From patchwork Fri Sep 2 03:13:01 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "yekai (A)" X-Patchwork-Id: 12963590 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8F26C38145 for ; Fri, 2 Sep 2022 03:19:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232782AbiIBDTI (ORCPT ); Thu, 1 Sep 2022 23:19:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231344AbiIBDTE (ORCPT ); Thu, 1 Sep 2022 23:19:04 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 389EE83BCD; Thu, 1 Sep 2022 20:19:01 -0700 (PDT) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4MJjgs697fzYcnb; Fri, 2 Sep 2022 11:14:33 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 2 Sep 2022 11:18:59 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 2 Sep 2022 11:18:58 +0800 From: Kai Ye To: , CC: , , , , Subject: [PATCH v8 0/3] crypto: hisilicon - supports device isolation feature Date: Fri, 2 Sep 2022 03:13:01 +0000 Message-ID: <20220902031304.37516-1-yekai13@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org 1、Add the uacce hardware error isolation interface. Supports configures the hardware error isolation frequency. 2、Defining the isolation strategy for ACC by uacce sysfs node. If the number of hardware errors in a per hour exceeds the configured value, the device will not be available in user space. The VF device use the PF device isolation strategy. changes v1->v2: - deleted dev_to_uacce api. - add vfs node doc. - move uacce->ref to driver. changes v2->v3: - deleted some redundant code. - use qm state instead of reference count. - add null pointer check. - isolate_strategy_read() instead of a copy. changes v3->v4: - modify a comment changes v4->v5: - use bool instead of atomic. - isolation frequency instead of isolation command. changes v5->v6: - add is_visible in uacce. - add the description of the isolation strategy file node. changes v6->v7 - add an example for isolate_strategy in Documentation. changes v7->v8 - update the correct date. Kai Ye (3): uacce: supports device isolation feature Documentation: add a isolation strategy sysfs node for uacce crypto: hisilicon/qm - define the device isolation strategy Documentation/ABI/testing/sysfs-driver-uacce | 26 +++ drivers/crypto/hisilicon/qm.c | 163 +++++++++++++++++-- drivers/misc/uacce/uacce.c | 58 +++++++ include/linux/hisi_acc_qm.h | 9 + include/linux/uacce.h | 11 ++ 5 files changed, 255 insertions(+), 12 deletions(-)