Received: by 2002:a05:6a10:83d0:0:0:0:0 with SMTP id o16csp52187pxh; Thu, 7 Apr 2022 13:42:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3SbYF2a19UOGyH4XKC7cI50QOSEFMRMUHxPtryVh5dcP+98ML0PMPl/yoPqJsEwZD2hD4 X-Received: by 2002:a17:902:dac2:b0:156:a7f5:bc3d with SMTP id q2-20020a170902dac200b00156a7f5bc3dmr15993266plx.76.1649364173833; Thu, 07 Apr 2022 13:42:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649364173; cv=none; d=google.com; s=arc-20160816; b=BYfgHImjE/YP4twVpa4hDYvWsPLB3F4NMcQkeHWNV0fbiOV+5JNCWDtgzuE8qjXPeJ hKk20rOHs2wbpE53eHgDHosBYpylss4OItvNukbM6LuHDdq0mmOfPej/OSvnLwLw2hdQ fBHD22+u5mZxRSnQBHeMsM3t6PMoH9w4FDrKM3sgW5DCxhNKCJrPxOyec5QGlbWJij9Q 2cu2mhMvJrU6mKLapfPt5EObHWQC6/LyiwgS2s5uYBOKkcdhWvXctUtUMDSWseQ+VAOL fqzvFVUT5yeZ/fEl+5fS/8IRUr2+Mh+/hFUbnLG75XZuDsJcd7mi6o5MMsqSkWNM1PVy ubgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:organization :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3q8fcqfYJqYw4Vdj0D+ZTIfrLh5anlI7juNek441TOI=; b=vfxkOvXbvCOW4mZKzPyOCbmviJIcNXUtAlEFW2iv2JfmEcbuPd9vpbkhG0Q//VSHDO 89xl/Mrmbjdu/diLccpI0/VMy2Mw1ymk0B+hXJqisrPhp8AUMPS+6wXETvrOmgtBSEx2 U8XQBTN4tnRT2hjhgRM6lr6Itj0ak5anYnV7RsNsJrrkAyVLnkIcHCE90DBMTPPdCf25 d/gbVmv33JaVb4Qcn3Jqhz5lq/YCHpT2LGrID5+PSn8RHc2a4TzXNtg8bVOmPKW6Hkhi LeTSu3n/S446vdFb02VZJi6I5K351Qg3hnhwsQEJ02Hjmv/zOxF4Z/LWV3vSJ0W4Tw5e Qyqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=H5uDo5M7; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id s8-20020a632c08000000b003816043f13csi19411198pgs.817.2022.04.07.13.42.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 13:42:53 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=H5uDo5M7; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5A1C13C2134; Thu, 7 Apr 2022 12:51:50 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345841AbiDGQxX (ORCPT + 99 others); Thu, 7 Apr 2022 12:53:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48886 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345849AbiDGQxN (ORCPT ); Thu, 7 Apr 2022 12:53:13 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF14382332 for ; Thu, 7 Apr 2022 09:51:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649350272; x=1680886272; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=58saA/o1EdZ3a1m4vHbQDfSobGluPWIU6nJJlJKRTNQ=; b=H5uDo5M764MhFAvHKfSD7qWf7NqWNGF/A2r+x/B/z7tdS3wjOw882tv1 AsUmAaHrigI3G+hq5ga8gpw6LeSc2IrRMlQfE3vYxUoROt6l/XUaT+l/i ST4+5gvarn8i8UfvjYlxY1isZqWTu2IYQ2fJY3FLq2FS2+yx/jtQRnOaB k7wB4WhHQL/WSVloNmgaD0vVpcLW8dB8vBFqogDSBukRzajtqfiaXOsdk N/N5YKHQkmJEvnlKWRYAPLfjAUGFOlTm1RwnHlDx88a5qD+7yKX3X9cXS TmznSaZKaIQM1ZMwi+6+UdgCrtNYC7WDEKOthmc3neLSDZK5KmnIN9r4j g==; X-IronPort-AV: E=McAfee;i="6400,9594,10310"; a="241312047" X-IronPort-AV: E=Sophos;i="5.90,242,1643702400"; d="scan'208";a="241312047" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Apr 2022 09:51:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,242,1643702400"; d="scan'208";a="652898351" Received: from silpixa00393544.ir.intel.com ([10.237.213.118]) by fmsmga002.fm.intel.com with ESMTP; 07 Apr 2022 09:51:11 -0700 From: Marco Chiappero To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, giovanni.cabiddu@intel.com, Marco Chiappero Subject: [PATCH v2 06/16] crypto: qat - remove unnecessary tests to detect PFVF support Date: Thu, 7 Apr 2022 17:54:45 +0100 Message-Id: <20220407165455.256777-7-marco.chiappero@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220407165455.256777-1-marco.chiappero@intel.com> References: <20220407165455.256777-1-marco.chiappero@intel.com> MIME-Version: 1.0 Organization: Intel Research and Development Ireland Ltd - Co. Reg. #308263 - Collinstown Industrial Park, Leixlip, County Kildare - Ireland Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Previously, the GEN4 host driver supported SR-IOV but had no working implementation of the PFVF protocol to communicate with VF drivers. Since all the host drivers for QAT devices now support both SR-IOV and PFVF, remove the old and unnecessary checks to test PFVF support. Signed-off-by: Marco Chiappero Reviewed-by: Giovanni Cabiddu --- drivers/crypto/qat/qat_common/adf_sriov.c | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/drivers/crypto/qat/qat_common/adf_sriov.c b/drivers/crypto/qat/qat_common/adf_sriov.c index 81f484cbad3d..71d75f65b504 100644 --- a/drivers/crypto/qat/qat_common/adf_sriov.c +++ b/drivers/crypto/qat/qat_common/adf_sriov.c @@ -74,8 +74,7 @@ static int adf_enable_sriov(struct adf_accel_dev *accel_dev) hw_data->configure_iov_threads(accel_dev, true); /* Enable VF to PF interrupts for all VFs */ - if (hw_data->pfvf_ops.get_pf2vf_offset) - adf_enable_vf2pf_interrupts(accel_dev, BIT_ULL(totalvfs) - 1); + adf_enable_vf2pf_interrupts(accel_dev, BIT_ULL(totalvfs) - 1); /* * Due to the hardware design, when SR-IOV and the ring arbiter @@ -104,14 +103,11 @@ void adf_disable_sriov(struct adf_accel_dev *accel_dev) if (!accel_dev->pf.vf_info) return; - if (hw_data->pfvf_ops.get_pf2vf_offset) - adf_pf2vf_notify_restarting(accel_dev); - + adf_pf2vf_notify_restarting(accel_dev); pci_disable_sriov(accel_to_pci_dev(accel_dev)); /* Disable VF to PF interrupts */ - if (hw_data->pfvf_ops.get_pf2vf_offset) - adf_disable_vf2pf_interrupts(accel_dev, GENMASK(31, 0)); + adf_disable_vf2pf_interrupts(accel_dev, GENMASK(31, 0)); /* Clear Valid bits in AE Thread to PCIe Function Mapping */ if (hw_data->configure_iov_threads) -- 2.34.1