Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2100802ybl; Thu, 30 Jan 2020 11:22:03 -0800 (PST) X-Google-Smtp-Source: APXvYqyYitlgS+xPMNuJWt/QZPt7KPVQGecIdILxWKNtk/75rG1ZAhygjamuVxqPCbgUqRfDR3GX X-Received: by 2002:aca:dc04:: with SMTP id t4mr3800493oig.51.1580412123482; Thu, 30 Jan 2020 11:22:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580412123; cv=none; d=google.com; s=arc-20160816; b=kKeW8vd62WjGOetDPv18hsOAF28akqj50+lN+XGAX+c8W6LAUIDHgZSqr7EpFbJYoW zYPhWL3FhK/CT3sUjhaJFsO8Tq/RSwaSdSB/Aod1eWwzhM1FzPjhOCsI0ATQJ4BU8Lu/ pPZtw6m5koIFxIDpyB176ABM0+MEDmzJom1Uw9pCzYQIqQM/30smOsBLAOJn2K8rH7AB NvXeC2Zj07yniXV7Y9qqUhceQwPe2Ee1VQSDRlxTK1cnkIUt+aRTgdsl18bgDfqmb0Bs XqnNj0btJoTOQVnWCWcTngf5aiJoRwRTvttlVnzd2sxm34PN4Ue1b2FNYGjRlAXdsWrn GLLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bBEvaaAcqI17GdrLzK/6G8Gt34b8lPryHzFZ0/cjgbM=; b=kzaZ/M9K4w1ig/imLqKs4krsVQNCmHqbonrlaixYBUqXtkBa+sGrekRUbiJ1alJaVJ 9YtuWEhWvmVMBcEcYYAdtgWMGjyCGDs0rbAHnTXMMLskt09Ot7k5s/FlJNyvVbbmR69s /mRqqiYorm7hgEz01KvTzhgsBQOonO3f2mdpRU95t0zRBTMcDzhbU9zkgVSoMqWCcQ2V Qcaenf4COngIypzgDzJJwXmhjJaSaBo7NkbaeluR4nsdGJ+SpsTnyVyuqw35HLF079Kq Slo33H6hcjsSEBG0lmRiQR3ahJP3OwpO9q5Z4O8f+deDs5nemkik8zGoSky2Pv4Nwddk NbiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k21A9rmn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i2si3379904otc.130.2020.01.30.11.21.51; Thu, 30 Jan 2020 11:22:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k21A9rmn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728139AbgA3SvB (ORCPT + 99 others); Thu, 30 Jan 2020 13:51:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:56094 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731151AbgA3SqL (ORCPT ); Thu, 30 Jan 2020 13:46:11 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A932B20CC7; Thu, 30 Jan 2020 18:46:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580409971; bh=iKjqdQ3xF9xmP29Ev2BGUdYr1kdrt+juC44ZexWRT4M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k21A9rmnCrpXn4YilQ7XVhgscnhLNgid5jCRCZoT7LTxjRzkryXceCswfdu6rz9Os EjfeghR37YnKZQtwGa2YGAjzNbwmbd1WiGMe1ScBvYCXiQAx/dlrBvdJS2z2EUMa32 KwT+bzunG+9lzVtMlbAPKo2CxAEFh0genIf7DEe8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Iuliana Prodan , Andrey Smirnov , Alison Wang , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu Subject: [PATCH 5.4 106/110] crypto: caam - do not reset pointer size from MCFGR register Date: Thu, 30 Jan 2020 19:39:22 +0100 Message-Id: <20200130183626.004894950@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183613.810054545@linuxfoundation.org> References: <20200130183613.810054545@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Iuliana Prodan commit 7278fa25aa0ebcc0e62c39b12071069df13f7e77 upstream. In commit 'a1cf573ee95 ("crypto: caam - select DMA address size at runtime")' CAAM pointer size (caam_ptr_size) is changed from sizeof(dma_addr_t) to runtime value computed from MCFGR register. Therefore, do not reset MCFGR[PS]. Fixes: a1cf573ee95 ("crypto: caam - select DMA address size at runtime") Signed-off-by: Iuliana Prodan Cc: Cc: Andrey Smirnov Cc: Alison Wang Reviewed-by: Horia Geantă Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/caam/ctrl.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) --- a/drivers/crypto/caam/ctrl.c +++ b/drivers/crypto/caam/ctrl.c @@ -685,11 +685,9 @@ static int caam_probe(struct platform_de of_node_put(np); if (!ctrlpriv->mc_en) - clrsetbits_32(&ctrl->mcr, MCFGR_AWCACHE_MASK | MCFGR_LONG_PTR, + clrsetbits_32(&ctrl->mcr, MCFGR_AWCACHE_MASK, MCFGR_AWCACHE_CACH | MCFGR_AWCACHE_BUFF | - MCFGR_WDENABLE | MCFGR_LARGE_BURST | - (sizeof(dma_addr_t) == sizeof(u64) ? - MCFGR_LONG_PTR : 0)); + MCFGR_WDENABLE | MCFGR_LARGE_BURST); handle_imx6_err005766(&ctrl->mcr);