Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6020873ybc; Wed, 27 Nov 2019 13:32:16 -0800 (PST) X-Google-Smtp-Source: APXvYqzKz+/uRh86AXqqKFrMisgFevsc6DHMODEWhQxG2xgQfL0LDf4kCuJY34kio+JNil3mBc+4 X-Received: by 2002:a50:c3c5:: with SMTP id i5mr34589109edf.137.1574890335981; Wed, 27 Nov 2019 13:32:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574890335; cv=none; d=google.com; s=arc-20160816; b=VKXabuxghEe6gOR1Tbe+wDVMo2toB2tv2rxtcZGb0qBEup08l87dpP/Asg3EPIHbgJ dANMv2DWW1Uo+383aWf9SsMi4jawB195/1BrRbBGqRP9PNZ0o4Boz6kL46isgEKQQkN7 7aECkF3ihazTxKnKYCwwzC+qa6iyj5AnXJpcWpQxhIJPuhk60DIHD0TCCXpQ0fr2bXsA bYR8IRWOmKXBLpv1etP+nIIQRSPsezIgVGV9ymsH6lTJG8rDuRBlre8dLLJ7lLjwdN6L 1sDLlFeT5LVjHSORmCod7JLOvYQdQFK++1ZkS19EY5u1z8cJAitigRv8dcnJJOJUL28L DFaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aLaViW3rZXDzx9E10+OuakS6sBwabY/2FE9xxMqUwEg=; b=eu7WzmWpp4IzKxsb0WPYrpiSJy9KRtuhVxkcK3ThtueayaKLoEFdfUjbpX//GyDASu XZs2yU27lnhx1ZKdWvlBQxXQmDw2A1tU93IGpmVKh176Hv4A615kSbwsx5m2r4awEBtE aKuX+75d35JlkYpEUTKeUBCe7PnYqaLZvdmNDNfuMyAdHJEQP2ptWXggiTPdC7ur9ncY eiKPvr3M2agp31+ogiDR0gz/iy9eM6mLfVoJEU7NqSteZUUS7FBCCddye5Op9Xgg/2sJ upv0YdiyyvxiWgtHFQ7P6gCFvS53aTKh368DWEqH3l9ScLk7pxW2dVXPi5CWNS4lQ7H8 A4EA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cxIHABps; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f17si10066154eja.153.2019.11.27.13.31.52; Wed, 27 Nov 2019 13:32:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cxIHABps; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727175AbfK0V1c (ORCPT + 99 others); Wed, 27 Nov 2019 16:27:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:50890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731411AbfK0U7Y (ORCPT ); Wed, 27 Nov 2019 15:59:24 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C7C6E20678; Wed, 27 Nov 2019 20:59:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574888363; bh=Mr7tKvRZ502cywgXVcx/jiSQvnfQj4wn5VzQkntfH5o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cxIHABpsMtR1pcMfIdpfH6BBC+cjFyZHP/aWndX3bL7xXlizUhIn3EToKD014EZy2 jM7Gf7ZlH0BmID07GnyNi97I2GvDC37UdIIwSPedNT4JEGKHcCOKwETvtdtry5hZER I2jbabiDXGVh3LwdEEHwX/SloHms3I+s5cnhGR8Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vignesh R , Mark Brown , Sasha Levin Subject: [PATCH 4.19 106/306] spi: omap2-mcspi: Set FIFO DMA trigger level to word length Date: Wed, 27 Nov 2019 21:29:16 +0100 Message-Id: <20191127203123.065567740@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191127203114.766709977@linuxfoundation.org> References: <20191127203114.766709977@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vignesh R [ Upstream commit b682cffa3ac6d9d9e16e9b413c45caee3b391fab ] McSPI has 32 byte FIFO in Transmit-Receive mode. Current code tries to configuration FIFO watermark level for DMA trigger to be GCD of transfer length and max FIFO size which would mean trigger level may be set to 32 for transmit-receive mode if length is aligned. This does not work in case of SPI slave mode where FIFO always needs to have data ready whenever master starts the clock. With DMA trigger size of 32 there will be a small window during slave TX where DMA is still putting data into FIFO but master would have started clock for next byte, resulting in shifting out of stale data. Similarly, on Slave RX side there may be RX FIFO overflow Fix this by setting FIFO watermark for DMA trigger to word length. This means DMA is triggered as soon as FIFO has space for word length bytes and DMA would make sure FIFO is almost always full therefore improving FIFO occupancy in both master and slave mode. Signed-off-by: Vignesh R Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- drivers/spi/spi-omap2-mcspi.c | 26 +++++++------------------- 1 file changed, 7 insertions(+), 19 deletions(-) diff --git a/drivers/spi/spi-omap2-mcspi.c b/drivers/spi/spi-omap2-mcspi.c index e2be7da743438..f50cb8a4b4138 100644 --- a/drivers/spi/spi-omap2-mcspi.c +++ b/drivers/spi/spi-omap2-mcspi.c @@ -299,7 +299,7 @@ static void omap2_mcspi_set_fifo(const struct spi_device *spi, struct omap2_mcspi_cs *cs = spi->controller_state; struct omap2_mcspi *mcspi; unsigned int wcnt; - int max_fifo_depth, fifo_depth, bytes_per_word; + int max_fifo_depth, bytes_per_word; u32 chconf, xferlevel; mcspi = spi_master_get_devdata(master); @@ -315,10 +315,6 @@ static void omap2_mcspi_set_fifo(const struct spi_device *spi, else max_fifo_depth = OMAP2_MCSPI_MAX_FIFODEPTH; - fifo_depth = gcd(t->len, max_fifo_depth); - if (fifo_depth < 2 || fifo_depth % bytes_per_word != 0) - goto disable_fifo; - wcnt = t->len / bytes_per_word; if (wcnt > OMAP2_MCSPI_MAX_FIFOWCNT) goto disable_fifo; @@ -326,16 +322,17 @@ static void omap2_mcspi_set_fifo(const struct spi_device *spi, xferlevel = wcnt << 16; if (t->rx_buf != NULL) { chconf |= OMAP2_MCSPI_CHCONF_FFER; - xferlevel |= (fifo_depth - 1) << 8; + xferlevel |= (bytes_per_word - 1) << 8; } + if (t->tx_buf != NULL) { chconf |= OMAP2_MCSPI_CHCONF_FFET; - xferlevel |= fifo_depth - 1; + xferlevel |= bytes_per_word - 1; } mcspi_write_reg(master, OMAP2_MCSPI_XFERLEVEL, xferlevel); mcspi_write_chconf0(spi, chconf); - mcspi->fifo_depth = fifo_depth; + mcspi->fifo_depth = max_fifo_depth; return; } @@ -585,7 +582,6 @@ omap2_mcspi_txrx_dma(struct spi_device *spi, struct spi_transfer *xfer) struct dma_slave_config cfg; enum dma_slave_buswidth width; unsigned es; - u32 burst; void __iomem *chstat_reg; void __iomem *irqstat_reg; int wait_res; @@ -605,22 +601,14 @@ omap2_mcspi_txrx_dma(struct spi_device *spi, struct spi_transfer *xfer) } count = xfer->len; - burst = 1; - - if (mcspi->fifo_depth > 0) { - if (count > mcspi->fifo_depth) - burst = mcspi->fifo_depth / es; - else - burst = count / es; - } memset(&cfg, 0, sizeof(cfg)); cfg.src_addr = cs->phys + OMAP2_MCSPI_RX0; cfg.dst_addr = cs->phys + OMAP2_MCSPI_TX0; cfg.src_addr_width = width; cfg.dst_addr_width = width; - cfg.src_maxburst = burst; - cfg.dst_maxburst = burst; + cfg.src_maxburst = es; + cfg.dst_maxburst = es; rx = xfer->rx_buf; tx = xfer->tx_buf; -- 2.20.1