Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp766074rwb; Mon, 26 Sep 2022 05:42:29 -0700 (PDT) X-Google-Smtp-Source: AMsMyM47xg2yguFBil49sL8hXZM0TxW2/gw7BA/22zB9QZIwIgLNTNwKWxx7K+6QZLp0Lkqxi5rg X-Received: by 2002:a17:906:591:b0:73d:c3ef:84ae with SMTP id 17-20020a170906059100b0073dc3ef84aemr18368693ejn.155.1664196148804; Mon, 26 Sep 2022 05:42:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664196148; cv=none; d=google.com; s=arc-20160816; b=tS+9GgwslIpWQIsloQ6rBRW+scOL8qEGtelTisFivm1U4A0+qJYnsQeYwunF5sH/cb IX7F8PCASoqIVy4RXZeGZQ1IS7Qi8S60ouLHKDqU8ThTTrQdsd42gmrfT/BV+eXd7t2A 2TiHsm1HD1Y6mJmE8e/4BySvuboYD2mrp4rl2R8oCrBtnM+QjIBA0irXL0v3IxPFfkhs FqaXntoTeKNEMPu2Jb0kZ2pG/HEcWD8CJsljxks9WHYLV0MLecFz95HCCjLoNGDqXfY4 U3lgY2Pc6OmnMv0SrkS8Ba/KcI2Azd9CcV0yCccajNz/2l/EhB7CecFVlQMJbzMV63hd dKGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mjIffhOKFXjXYu3p9b+d35bbZoopR7FP57zmoOMRe78=; b=cD02qNDiqGqXK+jvjRhkgaxmSRuED0a06EZ+FrK+Mme1TasW7rOfAQX7dLqHs/M+qt se8nUo0G7UQyWKpfO1GaigVj2IfXD/LO7skY8XVlJj+BG2VgdLIh50yM0o6OdN9FkFn1 4xiqkTMTeXBjT36Yasmu8jK+ngZJ2HY67n0WbQu/w9XasSsOIPxXmX7r04iCqJGxhyJp F5CUwRJN5dXMjOcMSEQEQyfeT1yCqL4YVvB6NwgQp9rEGO/aKTojzPefuGKiut7PMXYR 2bXMiba0Z+xkrCn7ROShAEXorM5GMqOWcURPzoAN/iqFizkjFRRbmXlJWTeUMclAHe3z 90Eg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pJmWtW16; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s7-20020a50ab07000000b00446dc8f5e44si15756048edc.243.2022.09.26.05.42.03; Mon, 26 Sep 2022 05:42:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pJmWtW16; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237697AbiIZLSa (ORCPT + 99 others); Mon, 26 Sep 2022 07:18:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237696AbiIZLRX (ORCPT ); Mon, 26 Sep 2022 07:17:23 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1FDF1659E3; Mon, 26 Sep 2022 03:38:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A873260C0B; Mon, 26 Sep 2022 10:36:33 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9E29BC433D6; Mon, 26 Sep 2022 10:36:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664188593; bh=cAVjTlph+uYTY5nMF2GiWxeyu+HH3UT40wtrKGB0ylA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pJmWtW16lQ/q+3fUJqW6zR7SnrIutucOE71GmTeniZSWu4Z4c+X4ITTryA8iKvavb Vob8I+qI9G1JnrR706vYiEieRaYdFcNbmwlVd5qhmmTtCz9lz4w2Jnli5zBoWGJdIO hb39ikURF3V13l6bKF8JVHY0rAZ6UmQ95SBPNlmk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cristian Marussi , Sudeep Holla , Sasha Levin Subject: [PATCH 5.15 059/148] firmware: arm_scmi: Fix the asynchronous reset requests Date: Mon, 26 Sep 2022 12:11:33 +0200 Message-Id: <20220926100758.240987476@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220926100756.074519146@linuxfoundation.org> References: <20220926100756.074519146@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cristian Marussi [ Upstream commit b75c83d9b961fd3abf7310f8d36d5e6e9f573efb ] SCMI Reset protocol specification allows the asynchronous reset request only when an autonomous reset action is specified. Reset requests based on explicit assert/deassert of signals should not be served asynchronously. Current implementation will instead issue an asynchronous request in any case, as long as the reset domain had advertised to support asynchronous resets. Avoid requesting the asynchronous resets when the reset action is not of the autonomous type, even if the target reset domain does, in general, support the asynchronous requests. Link: https://lore.kernel.org/r/20220817172731.1185305-6-cristian.marussi@arm.com Fixes: 95a15d80aa0d ("firmware: arm_scmi: Add RESET protocol in SCMI v2.0") Signed-off-by: Cristian Marussi Signed-off-by: Sudeep Holla Signed-off-by: Sasha Levin --- drivers/firmware/arm_scmi/reset.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/firmware/arm_scmi/reset.c b/drivers/firmware/arm_scmi/reset.c index fc6237d6e926..e80a78205845 100644 --- a/drivers/firmware/arm_scmi/reset.c +++ b/drivers/firmware/arm_scmi/reset.c @@ -158,7 +158,7 @@ static int scmi_domain_reset(const struct scmi_protocol_handle *ph, u32 domain, return -EINVAL; rdom = pi->dom_info + domain; - if (rdom->async_reset) + if (rdom->async_reset && flags & AUTONOMOUS_RESET) flags |= ASYNCHRONOUS_RESET; ret = ph->xops->xfer_get_init(ph, RESET, sizeof(*dom), 0, &t); @@ -170,7 +170,7 @@ static int scmi_domain_reset(const struct scmi_protocol_handle *ph, u32 domain, dom->flags = cpu_to_le32(flags); dom->reset_state = cpu_to_le32(state); - if (rdom->async_reset) + if (flags & ASYNCHRONOUS_RESET) ret = ph->xops->do_xfer_with_response(ph, t); else ret = ph->xops->do_xfer(ph, t); -- 2.35.1