Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp630248pxb; Tue, 2 Feb 2021 13:44:55 -0800 (PST) X-Google-Smtp-Source: ABdhPJxXGL0kbd4BFDlCJtn0bFQmrTP5hDxixWtlC2axnSsnfH35Oa+t/bZufRrjvFKgjCmhvGoV X-Received: by 2002:aa7:d045:: with SMTP id n5mr116460edo.306.1612302295605; Tue, 02 Feb 2021 13:44:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612302295; cv=none; d=google.com; s=arc-20160816; b=jqvq4O2biFehbMbsEO6u6nZICsKXuuWeXImIsyjnR6qGg1GH0kw1NfbvErfadRAJWt hLHYBmcxNhwUoKk1V9GM3lA7U7ItNuSFrLsY+etOaquOefmMcYUruRgK2zO3JaOqpHW2 JSPzlu4n/cnPb2DNspSAtylCf4hVSYBKjvljYSe7Z/FsoQo9KRmP8DX5vPCzd81Ya/dI 82o3Je5ilL6Yx0GxLoePWP/vGJP/RhVVsMua6zvDP3wpV7KMbiOsmYnczGJ+4ISiyc9D 2PKGsziEdp7c6mUg5TZmBAyzwLhYLxjvmAKy83hlkf63sirEfBTlnYI/xon3+OX188xN 2F8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JNzS5YYiglJPLJYLejBCLm14wDBlQe79ww6IbguvF48=; b=ndh+YX+6XQiU5fISfOy2jwovA1cdV0/RlHPkUUy1XaVbvh2TYdx/Nkp6hYVJmHLEz0 IoRVfWYCZec9ZGNUJoCuuIdL2c9Daw1RX7qN33lkXmk8zEjEdIJ6LOVBGDoIJcjrDSjg bisuLOvYXv96kjglk+PemzeaysOtdfuKunstGXjwM299oPj/60LTqJvE/cNcwkwxIphU fUnIrQ1RSx45Vrcd6wX/o4dCNO5mllgD0yL+CXaInTyQCg0xaNC6y8IOMs1Tc9QGtTH7 z7W//hNN3U7ToO1k9SwWA1rWI4NKKRTbtxHLM1N1ch7QwHNjguDmrW1GSnsa0F7EONk8 A+aA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WzojE57M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h15si54982eje.285.2021.02.02.13.44.20; Tue, 02 Feb 2021 13:44:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WzojE57M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232932AbhBBNtz (ORCPT + 99 others); Tue, 2 Feb 2021 08:49:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:36410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232896AbhBBNpP (ORCPT ); Tue, 2 Feb 2021 08:45:15 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 686C764F79; Tue, 2 Feb 2021 13:40:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1612273244; bh=knkl94FSkMKf1qU+46CcvhyoGxxaf2VM4Xast9AQ40c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WzojE57MisJJ5pIDGzup7CyD9FYC6mX+VpI6+IxKTVdkAzn6UzZw5ZKGaUlplPBnX moAe2zFIPTrh3Fgma/aoiczdNyH/oWJcD59daAWV2Yyb1SZdcoYFVvWwdoFkiS4paa AyVykMsTSQcVHHwruRCJnKK6KUUKGjI0Cyu879GY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sven Auhagen , Herbert Xu Subject: [PATCH 5.10 034/142] crypto: marvel/cesa - Fix tdma descriptor on 64-bit Date: Tue, 2 Feb 2021 14:36:37 +0100 Message-Id: <20210202132959.116531916@linuxfoundation.org> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210202132957.692094111@linuxfoundation.org> References: <20210202132957.692094111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Herbert Xu commit 4f6543f28bb05433d87b6de6c21e9c14c35ecf33 upstream. The patch that added src_dma/dst_dma to struct mv_cesa_tdma_desc is broken on 64-bit systems as the size of the descriptor has been changed. This patch fixes it by using u32 instead of dma_addr_t. Fixes: e62291c1d9f4 ("crypto: marvell/cesa - Fix sparse warnings") Cc: Reported-by: Sven Auhagen Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/marvell/cesa/cesa.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/crypto/marvell/cesa/cesa.h +++ b/drivers/crypto/marvell/cesa/cesa.h @@ -300,11 +300,11 @@ struct mv_cesa_tdma_desc { __le32 byte_cnt; union { __le32 src; - dma_addr_t src_dma; + u32 src_dma; }; union { __le32 dst; - dma_addr_t dst_dma; + u32 dst_dma; }; __le32 next_dma;