Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp283575iog; Wed, 15 Jun 2022 02:08:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIPEuczJpeFuakoGxO+mYloXXHsI0Ihd5zlTfSjlJhI82LiIU+YW0iTnyJQn53bt5yHoZD X-Received: by 2002:a17:907:72d2:b0:703:9177:7d1f with SMTP id du18-20020a17090772d200b0070391777d1fmr7798388ejc.144.1655284139491; Wed, 15 Jun 2022 02:08:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655284139; cv=none; d=google.com; s=arc-20160816; b=yJlzggKNhXygELyAYC8P2DrG6RRN5IfP6dvP42uM4Rlo5s78ozYwPG1VSpwyHSrTpc YHtiUCvCbMVoZEcATbZ20NGClFVpv+nYXhHwskQFncv4TlWwWbgPxVjMsIP7ms98kWx5 y1O0fuc2b6emuDvpsi+8iiCi62jsERnXdK3RXSpI4hAETfAwiGidhBu96Kez5YUtK6MU jiu7wKLeK70T9JR1Swjhb92CaD5/A21VOXumyn2NaB9/Nki4yS4F3CBDtqzaM5P8WBys 1bQIoZIxAUEM3LwBC+6Yw/v3XX2sMHUARcwWOpC9TZeFtBdZ5ZuA/6qieJi/9MSLVpou hWdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=Tfr/Lycg/dWxV/LvrKi08B8CBsF9svyAmTC1yh8rMHA=; b=YipiJMRQfcixzxG1P/hs8TlTcT/a/yu+NDD0/ksfW14Zh8K9m8zmRHTc8z9mRloYoS 2xw1IMXpTmZir6Cci6jlFcidPgtpwg74qqKGtcnBbKiQamofmVCKHyl5i3RY/A+jYfoW xaQ9oqskEA1CL5HfNSdZ7fkGxeqK4NUYWqLN6HNJv4Ran1hPdJnq5hJAdvCiLJjYF5kJ Bmx5uIcOPptjUq4hnz5YOBpDdWra3kR6CmE8Yc+U2J8yIADsFHg6En7tUzhxYy/sgKYX x67qj0idkwNOUpvUiJ2gGHe7ll2XYl//p27GvxEt/gmowxExTwBGyvfEulKdn05ea+aB 5qvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hp2-20020a1709073e0200b0071200c8fa60si16998040ejc.596.2022.06.15.02.08.12; Wed, 15 Jun 2022 02:08:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344217AbiFOJH1 (ORCPT + 99 others); Wed, 15 Jun 2022 05:07:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46218 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343721AbiFOJHG (ORCPT ); Wed, 15 Jun 2022 05:07:06 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2BE43C4B0; Wed, 15 Jun 2022 02:07:00 -0700 (PDT) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.56]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4LNKBj0LfPz1K9tt; Wed, 15 Jun 2022 17:05:01 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 15 Jun 2022 17:06:58 +0800 Received: from [10.67.103.212] (10.67.103.212) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 15 Jun 2022 17:06:58 +0800 Subject: Re: [PATCH v2 1/3] uacce: supports device isolation feature To: Jonathan Cameron , "Kai Ye via Linux-accelerators" References: <20220614122943.1406-1-yekai13@huawei.com> <20220614122943.1406-2-yekai13@huawei.com> <20220615095211.00000889@Huawei.com> CC: , , , , , , From: "yekai(A)" Message-ID: <1ed2dd0a-cf8c-3540-928e-53c7b6d2a2d1@huawei.com> Date: Wed, 15 Jun 2022 17:06:58 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: <20220615095211.00000889@Huawei.com> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.103.212] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-5.4 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 2022/6/15 16:52, Jonathan Cameron wrote: > On Tue, 14 Jun 2022 20:29:38 +0800 > Kai Ye via Linux-accelerators wrote: > >> UACCE add the hardware error isolation API. Users can configure >> the error frequency threshold by this vfs node. This API interface >> certainly supports the configuration of user protocol strategy. Then >> parse it inside the device driver. UACCE only reports the device >> isolate state. When the error frequency is exceeded, the device >> will be isolated. The isolation strategy should be defined in each >> driver module. >> >> Signed-off-by: Kai Ye >> Reviewed-by: Zhou Wang >> --- >> drivers/misc/uacce/uacce.c | 37 +++++++++++++++++++++++++++++++++++++ >> include/linux/uacce.h | 16 +++++++++++++--- >> 2 files changed, 50 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/misc/uacce/uacce.c b/drivers/misc/uacce/uacce.c >> index b6219c6bfb48..525623215132 100644 >> --- a/drivers/misc/uacce/uacce.c >> +++ b/drivers/misc/uacce/uacce.c >> @@ -346,12 +346,47 @@ static ssize_t region_dus_size_show(struct device *dev, >> uacce->qf_pg_num[UACCE_QFRT_DUS] << PAGE_SHIFT); >> } >> >> +static ssize_t isolate_show(struct device *dev, >> + struct device_attribute *attr, char *buf) >> +{ >> + struct uacce_device *uacce = to_uacce_device(dev); >> + >> + return sysfs_emit(buf, "%d\n", uacce->ops->get_isolate_state(uacce)); >> +} >> + >> +static ssize_t isolate_strategy_show(struct device *dev, >> + struct device_attribute *attr, char *buf) >> +{ >> + struct uacce_device *uacce = to_uacce_device(dev); >> + >> + return sysfs_emit(buf, "%s\n", uacce->isolate_strategy); >> +} >> + >> +static ssize_t isolate_strategy_store(struct device *dev, >> + struct device_attribute *attr, >> + const char *buf, size_t count) >> +{ >> + struct uacce_device *uacce = to_uacce_device(dev); >> + int ret; >> + >> + if (!buf || sizeof(buf) > UACCE_MAX_ISOLATE_STRATEGY_LEN) >> + return -EINVAL; >> + >> + memcpy(uacce->isolate_strategy, buf, strlen(buf)); > What if it's not a valid strategy for the driver? We shouldn't > store this until we know it's valid. > >> + >> + ret = uacce->ops->isolate_strategy_write(uacce, buf); > Having copied the buf into uacce, why pass it as well? > > My preference would be to pass buf and length and not do > the memcpy in here. Leave that choice to the driver. > If this were a single value, it would be better stored > as an integer than as a string. Obviously that means > you need an isolate_strategy_read() as well (that also > solves the comment above about not storing what was written > until we know it was valid. > > Thanks, > > Jonathan it good job, I think so, need an isolate_strategy_read() instead of a copy. thanks Kai > > > >> + >> + return ret ? ret : count; >> +} >> + >> static DEVICE_ATTR_RO(api); >> static DEVICE_ATTR_RO(flags); >> static DEVICE_ATTR_RO(available_instances); >> static DEVICE_ATTR_RO(algorithms); >> static DEVICE_ATTR_RO(region_mmio_size); >> static DEVICE_ATTR_RO(region_dus_size); >> +static DEVICE_ATTR_RO(isolate); >> +static DEVICE_ATTR_RW(isolate_strategy); >> >> static struct attribute *uacce_dev_attrs[] = { >> &dev_attr_api.attr, >> @@ -360,6 +395,8 @@ static struct attribute *uacce_dev_attrs[] = { >> &dev_attr_algorithms.attr, >> &dev_attr_region_mmio_size.attr, >> &dev_attr_region_dus_size.attr, >> + &dev_attr_isolate.attr, >> + &dev_attr_isolate_strategy.attr, >> NULL, >> }; >> >> diff --git a/include/linux/uacce.h b/include/linux/uacce.h >> index 48e319f40275..0f7668bfa645 100644 >> --- a/include/linux/uacce.h >> +++ b/include/linux/uacce.h >> @@ -8,6 +8,7 @@ >> #define UACCE_NAME "uacce" >> #define UACCE_MAX_REGION 2 >> #define UACCE_MAX_NAME_SIZE 64 >> +#define UACCE_MAX_ISOLATE_STRATEGY_LEN 256 >> >> struct uacce_queue; >> struct uacce_device; >> @@ -30,6 +31,8 @@ struct uacce_qfile_region { >> * @is_q_updated: check whether the task is finished >> * @mmap: mmap addresses of queue to user space >> * @ioctl: ioctl for user space users of the queue >> + * @get_isolate_state: get the device state after set the isolate strategy >> + * @isolate_strategy_store: stored the isolate strategy to the device >> */ >> struct uacce_ops { >> int (*get_available_instances)(struct uacce_device *uacce); >> @@ -43,6 +46,8 @@ struct uacce_ops { >> struct uacce_qfile_region *qfr); >> long (*ioctl)(struct uacce_queue *q, unsigned int cmd, >> unsigned long arg); >> + enum uacce_dev_state (*get_isolate_state)(struct uacce_device *uacce); >> + int (*isolate_strategy_write)(struct uacce_device *uacce, const char *buf); >> }; >> >> /** >> @@ -57,6 +62,12 @@ struct uacce_interface { >> const struct uacce_ops *ops; >> }; >> >> +enum uacce_dev_state { >> + UACCE_DEV_ERR = -1, >> + UACCE_DEV_NORMAL, >> + UACCE_DEV_ISOLATE, >> +}; >> + >> enum uacce_q_state { >> UACCE_Q_ZOMBIE = 0, >> UACCE_Q_INIT, >> @@ -117,6 +128,7 @@ struct uacce_device { >> struct list_head queues; >> struct mutex queues_lock; >> struct inode *inode; >> + char isolate_strategy[UACCE_MAX_ISOLATE_STRATEGY_LEN]; >> }; >> >> #if IS_ENABLED(CONFIG_UACCE) >> @@ -125,7 +137,7 @@ struct uacce_device *uacce_alloc(struct device *parent, >> struct uacce_interface *interface); >> int uacce_register(struct uacce_device *uacce); >> void uacce_remove(struct uacce_device *uacce); >> - >> +struct uacce_device *dev_to_uacce(struct device *dev); >> #else /* CONFIG_UACCE */ >> >> static inline >> @@ -140,8 +152,6 @@ static inline int uacce_register(struct uacce_device *uacce) >> return -EINVAL; >> } >> >> -static inline void uacce_remove(struct uacce_device *uacce) {} >> - >> #endif /* CONFIG_UACCE */ >> >> #endif /* _LINUX_UACCE_H */ > > . >