Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp757503imn; Sat, 30 Jul 2022 01:41:12 -0700 (PDT) X-Google-Smtp-Source: AGRyM1toQAjMgnKLp2eOIsj38TFlAlKIXhL8mwOz12xTNc0bWI5Ff+RBtun02hWzD18ipcjbPFVe X-Received: by 2002:a63:ff4c:0:b0:412:b100:786b with SMTP id s12-20020a63ff4c000000b00412b100786bmr6024099pgk.537.1659170471915; Sat, 30 Jul 2022 01:41:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659170471; cv=none; d=google.com; s=arc-20160816; b=ydLNdTRm2C2tyh1+12u+61+i22wPWvF9GNxPXwgCiB4ohNXaSCeD4EnhvW2f0rr+3l BaCHUb//+7slks2hKtlwBx3B0DdIA9RZj6l56CgtrJjjEyYNwvH6OoMhRE2bDAmUKQoT zOGYyR65qaq9kv6LqhQaEnR0d9SZC+koyKidt5IisV+bjEpSozbHKVlIDLQpyTZMP7k6 ACQ38Nq7rhiTXJvNVkAmuswCnMjd1PuRWePPZUeTBe3BXTKnh+7NxrlIoCi220E4fCa9 pl0ssKW7VQYO3r1VpFrY3SdAyOR1LD4C4A1nOrGpMrhFpQp1CVFudyhGg9QAd6zk+OkE iSfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=hdKKnet6K+AQISLubRb6VFitAXpKRsDZp5zZK2bV708=; b=jsOOUhd5yZ1fyklXzEDmU0S9fDWfD6v9t9h8rWw7oMkrPGR9fjIvq1nwQssecct7yA m43PoB62tCIjSTGFO6BykN6lMDvc2yph0TsPMll4t0bFn8vfoVjbrKlCX2XpYBIcWdRB AJ7240cIKfjSZ0FR3NmV+cMJf4V+pwjewZ/EFRChn76S69CJeXzP7ZyKx2LwAnAyPH+4 4cgFVzlvdcXOy8xe3RBNRRukcoEvM4/CUzrCW1NZD+hQmsPnr1jFEaUgfmbLbHhQqzts q/1A5t3v7mYDsWPl4DqZJ4YoTieB/u2ERfJCP4KtGk2zIyL0Hi4s61kxpRr5AWNolQ2n uvMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i1-20020a170902c94100b0016c35b218bdsi7338874pla.433.2022.07.30.01.40.36; Sat, 30 Jul 2022 01:41:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232054AbiG3Iju (ORCPT + 99 others); Sat, 30 Jul 2022 04:39:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55418 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231314AbiG3Ijt (ORCPT ); Sat, 30 Jul 2022 04:39:49 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 86DDE28720; Sat, 30 Jul 2022 01:39:47 -0700 (PDT) Received: from dggpeml500021.china.huawei.com (unknown [172.30.72.53]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4LvyTM6SXZz9stV; Sat, 30 Jul 2022 16:38:31 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500021.china.huawei.com (7.185.36.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Sat, 30 Jul 2022 16:39:45 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Sat, 30 Jul 2022 16:39:45 +0800 From: Kai Ye To: , CC: , , , , Subject: [PATCH v6 0/3] crypto: hisilicon - supports device isolation feature Date: Sat, 30 Jul 2022 16:32:43 +0800 Message-ID: <20220730083246.55646-1-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org 1、Add the uacce hardware error isolation interface. Supports configures the hardware error isolation frequency. 2、Defining the isolation strategy for ACC by uacce sysfs node. If the number of hardware errors in a per hour exceeds the configured value, the device will not be available in user space. The VF device use the PF device isolation strategy. changes v1->v2: - deleted dev_to_uacce api. - add vfs node doc. - move uacce->ref to driver. changes v2->v3: - deleted some redundant code. - use qm state instead of reference count. - add null pointer check. - isolate_strategy_read() instead of a copy. changes v3->v4: - modify a comment changes v4->v5: - use bool instead of atomic. - isolation frequency instead of isolation command. changes v5->v6: - add is_visible in uacce. - add the description of the isolation strategy file node. Kai Ye (3): uacce: supports device isolation feature Documentation: add a isolation strategy sysfs node for uacce crypto: hisilicon/qm - define the device isolation strategy Documentation/ABI/testing/sysfs-driver-uacce | 17 ++ drivers/crypto/hisilicon/qm.c | 163 +++++++++++++++++-- drivers/misc/uacce/uacce.c | 58 +++++++ include/linux/hisi_acc_qm.h | 9 + include/linux/uacce.h | 11 ++ 5 files changed, 246 insertions(+), 12 deletions(-) -- 2.33.0