Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp343392pxa; Tue, 4 Aug 2020 07:03:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxe1uhz5Opmaqq3aDzdARdioShdmD55mcvRkxWbYCEh3b81Z1v+7rCRCpQIUUynNmRPOdi8 X-Received: by 2002:a05:6402:1e5:: with SMTP id i5mr20100035edy.194.1596549804911; Tue, 04 Aug 2020 07:03:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596549804; cv=none; d=google.com; s=arc-20160816; b=UJUGW5lyZS+f0Fpg1JMxHZXJO95zTcwkhw9bi7q1tvG/hBXyfz/x24WP8DkbZoWR8v K7kmd3DEFqhUktqGP0yAlmNbpD4P4JLj/xAqSGTD/uTET4tIq74fXus7iskfTF33lUiI Kv0m/E79DR3BzXpdhyvPFG1S2UcHAz4BSEb7MJ/UyrjVbQFv8XLhrtvlTcDNvhTBp2FC fbYTgyqO7dN6t+PCDh8t/FB3Uni0F5Od+lwumCcvz3o2CbiKFoN17/QuGmSvc8dWlGAO 6ysu6gV8p+4p0IUQ2oejsBkKdnhejZndwEgh49easuS2zcq8GnUpFdhMTX/rZtHlCQXy QQDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=eHeSCRvjXj6pH0QokHyFNy/WwsTrmKgG0clZT4nhByA=; b=XxtmXHfgnUIO9hWFDcwtSyks6iUxnLHq4ae8gnEbuaJ30wlDgVVIO++HGRsLbogPWU JtCJjz9WRWdmr+NmF2fQCsBEUlcFfSs4IHYJuE2xRIlTIDPcA5ke1Wsdwo0esOhagR8/ b1x1LoMbtdyErG9ntzMdpXr7TX5HqP0F7sb3bsmuUjnaHAmA9yVUEsqcHiN+hvJBsdQY N3avj5dYi5r1HQHDrIkHUBrs2Of0qGVzmuscsvCpyUye23sc3wpNVccNmqCvRcQ0J48m dlH6Hm6DupXVzvJd0P7c9EUvr+LCqTsWgJhP1zJW5B1+Ew++M6/z9Y+zjIqdvtH68Sh9 x6KQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f27si8505814ejt.13.2020.08.04.07.02.59; Tue, 04 Aug 2020 07:03:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728834AbgHDOA4 (ORCPT + 99 others); Tue, 4 Aug 2020 10:00:56 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:60914 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728777AbgHDOAu (ORCPT ); Tue, 4 Aug 2020 10:00:50 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id AEFF6118B2360200DCB5; Tue, 4 Aug 2020 22:00:38 +0800 (CST) Received: from localhost.localdomain (10.69.192.56) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.487.0; Tue, 4 Aug 2020 22:00:29 +0800 From: Yang Shen To: , CC: , , , Subject: [PATCH v4 00/10] crypto: hisilicon/qm - misc fixes Date: Tue, 4 Aug 2020 21:58:20 +0800 Message-ID: <1596549510-2373-1-git-send-email-shenyang39@huawei.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-CFilter-Loop: Reflected Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This patchset fix some qm bugs: patch 1: store the string address before pass to 'strsep' patch 2: clear 'qp_status->used' when init the 'qp' patch 3: use 'dev_info_ratelimited' to avoid printk flooding. patch 4: fix the judgement of queue is full patch 7: save the vf configuration space to make sure it is available after the 'PF' 'FLR' patch 8: register callback to 'pci_driver.shutdown' patch 9: wait for all working function finishs when remove the device patch 10: move the process of register alg to crypto in driver 'hisi_zip' v4: - exchange the patch 'fix the call trace when unbind device' and 'fix the process of register algorithms to crypto' to make sure the driver is stable. v3: - add the patch 10 which is aimed to fix the call trace when remove a working device v2: - fix the wrong email address on patch 1 Hui Tang (1): crypto: hisilicon/qm - fix judgement of queue is full Shukun Tan (3): crypto: hisilicon/qm - clear used reference count when start qp crypto: hisilicon/qm - fix event queue depth to 2048 crypto: hisilicon/qm - fix VF not available after PF FLR Sihang Chen (1): crypto: hisilicon/qm - fix wrong release after using strsep Weili Qian (1): crypto: hisilicon/qm - fix the call trace when unbind device Yang Shen (4): crypto: hisilicon/qm - fix print frequence in hisi_qp_send crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop' crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown' crypto: hisilicon/qm - fix the process of register algorithms to crypto drivers/crypto/hisilicon/hpre/hpre_crypto.c | 36 ++--- drivers/crypto/hisilicon/hpre/hpre_main.c | 28 ++-- drivers/crypto/hisilicon/qm.c | 221 ++++++++++++++++++++++++---- drivers/crypto/hisilicon/qm.h | 27 ++-- drivers/crypto/hisilicon/sec2/sec_crypto.c | 35 ++--- drivers/crypto/hisilicon/sec2/sec_main.c | 34 ++--- drivers/crypto/hisilicon/zip/zip_crypto.c | 2 +- drivers/crypto/hisilicon/zip/zip_main.c | 49 +++--- 8 files changed, 288 insertions(+), 144 deletions(-) -- 2.7.4