Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp366284rwi; Fri, 14 Oct 2022 03:14:12 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4x4cytC4ueFd2MmnveW0UNmYnKXqmuUt9nlBwwf1e/vlQaB9F2HprSCe0gjSl3Ln8J1ffy X-Received: by 2002:a05:6402:410:b0:451:ea13:4ed7 with SMTP id q16-20020a056402041000b00451ea134ed7mr3764119edv.262.1665742452622; Fri, 14 Oct 2022 03:14:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665742452; cv=none; d=google.com; s=arc-20160816; b=K4cel7Dd1b6xqHlof5opxAnW16S9O2fPD3U2Gtjh08ybz81Fzy5Eh6V5p9cD5QBM53 fTaPLTJes+WzaBHHgaM+XtKAxsL3ByR0to2TkHKhimDa7MCtj0Rkh7MPqHEoTrB05NS0 Wu4cn9Ochx6zZKfB/bRUTo7375aKBpgZ9G1gp9beYC2Y82IB+Mw76aWlO6Czsev+OHH4 Y3tkenoM2QHULoQn1WgNRlkEOaxSRGpmXhFO5taaVZW2E+OvrPMwUKMq7nvfhhfIxDQC I8hnd2FgsOv9uvRFS5QJsSYOyXa+WQjOoi7oSJn4f5iVpYkPvtG2wVVlci7j3myQJf/m 1ygw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=KCyMXomirBhNE+PGYaW2ctJtm3ZZvMGDsppN/at8JsU=; b=SXZmmJZsbrKSWu1dMT+W5RByCyjjzciFU+VWurTEy2senSwgCFP5W0+TmnDXeNmK6L sIydqQBLeQEcwxcJ1gwD4MevRQeLiY2xJPOn9Q/nmafRP926VbTqnBmTGkmpz4jzFTlX Lxwgg0JRP+TtPUTEzUSwwAT4rVNWZL+FkmR/8BFsAKkO7msVQU0a7giHFzV3xK8rRSmK LJJ9sFn/ULR+CqV43wIlWle1Acw5i7vTVLaKaeFMFaJZ9wkyoHIYq/CdCzO669KHt7JU Vlx0uwCqZ1QpseWxxp+FFtpeTqtb06saXw8HRR2MHUM/c+FnUqMeg8HwfVXilSgFBv6V Tvlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dz8-20020a0564021d4800b00459e2868163si2426721edb.357.2022.10.14.03.13.46; Fri, 14 Oct 2022 03:14:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229715AbiJNKJc (ORCPT + 99 others); Fri, 14 Oct 2022 06:09:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44296 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230052AbiJNKJM (ORCPT ); Fri, 14 Oct 2022 06:09:12 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1FE40181D8C; Fri, 14 Oct 2022 03:09:04 -0700 (PDT) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.55]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4Mphqm1PPqzDrCl; Fri, 14 Oct 2022 18:06:28 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 14 Oct 2022 18:09:02 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 14 Oct 2022 18:09:01 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH v2 2/3] crypto: hisilicon/qm - add pci bdf number check Date: Fri, 14 Oct 2022 10:03:18 +0000 Message-ID: <20221014100319.5259-3-yekai13@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221014100319.5259-1-yekai13@huawei.com> References: <20221014100319.5259-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The pci bdf number check is added for qos written by using the pci api. Directly get the devfn by pci_dev, so delete some redundant code. And use the kstrtoul instead of sscanf to simplify code. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/qm.c | 37 ++++++++++++----------------------- 1 file changed, 12 insertions(+), 25 deletions(-) diff --git a/drivers/crypto/hisilicon/qm.c b/drivers/crypto/hisilicon/qm.c index 5d79e9f0e7e1..80eeb966cf89 100644 --- a/drivers/crypto/hisilicon/qm.c +++ b/drivers/crypto/hisilicon/qm.c @@ -4589,49 +4589,36 @@ static ssize_t qm_algqos_read(struct file *filp, char __user *buf, return ret; } -static ssize_t qm_qos_value_init(const char *buf, unsigned long *val) -{ - int buflen = strlen(buf); - int ret, i; - - for (i = 0; i < buflen; i++) { - if (!isdigit(buf[i])) - return -EINVAL; - } - - ret = sscanf(buf, "%lu", val); - if (ret != QM_QOS_VAL_NUM) - return -EINVAL; - - return 0; -} - static ssize_t qm_get_qos_value(struct hisi_qm *qm, const char *buf, unsigned long *val, unsigned int *fun_index) { + struct bus_type *bus_type = qm->pdev->dev.bus; char tbuf_bdf[QM_DBG_READ_LEN] = {0}; char val_buf[QM_DBG_READ_LEN] = {0}; - u32 tmp1, device, function; - int ret, bus; + struct pci_dev *pdev; + struct device *dev; + int ret; ret = sscanf(buf, "%s %s", tbuf_bdf, val_buf); if (ret != QM_QOS_PARAM_NUM) return -EINVAL; - ret = qm_qos_value_init(val_buf, val); + ret = kstrtoul(val_buf, 10, val); if (ret || *val == 0 || *val > QM_QOS_MAX_VAL) { pci_err(qm->pdev, "input qos value is error, please set 1~1000!\n"); return -EINVAL; } - ret = sscanf(tbuf_bdf, "%u:%x:%u.%u", &tmp1, &bus, &device, &function); - if (ret != QM_QOS_BDF_PARAM_NUM) { - pci_err(qm->pdev, "input pci bdf value is error!\n"); - return -EINVAL; + dev = bus_find_device_by_name(bus_type, NULL, tbuf_bdf); + if (!dev) { + pci_err(qm->pdev, "input pci bdf number is error!\n"); + return -ENODEV; } - *fun_index = PCI_DEVFN(device, function); + pdev = container_of(dev, struct pci_dev, dev); + + *fun_index = pdev->devfn; return 0; } -- 2.17.1