Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp1464511rwe; Thu, 1 Sep 2022 20:21:00 -0700 (PDT) X-Google-Smtp-Source: AA6agR7I9rXvO41q5e2PD3HjpUFFcVCiJPujamMWUYGgD+HDJe5E08U6hkxlJ2FYKegOyPRTcAFB X-Received: by 2002:aa7:d385:0:b0:447:d5ec:d452 with SMTP id x5-20020aa7d385000000b00447d5ecd452mr27678316edq.231.1662088859954; Thu, 01 Sep 2022 20:20:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662088859; cv=none; d=google.com; s=arc-20160816; b=sPfoeknAvk/YgZ0+WQB78fhQfWB0alxGwUKhprvFs6XIfSFm+PzqYVf2lwQuvIeVfl flsXjv0BHTsqilFhd6ZyGWT1iB8cJgBG8b34kA6qoCDQ8nt9UtPcWIh6Q2jgjKmLuVIE WkcTNF6kUe47RbQcpZTkI0lbN8FWwDYwJbuKW2r5Xxrx2nIi1aYt/VdwwCP9b2R4+pxd uzYSPzBo+8NkECbl979EegSSn3gd6QyfGgm8ieyc75f0EXkBtdZA65MUAcP+vnHiF3Yh au3Ys81C0p8NkmOxWJatxOOb6/zmmEsNlx2YbD3Xd+7hqeKZAgUAKj9rE1EoIWvE4E8i X3Pw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=dCNGD1BoiDGYIBFuCve2CdhCqRmaoXvSRyhv+1G9l34=; b=oBsfSLqCGEYYXTzyzKh7Gc1YOYLIpNHQ6lK4iP5oB1X75BMsW2su5poe/t5XFDqN82 Aro2GvstnPHI1Y2u9BTOGZvv8QEkrD+HUsrE7j+FC744d9dvhhp5hXMRRPSRjK/NukZP CX32fjBNnje4P0aTtZ9MEb6rMrRH6tOIlZ+0Zk4YAxxdXcKVN8Vp/S//P+J+9s1sL0K1 xsNqyMXVk++8XxbkdYuBgI8esnFzwvCIrYFCJNiSn/XmAd56GzZdGRQbwhFDi5MDqCrX NAJYxt2+csILlNOzEXZNKkpMmDEp5NYP7kNGWeCIbcxT3fy7fpMCboaZbdOeNdRQGHzi +p/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j13-20020a1709066dcd00b0073d7c3486b8si629875ejt.208.2022.09.01.20.20.35; Thu, 01 Sep 2022 20:20:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232782AbiIBDTI (ORCPT + 99 others); Thu, 1 Sep 2022 23:19:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231344AbiIBDTE (ORCPT ); Thu, 1 Sep 2022 23:19:04 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 389EE83BCD; Thu, 1 Sep 2022 20:19:01 -0700 (PDT) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4MJjgs697fzYcnb; Fri, 2 Sep 2022 11:14:33 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 2 Sep 2022 11:18:59 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 2 Sep 2022 11:18:58 +0800 From: Kai Ye To: , CC: , , , , Subject: [PATCH v8 0/3] crypto: hisilicon - supports device isolation feature Date: Fri, 2 Sep 2022 03:13:01 +0000 Message-ID: <20220902031304.37516-1-yekai13@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org 1、Add the uacce hardware error isolation interface. Supports configures the hardware error isolation frequency. 2、Defining the isolation strategy for ACC by uacce sysfs node. If the number of hardware errors in a per hour exceeds the configured value, the device will not be available in user space. The VF device use the PF device isolation strategy. changes v1->v2: - deleted dev_to_uacce api. - add vfs node doc. - move uacce->ref to driver. changes v2->v3: - deleted some redundant code. - use qm state instead of reference count. - add null pointer check. - isolate_strategy_read() instead of a copy. changes v3->v4: - modify a comment changes v4->v5: - use bool instead of atomic. - isolation frequency instead of isolation command. changes v5->v6: - add is_visible in uacce. - add the description of the isolation strategy file node. changes v6->v7 - add an example for isolate_strategy in Documentation. changes v7->v8 - update the correct date. Kai Ye (3): uacce: supports device isolation feature Documentation: add a isolation strategy sysfs node for uacce crypto: hisilicon/qm - define the device isolation strategy Documentation/ABI/testing/sysfs-driver-uacce | 26 +++ drivers/crypto/hisilicon/qm.c | 163 +++++++++++++++++-- drivers/misc/uacce/uacce.c | 58 +++++++ include/linux/hisi_acc_qm.h | 9 + include/linux/uacce.h | 11 ++ 5 files changed, 255 insertions(+), 12 deletions(-) -- 2.17.1