| ae1dc276 | 07-May-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: refactor error handling and add mutex locks
Error handling in qat driver code has been refactored. Mutex lock handling has also been added during driver attach and detach. Also pci_disable_busm
qat: refactor error handling and add mutex locks
Error handling in qat driver code has been refactored. Mutex lock handling has also been added during driver attach and detach. Also pci_disable_busmaster() is called in adf_detach() to ensure proper cleanup during device detachment.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|
| e745eee5 | 01-May-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: reimplement cpaCyGetXXXInstances as a wrapper
Currently code from sal_instances.c and sal_crypto.c for getting cy instances or number of instances is duplicated.
This commit replaces cpaCyGetX
qat: reimplement cpaCyGetXXXInstances as a wrapper
Currently code from sal_instances.c and sal_crypto.c for getting cy instances or number of instances is duplicated.
This commit replaces cpaCyGetXXXInstances implementation with Lac_GetCyXXXInstancesByType invocation.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|
| 8aa51e6d | 01-May-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: restrict sysctl access to privileged users
Access to crucial QAT driver internals, such as firmware counters and transport debug via sysctl, has been limited to privileged users only.
Reviewed
qat: restrict sysctl access to privileged users
Access to crucial QAT driver internals, such as firmware counters and transport debug via sysctl, has been limited to privileged users only.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|
| c38bafee | 30-Apr-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: move debugfs handling to separate file
Moved handling of debugfs entries to a separate file. In addition, it will allow to consolidate the addition of debugfs entries to a single location in th
qat: move debugfs handling to separate file
Moved handling of debugfs entries to a separate file. In addition, it will allow to consolidate the addition of debugfs entries to a single location in the code.
This implementation adds infrastructure to create (and remove) debugfs entries at two different stages. - Done when a device is probed, allows to keep debugfs entries persistent between a transition in device state (up to down or vice versa). - Done after the initialization phase, allows to have debugfs entries that are accessible only when the device is up.
In addition, moved the creation of debugfs entries for configuration of the newly created function adf_dbgfs_init() and replace symbolic permissions with octal permissions when creating the debugfs files.
Added sysctl oids storage for proper cleanup on device down.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|
| 4da5c15e | 30-Apr-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: update 4xxx capabilities handling
Some capabilities were not properly fused out based on the hardware slices. Hence updated the function accordingly. Both PF and VF are changed.
This change al
qat: update 4xxx capabilities handling
Some capabilities were not properly fused out based on the hardware slices. Hence updated the function accordingly. Both PF and VF are changed.
This change also streamlines capability handling for SYM service: - Lack of UCS slice does not mean that CIPHER capabilities are not available. - SYM capabilities should be considered disabled only if both AUTH and CIPHER capabilities are not present. - AUTH capability shouldn't disable CIPHER.
SMX slice mask for qat_4xxx is also corrected to check for both SM3 and SM4 support.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|
| 5a8e5215 | 30-Apr-2025 |
Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> |
qat: add disable safe dc mode for QAT SPR devices
Build and sysctl configuration modes are introduced for QAT SPR devices to disable safe dc mode. A new QAT driver build option ‘QAT_DISABLE_SAFE_DC_
qat: add disable safe dc mode for QAT SPR devices
Build and sysctl configuration modes are introduced for QAT SPR devices to disable safe dc mode. A new QAT driver build option ‘QAT_DISABLE_SAFE_DC_MODE’ is required to build the QAT driver with code that allows a request to be sent to FW to override the ‘History Buffer’ mitigation. Default QAT driver builds do not include this ‘QAT_DISABLE_SAFE_DC_MODE’ build option. Even if the QAT driver was built with code that allows a request to be sent to FW to override the ‘History Buffer’ mitigation, the QAT driver must still be configured using sysctl to request an override of the ‘History Buffer’ mitigation if desired. The default QAT driver configuration option sysctl dev.qat.X.disable_safe_dc_mode does not allow override of the mitigation. The new sysctl attribute disable_safe_dc_mode is to be set to 1 for overriding the history buffer mitigation. Firmware for qat_4xxx is updated for this change. If this mode is enabled, decompression throughput increases but may result in a data leak if num_user_processes is more than 1. This option is to be enabled only if your system is not prone to user data leaks.
Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379
show more ...
|