Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp182634imw; Fri, 8 Jul 2022 00:30:08 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sq2SZiLdAWy/5zVWvAnE/ZzaOEpUWXKUmkHXfoj9IPlLgkZR5Edy4AFXzmEnxTsqRX/g6G X-Received: by 2002:a05:6402:34d0:b0:43a:87c0:4bcd with SMTP id w16-20020a05640234d000b0043a87c04bcdmr2978992edc.67.1657265407827; Fri, 08 Jul 2022 00:30:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657265407; cv=none; d=google.com; s=arc-20160816; b=w+04Ed5I5eHkLqXwIpGONr9MExUqe5/eZ6dY+n0gfxNHiPQLONNjPWeKrldrorxeTK TwVkWT/aN01AQguWQSc0RprXQTWcllSJJIQ+/8X6cOihAjOBSWtjmNb8waHvN9D0pwa/ kr1OmnnEi6VghGqKUnWTI0/1RcHvvLQuIQCJ9VpAYtXbXRPfouBGwtmD9gh4ldUyxG2Z U4qyj+gGDcd0PAsq5Wt7rq5bU+q9jVsG55YtnXPQEfddItCKXEZaEEiJ3V16py/n2bQi tSL02D3OEmC3wsTQa+w3TQp4rvC2+kf9wsTjPHYW1CFoFO78T0ilmnVa9jXh5+UjWQtB d/8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Aq3S1HKrw6IwGsKYLVvAQI0WBc6tbv+BJ3eGOMScV3Q=; b=fc5mPWbrPGHhEPhFbPGeTsr5ewxHSrK3wxdl+MEtDfPFqrD0aFrtXWLxNcGs/+a+FE VNRLJKMmCsQfztQRx3vULUM8MJDEpLRdxaoP/eCaLBzPV+GLJypdDeOu6ciIZgdfQOEA NkNPdPk+I+GLNwBIazr330XVwaTtBTM7xKbUdJvOcQ6d7Fggs0Heus/4fKWRp2Srn554 o4Wt4SQovaFpw50cdvhoXn1DuTCqYJynTwAbdJHHg6LjrQDmZ4IReglnWxilNpsfiZB3 FBT6ldgfoZqLN6mbDTHIjCETtBT2xigz9F/T/8SeUdlM1iMciahfb+QpvphRbmLpj0+2 2U1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MwNF3wcS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h14-20020a056402280e00b0042dd658ab17si4691533ede.231.2022.07.08.00.29.38; Fri, 08 Jul 2022 00:30:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MwNF3wcS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237545AbiGHH3B (ORCPT + 99 others); Fri, 8 Jul 2022 03:29:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41310 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237538AbiGHH27 (ORCPT ); Fri, 8 Jul 2022 03:28:59 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1CED67B361; Fri, 8 Jul 2022 00:28:58 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id ADAF462577; Fri, 8 Jul 2022 07:28:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B2F57C341C0; Fri, 8 Jul 2022 07:28:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1657265337; bh=P3KJbNk/a1tni8VNKqa9yL67GlHHapXzf5CgJxWvq2U=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MwNF3wcS5wZs0apvEn9xv6n5LXVfwDmNG/aWqaunbQhVrmAk7gzn7R6HU07LSpAe+ BA/dmzqZ2IHyv/ket3FWllSMB+rV3FfUmKjLHUfEMUoVGkcuIyEF2uoXRjU8fA+KDz RE/RTd1R2bTHjm4/tcC05MPFQJy01G2lDVTtCZtU= Date: Fri, 8 Jul 2022 09:28:54 +0200 From: Greg KH To: Kai Ye Cc: herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, wangzhou1@hisilicon.com Subject: Re: [PATCH v5 1/3] uacce: supports device isolation feature Message-ID: References: <20220708070820.43958-1-yekai13@huawei.com> <20220708070820.43958-2-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220708070820.43958-2-yekai13@huawei.com> X-Spam-Status: No, score=-7.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Jul 08, 2022 at 03:08:18PM +0800, Kai Ye wrote: > UACCE adds the hardware error isolation API. Users can configure > the isolation frequency by this sysfs node. UACCE reports the device > isolate state to the user space. If the AER error frequency exceeds > the value of setting for a certain period of time, the device will be > isolated. > > Signed-off-by: Kai Ye > --- > drivers/misc/uacce/uacce.c | 55 ++++++++++++++++++++++++++++++++++++++ > include/linux/uacce.h | 11 ++++++++ > 2 files changed, 66 insertions(+) > > diff --git a/drivers/misc/uacce/uacce.c b/drivers/misc/uacce/uacce.c > index 281c54003edc..d07b5f1f0596 100644 > --- a/drivers/misc/uacce/uacce.c > +++ b/drivers/misc/uacce/uacce.c > @@ -7,6 +7,8 @@ > #include > #include > > +#define MAX_ERR_ISOLATE_COUNT 65535 > + > static struct class *uacce_class; > static dev_t uacce_devt; > static DEFINE_MUTEX(uacce_mutex); > @@ -339,12 +341,63 @@ static ssize_t region_dus_size_show(struct device *dev, > uacce->qf_pg_num[UACCE_QFRT_DUS] << PAGE_SHIFT); > } > > +static ssize_t isolate_show(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + struct uacce_device *uacce = to_uacce_device(dev); > + > + if (!uacce->ops->get_isolate_state) > + return -ENODEV; If there is no callback, why is this sysfs even created at all? Please do not create it if it can not be accessed. Use the is_visable() callback for the group to do this. > + > + return sysfs_emit(buf, "%d\n", uacce->ops->get_isolate_state(uacce)); > +} > + > +static ssize_t isolate_strategy_show(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + struct uacce_device *uacce = to_uacce_device(dev); > + u32 val; > + > + if (!uacce->ops->isolate_strategy_read) > + return -ENODEV; Same here, don't have a sysfs file that does nothing. > + > + val = uacce->ops->isolate_strategy_read(uacce); > + if (val > MAX_ERR_ISOLATE_COUNT) > + return -EINVAL; > + > + return sysfs_emit(buf, "%u\n", val); > +} > + > +static ssize_t isolate_strategy_store(struct device *dev, > + struct device_attribute *attr, > + const char *buf, size_t count) > +{ > + struct uacce_device *uacce = to_uacce_device(dev); > + unsigned long val; > + int ret; > + > + if (!uacce->ops->isolate_strategy_write) > + return -ENODEV; Same here. thanks, greg k-h