Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1118013ybh; Thu, 23 Jul 2020 00:23:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPCg9CR8kUwdhBWT0cDLHQT9GnRUNLMz666nK0GIhZ5JUByMvsA2eNQeJeiHauSsh9NBQo X-Received: by 2002:a50:cbcd:: with SMTP id l13mr2875928edi.384.1595489033541; Thu, 23 Jul 2020 00:23:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595489033; cv=none; d=google.com; s=arc-20160816; b=CJ2zenknXJuX0QEU8sA+ryFqkNW10d50ymtM8B2obYkSqRwywM7hgy4n6kNq+IgKv/ HcOfbEvEIpDrIXHAlnJPkoQzBSHzWl1524PpRTzHGIab2Taz1t5JWgSyAjknI7Ovw+8r DnqBOFycSR8ZTTI/ktSFqgaBa/qFaDwTa4AJXLxGxLI2BqEDWSbPcL0sCagj1O9qj4uk jk3Cw3r/U1ljVVAmsaEKmiitbenaz6IjOYTqXYa7uvtc1NBMx+ot0Vl4JwD0041jUxKw oa3EUOMp6z+XlGGvIHS4QafnFGdCqkX6Jqb9NRvdcsX2RmPFyn3V4vFCeXjtq1B+noTN DZeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=yLnYOoq0uM2EwZGMaqw6CdqusLhj3hUxhoXNwujFcKw=; b=SOcP1HXQSbVDopcrLg/00XP0NJEIZ8zgoNEbeNG+X7E8BSokVD97FDrFl0oUym9gl/ eFUj2xY3ASIylQvjPEK464BiBwhJRLAT160EEpyicnAPisPinwroa5L/aO9bITX12SOA SHLVQwbIvsK2839OrgZyi+OJ6RwKJlBxfjsxmzxuP1deoh8jI+XbS6i7i8SwXHbOLLjB ofOdMOdZrtdf6/Q2zsm/dEbRydh1+Y2+RjqTL7c2Z8wN9mD3V0K2f+/bGmL0SfzW5Zl1 ImN95cIutfkGOJ+dQr/0n4bvPiudieD/z3a2HVTS/09ED8ndfte2NCRqwtDA7Ge07fBS HpxQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 7si223138edh.348.2020.07.23.00.23.30; Thu, 23 Jul 2020 00:23:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726931AbgGWHWE (ORCPT + 99 others); Thu, 23 Jul 2020 03:22:04 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:8361 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726956AbgGWHWE (ORCPT ); Thu, 23 Jul 2020 03:22:04 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 1CE4FF507321F7B980D2; Thu, 23 Jul 2020 15:21:52 +0800 (CST) Received: from localhost.localdomain (10.69.192.56) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.487.0; Thu, 23 Jul 2020 15:21:45 +0800 From: Yang Shen To: , CC: , , Subject: [PATCH v3 09/10] crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown' Date: Thu, 23 Jul 2020 15:19:39 +0800 Message-ID: <1595488780-22085-10-git-send-email-shenyang39@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1595488780-22085-1-git-send-email-shenyang39@huawei.com> References: <1595488780-22085-1-git-send-email-shenyang39@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-CFilter-Loop: Reflected Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Since the drivers such as HPRE/SEC/ZIP do not implement 'pci_driver.shutdow', a RAS will be triggered at OS rebooting or shutting down as the hardware device is processing request. The log looks like this: NOTICE: [NimbusSecNodeType1]:[2372L]This is sec, Base = 0x141800000 NOTICE: [NimbusSecHandle]:[2319L] SecIntSt = 0x3 NOTICE: [NimbusSecHandle]:[2320L] SecQmIntStatus = 0x2 NOTICE: [PrintSecurityType]:[344L] SecurityType is RECOVERABLE! This patch offers a new API in qm to shutdown devices, and add shutdown callbacks in ACC driver based on this new API. So the running devices will be stopped when the OS reboot or shutdown. Signed-off-by: Yang Shen Reviewed-by: Zhou Wang --- drivers/crypto/hisilicon/hpre/hpre_main.c | 1 + drivers/crypto/hisilicon/qm.c | 17 +++++++++++++++++ drivers/crypto/hisilicon/qm.h | 1 + drivers/crypto/hisilicon/sec2/sec_main.c | 1 + drivers/crypto/hisilicon/zip/zip_main.c | 1 + 5 files changed, 21 insertions(+) diff --git a/drivers/crypto/hisilicon/hpre/hpre_main.c b/drivers/crypto/hisilicon/hpre/hpre_main.c index 9bb6f5a..f3436f70 100644 --- a/drivers/crypto/hisilicon/hpre/hpre_main.c +++ b/drivers/crypto/hisilicon/hpre/hpre_main.c @@ -939,6 +939,7 @@ static struct pci_driver hpre_pci_driver = { .sriov_configure = IS_ENABLED(CONFIG_PCI_IOV) ? hisi_qm_sriov_configure : NULL, .err_handler = &hpre_err_handler, + .shutdown = hisi_qm_dev_shutdown, }; static void hpre_register_debugfs(void) diff --git a/drivers/crypto/hisilicon/qm.c b/drivers/crypto/hisilicon/qm.c index fa371ed..cc3a41c 100644 --- a/drivers/crypto/hisilicon/qm.c +++ b/drivers/crypto/hisilicon/qm.c @@ -3836,6 +3836,23 @@ static int qm_irq_register(struct hisi_qm *qm) return ret; } +/** + * hisi_qm_dev_shutdown() - Shutdown device. + * @pdev: The device will be shutdown. + * + * This function will stop qm when OS shutdown or rebooting. + */ +void hisi_qm_dev_shutdown(struct pci_dev *pdev) +{ + struct hisi_qm *qm = pci_get_drvdata(pdev); + int ret; + + ret = hisi_qm_stop(qm, QM_NORMAL); + if (ret) + dev_err(&pdev->dev, "Fail to stop qm in shutdown!\n"); +} +EXPORT_SYMBOL_GPL(hisi_qm_dev_shutdown); + static void hisi_qm_controller_reset(struct work_struct *rst_work) { struct hisi_qm *qm = container_of(rst_work, struct hisi_qm, rst_work); diff --git a/drivers/crypto/hisilicon/qm.h b/drivers/crypto/hisilicon/qm.h index bd00897..233ed09e 100644 --- a/drivers/crypto/hisilicon/qm.h +++ b/drivers/crypto/hisilicon/qm.h @@ -378,4 +378,5 @@ int hisi_qm_alloc_qps_node(struct hisi_qm_list *qm_list, int qp_num, void hisi_qm_free_qps(struct hisi_qp **qps, int qp_num); int hisi_qm_alg_register(struct hisi_qm *qm, struct hisi_qm_list *qm_list); void hisi_qm_alg_unregister(struct hisi_qm *qm, struct hisi_qm_list *qm_list); +void hisi_qm_dev_shutdown(struct pci_dev *pdev); #endif diff --git a/drivers/crypto/hisilicon/sec2/sec_main.c b/drivers/crypto/hisilicon/sec2/sec_main.c index e06172c..7751ab27 100644 --- a/drivers/crypto/hisilicon/sec2/sec_main.c +++ b/drivers/crypto/hisilicon/sec2/sec_main.c @@ -949,6 +949,7 @@ static struct pci_driver sec_pci_driver = { .remove = sec_remove, .err_handler = &sec_err_handler, .sriov_configure = hisi_qm_sriov_configure, + .shutdown = hisi_qm_dev_shutdown, }; static void sec_register_debugfs(void) diff --git a/drivers/crypto/hisilicon/zip/zip_main.c b/drivers/crypto/hisilicon/zip/zip_main.c index 996d7ae..d8ed450 100644 --- a/drivers/crypto/hisilicon/zip/zip_main.c +++ b/drivers/crypto/hisilicon/zip/zip_main.c @@ -880,6 +880,7 @@ static struct pci_driver hisi_zip_pci_driver = { .sriov_configure = IS_ENABLED(CONFIG_PCI_IOV) ? hisi_qm_sriov_configure : NULL, .err_handler = &hisi_zip_err_handler, + .shutdown = hisi_qm_dev_shutdown, }; static void hisi_zip_register_debugfs(void) -- 2.7.4