Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp5525046iog; Wed, 22 Jun 2022 23:08:56 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uDZFO+uAACYpSMr9Ez/dYdmCDsE9SoR8n1xqh+iZx9YxIMFcH75O83Kr8KTiwSEVK7/5lE X-Received: by 2002:a17:906:d552:b0:722:f0c9:1e2f with SMTP id cr18-20020a170906d55200b00722f0c91e2fmr6435084ejc.406.1655964536191; Wed, 22 Jun 2022 23:08:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655964536; cv=none; d=google.com; s=arc-20160816; b=AebeVh8DfSlFg15/2gsU0AIUpQwb62mZyjpKCjV64DV+77oPyf0jx65mqU7ZxXWkzq PoCY+yxfRbleHwufVEnPlK+p6UFmUVZ2Ci3krMHB/ZJuMlgq4kwXMF/REKaFBfRvkl7o qox4gHzgWgSNm0rPwuE/3H4km8Evdd+IEZHq7Za4VPAeCdXqsd1C8lb7cl0eR70NFU/x c+W6JqYrGau1WxEw2QrNSSX7+lBylON0kaj6/9xNYMlBAxzVaiWZGcHaC+z3REIr8onq 54nBi3jnnLI1KAN7o7QKfeTIuFf/l1z+2h2v409JgR2zBFSFkoqz/KQwRZ91guEQCMRV ljKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=oG7tukIfZ2/IjetZ7Oq+1HJZzfvo7xHj3wjXgmLiJgg=; b=ireNBcFQIx98tLAOTv5CWDV7X/nvfc3M7lClFXXTYVpme/q1HFtZgQMffzA8Oxc81o BTA9Fpq12M2699skM06o4tgBqYQ4ImurKwij//I0IvTCJnxI17RaLJs6xqB0V3aE63tH P+UkMU1M/EU3MtCudoqPKUXNU++RF728sIn9alRpL3CDx2lxeWUQsdkouANpH2S1A7nm aNgc6O/+PYgu3RkL+njGlQQOBant6faYYpd3PQ8EiFJ7gDGW/PgLlnywp19JUaijpn0j QTzoyqKEmglw6lCWpqEOw7Ozba9yUg+Iizia1Xgd62u4yi/XDpjr+EogUqzoScNslo7u 7vJg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sd32-20020a1709076e2000b006e86e8d7520si21920545ejc.186.2022.06.22.23.08.21; Wed, 22 Jun 2022 23:08:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229707AbiFWGHq (ORCPT + 99 others); Thu, 23 Jun 2022 02:07:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229699AbiFWGHp (ORCPT ); Thu, 23 Jun 2022 02:07:45 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1D4FD44A0B; Wed, 22 Jun 2022 23:07:43 -0700 (PDT) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4LT8rQ6Ry8zkWSs; Thu, 23 Jun 2022 14:05:58 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Thu, 23 Jun 2022 14:07:41 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Thu, 23 Jun 2022 14:07:40 +0800 From: Kai Ye To: , CC: , , , , , , Subject: [PATCH v3 1/3] uacce: supports device isolation feature Date: Thu, 23 Jun 2022 14:01:12 +0800 Message-ID: <20220623060114.37505-2-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20220623060114.37505-1-yekai13@huawei.com> References: <20220623060114.37505-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org UACCE adds the hardware error isolation API. Users can configure the isolation method command by this sysfs node. This API interface certainly supports the configuration of user protocol strategy. Then parse it inside the device driver. UACCE only reports the device isolate state. e.g. When the error frequency is exceeded, the device will be isolated. The isolation strategy should be defined in each driver module. Signed-off-by: Kai Ye --- drivers/misc/uacce/uacce.c | 41 ++++++++++++++++++++++++++++++++++++++ include/linux/uacce.h | 11 ++++++++++ 2 files changed, 52 insertions(+) diff --git a/drivers/misc/uacce/uacce.c b/drivers/misc/uacce/uacce.c index b6219c6bfb48..440144fea656 100644 --- a/drivers/misc/uacce/uacce.c +++ b/drivers/misc/uacce/uacce.c @@ -346,12 +346,51 @@ static ssize_t region_dus_size_show(struct device *dev, uacce->qf_pg_num[UACCE_QFRT_DUS] << PAGE_SHIFT); } +static ssize_t isolate_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct uacce_device *uacce = to_uacce_device(dev); + + if (!uacce->ops->get_isolate_state) + return -ENODEV; + + return sysfs_emit(buf, "%d\n", uacce->ops->get_isolate_state(uacce)); +} + +static ssize_t isolate_strategy_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct uacce_device *uacce = to_uacce_device(dev); + + if (!uacce->ops->isolate_strategy_read) + return -ENODEV; + + return uacce->ops->isolate_strategy_read(uacce, buf); +} + +static ssize_t isolate_strategy_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t count) +{ + struct uacce_device *uacce = to_uacce_device(dev); + int ret; + + if (!uacce->ops->isolate_strategy_write) + return -ENODEV; + + ret = uacce->ops->isolate_strategy_write(uacce, buf, count); + + return ret ? ret : count; +} + static DEVICE_ATTR_RO(api); static DEVICE_ATTR_RO(flags); static DEVICE_ATTR_RO(available_instances); static DEVICE_ATTR_RO(algorithms); static DEVICE_ATTR_RO(region_mmio_size); static DEVICE_ATTR_RO(region_dus_size); +static DEVICE_ATTR_RO(isolate); +static DEVICE_ATTR_RW(isolate_strategy); static struct attribute *uacce_dev_attrs[] = { &dev_attr_api.attr, @@ -360,6 +399,8 @@ static struct attribute *uacce_dev_attrs[] = { &dev_attr_algorithms.attr, &dev_attr_region_mmio_size.attr, &dev_attr_region_dus_size.attr, + &dev_attr_isolate.attr, + &dev_attr_isolate_strategy.attr, NULL, }; diff --git a/include/linux/uacce.h b/include/linux/uacce.h index 48e319f40275..a535286d2753 100644 --- a/include/linux/uacce.h +++ b/include/linux/uacce.h @@ -30,6 +30,9 @@ struct uacce_qfile_region { * @is_q_updated: check whether the task is finished * @mmap: mmap addresses of queue to user space * @ioctl: ioctl for user space users of the queue + * @get_isolate_state: get the device state after set the isolate strategy + * @isolate_strategy_write: stored the isolate strategy to the device + * @isolate_strategy_read: read the isolate strategy from the device */ struct uacce_ops { int (*get_available_instances)(struct uacce_device *uacce); @@ -43,6 +46,9 @@ struct uacce_ops { struct uacce_qfile_region *qfr); long (*ioctl)(struct uacce_queue *q, unsigned int cmd, unsigned long arg); + enum uacce_dev_state (*get_isolate_state)(struct uacce_device *uacce); + int (*isolate_strategy_write)(struct uacce_device *uacce, const char *buf, size_t count); + int (*isolate_strategy_read)(struct uacce_device *uacce, char *buf); }; /** @@ -57,6 +63,11 @@ struct uacce_interface { const struct uacce_ops *ops; }; +enum uacce_dev_state { + UACCE_DEV_NORMAL, + UACCE_DEV_ISOLATE, +}; + enum uacce_q_state { UACCE_Q_ZOMBIE = 0, UACCE_Q_INIT, -- 2.33.0