Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1411730iog; Tue, 14 Jun 2022 05:40:10 -0700 (PDT) X-Google-Smtp-Source: AGRyM1u8OJqN8hV/Xj8CxtXFNkFZLWQvMAhYp889XJCBEDRs6MKqF3UtMT1mowwrf3Cul/agLXtF X-Received: by 2002:aa7:c450:0:b0:431:55c6:29f9 with SMTP id n16-20020aa7c450000000b0043155c629f9mr5766764edr.14.1655210410008; Tue, 14 Jun 2022 05:40:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655210410; cv=none; d=google.com; s=arc-20160816; b=nhvVWEHW4XC5iV+2RMq+wyPSZiC159NWqwTxsbLgVgIPwOGGkfbmVuhKeT6MfF6tpX eRT8NKJn2Py5q4uU57A+vzqc8bvZMLYSydykfiwCGKoyo4wZuZ8a5gdvlb5yxVBux/Gt pa1nXokcM8PuVS8tkQpC13+TeZW+2++9tKL9ipzrdxzKTVzQ97WykFzQwPAVk9EK/lt5 LHiExbL6dqNwdnFechsFYr2mgvfjtpmfKJC0v/qwd5UTtLwZwNeM4lSnK8JPO+gZJKsz rY1fISF9zuPyQoj4lZsWnTyhGjQTxFdwodTf25bgeoQdc7AjUrwJwj4jNEEECmheuIAr GpIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=7MkMUY41j9BZlVViNxUe+84qSWe+mc1iZNzuXCPxi34=; b=rwfapSadHlpQ0rhjgcEOoVxzy/mkwJS8AUuH2cHC31F2U4P5U5Rw6Br7wbu+ZYbx2F abN1WBh1Iw3HZ+LeIbHQx0Gud4UyqA4rpp58ZRASDSItZpD6Q5BoW3FCoN4jx3UlocnS 1zN0+aYr5X4WM720YoXLgV/ImtlGNTDWLe9FanILgDwMnYCPVBO4OQHSxnjX2fyhSUWz 2wXnlRzWBHF4Tvfet/iZhwo7zs1WK3dWy4PVMt+5GnmwqCfey9XQOR9bHO5Kg5XQU5H+ gqoL1VM8qLUnmNWoATTqZRp+P4xFXgS43R/GqvoiYSflwwt6Ka3Rw3YcmlZY0k1I2BoX 82OA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b23-20020a1709064d5700b006ffe48f0c5bsi9614541ejv.346.2022.06.14.05.39.44; Tue, 14 Jun 2022 05:40:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243061AbiFNMjb (ORCPT + 99 others); Tue, 14 Jun 2022 08:39:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42620 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357616AbiFNMjP (ORCPT ); Tue, 14 Jun 2022 08:39:15 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E415045523; Tue, 14 Jun 2022 05:36:50 -0700 (PDT) Received: from dggpeml500021.china.huawei.com (unknown [172.30.72.53]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4LMnvR22xjzjY2V; Tue, 14 Jun 2022 20:34:59 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500021.china.huawei.com (7.185.36.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 14 Jun 2022 20:36:03 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 14 Jun 2022 20:36:03 +0800 From: Kai Ye To: , CC: , , , , , , Subject: [PATCH v2 0/3] crypto: hisilicon - supports device isolation feature Date: Tue, 14 Jun 2022 20:29:37 +0800 Message-ID: <20220614122943.1406-1-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add the hardware error isolation feature for ACC. Defines a driver debugfs node that used to configures the hardware error frequency. When the error frequency is exceeded, the device will be isolated. The isolation strategy can be defined in each driver module. e.g. Defining the isolation strategy for ACC, if the AER error frequency exceeds the value of setting for a certain period of time, The device will not be available in user space. The VF device use the PF device isolation strategy. as well as the isolation strategy should not be set during device use. changes v1->v2: 1、deleted dev_to_uacce api. 2、add vfs node doc. 3、move uacce->ref to driver. Kai Ye (3): uacce: supports device isolation feature Documentation: add a isolation strategy vfs node for uacce crypto: hisilicon/qm - defining the device isolation strategy Documentation/ABI/testing/sysfs-driver-uacce | 17 ++ drivers/crypto/hisilicon/qm.c | 157 +++++++++++++++++-- drivers/misc/uacce/uacce.c | 37 +++++ include/linux/hisi_acc_qm.h | 9 ++ include/linux/uacce.h | 16 +- 5 files changed, 219 insertions(+), 17 deletions(-) -- 2.33.0