Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751269AbdGMHdT (ORCPT ); Thu, 13 Jul 2017 03:33:19 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:49196 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750920AbdGMHdS (ORCPT ); Thu, 13 Jul 2017 03:33:18 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org AF6826029D Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=akdwived@codeaurora.org Subject: Re: [PATCH v6 1/4] firmware: scm: Add new SCM call API for switching memory ownership To: Stephen Boyd Cc: bjorn.andersson@linaro.org, agross@codeaurora.org, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-remoteproc@vger.kernel.org References: <1498133333-21291-1-git-send-email-akdwived@codeaurora.org> <1498133333-21291-2-git-send-email-akdwived@codeaurora.org> <20170707224956.GK22780@codeaurora.org> <13defb94-dac3-097d-f3c6-088385b909a5@codeaurora.org> <20170713055404.GS22780@codeaurora.org> From: "Dwivedi, Avaneesh Kumar (avani)" Message-ID: Date: Thu, 13 Jul 2017 13:03:12 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <20170713055404.GS22780@codeaurora.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3723 Lines: 83 On 7/13/2017 11:24 AM, Stephen Boyd wrote: > On 07/12, Dwivedi, Avaneesh Kumar (avani) wrote: >> >> On 7/8/2017 4:19 AM, Stephen Boyd wrote: >>> On 06/22, Avaneesh Kumar Dwivedi wrote: >>>> diff --git a/drivers/firmware/qcom_scm-64.c b/drivers/firmware/qcom_scm-64.c >>>> index 6e6d561..cdfe986 100644 >>>> --- a/drivers/firmware/qcom_scm-64.c >>>> +++ b/drivers/firmware/qcom_scm-64.c >>>> @@ -292,6 +304,86 @@ int qcom_scm_pas_shutdown(u32 peripheral) >>>> } >>>> EXPORT_SYMBOL(qcom_scm_pas_shutdown); >>>> +/** >>>> + * qcom_scm_assign_mem() - Make a secure call to reassign memory ownership >>>> + * >>>> + * @mem_addr: mem region whose ownership need to be reassigned >>>> + * @mem_sz: size of the region. >>>> + * @srcvm: vmid for current set of owners, each set bit in >>>> + * flag indicate a unique owner >>>> + * @newvm: array having new owners and corrsponding permission >>>> + * flags >>>> + * @dest_cnt: number of owners in next set. >>>> + * Return next set of owners on success. >>>> + */ >>>> +int qcom_scm_assign_mem(phys_addr_t mem_addr, size_t mem_sz, int srcvm, >>>> + struct qcom_scm_vmperm *newvm, int dest_cnt) >>>> +{ >>>> + unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS; >>> Why do we need this? Just curious if we can drop this. >> The force contiguous flag is required with dma_alloc_attrs() api to >> allocate memory from physically contiguous zone. >> I am not sure, are you saying that api will work without the >> attribute or you mean i shall use some api which does not take >> explicit attribute? > Does physically contiguous zone mean some CMA carveout? I wasn't > aware of a carveout for scm devices. I'm still not following the > reasoning here. the memory will be allocated from common carveout, there is no scm device specific carveout. i will use dma_alloc_coherent() and will drop off this flag. we need physical contigious zone to fill and pass scm call parameters to TZ. > > I'm saying that I don't understand why we need this flag. It > feels like this sort of constraint would apply all over the scm > driver if it was true, hence the confusion. > >>>> + >>>> + ret = __qcom_scm_assign_mem(__scm->dev, memory_phys, >>>> + memory_sz, src_phys, src_sz, dest_phys, dest_sz); >>>> + dma_free_attrs(__scm->dev, ALIGN(mem_all_sz, SZ_64), >>>> + ptr, src_phys, dma_attrs); >>>> + if (ret == 0) >>>> + return next_vm; >>>> + else if (ret > 0) >>>> + return -ret; >>> This still confuses me. Do we really just pass whatever the >>> firmware tells us the error code is up to the caller? Shouldn't >>> we be remapping the scm errors we receive to normal linux errnos? >> because i do not know in advance what exactly will be the return >> error code, moreover there are number of error codes which are >> returned in case of failure >> so if i have to return linux error code, i can not do one to one >> mapping of error code and will have to return single error code for >> all failure. >> let me know your comments further on this.+ return ret; > Yes, returning -EINVAL all the time is fine if we can't remap the > error. In fact, we should probably do what we do downstream and > print out the error value returned from the firmware to the > kernel log and then return some sane errno up to the caller. That > way the few people who know what the error codes mean can tell us > why the scm call failed. OK, will do same. just last thing to ask, should i resend all 4 patches together again or only one patch in v7 version. as chnage will be in only 1 out of 4 patches. > -- Qualcomm India Private Limited, on behalf of Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.