Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4372948ybf; Wed, 4 Mar 2020 02:42:08 -0800 (PST) X-Google-Smtp-Source: ADFU+vsF9f7qy7bedqkBa0mExaEyIcbWdp398NmcC/xVagK3Te8Qq/lc9XkbZm7YWiQVK0GMKsTP X-Received: by 2002:a9d:6e8e:: with SMTP id a14mr1721568otr.109.1583318528476; Wed, 04 Mar 2020 02:42:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583318528; cv=none; d=google.com; s=arc-20160816; b=PCQN15/o3GNQvfs0XAIHuk+yN8DJaz8q8k6YtEh/u4d5tB8OSlq0ee8lWzTfS9hxpm sjFrrqMRumym9N+Ri79Mz2azV8J2HEGPxyix4IUSDgsiYM1MWCEHHxERIZRwaxrO4C93 2Ehpt5T6fwvQ55g8NtVUz5VARzyXOi0HbkDiauZyppHAw9ex4DSvXl4ZwY5feWXBKSnY DL7D4vfPSgRhuul+7iDuHZV5WzzrNphYINB3mIcBVq3Yqdddw7EuP/KAz7UzmeYdkyTD WfTAu/fCWL7Dnv69eFtcdfVBpmBDtHWV31cUV4O+RqdUNMSQddUHcCOLvSebKASdoBKE Kc0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=tj8yI+ZQbufCzNZSPgud3ckvpXsZvice6sv85gKklx0=; b=l6EPDWKuv+8gy9HuM/eM+fhSHWqiBxq0q43GbSK5898PQDJn8i+fAQ9DzfZmNqsZlW oV9C9uV2uYPH6NYts3xihAtUXFiA4clVQqny59YxJHnDa+I5JfsQdOe4479EcQLthPkY DgHKvV3UGDybDs4PAM8PXoA3JNCOmcHU9dGDXoUyIAB4IV0/VoN4kyYvPUJNXwyF3LuN rlqO+5PGUWy3C7xyFX2iJODKIilcxXULENzQ+hUOgATSxDRzMqoUXrv7ODdcQi4JO27E oeCqE5kJXXTh2QsCI8mdGgWfwTJLvi+0sZKtui4kBqR3Sm+4WdQ0J882j7/NBzwMZBqB OhSg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l5si883162otn.35.2020.03.04.02.41.56; Wed, 04 Mar 2020 02:42:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387785AbgCDKkO (ORCPT + 99 others); Wed, 4 Mar 2020 05:40:14 -0500 Received: from foss.arm.com ([217.140.110.172]:60634 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729118AbgCDKkO (ORCPT ); Wed, 4 Mar 2020 05:40:14 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EBDD530E; Wed, 4 Mar 2020 02:40:13 -0800 (PST) Received: from bogus (e103737-lin.cambridge.arm.com [10.1.197.49]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B7FC03F534; Wed, 4 Mar 2020 02:40:12 -0800 (PST) Date: Wed, 4 Mar 2020 10:40:05 +0000 From: Sudeep Holla To: peng.fan@nxp.com Cc: robh+dt@kernel.org, viresh.kumar@linaro.org, f.fainelli@gmail.com, linux-imx@nxp.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, Sudeep Holla Subject: Re: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc transport Message-ID: <20200304103954.GA25004@bogus> References: <1583201219-15839-1-git-send-email-peng.fan@nxp.com> <1583201219-15839-3-git-send-email-peng.fan@nxp.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1583201219-15839-3-git-send-email-peng.fan@nxp.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 03, 2020 at 10:06:59AM +0800, peng.fan@nxp.com wrote: > From: Peng Fan > > Take arm,smc-id as the 1st arg, leave the other args as zero for now. > There is no Rx, only Tx because of smc/hvc not support Rx. > > Signed-off-by: Peng Fan [...] > +static int smc_send_message(struct scmi_chan_info *cinfo, > + struct scmi_xfer *xfer) > +{ > + struct scmi_smc *scmi_info = cinfo->transport_info; > + struct arm_smccc_res res; > + > + shmem_tx_prepare(scmi_info->shmem, xfer); How do we protect another thread/process on another CPU going and modifying the same shmem with another request ? We may need notion of channel with associated shmem and it is protected with some lock. -- Regards, Sudeep