From: <Tharunkumar.Pasumarthi@microchip.com>
To: <broonie@kernel.org>
Cc: <linux-spi@vger.kernel.org>, <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH SPI for-next] spi: microchip: pci1xxxx: Fix minor bugs in spi-pci1xxxx driver
Date: Fri, 31 Mar 2023 08:59:15 +0000 [thread overview]
Message-ID: <754b57849925e48401e6ebb3d206c966a8a08800.camel@microchip.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 651 bytes --]
Hi Mark,
Thanks for the comments. Please find my inline replies below:
> As covered in submitting-patches.rst you should send one patch per
> change, this makes things much easier to review.
Okay. I will submit these fixes as a new patchset.
> I am unclear how chip select will ever be asserted with this change?
> Now the value is only written if we are disabling.
In PCI1xxxx, there is a common bit in hardware to enable / disable chip
select lines. I will use this bit in pci1xxxx_spi_set_cs API in
the upcoming version of patch. Currently, this bit is used within
pci1xxxx_spi_transfer_one API.
Thanks,
Tharun Kumar P
[-- Attachment #2: Type: message/rfc822, Size: 5694 bytes --]
[-- Attachment #2.1.1: Type: text/plain, Size: 1484 bytes --]
On Tue, Mar 28, 2023 at 11:12:12AM +0530, Tharun Kumar P wrote:
> Following bugs are fixed in this patch:
> 1. pci1xxxx_spi_resume API masks SPI interrupt bit which prohibits
> firing of interrupt to the host at the end of the transaction after
> suspend-resume. This patch unmasks this bit at resume.
> 2. In pci1xxxx_spi_transfer_one API, length of SPI transaction gets
> cleared by unmasking length field. Set length of transaction after
> unmasking length field.
> 3. Remove support for disabling chip select as hardware does not support
> the same.
As covered in submitting-patches.rst you should send one patch per
change, this makes things much easier to review.
> drivers/spi/spi-pci1xxxx.c | 12 ++++--------
> 1 file changed, 4 insertions(+), 8 deletions(-)
The subject says this is a patch for the microchip driver...
> /* Set the DEV_SEL bits of the SPI_MST_CTL_REG */
> regval = readl(par->reg_base + SPI_MST_CTL_REG_OFFSET(p->hw_inst));
> - if (enable) {
> + if (!enable) {
> regval &= ~SPI_MST_CTL_DEVSEL_MASK;
> regval |= (spi_get_chipselect(spi, 0) << 25);
> writel(regval,
> par->reg_base + SPI_MST_CTL_REG_OFFSET(p->hw_inst));
> - } else {
> - regval &= ~(spi_get_chipselect(spi, 0) << 25);
> - writel(regval,
> - par->reg_base + SPI_MST_CTL_REG_OFFSET(p->hw_inst));
> -
I am unclear how chip select will ever be asserted with this change?
Now the value is only written if we are disabling.
[-- Attachment #2.1.2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]
next reply other threads:[~2023-03-31 8:59 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-03-31 8:59 Tharunkumar.Pasumarthi [this message]
-- strict thread matches above, loose matches on Subject: below --
2023-03-28 5:42 [PATCH SPI for-next] spi: microchip: pci1xxxx: Fix minor bugs in spi-pci1xxxx driver Tharun Kumar P
2023-03-28 13:43 ` Mark Brown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=754b57849925e48401e6ebb3d206c966a8a08800.camel@microchip.com \
--to=tharunkumar.pasumarthi@microchip.com \
--cc=broonie@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-spi@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).