From: Herbert Xu Subject: Re: [PATCH] crypto: caam - fix pointer size for AArch64 boot loader, AArch32 kernel Date: Wed, 7 Dec 2016 20:07:46 +0800 Message-ID: <20161207120746.GB20680@gondor.apana.org.au> References: <1480928818-8166-1-git-send-email-horia.geanta@nxp.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Cc: "David S. Miller" , linux-crypto@vger.kernel.org, Dan Douglass , Alison Wang To: Horia =?utf-8?Q?Geant=C4=83?= Return-path: Received: from helcar.hengli.com.au ([209.40.204.226]:41082 "EHLO helcar.apana.org.au" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752105AbcLGMIw (ORCPT ); Wed, 7 Dec 2016 07:08:52 -0500 Content-Disposition: inline In-Reply-To: <1480928818-8166-1-git-send-email-horia.geanta@nxp.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: On Mon, Dec 05, 2016 at 11:06:58AM +0200, Horia Geantă wrote: > Start with a clean slate before dealing with bit 16 (pointer size) > of Master Configuration Register. > This fixes the case of AArch64 boot loader + AArch32 kernel, when > the boot loader might set MCFGR[PS] and kernel would fail to clear it. > > Cc: > Reported-by: Alison Wang > Signed-off-by: Horia Geantă Patch applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt