Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp338584rwi; Fri, 14 Oct 2022 02:48:21 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4jZeGCNSUSYe3VuxAMnLcDyUVj6YtGdJq6fg5F072IMOgejAURGCVJRknS2I39Js+mRzhE X-Received: by 2002:aa7:de9a:0:b0:44d:8191:44c5 with SMTP id j26-20020aa7de9a000000b0044d819144c5mr3519784edv.232.1665740901224; Fri, 14 Oct 2022 02:48:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665740901; cv=none; d=google.com; s=arc-20160816; b=kjS5iJoSNVRW63p21pGaEq5POrPaGlWYJnRRdV1KJ8SWwWJqQIzVyrBYrqPVriOv8v GkLD4qDP7ngz7zHahl/MiXMxUptKMMruWdP5bDl/R6kwVVWbUvGL135Tyv8zLMqXEobV e4ZBaDusslymIZmM4Ja4qKO9YsKIrUGAn1CtR5Li8sWVL0tzGMjxIAflZKMssaqA6PeW Bp6bfYL4Z7e06O8us51IbEAyW8nZhC76J9EeudtH+15rkREGUzhuJ/C/eSRaz30THTcN hOr2s2mVcGu7umB8R5mk313eBlIceuh8h21pZ84PJOfZJt4hgmvejlreezRX1CoLKFiY 72YA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=DpFzI98i5WVAd9cmiTjagtGyU2+V4l2m+7U8Sg79/7o=; b=0+S8/RHvUeU73CqwBV0Hu8FyPjhd1v/VQ6vsfDA6M9qD4ICtpxD+hWGXbEPi6bNMzU CVjlbWARgmOAAU6s9SArJ4TLNifDni9mzTuwYdbgW9ixGJYCcCrpOIoTxLMsdsrbDB1I HDv3u3eqnZzblk6JtK6DIFpsj9bwW+BMO0R/CdBHlt+ZSzrQQMV2qhah3Qw22HFUQBhf c277AJYEGYpG1khm7sx3bkCMcvwzDQFyYzNky77tBiugflpUj6G4czrqrkx5s9J+4n7v exwkS3lbTQwrPmhQxUntLXyLEzhkYszCly636xUJrY0GUasFgme3EG4c9xm0jteGKeai B8Ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l15-20020a170906644f00b00771d781fb88si1692127ejn.411.2022.10.14.02.47.49; Fri, 14 Oct 2022 02:48:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229862AbiJNJnx (ORCPT + 99 others); Fri, 14 Oct 2022 05:43:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35104 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229585AbiJNJnv (ORCPT ); Fri, 14 Oct 2022 05:43:51 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7DAD114DF3F; Fri, 14 Oct 2022 02:43:50 -0700 (PDT) Received: from dggpeml500024.china.huawei.com (unknown [172.30.72.57]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4MphDH4vnYz1P7RV; Fri, 14 Oct 2022 17:39:11 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500024.china.huawei.com (7.185.36.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 14 Oct 2022 17:43:48 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 14 Oct 2022 17:43:48 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH 2/3] crypto: hisilicon/qm - add pci bdf number check Date: Fri, 14 Oct 2022 09:38:06 +0000 Message-ID: <20221014093807.3101-3-yekai13@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221014093807.3101-1-yekai13@huawei.com> References: <20221014093807.3101-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The pci bdf number check is added for qos written by using the pci api. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/qm.c | 37 ++++++++++++----------------------- 1 file changed, 12 insertions(+), 25 deletions(-) diff --git a/drivers/crypto/hisilicon/qm.c b/drivers/crypto/hisilicon/qm.c index 335e58018a31..661cc964e2eb 100644 --- a/drivers/crypto/hisilicon/qm.c +++ b/drivers/crypto/hisilicon/qm.c @@ -4591,49 +4591,36 @@ static ssize_t qm_algqos_read(struct file *filp, char __user *buf, return ret; } -static ssize_t qm_qos_value_init(const char *buf, unsigned long *val) -{ - int buflen = strlen(buf); - int ret, i; - - for (i = 0; i < buflen; i++) { - if (!isdigit(buf[i])) - return -EINVAL; - } - - ret = sscanf(buf, "%lu", val); - if (ret != QM_QOS_VAL_NUM) - return -EINVAL; - - return 0; -} - static ssize_t qm_get_qos_value(struct hisi_qm *qm, const char *buf, unsigned long *val, unsigned int *fun_index) { + struct bus_type *bus_type = qm->pdev->dev.bus; char tbuf_bdf[QM_DBG_READ_LEN] = {0}; char val_buf[QM_DBG_READ_LEN] = {0}; - u32 tmp1, device, function; - int ret, bus; + struct pci_dev *pdev; + struct device *dev; + int ret; ret = sscanf(buf, "%s %s", tbuf_bdf, val_buf); if (ret != QM_QOS_PARAM_NUM) return -EINVAL; - ret = qm_qos_value_init(val_buf, val); + ret = kstrtoul(val_buf, 10, val); if (ret || *val == 0 || *val > QM_QOS_MAX_VAL) { pci_err(qm->pdev, "input qos value is error, please set 1~1000!\n"); return -EINVAL; } - ret = sscanf(tbuf_bdf, "%u:%x:%u.%u", &tmp1, &bus, &device, &function); - if (ret != QM_QOS_BDF_PARAM_NUM) { - pci_err(qm->pdev, "input pci bdf value is error!\n"); - return -EINVAL; + dev = bus_find_device_by_name(bus_type, NULL, tbuf_bdf); + if (!dev) { + pci_err(qm->pdev, "input pci bdf number is error!\n"); + return -ENODEV; } - *fun_index = PCI_DEVFN(device, function); + pdev = container_of(dev, struct pci_dev, dev); + + *fun_index = pdev->devfn; return 0; } -- 2.33.0