Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3517935pxb; Mon, 4 Apr 2022 19:37:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy29/trVklLDgZ9eu3oKijNzLfo/9oPIa/QEP50FS6CdjEMlAp65XKFmCHfdpJCypdPCndV X-Received: by 2002:a17:90b:390c:b0:1c7:9a94:1797 with SMTP id ob12-20020a17090b390c00b001c79a941797mr1514342pjb.221.1649126240895; Mon, 04 Apr 2022 19:37:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649126240; cv=none; d=google.com; s=arc-20160816; b=BFnkPYdVWdZN0MiRWVFwvvZTX6HBm/CFIl/uXh4ugOj/OKaSzYKxKisZcRbiFgMAtA fEr9ZFNkfjj6o/T6IZCdD+I8OZxOS04hylMalxT0g0mPcdrdQZ0IFmIk2ChYS1SfHGLF 6OLeTwG7Dwy7Wj1KTG/Ki6vscBWgMIm0GFZXFtVAUIVVJWKdKwfMqqEcmcMZU0LVlJ65 zIqL79SLJdsQ2tEPWQ+kAVMOdSeGDe/ad5VpaFUAscRIi+EHlm/VLamylvrfmhhfQ5NC GqppJQ0mLwVQq154LjK6skKVFrAdPX5H/VZGuNYhokDq2/1EVIdIlTSXQuASwAT+xSb4 Vi0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=m4jwi5/2nUR/8H7G0DvUFxXxEPoV5b39RUqC3IHdxHA=; b=up1TZJ+OSnRvhfSUvRymDquUZhD5Qcck/Sc5ScLSN0ujy4PMzncoVrewxwZrdbIyA0 WTKwXVN8DrT8Rt6WapIdXhWFd6Mo1mprjc68IM7SSnoSGu4ItUHUh6FZssBnsG3ntyAu f7Do4P8b0Ap8fv9Jgu22Dnvn8ZGeQj3g1zrS181kaQ7RifJWC1I8ST1dbttkplBhnJHR TDHxhr/KEMfGivIqbRaSsCNv1p1K+ftIZrRZjb0Lx17RDsN1ZWizEvgkKdZYIJ6jYLG3 5VH/LSOva8IANIwDYpVvAV/YuD6hu0XUcrwf2mq7MqoojPNQZgoc/g0sVcplhvrMEcBU d7gA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cwh2TTC3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id h8-20020a656388000000b00398068cc21bsi12223147pgv.0.2022.04.04.19.37.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:37:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cwh2TTC3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id ED1A72C738F; Mon, 4 Apr 2022 18:00:52 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239967AbiDDMLM (ORCPT + 99 others); Mon, 4 Apr 2022 08:11:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43162 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238824AbiDDMLK (ORCPT ); Mon, 4 Apr 2022 08:11:10 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF2471403D; Mon, 4 Apr 2022 05:08:41 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8B16D61021; Mon, 4 Apr 2022 12:08:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7900FC340EE; Mon, 4 Apr 2022 12:08:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1649074121; bh=nPe/HQ//FKscyeabci6+QLSF2pg4qr1Hh7sEKZFl5bA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cwh2TTC3WEBl72sWcAcoULahp+zU7+K/IWcOnzrxlgOR5YdVaSrvIzJDk+eIW8ZzO 5kH/fJYI0oL12iywwUV8N21LHJBoQp8VtyDN3EnFxmqjIuMGSSdlsqHEZv1K4UTCD2 3yLC0dUctx+DhkCnyxzVhkTW7KjIHhK6vuuAGlX9WzzIys50Uz/1d65s0oIVT7SqsJ uZIDbX6Mvp2UF/JJ77iHGes52+OALUpk9TxFFn3TATFF0Z60j4qRgs1H48mKZ/dEJT iwSH7l3mJlvkwNkePAyc6K+3/5H3H9DEqY8l8oQwVNeXTiTEu48HPgbeV3RK7LvZZg B9byBa0RUYHBg== From: Leon Romanovsky To: Jakub Kicinski , Paolo Abeni Cc: Leon Romanovsky , Jason Gunthorpe , linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org, netdev@vger.kernel.org, Saeed Mahameed , Tariq Toukan Subject: [PATCH mlx5-next 2/5] net/mlx5: Reliably return TLS device capabilities Date: Mon, 4 Apr 2022 15:08:16 +0300 Message-Id: X-Mailer: git-send-email 2.35.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Leon Romanovsky The capabilities returned from the FW are independent to the compiled kernel and traditionally rely on the relevant CAPs bit only. The mlx5_accel_is_ktls_*() functions are compiled out if CONFIG_MLX5_TLS is not set, which "hides" from the user the information that TLS can be enabled on this device. Reviewed-by: Tariq Toukan Signed-off-by: Leon Romanovsky --- drivers/net/ethernet/mellanox/mlx5/core/fw.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/net/ethernet/mellanox/mlx5/core/fw.c b/drivers/net/ethernet/mellanox/mlx5/core/fw.c index 614687e0e3d9..cfb8bedba512 100644 --- a/drivers/net/ethernet/mellanox/mlx5/core/fw.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/fw.c @@ -35,7 +35,6 @@ #include "mlx5_core.h" #include "../../mlxfw/mlxfw.h" #include "lib/tout.h" -#include "accel/tls.h" enum { MCQS_IDENTIFIER_BOOT_IMG = 0x1, @@ -249,7 +248,7 @@ int mlx5_query_hca_caps(struct mlx5_core_dev *dev) return err; } - if (mlx5_accel_is_ktls_tx(dev) || mlx5_accel_is_ktls_rx(dev)) { + if (MLX5_CAP_GEN(dev, tls_tx) || MLX5_CAP_GEN(dev, tls_rx)) { err = mlx5_core_get_caps(dev, MLX5_CAP_TLS); if (err) return err; -- 2.35.1