Received: by 2002:a05:6a10:83d0:0:0:0:0 with SMTP id o16csp68638pxh; Thu, 7 Apr 2022 14:13:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxEOGr4qPmdPcD1XXvQP8SszI7UUt9h9ow5gqDbBmz6fFpLHLbfD8//FzLRyJQtXlVBqK+U X-Received: by 2002:a17:902:e141:b0:157:1113:57e with SMTP id d1-20020a170902e14100b001571113057emr3694345pla.112.1649366005022; Thu, 07 Apr 2022 14:13:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649366005; cv=none; d=google.com; s=arc-20160816; b=SDMYd1EOGsBi3LrxnFUkGbB8FEAIR8fBNxpcQkJw507iWMlNrvUE5N0MgnqxDKp43g b/GuzRpU5vaLyLYKAtW6bzC5mGyl53kJweKRMV7A3fsfZJwkm74bbp47+Sm/MgDA8zVN IU4gVoSbwkbb6gHPKrOE0e/M/S5jVw+XXzoSn/UfvqI7W0SyBmi8briBejZvsPZusyUC R5Z/ozXavqmkdrrpESVwQkddRzSEohr6PnOqoTJJKxPt3hJqN7sJPN7B8PuMBCkcotjd ritTKsF/MFm9LZPHe3Is1UOQdWYh2CWgUYwVlV1mMRwbvaG7XQcavRB4lzXPQPo46/bf NNoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:organization :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=A6rP39xMVfqvFV7zscm3qPLzdmKNcqGpBupZ4x5LioQ=; b=JVPzKqqflUglGF2hYXIkPYSsPDOTvvQDg4LN8lD6VCfiawTr+YCbt7HyAKvuP/x9Ch iP+lJgHt4rIvIRyeZr9ZLnkrl8hI9H4Iw7HRa4cIWqs0jfBU+LwmizTqft50+usKBRnq wUt839TLi7qvUVi56cS7FjyC1Lem2MBspAnBxHog7qAmq7dSScdwyQb4A4JWYXwPDcU0 t1D+m5pSSMwS+U+Dv0Bej/MjWyPPjtzkgMY22xfQp/NY/q84J53gnKgyUH5ziOtrHumX gV0VaJJ2GzO1l0ZBJNoIH6ABKNZt0/SanAAvvCqD/YEzJMxB9Tol3jtKo4eXJz7yDkCA h/Uw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Jjgr7HbC; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id f6-20020a655506000000b0039abb29d7b8si7152593pgr.397.2022.04.07.14.13.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 14:13:25 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Jjgr7HbC; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6382F44B478; Thu, 7 Apr 2022 13:05:33 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345857AbiDGQx1 (ORCPT + 99 others); Thu, 7 Apr 2022 12:53:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345862AbiDGQxW (ORCPT ); Thu, 7 Apr 2022 12:53:22 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ADA60C6EE8 for ; Thu, 7 Apr 2022 09:51:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649350277; x=1680886277; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=MYFEFSWz5boVOSRwjsbs8SCDfn1zJK3CrTcS9OsVqcw=; b=Jjgr7HbC8W8+OYIrGSzOEHu20o85uWjuJkx327Sz3owTYuzeYdqCKFfI W2avQUxuXKWRUSuxus2KOmgMCIglOU2E1eFT4JNLhFsn8RwWVhlKN6vTd bHoJL2wCSMf6AwuSP+sz1j2lvBhb8aVNJTWYtdFMmGhOog711mdeA6UB2 5xv9kjK+xth718bkBt6cQIdnUk6+zyED/rDpBR0x0Tlz2yoqNQRMWXjiF gf7x91rSBbfz3Ax9JELltAmqtXlbTy8pARGMxeG8WXcJe35tQwvwVYdxw /Ij2rzHhBVK24NqgzWAw4Snf2AL9rL7u1wZ/6X49yyit0ww0M64yzyv71 g==; X-IronPort-AV: E=McAfee;i="6400,9594,10310"; a="241312066" X-IronPort-AV: E=Sophos;i="5.90,242,1643702400"; d="scan'208";a="241312066" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Apr 2022 09:51:17 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,242,1643702400"; d="scan'208";a="652898365" Received: from silpixa00393544.ir.intel.com ([10.237.213.118]) by fmsmga002.fm.intel.com with ESMTP; 07 Apr 2022 09:51:15 -0700 From: Marco Chiappero To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, giovanni.cabiddu@intel.com, Marco Chiappero Subject: [PATCH v2 09/16] crypto: qat - test PFVF registers for spurious interrupts on GEN4 Date: Thu, 7 Apr 2022 17:54:48 +0100 Message-Id: <20220407165455.256777-10-marco.chiappero@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220407165455.256777-1-marco.chiappero@intel.com> References: <20220407165455.256777-1-marco.chiappero@intel.com> MIME-Version: 1.0 Organization: Intel Research and Development Ireland Ltd - Co. Reg. #308263 - Collinstown Industrial Park, Leixlip, County Kildare - Ireland Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Spurious PFVF interrupts can happen when either the ISR is invoked without a valid source being set or, otherwise, when no interrupt bit is set in the PFVF register containing the message. The latter test was present for GEN2 devices but missing for GEN4, this patch fills the gap. Signed-off-by: Marco Chiappero Reviewed-by: Giovanni Cabiddu --- drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/crypto/qat/qat_common/adf_gen4_pfvf.c b/drivers/crypto/qat/qat_common/adf_gen4_pfvf.c index d80d493a7756..f7860bf612da 100644 --- a/drivers/crypto/qat/qat_common/adf_gen4_pfvf.c +++ b/drivers/crypto/qat/qat_common/adf_gen4_pfvf.c @@ -96,10 +96,16 @@ static struct pfvf_message adf_gen4_pfvf_recv(struct adf_accel_dev *accel_dev, u32 pfvf_offset, u8 compat_ver) { void __iomem *pmisc_addr = adf_get_pmisc_base(accel_dev); + struct pfvf_message msg = { 0 }; u32 csr_val; /* Read message from the CSR */ csr_val = ADF_CSR_RD(pmisc_addr, pfvf_offset); + if (!(csr_val & ADF_PFVF_INT)) { + dev_info(&GET_DEV(accel_dev), + "Spurious PFVF interrupt, msg 0x%.8x. Ignored\n", csr_val); + return msg; + } /* We can now acknowledge the message reception by clearing the * interrupt bit -- 2.34.1