Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3320951rdb; Sun, 10 Dec 2023 00:17:15 -0800 (PST) X-Google-Smtp-Source: AGHT+IHqdHrEIpLC4QPYm9fx3dkYVHfC5M33Jv4oYFb1mJZiDNVW6Yo185PRIE4TAtE4YanUks+Q X-Received: by 2002:a05:6808:114f:b0:3b8:4023:86e2 with SMTP id u15-20020a056808114f00b003b8402386e2mr4164737oiu.29.1702196235256; Sun, 10 Dec 2023 00:17:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702196235; cv=none; d=google.com; s=arc-20160816; b=jeRoN4GiTRHaImJ//9aZi04FY3gxsPHqhgfYaEpp3EHhaLQJ/HJNRVlR4YlaEb6z9O FQUpsXq9XTGckB6EpdDDGCQqnMJJj86sQeoTMiS2i9nWxibT2+/NGvrEuYM5MqrW3P8q 0gEbggiyzF+e+NkEDSGqL5g51/eFT7p09Z84kd00X6hGG7SB4kV9gql7rIzSUm70mc3o 5z1uqUe4ZRWqAZtZJCdx16Z/f8fVA9/J+OUNbnLkaQvUbG6veUGEgqsmlHa3jQiNf6Ro xZhGlOGgRDQ37sIMruXSmzI3290u+ei3NNoeFOfwCZNaGgez/mQjf13FrjBSt5g4M19C 3sDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=IiLsKxcQMxtqZyZiLrFWsGjh3HqUos/9TIRKZa2B8Wc=; fh=r8Es85g3KtpvL1i4PUzM2SW8zEM8S9z0EcRZxYT4TBE=; b=JBH06Xbbx23dSDte20R/SWbbncmIZuEO4/3oRSJlNs/3wmPWgjUbglVFpmDh9o6/la vf++2kd8FvYjRc8X4mLrY2w/euIL3S9rwvbdBSNShhXVQlnl1O4by4kSCdPXtKdYzDmO r9EvTg6pFFK4tN6uasKBPJmvHc1h6ZkOo5XORxAdeipCZkTgJaqrXR4PkwmdGeA9JO6C hdZ5A8KDN5rlkPHWHON6gqWkhaXXjn2q0qfG/Llp3RvwfJFEVdx4M2SLTytk1U6ZFafe S9vfpbklqKy9q7W4eE9NGTyarC69yyGAhdZHYWI1/hcAr78QpkPAg37r0YQCW5NX70dg hhDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=id7Mif+E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id k124-20020a632482000000b005c6aa4d4a0esi4179287pgk.801.2023.12.10.00.17.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 10 Dec 2023 00:17:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=id7Mif+E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 87EFE805B2C3; Sun, 10 Dec 2023 00:17:12 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231868AbjLJIRA (ORCPT + 99 others); Sun, 10 Dec 2023 03:17:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45716 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231653AbjLJIQ6 (ORCPT ); Sun, 10 Dec 2023 03:16:58 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 89FC8C6 for ; Sun, 10 Dec 2023 00:17:04 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 76281C433C8; Sun, 10 Dec 2023 08:17:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1702196224; bh=4MP+IiZQyTgAhgvxwWK9fTe8S5nqlJbp9EPDPLsqyds=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=id7Mif+ETkUg+AUNse9Dqu2A10VFzTNzArnoZoaxMSbOC7h5t/k6lDLydmqAfAD/N QbdjWGuMcJA8s79ckAw9B4IiXJxM/ZRjmW9c48qSVsXhHej/WIQwipXW0LdN0kXuec JBlSCZ+wTC1D98CwYK56EPHTtYzmUK6izmRh2Kx0= Date: Sun, 10 Dec 2023 09:17:01 +0100 From: Greg KH To: Benjamin Bigler Cc: broonie@kernel.org, linux@bigler.io, francesco@dolcini.it, linux-kernel@vger.kernel.org, linux-spi@vger.kernel.org, regressions@lists.linux.dev, stefan.moring@technolution.nl, regressions@leemhuis.info Subject: Re: [PATCH] spi: spi-imx: correctly configure burst length when using dma Message-ID: <2023121047-unnamable-magma-2b6d@gregkh> References: <20231209222338.5564-1-benjamin@bigler.one> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231209222338.5564-1-benjamin@bigler.one> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Sun, 10 Dec 2023 00:17:12 -0800 (PST) On Sat, Dec 09, 2023 at 11:23:26PM +0100, Benjamin Bigler wrote: > If DMA is used, burst length should be set to the bus width of the DMA. > Otherwise, the SPI hardware will transmit/receive one word per DMA > request. > Since this issue affects both transmission and reception, it cannot be > detected with a loopback test. > Replace magic numbers 512 and 0xfff with MX51_ECSPI_CTRL_MAX_BURST. > > Signed-off-by: Benjamin Bigler > Reported-by Stefan Bigler > Fixes: 15a6af94a277 ("spi: Increase imx51 ecspi burst length based on transfer length") > Link: https://lore.kernel.org/r/8a415902c751cdbb4b20ce76569216ed@mail.infomaniak.com > --- > drivers/spi/spi-imx.c | 15 +++++++++++---- > 1 file changed, 11 insertions(+), 4 deletions(-) > Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - You have marked a patch with a "Fixes:" tag for a commit that is in an older released kernel, yet you do not have a cc: stable line in the signed-off-by area at all, which means that the patch will not be applied to any older kernel releases. To properly fix this, please follow the documented rules in the Documentation/process/stable-kernel-rules.rst file for how to resolve this. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot