From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C85D1C00144 for ; Mon, 1 Aug 2022 19:06:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234803AbiHATGa (ORCPT ); Mon, 1 Aug 2022 15:06:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52856 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234676AbiHATFm (ORCPT ); Mon, 1 Aug 2022 15:05:42 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A2CC032EEC; Mon, 1 Aug 2022 12:03:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 465A2B81616; Mon, 1 Aug 2022 19:03:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 58677C433D7; Mon, 1 Aug 2022 19:03:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1659380616; bh=7caPzMWB9rGMBov37BYyYTRTmteD0Rt1+hV/9+dUH5Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=at7e5RmP2L0RnVsn4bqz+xkAY4oE5wkqHKQaRKLTyryynjmOIOc6VqjwVHE/H3zRG lusxb8pOOL1N8QbeuYiZ/P70GbgIXZvQ+XIuGJUklBa0aWnEiBehjjjlzDYNq71QnV XD0Vj56rA23xhRAQrrnewxOllrZeD8P1tGM6sMshllCqOdbhUxRMpYgj76hdu20pFv GoeXxvOgyBJy6pebZcxqU357ajCVIEaklqH2Dy7EK/bCn5zx2oWyvEihBuLm/w4mrQ gveXMs1ZE9VxoxQF5kK1x1ogeUX65KL7mij861gV68nAGdDKN9+xwRHSWnddwRKoxp HoUqxpnoYYb3Q== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Biju Das , Geert Uytterhoeven , Mark Brown , Sasha Levin , linux-spi@vger.kernel.org Subject: [PATCH AUTOSEL 4.19 2/4] spi: spi-rspi: Fix PIO fallback on RZ platforms Date: Mon, 1 Aug 2022 15:03:29 -0400 Message-Id: <20220801190331.3819791-2-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220801190331.3819791-1-sashal@kernel.org> References: <20220801190331.3819791-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Biju Das [ Upstream commit b620aa3a7be346f04ae7789b165937615c6ee8d3 ] RSPI IP on RZ/{A, G2L} SoC's has the same signal for both interrupt and DMA transfer request. Setting DMARS register for DMA transfer makes the signal to work as a DMA transfer request signal and subsequent interrupt requests to the interrupt controller are masked. PIO fallback does not work as interrupt signal is disabled. This patch fixes this issue by re-enabling the interrupts by calling dmaengine_synchronize(). Signed-off-by: Biju Das Reviewed-by: Geert Uytterhoeven Link: https://lore.kernel.org/r/20220721143449.879257-1-biju.das.jz@bp.renesas.com Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- drivers/spi/spi-rspi.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/spi/spi-rspi.c b/drivers/spi/spi-rspi.c index d61120822f02..ef604e12a428 100644 --- a/drivers/spi/spi-rspi.c +++ b/drivers/spi/spi-rspi.c @@ -603,6 +603,10 @@ static int rspi_dma_transfer(struct rspi_data *rspi, struct sg_table *tx, rspi->dma_callbacked, HZ); if (ret > 0 && rspi->dma_callbacked) { ret = 0; + if (tx) + dmaengine_synchronize(rspi->ctlr->dma_tx); + if (rx) + dmaengine_synchronize(rspi->ctlr->dma_rx); } else { if (!ret) { dev_err(&rspi->master->dev, "DMA timeout\n"); -- 2.35.1