Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp35091ybv; Tue, 18 Feb 2020 17:10:48 -0800 (PST) X-Google-Smtp-Source: APXvYqypGBW23xniQ44fn7J/sYJfAx2mYHFxq8JjU8AL9d1UCT0dLjgQ7sx4N1o9gKLhpIUsXdfO X-Received: by 2002:a9d:7511:: with SMTP id r17mr16552044otk.154.1582074648082; Tue, 18 Feb 2020 17:10:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582074648; cv=none; d=google.com; s=arc-20160816; b=qEKO/TQIuq6vHPescAON5yIegFju17+fAQY0vywx31zJr64ca7Az+8K2FOWa5KhxTz 4pZMjHZ7wXG1bOIsu0hkYWhChwU31+kHtGpKVwrpvvlPtYNI+yNCiIqiMdVzrENhIr/W /6nwtgQdjv+Jn6Xd5gOm0IBzhvkoH8m+sNMtRtNawHXCVy79Wm5VCgNZDBoEbqQzMYeT 0EW7a9v00AvDRAzmvbAHcAUQHBMVpt4QDVBK6ewT3QQJ+3Zchbos68+SCC682y6NTvYz 34+VaG792Z/DcxpKuTreOitB1pKvpAcXmVJ5JOEhFxKYs9Bdk+EEmd1ptf28G4oIdqe8 FHSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=+DINZUAbJ7UDGKDZfWJ2Byfrf2yzMzZXuXsWMv2eNmw=; b=Z4OJytEukI3HImzop2odRp6qIKe7FOl+Ye3R0kRDMO4ax23QBzzhx3oUyMD4mPw/1H 0EmCSjfAYI7V5PWAgKr6u/dB09gm6PnK9j38YczXbdDUBC27xgaCVYVK2BoUlMVq7vfY PlesKiZQzFkjwxxIBkZswh5b97yskcNU6ZPM3G7DaKLzVh0M/DkiUsM5vLCO9T4jC5c6 4ZaGo1dv+vWx/OV5JYGC/7oK0zVKa6M61BqatGuuVQECHJNPGrUcf4qCsLlSUZbXZtAh /J1W2/9xx3XAegWM8nmI0aIp9FbNcTsodsU4ES3bwbxTP3O0yYxDw8eLaZtRwskwu+sX aalA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@megous.com header.s=mail header.b=QHSn0XjA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=megous.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n1si8897508oic.225.2020.02.18.17.10.35; Tue, 18 Feb 2020 17:10:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@megous.com header.s=mail header.b=QHSn0XjA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=megous.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727809AbgBSBKB (ORCPT + 99 others); Tue, 18 Feb 2020 20:10:01 -0500 Received: from vps.xff.cz ([195.181.215.36]:54202 "EHLO vps.xff.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726761AbgBSBKB (ORCPT ); Tue, 18 Feb 2020 20:10:01 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=megous.com; s=mail; t=1582074599; bh=Aeuv5iYbaAp7rr6i5ZST/n1JdcOfY/hR+2BNrgy8C+E=; h=From:To:Cc:Subject:Date:From; b=QHSn0XjACs3lffkvnSFb2Pb78S1/c0rmc4BVbXsaxeakyWxv3Mh/uhDOckugdgAqZ FcC8PID+c6c6kZWMrj4KvwtCzGJHnr4igAaFwpP17DnZYrxwk+t60tjSDIqWrlF0aD UjWgeF7tQbJzZPcmQflTg7yTojktxGRiFa4KFSkY= From: Ondrej Jirman To: linux-sunxi@googlegroups.com Cc: Ondrej Jirman , Maxime Ripard , Chen-Yu Tsai , Samuel Holland , Stephen Boyd , linux-arm-kernel@lists.infradead.org (moderated list:ARM/Allwinner sunXi SoC support), linux-kernel@vger.kernel.org (open list) Subject: [PATCH] bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads Date: Wed, 19 Feb 2020 02:09:50 +0100 Message-Id: <20200219010951.395599-1-megous@megous.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When doing a 16-bit read that returns data in the MSB byte, the RSB_DATA register will keep the MSB byte unchanged when doing the following 8-bit read. sunxi_rsb_read() will then return a result that contains high byte from 16-bit read mixed with the 8-bit result. The consequence is that after this happens the PMIC's regmap will look like this: (0x33 is the high byte from the 16-bit read) % cat /sys/kernel/debug/regmap/sunxi-rsb-3a3/registers 00: 33 01: 33 02: 33 03: 33 04: 33 05: 33 06: 33 07: 33 08: 33 09: 33 0a: 33 0b: 33 0c: 33 0d: 33 0e: 33 [snip] Fix this by masking the result of the read with the correct mask based on the size of the read. There are no 16-bit users in the mainline kernel, so this doesn't need to get into the stable tree. Signed-off-by: Ondrej Jirman --- drivers/bus/sunxi-rsb.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/bus/sunxi-rsb.c b/drivers/bus/sunxi-rsb.c index b8043b58568ac..8ab6a3865f569 100644 --- a/drivers/bus/sunxi-rsb.c +++ b/drivers/bus/sunxi-rsb.c @@ -316,6 +316,7 @@ static int sunxi_rsb_read(struct sunxi_rsb *rsb, u8 rtaddr, u8 addr, { u32 cmd; int ret; + u32 mask; if (!buf) return -EINVAL; @@ -323,12 +324,15 @@ static int sunxi_rsb_read(struct sunxi_rsb *rsb, u8 rtaddr, u8 addr, switch (len) { case 1: cmd = RSB_CMD_RD8; + mask = 0xffu; break; case 2: cmd = RSB_CMD_RD16; + mask = 0xffffu; break; case 4: cmd = RSB_CMD_RD32; + mask = 0xffffffffu; break; default: dev_err(rsb->dev, "Invalid access width: %zd\n", len); @@ -345,7 +349,7 @@ static int sunxi_rsb_read(struct sunxi_rsb *rsb, u8 rtaddr, u8 addr, if (ret) goto unlock; - *buf = readl(rsb->regs + RSB_DATA); + *buf = readl(rsb->regs + RSB_DATA) & mask; unlock: mutex_unlock(&rsb->lock); -- 2.25.1