crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
authorYang Shen <shenyang39@huawei.com>
Sat, 15 Aug 2020 09:56:15 +0000 (17:56 +0800)
committerHerbert Xu <herbert@gondor.apana.org.au>
Fri, 21 Aug 2020 04:47:52 +0000 (14:47 +1000)
Since the drivers such as HPRE/SEC/ZIP do not implement
'pci_driver.shutdow', a RAS will be triggered at OS rebooting or shutting
down as the hardware device is processing request.
The log looks like this:
NOTICE:  [NimbusSecNodeType1]:[2372L]This is sec, Base = 0x141800000
NOTICE:  [NimbusSecHandle]:[2319L] SecIntSt = 0x3
NOTICE:  [NimbusSecHandle]:[2320L] SecQmIntStatus = 0x2
NOTICE:  [PrintSecurityType]:[344L] SecurityType is RECOVERABLE!

This patch offers a new API in qm to shutdown devices, and add shutdown
callbacks in ACC driver based on this new API.

So the running devices will be stopped when the OS reboot or shutdown.

Signed-off-by: Yang Shen <shenyang39@huawei.com>
Reviewed-by: Zhou Wang <wangzhou1@hisilicon.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
drivers/crypto/hisilicon/hpre/hpre_main.c
drivers/crypto/hisilicon/qm.c
drivers/crypto/hisilicon/qm.h
drivers/crypto/hisilicon/sec2/sec_main.c
drivers/crypto/hisilicon/zip/zip_main.c

index b9e5214e826f4b4ce26b326183f6e525e9a96fe7..bbf3efbf47fe92224a56e2baf84826d1e9e1fa68 100644 (file)
@@ -939,6 +939,7 @@ static struct pci_driver hpre_pci_driver = {
        .sriov_configure        = IS_ENABLED(CONFIG_PCI_IOV) ?
                                  hisi_qm_sriov_configure : NULL,
        .err_handler            = &hpre_err_handler,
+       .shutdown               = hisi_qm_dev_shutdown,
 };
 
 static void hpre_register_debugfs(void)
index 3c37e0099a4b3faace5d6e9a5f9aed144ce3b280..f2729e6db92094461b6f01e16535de80157205f6 100644 (file)
@@ -3837,6 +3837,23 @@ err_aeq_irq:
        return ret;
 }
 
+/**
+ * hisi_qm_dev_shutdown() - Shutdown device.
+ * @pdev: The device will be shutdown.
+ *
+ * This function will stop qm when OS shutdown or rebooting.
+ */
+void hisi_qm_dev_shutdown(struct pci_dev *pdev)
+{
+       struct hisi_qm *qm = pci_get_drvdata(pdev);
+       int ret;
+
+       ret = hisi_qm_stop(qm, QM_NORMAL);
+       if (ret)
+               dev_err(&pdev->dev, "Fail to stop qm in shutdown!\n");
+}
+EXPORT_SYMBOL_GPL(hisi_qm_dev_shutdown);
+
 static void hisi_qm_controller_reset(struct work_struct *rst_work)
 {
        struct hisi_qm *qm = container_of(rst_work, struct hisi_qm, rst_work);
index 9d6cf1dc23bfa61ea73c527cebbd1e237a34cde4..5fc44cb2c55291625c682f8fea5a72dc068e38e0 100644 (file)
@@ -390,4 +390,5 @@ void hisi_acc_free_sgl_pool(struct device *dev,
 int hisi_qm_alloc_qps_node(struct hisi_qm_list *qm_list, int qp_num,
                           u8 alg_type, int node, struct hisi_qp **qps);
 void hisi_qm_free_qps(struct hisi_qp **qps, int qp_num);
+void hisi_qm_dev_shutdown(struct pci_dev *pdev);
 #endif
index 5f1c870dc93937acf39eb8fb7233f6f41fd3d93b..8b388c47489e0cc8ae514d83e1d234b88f88d498 100644 (file)
@@ -950,6 +950,7 @@ static struct pci_driver sec_pci_driver = {
        .remove = sec_remove,
        .err_handler = &sec_err_handler,
        .sriov_configure = hisi_qm_sriov_configure,
+       .shutdown = hisi_qm_dev_shutdown,
 };
 
 static void sec_register_debugfs(void)
index 224041ea306dbf2cdf36cf63cfb26aa321845200..10d21085e2fcacd18aa57f33a7133304c969934d 100644 (file)
@@ -866,6 +866,7 @@ static struct pci_driver hisi_zip_pci_driver = {
        .sriov_configure        = IS_ENABLED(CONFIG_PCI_IOV) ?
                                        hisi_qm_sriov_configure : NULL,
        .err_handler            = &hisi_zip_err_handler,
+       .shutdown               = hisi_qm_dev_shutdown,
 };
 
 static void hisi_zip_register_debugfs(void)