Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp190956imm; Thu, 30 Aug 2018 11:33:10 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaI1HPp8X3uoSQZq1kTa+K7ekEAlUYCVcVw6mhT4ygjToFPv/tgoX5v7htZ/CBGdahPs7rf X-Received: by 2002:a62:9ed1:: with SMTP id f78-v6mr11779116pfk.206.1535653990077; Thu, 30 Aug 2018 11:33:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535653990; cv=none; d=google.com; s=arc-20160816; b=yKnVOQYlms82lYi8zjvzQqNcxSwnZx1oGce4YElFrCkH2C6SLHd5yiUjoVYIlzQtx0 tMGXHvpsnXncJpDrV3o30QYlB5pk0Lh6YiHevcluVGcy9lSZrR+y8p5gNWX7QodCBwcz 7x5TMFx7Z/oATx1idbKdv8kGyYBiNbx/9bCDkgJEu/3+N6nbT2BQbkwpc922rZoGiIDu wLeOykqFfrLobjN24MHnxTGGISVp6+JXrZ2TDESTYNmwEgyinVaSsx9CgStjEC4nP2a3 KRtlWv2HFRRsVAXvdtfSF2sd6OMT7SEHQXukiOld9DpMaljb4yW+q4jbRN39yRbo93ki tkgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=I8y2gzFkzmqwPeNiS8CvRA+6heY+d7qSqwXYwtdj6xA=; b=LNyM5ILA51VBfBhLzQ84VKJLOmkPGmOX2PvnX2NngdZF3rSvFYZEgF5EsS0iphmQKf YL9guErw6tb5+1Pa4/CLlVHZGYwOGC2ov7L/1PK7KaWOnkbn5nYCd/DrZRUtM6rLoNDK wKaZDwB79tvmu2YT6CrlvFLFM9tmVg5iRj8G85vu13MAecYPmH6gIFH66+JqYujfxlgC 7totoAg1+dfdI7gLLEVhJKJVKSalUD9sdGiBa11nEeDhGrUPy5Izt+Ji8oWc9KfMN2N4 VfdhmlJ4GkTqoJ+T7pWv5qP/DpYcQj9QKob5mn+nJqv5ED5BeZUtOkjAG0Os3DooLx9n UaSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=BQQuZ36+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1-v6si7230298pgn.212.2018.08.30.11.32.55; Thu, 30 Aug 2018 11:33:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=BQQuZ36+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728203AbeH3Wew (ORCPT + 99 others); Thu, 30 Aug 2018 18:34:52 -0400 Received: from mail-wr1-f67.google.com ([209.85.221.67]:44153 "EHLO mail-wr1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726727AbeH3Wew (ORCPT ); Thu, 30 Aug 2018 18:34:52 -0400 Received: by mail-wr1-f67.google.com with SMTP id v16-v6so8943529wro.11; Thu, 30 Aug 2018 11:31:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=I8y2gzFkzmqwPeNiS8CvRA+6heY+d7qSqwXYwtdj6xA=; b=BQQuZ36+ntUsz0WkZlDd3CR77e9g/qPHRYaXAa4PAG7Fo4E2jXQcwwDsv2shVPzDRA V8QMoDByOYFeYgIlMGKcNXoheTwtFinpj/HFs6bw0ncljGcqnD7vPFwtqM9S+HXuwggx ic6YYcM7ho57ZxqrHJhsxAeyd6KiM2M0BK5/6l6UCpmVU0DOF/dYv1ervFpNKN96AhU4 QeWFGfJDvINM8Hp3iN1/MNWcLqiRvbWG3TmKX9sQsWBlKHfA/vUVMQYjZkGn58OIBnba 3TMNCwqtB/9zQISgUZ58G0ErFymeAob9HbH/8VCQBFE9SVaKa4gZJxeMT6znvhGBVF7W Eilg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=I8y2gzFkzmqwPeNiS8CvRA+6heY+d7qSqwXYwtdj6xA=; b=BKhbJKHN9Sz2REgn00COoHjlSGpVmYyFhdce91GbtfEgevjyHrULhZ4iFnU7t4J39x Qp7gzQPOuibxBpShccbyaafpUMPoYV9qMd5Tbr83197PTsyGT/REwVLYdqGYs90E33gt jVD/Mnc7K/Tpa1CTj0BhuIVgZc6RNzZzVi+SSdyQvxzgblaw17bF3WVBsvek6trZsOZB wb/OTisjqKFC/jwEOSy9SmwuFcP2/1rnYsZEuovPUkcRLtq4GF9gjUlZrRa0nPGWMird +v7kaGOtpbivB6kdxFw88ivnwwiTZ5y0jw8lddooJLrBucHEDstjtDXGupxu/s/ehYya 4DhA== X-Gm-Message-State: APzg51DgxZFqEy6DzBHbAjd1l612CrFaVnxYZw8qMH61Nat5f4Hv+NyD r36g3keZq9W9PeW2KQwc8O8ZDqhYhviSqjxNOW8= X-Received: by 2002:adf:82c3:: with SMTP id 61-v6mr8760351wrc.131.1535653883110; Thu, 30 Aug 2018 11:31:23 -0700 (PDT) MIME-Version: 1.0 References: <1535453838-12154-1-git-send-email-sunil.kovvuri@gmail.com> <20180830132658.GA27566@lunn.ch> In-Reply-To: <20180830132658.GA27566@lunn.ch> From: Sunil Kovvuri Date: Fri, 31 Aug 2018 00:01:11 +0530 Message-ID: Subject: Re: [PATCH 00/15] soc: octeontx2: Add RVU admin function driver To: Andrew Lunn Cc: Arnd Bergmann , LKML , olof@lixom.net, LAKML , linux-soc@vger.kernel.org, Sunil Goutham , Linux Netdev List , "David S. Miller" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 30, 2018 at 6:57 PM Andrew Lunn wrote: > > > > > My feeling overall is that we need a review from the network driver > > > > folks more than the arm-soc team etc, and that maybe the driver > > > > as a whole should go into drivers/net/ethernet. > > > > > > This driver doesn't handle any network IO and moreever this driver has to handle > > > configuration requests from crypto driver as well. There will be > > > separate network and > > > crypto drivers which will be upstreamed into drivers/net/ethernet and > > > drivers/crypto. > > > And in future silicons there will be different types of functional > > > blocks which will be > > > added into this resource virtualization unit (RVU). Hence i thought > > > this driver is not a > > > right fit in drivers/net/ethernet. > > Hi Sunil > > Do you have a git branch for everything? I would like to look at the > actual Ethernet driver, and the full API this driver exports to other > drivers. Hi Andrew, I have pushed all patches into a github repo for your reference. These are not the final patches, i still need to do some minor changes before submitting (i mean otherthan the ones i already submitted). AF driver & CGX drivers: https://github.com/sunilkovvuri/rvu_drivers/tree/master/drivers/soc/marvell/octeontx2 Ethernet drivers PF and VF https://github.com/sunilkovvuri/rvu_drivers/tree/master/drivers/net/ethernet/marvell/octeontx2 Info exported/shared by AF driver with other drivers is # Mailbox communication APIs, message IDs, message structs e.t.c https://github.com/sunilkovvuri/rvu_drivers/blob/master/drivers/soc/marvell/octeontx2/mbox.c https://github.com/sunilkovvuri/rvu_drivers/blob/master/drivers/soc/marvell/octeontx2/mbox.h # Other structs and APIs https://github.com/sunilkovvuri/rvu_drivers/blob/master/drivers/soc/marvell/octeontx2/common.h https://github.com/sunilkovvuri/rvu_drivers/blob/master/drivers/soc/marvell/octeontx2/rvu_struct.h > > I think there real question here is, do you have split between this > driver and the actual device drivers in the right place? For me, link > up/down detection should be in the Ethernet driver, since it is not > shared with the crypto driver. > As mentioned in the patch '[PATCH 13/15] soc: octeontx2: Add support for CGX link management', link up/down is detected by firmware. And firmware triggers a IRQ to CGX driver, which then takes the new status and sends a update to ethernet driver via a mailbox communication. Ethernet driver detects the link change and does the necessary stuff. https://github.com/sunilkovvuri/rvu_drivers/blob/master/drivers/net/ethernet/marvell/octeontx2/otx2_pf.c#L116 > Thanks > Andrew