From patchwork Thu Nov 10 01:25:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hui Wang X-Patchwork-Id: 1701925 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=IaggUQfl; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4N741Q4TDpz23mS for ; Thu, 10 Nov 2022 12:26:33 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1oswKi-0003JO-V6; Thu, 10 Nov 2022 01:26:20 +0000 Received: from smtp-relay-canonical-1.internal ([10.131.114.174] helo=smtp-relay-canonical-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1oswKh-0003JB-Dw for kernel-team@lists.ubuntu.com; Thu, 10 Nov 2022 01:26:19 +0000 Received: from localhost.localdomain (unknown [123.112.66.48]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 2AF4E431C7 for ; Thu, 10 Nov 2022 01:26:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1668043579; bh=zw+EgRIAWlIMvW5e5e034p1B6670/rLXc46Oo9pK/Tg=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=IaggUQfl4be4UvGlgGuN9/4JWLzYRrNnV9YwAPEZ7f1Mfw7NaqTOTlVFsLi/tp+ht KX5ibfPUoFql18LopgH3XMz4C9pFOyzgbQtYRZgY35bc1wf5nMW8C1e63ZiF1TQD7H z+le9cqCWnxxvO332H4OTU0kZyMuUc4xllKQIc73hYLleBi9+4GNREmLMnJJxIp2Ef xRZQQiJEjDk4nIUvoESnJBamK+Wymq5U0T8c5lQKFa5dGf3PqIQvKbkI8YpofSC02N YiUTF/MKHSrr8Di25WOhI0nUemf8oqcdc9NOY24RdoJ4xSJG6LnJnhve+rpxQWXg6i Fv6sEdeIee7dw== From: Hui Wang To: kernel-team@lists.ubuntu.com Subject: [SRU][Jammy][PATCH 1/2] ASoC: cs35l41: Add one more variable in the debug log Date: Thu, 10 Nov 2022 09:25:31 +0800 Message-Id: <20221110012532.8796-2-hui.wang@canonical.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221110012532.8796-1-hui.wang@canonical.com> References: <20221110012532.8796-1-hui.wang@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/1996121 otp_map[].size is a key variable to compute the value of otp_val and to update the bit_offset, it is helpful to debug if could put it in the debug log. Reviewed-by: Lucas Tanure Signed-off-by: Hui Wang Acked-by: Charles Keepax Link: https://lore.kernel.org/r/20220328123535.50000-1-hui.wang@canonical.com Signed-off-by: Mark Brown (cherry picked from commit 0f91bc71fe1f24b29e8980504a23681324713a0f) Signed-off-by: Hui Wang --- sound/soc/codecs/cs35l41-lib.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/soc/codecs/cs35l41-lib.c b/sound/soc/codecs/cs35l41-lib.c index e5a56bcbb223..810643be13a4 100644 --- a/sound/soc/codecs/cs35l41-lib.c +++ b/sound/soc/codecs/cs35l41-lib.c @@ -822,8 +822,8 @@ int cs35l41_otp_unpack(struct device *dev, struct regmap *regmap) word_offset = otp_map_match->word_offset; for (i = 0; i < otp_map_match->num_elements; i++) { - dev_dbg(dev, "bitoffset= %d, word_offset=%d, bit_sum mod 32=%d\n", - bit_offset, word_offset, bit_sum % 32); + dev_dbg(dev, "bitoffset= %d, word_offset=%d, bit_sum mod 32=%d, otp_map[i].size = %u\n", + bit_offset, word_offset, bit_sum % 32, otp_map[i].size); if (bit_offset + otp_map[i].size - 1 >= 32) { otp_val = (otp_mem[word_offset] & GENMASK(31, bit_offset)) >> bit_offset;