Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp1732634pxb; Mon, 12 Apr 2021 05:35:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz1KAWNCakgkSC871YubMFfay8C1P7cr+U3eWZe1hS+skZ+RG+zFDozh3zavifYqBiZ1fMg X-Received: by 2002:a05:6402:4386:: with SMTP id o6mr30430312edc.307.1618230900478; Mon, 12 Apr 2021 05:35:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618230900; cv=none; d=google.com; s=arc-20160816; b=FEZzdOTU8kOXH601jQzKIhX3/GvU0ZLiE47NgH2Qu9SzPasNVeSE+kwVzZMbu0OTzX DLTPZzw75/zfKnjm6cX+glJ19XrFZsiXw1PweHlIdiRkVXoW+dxEYjn0BJwM1zZijTc1 mTXHDCHtB2DK0Of1/OCC6smlbYH271PWVT9/AE/HS1fWRGV/M+yNCPeT5HWFRHqxldSG /t1x/uCUeGvnRUzGIRilZLP90lsf6FR6iXQxqsDT2NNtFFwCX5mU3gzSiDzFje/nX5jV feGIeVsY/2BHtiCDiwxyd9PppsP3F59B1rbhqxkSXQgD/hLj9zs1OUkLod9EtvYrkMsQ nMCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=vnFz708JzrsIBugr9WKq1sPqiwO6G/ZicCBXFG5f9Io=; b=wafG0du4rD8Y4L2BFHNBhdKDRNBykpix/s0PPkcnaUjnkMDgY/8h3d7zLSoOU7Xaqr jcRH3GJUqVvNwxzPye/udRovQvi6CvjBsBZni8k6RCADcVUs4UXzY7nlKsXECPostCLD zxBfD30ul0hIdOm2izEhM4NhDIef2uJQGmsk4kCUaJLoAqA52fdiodgeAHPTmArAHxpj rHfq7UQnJuXmG4PikvqACEr/bJDGsU0ROuou/QYX56dEYdBHi7/MCsDt+fFFkbyze/JT nzVrtXx7pf3BWDyRsEAnPAcJiG0rmowm5KvrEneUUcql/dvNhby8nSOK/Y8SoYZJcUah Qc/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gy3si7578184ejb.557.2021.04.12.05.34.37; Mon, 12 Apr 2021 05:35:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241061AbhDLMeq (ORCPT + 99 others); Mon, 12 Apr 2021 08:34:46 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:16575 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239097AbhDLMep (ORCPT ); Mon, 12 Apr 2021 08:34:45 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.60]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4FJp5l16cRz18H3G; Mon, 12 Apr 2021 20:32:11 +0800 (CST) Received: from localhost.localdomain (10.67.165.24) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.498.0; Mon, 12 Apr 2021 20:34:18 +0800 From: Weili Qian To: , CC: , , , , , Weili Qian Subject: [PATCH 3/4] crypto: hisilicon - add new error type for SEC Date: Mon, 12 Apr 2021 20:31:34 +0800 Message-ID: <1618230695-22775-4-git-send-email-qianweili@huawei.com> X-Mailer: git-send-email 2.8.1 In-Reply-To: <1618230695-22775-1-git-send-email-qianweili@huawei.com> References: <1618230695-22775-1-git-send-email-qianweili@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Kunpeng930 SEC adds several new hardware error types. This patch enables the new error types and configures the error types as NFE. Signed-off-by: Weili Qian --- drivers/crypto/hisilicon/sec2/sec_main.c | 26 +++++++++++++++++++++++--- 1 file changed, 23 insertions(+), 3 deletions(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_main.c b/drivers/crypto/hisilicon/sec2/sec_main.c index 26b9904..6f0062d 100644 --- a/drivers/crypto/hisilicon/sec2/sec_main.c +++ b/drivers/crypto/hisilicon/sec2/sec_main.c @@ -42,8 +42,8 @@ #define SEC_ECC_NUM 16 #define SEC_ECC_MASH 0xFF #define SEC_CORE_INT_DISABLE 0x0 -#define SEC_CORE_INT_ENABLE 0x1ff -#define SEC_CORE_INT_CLEAR 0x1ff +#define SEC_CORE_INT_ENABLE 0x7c1ff +#define SEC_CORE_INT_CLEAR 0x7c1ff #define SEC_SAA_ENABLE 0x17f #define SEC_RAS_CE_REG 0x301050 @@ -51,7 +51,7 @@ #define SEC_RAS_NFE_REG 0x301058 #define SEC_RAS_CE_ENB_MSK 0x88 #define SEC_RAS_FE_ENB_MSK 0x0 -#define SEC_RAS_NFE_ENB_MSK 0x177 +#define SEC_RAS_NFE_ENB_MSK 0x7c177 #define SEC_RAS_DISABLE 0x0 #define SEC_MEM_START_INIT_REG 0x301100 #define SEC_MEM_INIT_DONE_REG 0x301104 @@ -147,6 +147,26 @@ static const struct sec_hw_error sec_hw_errors[] = { .int_msk = BIT(8), .msg = "sec_chain_buff_err_rint" }, + { + .int_msk = BIT(14), + .msg = "sec_no_secure_access" + }, + { + .int_msk = BIT(15), + .msg = "sec_wrapping_key_auth_err" + }, + { + .int_msk = BIT(16), + .msg = "sec_km_key_crc_fail" + }, + { + .int_msk = BIT(17), + .msg = "sec_axi_poison_err" + }, + { + .int_msk = BIT(18), + .msg = "sec_sva_err" + }, {} }; -- 2.8.1