Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3607989pxb; Mon, 24 Jan 2022 13:24:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJwxRrf4eNIaA14d6ao2o7JT31uY5Um9vC9oZ0TqpblMhg6r2ZlNZAaIX+WErIwe/2P3V4DT X-Received: by 2002:a05:6a00:10d0:b0:4c9:1d31:c596 with SMTP id d16-20020a056a0010d000b004c91d31c596mr6168573pfu.73.1643059489028; Mon, 24 Jan 2022 13:24:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643059489; cv=none; d=google.com; s=arc-20160816; b=o9XcuUZJNOqKX5THBexbTN2EV0wioQMJSYDAqLMCQyaRcmwUCGJIwVIi8bAlKqelLh VQWb5dklOSiup/wrgjnfSE6vHaKUcpefJGLPd1jTqffqe989Da1VOi2NUCm4Y3iSr7+Z waanFttPVG9EzY048CVktT1Zp0XjrcIA5DgaYJsPxx2JfRHXPiCWs40odj89MrRFmNFs yK1HzG1NE8aOwyLnuToxW9hDIi9F0HDeX7TzspfjRljSan3Fbh46VrgDlFeKsEr4jwOK 5JeuvYnYL6yywSdCa5frAmfj+oiuX4sOLxo2dMa6izm/xY9mUbDFaV/E0GqGxVKbbdv8 INQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mAIjyRDQQLo/inFMLZdZhks7AUUx0xmp2998T/GJ6xA=; b=nXS349k7qO3zs61F8v68ImvtbLEVvgs66fq1psg4Yjekt8iVIzJ/oYcQoDwJLZj1w6 maRMjmv2NvIG5L9hwL3V7jty+Nc/mr6bKkvGdpo01ebfNRQgM34wSkUFhwq1D6/mTQc1 hNWDAb+RNM/T0DFczG2EzEUacy3BRw7boIKZahJ+pvuC81ypoDMaK/SNj1UvphmU/uJX WAAsRPqu8JkmPEULLc1um/mT4Wtj1ef+87DLNYRANIlX5oujFyWN1sH8q5sHGHKFz1Xg DyUiZ7qkejqEt0HQRdy75yWn5/Qy2FbpFttySRqF4ufD355Up/prVQ/scJpIh5E6bueR zOgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cvloL0rq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q18si6985861pll.369.2022.01.24.13.24.35; Mon, 24 Jan 2022 13:24:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cvloL0rq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1442993AbiAXUz7 (ORCPT + 99 others); Mon, 24 Jan 2022 15:55:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39750 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1385517AbiAXUd3 (ORCPT ); Mon, 24 Jan 2022 15:33:29 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF816C07E2A1; Mon, 24 Jan 2022 11:45:48 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 8A2C1B811F9; Mon, 24 Jan 2022 19:45:47 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AA6F8C340E5; Mon, 24 Jan 2022 19:45:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643053546; bh=Hf36ntOYAnKrh82bMACnxeu8gNHCeUCilXw7+onLIuQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cvloL0rqGFmtYY2Nb2rQfe54ESQocfr5+M65dvmGgHItY5fcb86QBw/pgPoS4nffO cnpeNI03GJ6/MDkJqRbnwFTkpusml8Z/FyLyD41AfRlGkf8PIRuNHV+sI/Lg+3hToJ 9qJ+p898kRoDbj7wb4EZ50Lw5nn/y0aqlPxayJE8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marco Chiappero , Giovanni Cabiddu , Herbert Xu , Sasha Levin Subject: [PATCH 5.10 099/563] crypto: qat - remove unnecessary collision prevention step in PFVF Date: Mon, 24 Jan 2022 19:37:44 +0100 Message-Id: <20220124184027.824746602@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marco Chiappero [ Upstream commit e17f49bb244a281fe39bfdad0306a38b3a02e7bf ] The initial version of the PFVF protocol included an initial "carrier sensing" to get ownership of the channel. Collisions can happen anyway, the extra wait and test does not prevent collisions, it instead slows the communication down, so remove it. Signed-off-by: Marco Chiappero Reviewed-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 20 +------------------ 1 file changed, 1 insertion(+), 19 deletions(-) diff --git a/drivers/crypto/qat/qat_common/adf_pf2vf_msg.c b/drivers/crypto/qat/qat_common/adf_pf2vf_msg.c index e3da97286980e..d1dbf6216de57 100644 --- a/drivers/crypto/qat/qat_common/adf_pf2vf_msg.c +++ b/drivers/crypto/qat/qat_common/adf_pf2vf_msg.c @@ -120,28 +120,10 @@ static int __adf_iov_putmsg(struct adf_accel_dev *accel_dev, u32 msg, u8 vf_nr) goto out; } - /* Attempt to get ownership of PF2VF CSR */ msg &= ~local_in_use_mask; msg |= local_in_use_pattern; - ADF_CSR_WR(pmisc_bar_addr, pf2vf_offset, msg); - /* Wait in case remote func also attempting to get ownership */ - msleep(ADF_IOV_MSG_COLLISION_DETECT_DELAY); - - val = ADF_CSR_RD(pmisc_bar_addr, pf2vf_offset); - if ((val & local_in_use_mask) != local_in_use_pattern) { - dev_dbg(&GET_DEV(accel_dev), - "PF2VF CSR in use by remote - collision detected\n"); - ret = -EBUSY; - goto out; - } - - /* - * This function now owns the PV2VF CSR. The IN_USE_BY pattern must - * remain in the PF2VF CSR for all writes including ACK from remote - * until this local function relinquishes the CSR. Send the message - * by interrupting the remote. - */ + /* Attempt to get ownership of the PF2VF CSR */ ADF_CSR_WR(pmisc_bar_addr, pf2vf_offset, msg | int_bit); /* Wait for confirmation from remote func it received the message */ -- 2.34.1