Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp5532869iog; Wed, 22 Jun 2022 23:21:46 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vmtFD07C+Osb3TKmAWUBqYTYRXX94tDUlNT8veBqRYzfyDLp2kU74EY6JAIWfp2/ivoBJs X-Received: by 2002:a05:6a00:225a:b0:525:4d37:6b30 with SMTP id i26-20020a056a00225a00b005254d376b30mr4820355pfu.83.1655965305977; Wed, 22 Jun 2022 23:21:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655965305; cv=none; d=google.com; s=arc-20160816; b=W02ODBKXPbC6FT3i9rrBRHD4Gq3c2cIXU4pLHYnvn8QIjv0lQx3mjtIvEy9ZJsZ7nI Cx4x8AOYFWsPvsSvVr0PuBiZpxdxBLeIQPSJSiwmv001FzdYvZzuCk0lknrQmXyg0lVq 36v1tjuZ0VCBQK/xBCEb2OOcTAFaqZJw40gwpUxmIn66fIDnISFil1Y5s9P+xE0rfbkT dzCjCxEGUrLDw2elZTVG+k7Ml0CwgJ7Bp4WynY9BLYvWJ08BmAhNEiRBSaFaEyr+OCw/ 8SDl9XM4ZEFWw51YsNcaVK5odXq1DnQJYXQyrFBqw3XSOKpiG0UoSl04+FWg9WBveWDn DhWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=oG7tukIfZ2/IjetZ7Oq+1HJZzfvo7xHj3wjXgmLiJgg=; b=lFPeEI6yjklEYdqgCrV4npets0Mvw2LTlgk8IqAtv+7jsW6oHwee1zJEngUKh6x0O3 qcsMSeRLDCDVfsZhc6gPMNfJswxum2RBHy42w0zKTCJXswSujjWmPAHjh+2BBozGdQSg WgaxICqIdXw+OSd4RyXA8E5kvAjauuFHCSj76wOgC2yZ0tMv+lRMq/PjZDAz4UkVSya+ 6D/J17a54VnBkbQejLay4gWlmDiNNiSiqGrv67ttwD8/6uSoMdsfG4CpnQBTgxGnuKnt PlWIN2zxPStDUyKOFXnLfOqSBkHl+sxHUlb8+8BSmVyZKuPwCfpyluwLbj0eLtyE60Xf t5mQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ls16-20020a17090b351000b001ecc09d84bbsi2351820pjb.102.2022.06.22.23.21.33; Wed, 22 Jun 2022 23:21:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229556AbiFWGVa (ORCPT + 99 others); Thu, 23 Jun 2022 02:21:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229523AbiFWGV3 (ORCPT ); Thu, 23 Jun 2022 02:21:29 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D08F9326E8; Wed, 22 Jun 2022 23:21:21 -0700 (PDT) Received: from dggpeml500020.china.huawei.com (unknown [172.30.72.56]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4LT96B4mb3zShC8; Thu, 23 Jun 2022 14:17:54 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500020.china.huawei.com (7.185.36.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Thu, 23 Jun 2022 14:21:19 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Thu, 23 Jun 2022 14:21:19 +0800 From: Kai Ye To: , CC: , , , , , , Subject: [PATCH v4 1/3] uacce: supports device isolation feature Date: Thu, 23 Jun 2022 14:14:50 +0800 Message-ID: <20220623061452.40732-2-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20220623061452.40732-1-yekai13@huawei.com> References: <20220623061452.40732-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org UACCE adds the hardware error isolation API. Users can configure the isolation method command by this sysfs node. This API interface certainly supports the configuration of user protocol strategy. Then parse it inside the device driver. UACCE only reports the device isolate state. e.g. When the error frequency is exceeded, the device will be isolated. The isolation strategy should be defined in each driver module. Signed-off-by: Kai Ye --- drivers/misc/uacce/uacce.c | 41 ++++++++++++++++++++++++++++++++++++++ include/linux/uacce.h | 11 ++++++++++ 2 files changed, 52 insertions(+) diff --git a/drivers/misc/uacce/uacce.c b/drivers/misc/uacce/uacce.c index b6219c6bfb48..440144fea656 100644 --- a/drivers/misc/uacce/uacce.c +++ b/drivers/misc/uacce/uacce.c @@ -346,12 +346,51 @@ static ssize_t region_dus_size_show(struct device *dev, uacce->qf_pg_num[UACCE_QFRT_DUS] << PAGE_SHIFT); } +static ssize_t isolate_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct uacce_device *uacce = to_uacce_device(dev); + + if (!uacce->ops->get_isolate_state) + return -ENODEV; + + return sysfs_emit(buf, "%d\n", uacce->ops->get_isolate_state(uacce)); +} + +static ssize_t isolate_strategy_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct uacce_device *uacce = to_uacce_device(dev); + + if (!uacce->ops->isolate_strategy_read) + return -ENODEV; + + return uacce->ops->isolate_strategy_read(uacce, buf); +} + +static ssize_t isolate_strategy_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t count) +{ + struct uacce_device *uacce = to_uacce_device(dev); + int ret; + + if (!uacce->ops->isolate_strategy_write) + return -ENODEV; + + ret = uacce->ops->isolate_strategy_write(uacce, buf, count); + + return ret ? ret : count; +} + static DEVICE_ATTR_RO(api); static DEVICE_ATTR_RO(flags); static DEVICE_ATTR_RO(available_instances); static DEVICE_ATTR_RO(algorithms); static DEVICE_ATTR_RO(region_mmio_size); static DEVICE_ATTR_RO(region_dus_size); +static DEVICE_ATTR_RO(isolate); +static DEVICE_ATTR_RW(isolate_strategy); static struct attribute *uacce_dev_attrs[] = { &dev_attr_api.attr, @@ -360,6 +399,8 @@ static struct attribute *uacce_dev_attrs[] = { &dev_attr_algorithms.attr, &dev_attr_region_mmio_size.attr, &dev_attr_region_dus_size.attr, + &dev_attr_isolate.attr, + &dev_attr_isolate_strategy.attr, NULL, }; diff --git a/include/linux/uacce.h b/include/linux/uacce.h index 48e319f40275..a535286d2753 100644 --- a/include/linux/uacce.h +++ b/include/linux/uacce.h @@ -30,6 +30,9 @@ struct uacce_qfile_region { * @is_q_updated: check whether the task is finished * @mmap: mmap addresses of queue to user space * @ioctl: ioctl for user space users of the queue + * @get_isolate_state: get the device state after set the isolate strategy + * @isolate_strategy_write: stored the isolate strategy to the device + * @isolate_strategy_read: read the isolate strategy from the device */ struct uacce_ops { int (*get_available_instances)(struct uacce_device *uacce); @@ -43,6 +46,9 @@ struct uacce_ops { struct uacce_qfile_region *qfr); long (*ioctl)(struct uacce_queue *q, unsigned int cmd, unsigned long arg); + enum uacce_dev_state (*get_isolate_state)(struct uacce_device *uacce); + int (*isolate_strategy_write)(struct uacce_device *uacce, const char *buf, size_t count); + int (*isolate_strategy_read)(struct uacce_device *uacce, char *buf); }; /** @@ -57,6 +63,11 @@ struct uacce_interface { const struct uacce_ops *ops; }; +enum uacce_dev_state { + UACCE_DEV_NORMAL, + UACCE_DEV_ISOLATE, +}; + enum uacce_q_state { UACCE_Q_ZOMBIE = 0, UACCE_Q_INIT, -- 2.33.0