From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EA64F1CF5EE; Wed, 2 Oct 2024 13:21:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1727875261; cv=none; b=hcvnaAv3ua0SbIYRtUa7vQEHsexgzOdoKbCJ/GyROEdhBKdn3sy1oFxHfOxCuTtXCPd/wtavhlmTHHojMc0GnYQFJBFSfyfvv+vgGlAduV7yWcfjNxp5LW7exPYumrSJ5oO6VmpusNQ/RmVBXonuPmHhxTLzgEAGDEgD0gcgduU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1727875261; c=relaxed/simple; bh=rcL5ZXqt8qTXcZ+qOeudJwkR93oYumYFLycef1OF1gs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=UKElhhPisjX50S7OICMKtVnyEWJcLZLen2J4xGGBUr2aZkrGKOLhiM174FV7CHyL9tRTqnxEZhxrEeQNuO+67ucLf0W5tb4nQpdzJYO31N5idzAs+KS6ue6iItQDus5tmKmnjh0WIkz3cA0dooXhdeBCUhJdKeEzZ9IVPoGmPEw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=2ITIZ2KR; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="2ITIZ2KR" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 75611C4CEC5; Wed, 2 Oct 2024 13:21:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1727875260; bh=rcL5ZXqt8qTXcZ+qOeudJwkR93oYumYFLycef1OF1gs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2ITIZ2KRizf1r5nHa63Wnj/mpQ351DvOKVATGwR6hEnnQIdh+bBlZ3JSU+boVSwOM 3O0Zt43dVG02UgttIbzF8Nml7NdxGL12kQLhweqwa33fET8MlqYShpthfbwTl6GVFU uT+rP2t/KQPy8T1Z0nQAeCI4o4JFB0+0o0LX2KNI= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Svyatoslav Pankratov , Xin Zeng , Giovanni Cabiddu , Herbert Xu , Sasha Levin Subject: [PATCH 6.11 043/695] crypto: qat - fix "Full Going True" macro definition Date: Wed, 2 Oct 2024 14:50:41 +0200 Message-ID: <20241002125824.208755421@linuxfoundation.org> X-Mailer: git-send-email 2.46.2 In-Reply-To: <20241002125822.467776898@linuxfoundation.org> References: <20241002125822.467776898@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.11-stable review patch. If anyone has any objections, please let me know. ------------------ From: Svyatoslav Pankratov [ Upstream commit 694a6f594817462942acbb1a35b1f7d61e2d49e7 ] The macro `ADF_RP_INT_SRC_SEL_F_RISE_MASK` is currently set to the value `0100b` which means "Empty Going False". This might cause an incorrect restore of the bank state during live migration. Fix the definition of the macro to properly represent the "Full Going True" state which is encoded as `0011b`. Fixes: bbfdde7d195f ("crypto: qat - add bank save and restore flows") Signed-off-by: Svyatoslav Pankratov Reviewed-by: Xin Zeng Signed-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/intel/qat/qat_common/adf_gen4_hw_data.h b/drivers/crypto/intel/qat/qat_common/adf_gen4_hw_data.h index 8b10926cedbac..e8c53bd76f1bd 100644 --- a/drivers/crypto/intel/qat/qat_common/adf_gen4_hw_data.h +++ b/drivers/crypto/intel/qat/qat_common/adf_gen4_hw_data.h @@ -83,7 +83,7 @@ #define ADF_WQM_CSR_RPRESETSTS(bank) (ADF_WQM_CSR_RPRESETCTL(bank) + 4) /* Ring interrupt */ -#define ADF_RP_INT_SRC_SEL_F_RISE_MASK BIT(2) +#define ADF_RP_INT_SRC_SEL_F_RISE_MASK GENMASK(1, 0) #define ADF_RP_INT_SRC_SEL_F_FALL_MASK GENMASK(2, 0) #define ADF_RP_INT_SRC_SEL_RANGE_WIDTH 4 #define ADF_COALESCED_POLL_TIMEOUT_US (1 * USEC_PER_SEC) -- 2.43.0