Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp5588354ybf; Thu, 5 Mar 2020 03:27:11 -0800 (PST) X-Google-Smtp-Source: ADFU+vvKDJDAl3d2Vwizc1GEjZqJx1OVMrJgcJWoWFA3E8qFjFbghstGA80HlaZgmjSfqdYOm52i X-Received: by 2002:aca:b4c3:: with SMTP id d186mr5174623oif.131.1583407631049; Thu, 05 Mar 2020 03:27:11 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1583407631; cv=pass; d=google.com; s=arc-20160816; b=BT69iASShlg2AwwboRm2ys8Cqj2cN5CRUXP8m3IgltcnmVIjC8lV/b+4LOvArXrEEI 8JXDf4AfeeQtVwsRpfHwAZa/rVnrcFhbmwJtAyZ+HUQJNWAm1KtfZB1kAdsoOwyRndk+ 9RzFDZgVrbSAtjrlMIpfCaPRMrlRFS0yZAVkcOB+GL7AfYtaayJQenVJKOc3E8VfjxvB 5L+hY9TVqVxYPgrUzsO3foJnECS8NqPbht5Vr3dQVGj/ujEbMfIVsf9IGq4kEBMlQDwJ VgP8e0xePcysdOSiLkRUFgyRE9aQQgz4JtKNStTe6qjZ88NF4eSTYwVdwagZ3xohCaFQ 3GAQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=2zyuX7GS44k1j/89jhil6W6IOkMqYrFsP1t/zvuqWbY=; b=fTFUg+a2gaMI2aB54q1wazMqJGdTgIPICD8iaFzNjSLL/B1gchKS6z4JGFbeL68gD5 x0RWOT0LhDN7WwkeFV+tSTDjex1foe+opDbF0AOW5QtPioNYj6epOzEwSO04XZiA/jVt giNy2+pWR7BVLc69cEUp8HSpxLnJV4NxqJbmNExZEAe/yXUdQI4141wrKSXIgCPvJb25 4vVax1uV10/qZeyZ2pkd9o8CwVQQx19pQ9FzObGx58/ISuEE1qTSmrnZ4XfRLMuomdTk ibFo4cd050+yjtl/nUkEZ+u13QKoDvc6/6T7jB903qcH95yGZxbrb2UrLui5VR6wlr2h rIjg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@nxp.com header.s=selector2 header.b="ThGijMu/"; arc=pass (i=1 spf=pass spfdomain=nxp.com dkim=pass dkdomain=nxp.com dmarc=pass fromdomain=nxp.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l19si3146245oii.54.2020.03.05.03.26.58; Thu, 05 Mar 2020 03:27:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nxp.com header.s=selector2 header.b="ThGijMu/"; arc=pass (i=1 spf=pass spfdomain=nxp.com dkim=pass dkdomain=nxp.com dmarc=pass fromdomain=nxp.com); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727191AbgCELZk (ORCPT + 99 others); Thu, 5 Mar 2020 06:25:40 -0500 Received: from mail-eopbgr70078.outbound.protection.outlook.com ([40.107.7.78]:26039 "EHLO EUR04-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725880AbgCELZk (ORCPT ); Thu, 5 Mar 2020 06:25:40 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kwvtASk4IEZNlrRDYBL5smT+74YEsaukDxwgrmbZ3u6ezednUNsjhPXJc/0QeTiZM2JsW/eVPe3TNT0TwRKrdX6YY7DC+TernHkYcFYtb9oyIfoc+KtXRHASogprCbArBz+AP7FXaYL7+Db8QtMyscCB4toJu9ABb/fSXH4CYQaRoQ4pyKm8WEib09Cw/Lv9YSh3jlJ3Udj2+BhJ6MSE9x3Eq22MrZqvw0e886GtGtchftWNWsRPu9wd8kAZn4SJZkj4Z22aGfpWWGQbt4+ppCXBiyFr2/VNAaI9Gf1/blHgMj3OWhdpx9VeZ3Ct+Qn3I2KCJDTavlVHXog1tWixiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2zyuX7GS44k1j/89jhil6W6IOkMqYrFsP1t/zvuqWbY=; b=b4hc1Q14K8pR4ixZhFzczU0R776tJcjm8AEqFSfldpVAs7YLQlRZDaG3gcvgWX0aaAFwOEEMTdtvcZp+BFXXCNf5J5k/rpiWid+NZ5A02Ak8a/lnanfrPkGmmVG8tvXFRNLdnHY1c0zlPTh5SN7yy5kvrRlkl+J0HwRjeJ7rxrh8foM7APe5ZF0ak4ycsfdkCXsbEQeegCBCwwoNFp9hAaP0LF+Mob9s+ASD3XV4JMbQYUW+I7/GD7dgYTW11BMXfnc2Nvrx/yEwYEchAgk8suxn9/Rg5gOJsoIkWgy/wpOJu3tmm6CmMyNJa/id4BGxl1LrW6pt11E5vhoaPCvvag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2zyuX7GS44k1j/89jhil6W6IOkMqYrFsP1t/zvuqWbY=; b=ThGijMu/rC5nnTE2IdYmg8qAeYHbQ/eUoadr3sH7rOnwwMvXjZMrUvGwvQoPDDQwRKsdKKb+6xeJlF8oJJOZ8hsDTG5Vve6Ap4N43PBZtlk293Q5qpjYrX6xAJMGJzzsjI+o9HAZLYUnb3rPnJVPVtLzK0pFDFW6TaK8EvJ33LI= Received: from AM0PR04MB4481.eurprd04.prod.outlook.com (52.135.147.15) by AM0PR04MB6930.eurprd04.prod.outlook.com (52.132.214.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2793.16; Thu, 5 Mar 2020 11:25:35 +0000 Received: from AM0PR04MB4481.eurprd04.prod.outlook.com ([fe80::91e2:17:b3f4:d422]) by AM0PR04MB4481.eurprd04.prod.outlook.com ([fe80::91e2:17:b3f4:d422%3]) with mapi id 15.20.2772.019; Thu, 5 Mar 2020 11:25:35 +0000 From: Peng Fan To: Sudeep Holla CC: "robh+dt@kernel.org" , "viresh.kumar@linaro.org" , "f.fainelli@gmail.com" , dl-linux-imx , "linux-arm-kernel@lists.infradead.org" , "linux-kernel@vger.kernel.org" , "devicetree@vger.kernel.org" Subject: RE: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc transport Thread-Topic: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc transport Thread-Index: AQHV8QFMuMBBDfh8hE244PoeMX235qg4QIWAgAAijkCAAAqsUIAAPdoAgAEztyA= Date: Thu, 5 Mar 2020 11:25:35 +0000 Message-ID: References: <1583201219-15839-1-git-send-email-peng.fan@nxp.com> <1583201219-15839-3-git-send-email-peng.fan@nxp.com> <20200304103954.GA25004@bogus> <20200304170319.GB44525@bogus> In-Reply-To: <20200304170319.GB44525@bogus> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=peng.fan@nxp.com; x-originating-ip: [119.31.174.68] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 4d1a6af1-95ac-4dde-10f2-08d7c0f7ecae x-ms-traffictypediagnostic: AM0PR04MB6930:|AM0PR04MB6930: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-forefront-prvs: 03333C607F x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(4636009)(396003)(366004)(39860400002)(346002)(376002)(136003)(189003)(199004)(64756008)(66946007)(316002)(66556008)(66446008)(54906003)(66476007)(33656002)(478600001)(8676002)(86362001)(81156014)(81166006)(8936002)(76116006)(26005)(2906002)(186003)(44832011)(52536014)(6916009)(5660300002)(55016002)(7696005)(71200400001)(4326008)(6506007)(9686003);DIR:OUT;SFP:1101;SCL:1;SRVR:AM0PR04MB6930;H:AM0PR04MB4481.eurprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: +fN6WjvnKEZd/FK4F9D9DB06+QfsEmS/MBMqikj9Zaa3mN18/5nyy+dLjxvsyDEAQKbn464Rl6LEJ0Q+0/q2HiLuY0P1Bmq/cJOpz9kIJqiIl4rT3B1ERc1IrNSqgzjqHspsl400mzpkwQnNsAvOJor737A8gy6BYC8hcqZBNPx3BFYScS+KLFvgJpbTnWY7qqQEH2NugEpcd4gBtayROmjmOJwFekKSl0y9bIFu5hbKq3cj7+I8lvk6O7B8gHs1azF0JdjNPdLUfGs4reY+1SrsGy2gfaFqvBX21njt3CWlrXkibSTGRCIed1oD5FulFuXBHeFVuZ4dNaakpJJb9rG5mhGCvWtzBhVmTbR9PP2Y7bIu0dJlW2fSAhfpPAvra1+stVOpowaMFbm5zM242GDsXuI6Oq9DlJLbd/g4ZLkrCTqFE01r35TDDF560904 x-ms-exchange-antispam-messagedata: 0hIVHkmDmQHnpdgGBikfLjTMd8aqEGQq0uR9Gli4FkC9Pd2Q2nTPo9N3R3SFwk5upOmiiyrkoqPG95BosqHaRvoAMC9XWlOBFiu++FrhakUfDtNHtGWjlF9NPcOBDeDiWv5Kdvu6Swl1t0LCbNx5tw== Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4d1a6af1-95ac-4dde-10f2-08d7c0f7ecae X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Mar 2020 11:25:35.5230 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Hl9AulB+pKSE1awOq/YP3G2MxDS93Z/GdLmYUeuuXhKvS/le0IKLBYLhisHlq98a+EawYtUgx432XJQDEe6fVg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6930 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Subject: Re: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc transport >=20 > Hi Peng, >=20 > On Wed, Mar 04, 2020 at 02:16:00PM +0000, Peng Fan wrote: > > > Subject: RE: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc > > > transport > > > > > > Hi Sudeep, > > > > > > > Subject: Re: [PATCH V4 2/2] firmware: arm_scmi: add smc/hvc > > > > transport > > > > > > > > On Tue, Mar 03, 2020 at 10:06:59AM +0800, peng.fan@nxp.com wrote: > > > > > From: Peng Fan > > > > > > > > > > Take arm,smc-id as the 1st arg, leave the other args as zero for = now. > > > > > There is no Rx, only Tx because of smc/hvc not support Rx. > > > > > > > > > > Signed-off-by: Peng Fan > > > > > > > > [...] > > > > > > > > > +static int smc_send_message(struct scmi_chan_info *cinfo, > > > > > + struct scmi_xfer *xfer) > > > > > +{ > > > > > + struct scmi_smc *scmi_info =3D cinfo->transport_info; > > > > > + struct arm_smccc_res res; > > > > > + > > > > > + shmem_tx_prepare(scmi_info->shmem, xfer); > > > > > > > > How do we protect another thread/process on another CPU going and > > > > modifying the same shmem with another request ? We may need notion > > > > of channel with associated shmem and it is protected with some lock= . > > > > > > This is valid concern. But I think if shmem is shared bwteen > > > protocols, the access to shmem should be protected in > > > drivers/firmware/arm_scmi/driver.c: scmi_do_xfer, because > > > send_message and fetch_response both touches shmem > > > > > > The mailbox transport also has the issue you mentioned, I think. >=20 > No, it doesn't. I hope you realised that now based on your statement belo= w. >=20 > > > > Ignore my upper comments. How do think the following diff based on > current patch? > > > > If ok, I'll squash it with current patch and send out v5. > > > > diff --git a/drivers/firmware/arm_scmi/smc.c > > b/drivers/firmware/arm_scmi/smc.c index 88f91b68f297..7d770112f339 > > 100644 > > --- a/drivers/firmware/arm_scmi/smc.c > > +++ b/drivers/firmware/arm_scmi/smc.c > > @@ -29,6 +29,8 @@ struct scmi_smc { > > u32 func_id; > > }; > > > > +static DEFINE_MUTEX(smc_mutex); > > + > > static bool smc_chan_available(struct device *dev, int idx) { > > return true; > > @@ -99,11 +101,15 @@ static int smc_send_message(struct > scmi_chan_info *cinfo, > > struct scmi_smc *scmi_info =3D cinfo->transport_info; > > struct arm_smccc_res res; > > > > + mutex_lock(&smc_mutex); > > + > > shmem_tx_prepare(scmi_info->shmem, xfer); > > > > arm_smccc_1_1_invoke(scmi_info->func_id, 0, 0, 0, 0, 0, 0, 0, > &res); > > scmi_rx_callback(scmi_info->cinfo, > > shmem_read_header(scmi_info->shmem)); > > > > + mutex_unlock(&smc_mutex); > > + > > return res.a0; > > } > > >=20 > Yes, this may fix the issue. However I would like to know if we need to s= upport > multiple channels/shared memory simultaneously. It is fair requirement an= d > may need some work which should be fine.=20 Do you have any suggestions? Currently I have not worked out an good solution. Thanks, Peng. I just want to make sure we don't > need anything more from DT or if we need to add more to DT bindings, we > need to ensure it won't break single channel. I will think about that, bu= t I > would like to hear from other users of this SMC for SCMI. >=20 > -- > Regards, > Sudeep