677_spi_write(u32 addr, const voi if (!g_spi) return -ENODEV; - if (addr & 1) { + if (addr & 3) { dev_err(&g_spi->dev, "Bad write align 0x%x(%zu)\n", addr, len); return -EACCES; } - if (len & 1) - len_with_pad = len + 1; - memset(&t, 0, sizeof(t)); t.tx_buf = buf; t.speed_hz = RT5677_SPI_FREQ; spi_message_init_with_transfers(&m, &t, 1); - for (offset = 0; offset < len_with_pad;) { + for (offset = 0; offset < len;) { spi_cmd = rt5677_spi_select_cmd(false, (addr + offset) & 7, - len_with_pad - offset, &t.len); + len - offset, &t.len); /* Construct SPI message header */ buf[0] = spi_cmd;