Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3506605pxb; Mon, 4 Apr 2022 19:11:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxun4R2AOfte0nC+Y60l9o8sn3g2dSQ0U0+dPY2Z0lFDklKpIkB1dsABHqpdzwpenjzwQ1z X-Received: by 2002:a17:902:8a94:b0:156:1b99:f9d6 with SMTP id p20-20020a1709028a9400b001561b99f9d6mr1040331plo.49.1649124659972; Mon, 04 Apr 2022 19:10:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649124659; cv=none; d=google.com; s=arc-20160816; b=Nq9w2BF0Czv7iQ7sJHkoZRZfVlAm9UYrQokzamLJjDs+hQt+hqp94BAd0sGINvlG6s UaGzmCuP32636EyeVF1gaFf5qmyanYoCrZUxh3PPJmlM50jK7ut3JElcFDwDn8QYnIBP LlC8GsbGRiyk5fSXOzLKgbmsilEza3cX8y8QWY90BQOnzmOP+7iQzmV2K47PE/Au5VBD Su/Ra52iV378MoZDrnA217PxHs7vFHBVC4c2QhBdMP4q7J6EqN/a8zMPPKqBi0rojvAW 4eNUes4mmbOosgQEWe4NKa/ARV2/Clu30HyHQqNVns25Mpf1uFQXBcjbRrLgYy+NJEJT 5ITg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:organization :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=rCzz0EeTWewnoNpgnKqV6avWTK3c//UPk57pNjRoXpY=; b=xcL7XSl8ZIHy1ulLb0JLTlq7zTSX5/v5WbfFU/1+/exPk2I5gNqFDPZocjxyq0zYfV rp5sMbl4wqELR0y8pNOSgq/prD8S3iiBUnKnJ7zL5j1Rz6L9If8o7wtzkJywcKCd60gw tX7Y6VmCt5lw4ml6Pe9YE5D0Zce42E18azjHK9hbK0mqfXpprtYzCGG8ydmdTf5sub/I 0wKfa3uqtzynrf9tJTFWzXJERvi8W2u6Kq0gVVHj5yLOnwCH402S/p/OvzlfeND+sDLE l6rbeHCP9Swr5xaxo0pOCDFCyCb5xpfUKrDkEDY9z+hSgOtuD2ugF7JeWT1trOOImBTA xpeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PHS02eUp; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id j10-20020a056a00234a00b004fa69c325d2si12929820pfj.253.2022.04.04.19.10.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:10:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PHS02eUp; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6882F2560E2; Mon, 4 Apr 2022 17:34:00 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349018AbiDDOgo (ORCPT + 99 others); Mon, 4 Apr 2022 10:36:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39676 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241508AbiDDOgm (ORCPT ); Mon, 4 Apr 2022 10:36:42 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 151C8120B9 for ; Mon, 4 Apr 2022 07:34:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649082887; x=1680618887; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=Z+hMswjv5+YdlF7qPTqTVspbOeJZPEQyjAUdWq0ZysA=; b=PHS02eUpb2NGbtbnmHpcnJRglAXdm0oSYPvRi8XwR1K/iiQO7z9RaFeJ N3xl52wYq4ZQ38ncYagG3hLFkzpBsEEEEEh/7qAD4LQEC/4Y9TCzBi6M3 GpOm26fXQkU5um6lpryxIoVJGnEQzrlL5mFVvvtK68VQGX00WW8H4f50M tNarLoHJCbbqhUcANnuVwAVUJSlgMMGoe7rBM1UMRauzht+VZkG/V94RT zP7xya6QEKumkw2e090bg76woJST0/ZLay37Diol6/5nSVWDpTlI1AUE+ hvG2ThD1vfQtFM6vGl6xeiUWrHGf/4wSPYZqZxIbNlot+CzMipQ7Ql17J A==; X-IronPort-AV: E=McAfee;i="6200,9189,10307"; a="260704458" X-IronPort-AV: E=Sophos;i="5.90,234,1643702400"; d="scan'208";a="260704458" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2022 07:34:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,234,1643702400"; d="scan'208";a="657521384" Received: from silpixa00393544.ir.intel.com ([10.237.213.118]) by orsmga004.jf.intel.com with ESMTP; 04 Apr 2022 07:34:44 -0700 From: Marco Chiappero To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, giovanni.cabiddu@intel.com, Marco Chiappero Subject: [PATCH 0/8] crypto: qat - misc fixes Date: Mon, 4 Apr 2022 15:38:21 +0100 Message-Id: <20220404143829.147404-1-marco.chiappero@intel.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Organization: Intel Research and Development Ireland Ltd - Co. Reg. #308263 - Collinstown Industrial Park, Leixlip, County Kildare - Ireland Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This set contains a collection of fixes for DH895XCC (the first two patches) and PFVF (the rest of the set). Patches one and two correct the lack of necessary flags to indicate the presence of specific HW capabilities, which could result in VFs unable to work correctly. The third patch removes redundant PFVF code, while the fourth one addresses a problem which caused lost PFVF messages due to unhandled interrupts during bursts of PFVF messages from multiple VFs. This was usually noticeable when restarting many VMs/VFs at the same time. The remainder of the set is a refactoring resulting from the previous fix, but to ease the review. Giovanni Cabiddu (3): crypto: qat - set CIPHER capability for DH895XCC crypto: qat - set COMPRESSION capability for DH895XCC crypto: qat - remove unused PFVF stubs Marco Chiappero (5): crypto: qat - rework the VF2PF interrupt handling logic crypto: qat - leverage the GEN2 VF mask definiton crypto: qat - replace disable_vf2pf_interrupts() crypto: qat - use u32 variables in all GEN4 pfvf_ops crypto: qat - remove line wrapping for pfvf_ops functions .../crypto/qat/qat_common/adf_accel_devices.h | 4 +- .../crypto/qat/qat_common/adf_common_drv.h | 18 +-- drivers/crypto/qat/qat_common/adf_gen2_pfvf.c | 78 ++++++++----- drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 55 ++++++--- drivers/crypto/qat/qat_common/adf_isr.c | 21 ++-- drivers/crypto/qat/qat_common/adf_sriov.c | 2 +- .../qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 110 +++++++++++------- 7 files changed, 168 insertions(+), 120 deletions(-) base-commit: d6de7d2f20455c0239fbcc3e79e929ba068b6740 -- 2.34.1