Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp6078063rwr; Tue, 9 May 2023 09:55:54 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4Tmd8EK8OSo/xzXn+sEouhkQJ5KPpbdJGsILtUQ/WImVV0RM6IJu3XUZsyOnvy9a+9YatA X-Received: by 2002:a05:6a20:429b:b0:ff:ed6b:4c9e with SMTP id o27-20020a056a20429b00b000ffed6b4c9emr12911528pzj.36.1683651353745; Tue, 09 May 2023 09:55:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683651353; cv=none; d=google.com; s=arc-20160816; b=QkFw/VQw1g4obC+FdzEThf3NV8ueywRYDTmh3LXiRvRxEH2II9QWK7HXVGU3b5BmIU 7HtKfAwv6aflCzYKRz1k7Ajr7dlXski+icfLrrFm0bK0zrpYuzeQiJ1wMMEwbSqGYLzx HBJ+Er9VsyotRicOTw3DxlyQpL/H5sWAG0mGHzmNNRbbb5dSrAc+2BZUubEUTfBSJnst 0nGAbBFB/j+oJBoiDvowF+8dSVQTu7oyQeQOY46TfkCBR17SrrBXaOE+ax9MOvZFoDxY R6/SKqAQ7ylISlFoMWS21Hvrv06zKsJa1Yil/BQNJOoM1P1Ppy8toRX/MsV5iYEvn0Ox EYrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OjQmmXmIcH9+jcR8c3ItshyYbkN74w1OkLiozi3slDA=; b=LgTp1H3NcfsfqRjX5u8KkW0WvmTtRwWWOGZ8rgtyJCHYHMUY89OFCfiMSW3vroAWHR c3Tq2zdOZVSAuFan6tlu6az23Me0xEZCTEBG8wGMU48Q2A1aCsTWV2PD+yo9iVZxn4um JoBWAsHFGqg/O2K4UnMz/NlGuvF44oqmnYfwkN5ustmT3CGK0r7doAeErFpZTTItUaTY DWT3jDGZShl1WrrLKyuUoS2k230Y1E5NxUpeZvs4UvCfKqUd85fcWrli08GTlL8dhBON DnpURy7rYgqKAGy+YdmTWR4oPDtnObvjpqM2rXCk1f9XQ15q2U5Rg0rnVoN8kyMY+Xt/ ZENA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cirrus.com header.s=PODMain02222019 header.b=L9r7qoas; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cirrus.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j8-20020a17090aeb0800b0024c1ddfa1bfsi15355288pjz.92.2023.05.09.09.55.40; Tue, 09 May 2023 09:55:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@cirrus.com header.s=PODMain02222019 header.b=L9r7qoas; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cirrus.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234005AbjEIQmZ (ORCPT + 99 others); Tue, 9 May 2023 12:42:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233293AbjEIQmK (ORCPT ); Tue, 9 May 2023 12:42:10 -0400 Received: from mx0b-001ae601.pphosted.com (mx0b-001ae601.pphosted.com [67.231.152.168]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28D684225; Tue, 9 May 2023 09:42:07 -0700 (PDT) Received: from pps.filterd (m0077474.ppops.net [127.0.0.1]) by mx0b-001ae601.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 349GKtb4009501; Tue, 9 May 2023 11:41:55 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cirrus.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=PODMain02222019; bh=OjQmmXmIcH9+jcR8c3ItshyYbkN74w1OkLiozi3slDA=; b=L9r7qoasMnNbqSDBoKFDEqNM/N6u8SEfS3QNG54ncBAZPWp1Xmcy/kb716TgH+qZ/DDR dMoxzP7slx5O3ekxAX/x3yWSXL3rOCNAum1QHfuzJCr5iAvzBVaqiXMbMStcvP623Aqc EbyqTF2P6WNWn0OrXvN8LNiXjsYYC2/rz787mhJrzB7Ny3VhsVnpHaHGW1ddFLLjJlZ9 AFGRy772quyv2NmOJQNRAACW+dWjHnXrbM2fV1FwuL3A4AF+LB3/oT8ZWoTBU0YtSPJ1 TJOekg5m0Vz4hrByS+iMS0ibuEbzL8M7WmgOPYDTR0w/pVE6TpRL/u6kCOGM0tXZareF qg== Received: from ediex02.ad.cirrus.com ([84.19.233.68]) by mx0b-001ae601.pphosted.com (PPS) with ESMTPS id 3qf7s41aht-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 09 May 2023 11:41:54 -0500 Received: from ediex01.ad.cirrus.com (198.61.84.80) by ediex02.ad.cirrus.com (198.61.84.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Tue, 9 May 2023 11:41:53 -0500 Received: from ediswmail.ad.cirrus.com (198.61.86.93) by ediex01.ad.cirrus.com (198.61.84.80) with Microsoft SMTP Server id 15.2.1118.26 via Frontend Transport; Tue, 9 May 2023 11:41:53 -0500 Received: from algalon.ad.cirrus.com (algalon.ad.cirrus.com [198.90.251.122]) by ediswmail.ad.cirrus.com (Postfix) with ESMTP id 3E37E45; Tue, 9 May 2023 16:41:53 +0000 (UTC) From: Charles Keepax To: CC: , , , Subject: [PATCH 2/2] spi: spi-cadence: Only overlap FIFO transactions in slave mode Date: Tue, 9 May 2023 17:41:53 +0100 Message-ID: <20230509164153.3907694-2-ckeepax@opensource.cirrus.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20230509164153.3907694-1-ckeepax@opensource.cirrus.com> References: <20230509164153.3907694-1-ckeepax@opensource.cirrus.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Proofpoint-ORIG-GUID: cGxDQoXFL9mc-Nc8A6YsQtY593bxSw-h X-Proofpoint-GUID: cGxDQoXFL9mc-Nc8A6YsQtY593bxSw-h X-Proofpoint-Spam-Reason: safe X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit b1b90514eaa3 ("spi: spi-cadence: Add support for Slave mode") updated the code to trigger the IRQ when the FIFO was half empty, overlapping filling more data into the FIFO and sending what is left. This appears to cause regressions on the Zynq 7000, for transactions longer than the FIFO size, below that no overlapping occurs. It would appear from my testing that any attempt to put new data into the FIFO whilst data is still transmitting causes data corruption on both send and receive. If I am reading the commit message right on commit 49530e641178 ("spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo()"), that would also seem to imply this is the case. On the assumption that this isn't an issue on the platform the original slave mode support was added for, update the cdns_transfer_one to only set the watermark to 50% of the FIFO size when in slave mode. There by retaining the new behaviour for slave mode but reverting to the older behaviour when the SPI is used a master. Fixes: b1b90514eaa3 ("spi: spi-cadence: Add support for Slave mode") Signed-off-by: Charles Keepax --- drivers/spi/spi-cadence.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/drivers/spi/spi-cadence.c b/drivers/spi/spi-cadence.c index b0ccb138e3566..ff02d81041319 100644 --- a/drivers/spi/spi-cadence.c +++ b/drivers/spi/spi-cadence.c @@ -438,14 +438,15 @@ static int cdns_transfer_one(struct spi_controller *ctlr, xspi->tx_bytes = transfer->len; xspi->rx_bytes = transfer->len; - if (!spi_controller_is_slave(ctlr)) + if (!spi_controller_is_slave(ctlr)) { cdns_spi_setup_transfer(spi, transfer); - - /* Set TX empty threshold to half of FIFO depth - * only if TX bytes are more than half FIFO depth. - */ - if (xspi->tx_bytes > xspi->tx_fifo_depth) - cdns_spi_write(xspi, CDNS_SPI_THLD, xspi->tx_fifo_depth >> 1); + } else { + /* Set TX empty threshold to half of FIFO depth + * only if TX bytes are more than half FIFO depth. + */ + if (xspi->tx_bytes > xspi->tx_fifo_depth) + cdns_spi_write(xspi, CDNS_SPI_THLD, xspi->tx_fifo_depth >> 1); + } cdns_spi_fill_tx_fifo(xspi, xspi->tx_fifo_depth); spi_transfer_delay_exec(transfer); -- 2.30.2