Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp10738648rwl; Thu, 12 Jan 2023 01:45:51 -0800 (PST) X-Google-Smtp-Source: AMrXdXszcw2DB2W0VS/2YsnvMJw1nOc0yXOLMTAyILnrwn//T784wamf5sOvEuVj13rDV0nd1muM X-Received: by 2002:a05:6a20:13a0:b0:a5:df86:f2c3 with SMTP id w32-20020a056a2013a000b000a5df86f2c3mr119382575pzh.32.1673516751220; Thu, 12 Jan 2023 01:45:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673516751; cv=none; d=google.com; s=arc-20160816; b=MAd896zFYn4YKStY4mHjqCQAz3+Ve6bkMjGwo8vPzkbYwwV+WTTob9SSE3FofkxgPO 6HhBqCrM2+MFIajXOc3BbWv/g+MxvHAtZNOMzYXdBirDDVr0C1uy4kELuZi1+lmLa/CV /fyWdxwIBYnL7wKETqjg7db/C/80vmIxaxFEi1a4phHJqF1tcWTH0albemc4+I4fJlqC NvTUEqu0fHfrCltc6UfF9fCeHlJh5NxH42oQxVE8/9jLZKb9j17XNQ7V40guxbMWm8pP W4SlOgRbLhqiwogUC3W9Y6LtvxLMg9dG41h+dFbkstkj1sxeYeDWcrrFv7kE4F08jpx9 ylZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=CiQdLNJI8mCBvdjl6xncNktbzxEzysXejmzTv8i8M+g=; b=HKiFZlTI/8BkFrn2yJjC+bLyCXZpI0zJr7qvj9rTWb0peiC5K95WZDUnr4H5ockRq5 uUyaVOXnmRRhDvoQVB0TPAKJ1hlcfeBNAvaITsLXWzd8trN0BJ8Wlj3YJ8+Hqmt6ptaA nat9INWC1+f3+gEGhU/1R2vvikwJUZ8NMYPFF/IZNeNju+eEOvs/RmaqAi8QA7TmuQ98 NWrb9BHyIbdQG9OZw5qXI9B6j5KIH5p6Xjrh7jGxjhHUY+tpImOFu8DdaNDbSaYKJiiX tkOm09/bHHP5hPVn3khcbuCmQAnW7lMKGLgNisMUaNfK+daeptQlN/nRr7vUFarUGcHo piDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@sang-engineering.com header.s=k1 header.b=lV7BS4+N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l16-20020a056a00141000b0057374ca3be1si17616846pfu.151.2023.01.12.01.45.44; Thu, 12 Jan 2023 01:45:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@sang-engineering.com header.s=k1 header.b=lV7BS4+N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240166AbjALJOM (ORCPT + 52 others); Thu, 12 Jan 2023 04:14:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57204 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239659AbjALJLY (ORCPT ); Thu, 12 Jan 2023 04:11:24 -0500 Received: from mail.zeus03.de (www.zeus03.de [194.117.254.33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98AD4B7FC for ; Thu, 12 Jan 2023 01:07:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=sang-engineering.com; h= from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; s=k1; bh=lWWvuOMqhkCrkQtWw3xRYcDQAaz uxzjPQUYCZsAk/uM=; b=lV7BS4+NowWgKAvYXrCIBRLeql7HgAzFYSXSVOTRDBI 3nIudy4+C3902axEHVNSLzJ8137JOP2FjECpTe0j1GP+KTcwAk0moxA5Stebcq09 CEdVKQT6Ex3PEGp3gYRN3bLwq8dr8rFKY0s21yzs0qQ51cxLvxdb1vb178/gKNQI = Received: (qmail 673347 invoked from network); 12 Jan 2023 10:06:59 +0100 Received: by mail.zeus03.de with ESMTPSA (TLS_AES_256_GCM_SHA384 encrypted, authenticated); 12 Jan 2023 10:06:59 +0100 X-UD-Smtp-Session: l3s3148p1@ebt8cA3yRLZehh9g From: Wolfram Sang To: linux-renesas-soc@vger.kernel.org Cc: Wolfram Sang , Krzysztof Kozlowski , Mark Brown , Sergei Shtylyov , linux-kernel@vger.kernel.org Subject: [PATCH] memory: renesas-rpc-if: Remove redundant division of dummy Date: Thu, 12 Jan 2023 10:06:55 +0100 Message-Id: <20230112090655.43367-1-wsa+renesas@sang-engineering.com> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cong Dang The dummy cycles value was wrongly calculated if dummy.buswidth > 1, which affects QSPI, OSPI, HyperFlash on various SoCs. We're lucky in Single SPI case since its dummy.buswidth equals to 1, so the result of the division is unchanged This issue can be reproduced using something like the following commands A. QSPI mode: Mount device with jffs2 format jffs2: CLEANMARKER node found at 0x00000004, not first node in block (0x00000000) B. QSPI mode: Write data to mtd10, where mtd10 is a parition on SPI Flash storage, defined properly in a device tree [Correct fragment, read from SPI Flash] root@v3x:~# echo "hello" > /dev/mtd10 root@v3x:~# hexdump -C -n100 /dev/mtd10 00000000 68 65 6c 6c 6f 0a ff ff ff ff ff ff ff ff ff ff |hello...........| 00000010 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff |................| [Incorrect read of the same fragment: see the difference at offsets 0-3] root@v3x:~# echo "hello" > /dev/mtd10 root@v3x:~# hexdump -C -n100 /dev/mtd10 00000000 00 00 00 00 68 65 6c 6c 6f 0a ff ff ff ff ff ff |....hello.......| 00000010 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff |................| As seen from the result, 4 NULL bytes were inserted before the test data. Wrong calculation in rpcif_prepare() led to miss of some dummy cycle. A division by bus width is redundant because it had been performed already in spi-rpc-if.c::rpcif_spi_mem_prepare() Fix this by removing the redundant division. Fixes: ca7d8b980b67 ("memory: add Renesas RPC-IF driver") Signed-off-by: Cong Dang Signed-off-by: Hai Pham Signed-off-by: Wolfram Sang --- Sadly, I cannot test this patch myself because I don't have access to hardware which uses a buswidth > 1 for the dummy read. However, from code review, this patch makes sense. The division by buswidth is done twice, once in the SPI driver and once in the RPC core. It should stay only in the SPI driver. drivers/memory/renesas-rpc-if.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/memory/renesas-rpc-if.c b/drivers/memory/renesas-rpc-if.c index 09cd4318a83d..c36b407851ff 100644 --- a/drivers/memory/renesas-rpc-if.c +++ b/drivers/memory/renesas-rpc-if.c @@ -430,8 +430,7 @@ void rpcif_prepare(struct rpcif *rpc, const struct rpcif_op *op, u64 *offs, if (op->dummy.buswidth) { rpc->enable |= RPCIF_SMENR_DME; - rpc->dummy = RPCIF_SMDMCR_DMCYC(op->dummy.ncycles / - op->dummy.buswidth); + rpc->dummy = RPCIF_SMDMCR_DMCYC(op->dummy.ncycles); } if (op->option.buswidth) { -- 2.30.2