From patchwork Tue Jun 14 12:29:37 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "yekai (A)" X-Patchwork-Id: 12881140 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6D9D2C433EF for ; Tue, 14 Jun 2022 12:39:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243061AbiFNMjb (ORCPT ); Tue, 14 Jun 2022 08:39:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42620 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357616AbiFNMjP (ORCPT ); Tue, 14 Jun 2022 08:39:15 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E415045523; Tue, 14 Jun 2022 05:36:50 -0700 (PDT) Received: from dggpeml500021.china.huawei.com (unknown [172.30.72.53]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4LMnvR22xjzjY2V; Tue, 14 Jun 2022 20:34:59 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500021.china.huawei.com (7.185.36.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 14 Jun 2022 20:36:03 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 14 Jun 2022 20:36:03 +0800 From: Kai Ye To: , CC: , , , , , , Subject: [PATCH v2 0/3] crypto: hisilicon - supports device isolation feature Date: Tue, 14 Jun 2022 20:29:37 +0800 Message-ID: <20220614122943.1406-1-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add the hardware error isolation feature for ACC. Defines a driver debugfs node that used to configures the hardware error frequency. When the error frequency is exceeded, the device will be isolated. The isolation strategy can be defined in each driver module. e.g. Defining the isolation strategy for ACC, if the AER error frequency exceeds the value of setting for a certain period of time, The device will not be available in user space. The VF device use the PF device isolation strategy. as well as the isolation strategy should not be set during device use. changes v1->v2: 1、deleted dev_to_uacce api. 2、add vfs node doc. 3、move uacce->ref to driver. Kai Ye (3): uacce: supports device isolation feature Documentation: add a isolation strategy vfs node for uacce crypto: hisilicon/qm - defining the device isolation strategy Documentation/ABI/testing/sysfs-driver-uacce | 17 ++ drivers/crypto/hisilicon/qm.c | 157 +++++++++++++++++-- drivers/misc/uacce/uacce.c | 37 +++++ include/linux/hisi_acc_qm.h | 9 ++ include/linux/uacce.h | 16 +- 5 files changed, 219 insertions(+), 17 deletions(-)