Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1721881pxb; Sun, 17 Jan 2021 20:25:42 -0800 (PST) X-Google-Smtp-Source: ABdhPJyEkKrGl9FrwUgeQ9E4Z/W54+1OMbNeODpE9Nl8POpfUJ2z/pYOGhG5/edlB2NwlS7Vy1K+ X-Received: by 2002:aa7:dd4b:: with SMTP id o11mr17940651edw.303.1610943941920; Sun, 17 Jan 2021 20:25:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610943941; cv=none; d=google.com; s=arc-20160816; b=U96krA18hetYLvWa0OvoHC5Gj2aTr3SUv/gjogYbcf0M2AFCkqADNMZJUeP0GtfuT3 aTVBG3LPbpEeFfy+Xn9aNuhdWCCI0C2aMgfJauJhYhh7b64lh1lDxbrdQZZHronO5Vzo MalbBnAZNPxnk8YY5di+himaOAAtjDMmOZG9nwgWduTnbuDumZIHV5/tNMMXBoSexS1r 0pXk9NsWW/mnUHxwCQcl9eOVZZWDc+NsC6bG6Hvf1KWO8N1ukQ0ViKZ5ntJ5KMIHzz94 WU8ByuXDzHwO3eTUENkX2ZD0X2EEaRiwUn2qo8yeNIgsm5zcExRFS0COmB7QOD5eJpM9 LaZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :sender:dkim-signature; bh=6qAIVbxVqiKUhV3XLTDBhx1iSqJOiBlKfMz/NX8ydZ0=; b=X1DGk5R0sklJo9OQKw3FlSYdn05k1pyhLMrjpOetfDmCzJZ0QU5ilmkH3xZ7ZZxT+o GcPmlKwmT3gZGQmNAc38ceNBt83u5qC4r+I3fD9g6Z53pZlTyNNXAr/d241J0+AAlsbo GxnBTY82v81jJmplR3aaxcWD+9q7mhmwdEwqHCTpOw4kv/xy8cKSzfGcYvQ+LM46enoU UMghJPP4OXabJc6ak88PwpJrKUjvZkb4LMDrn/HyMirqbCrKN+S+pIdyOl7pPSaHTJMZ oF830siZJOffJCK2ndZu0PcfImXUruzW89w56s76hgw3Ek1n0q1v9NMRZQsbv+pnPVk9 EGoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b="bm54/zid"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay17si1525829ejb.399.2021.01.17.20.25.19; Sun, 17 Jan 2021 20:25:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b="bm54/zid"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731723AbhARDwb (ORCPT + 99 others); Sun, 17 Jan 2021 22:52:31 -0500 Received: from so254-31.mailgun.net ([198.61.254.31]:46626 "EHLO so254-31.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730666AbhARDwa (ORCPT ); Sun, 17 Jan 2021 22:52:30 -0500 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1610941933; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=6qAIVbxVqiKUhV3XLTDBhx1iSqJOiBlKfMz/NX8ydZ0=; b=bm54/zidzSFhH1DB5zz23qen5WeDVgcaXvEFVBgpEZksDD+Cyjw+gfScsKxBA/l5fjCmaL2f r64SAZDrdX1ndgHT/ljJ6f/8DiE81AWCMtJfPo/EYoQEClWYEuk6InaedteO+/j+X1AUikzU x3MkyGcoJhcMFwjb8rkkn6IbuVA= X-Mailgun-Sending-Ip: 198.61.254.31 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n10.prod.us-west-2.postgun.com with SMTP id 600505cefdec81ad1e03add1 (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Mon, 18 Jan 2021 03:51:42 GMT Sender: mdalam=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id B1D89C433ED; Mon, 18 Jan 2021 03:51:41 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: mdalam) by smtp.codeaurora.org (Postfix) with ESMTPSA id BB663C433C6; Mon, 18 Jan 2021 03:51:40 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 18 Jan 2021 09:21:40 +0530 From: mdalam@codeaurora.org To: Vinod Koul Cc: corbet@lwn.net, agross@kernel.org, bjorn.andersson@linaro.org, dan.j.williams@intel.com, dmaengine@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, sricharan@codeaurora.org, mdalam=codeaurora.org@codeaurora.org Subject: Re: [PATCH] dmaengine: qcom: bam_dma: Add LOCK and UNLOCK flag bit support In-Reply-To: <20210115055806.GE2771@vkoul-mobl> References: <1608215842-15381-1-git-send-email-mdalam@codeaurora.org> <20201221092355.GA3323@vkoul-mobl> <20210112101056.GI2771@vkoul-mobl> <20210115055806.GE2771@vkoul-mobl> Message-ID: <97ce29b230164a5848a38f6448d1be60@codeaurora.org> X-Sender: mdalam@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-01-15 11:28, Vinod Koul wrote: > On 14-01-21, 01:20, mdalam@codeaurora.org wrote: >> On 2021-01-12 15:40, Vinod Koul wrote: >> > On 12-01-21, 15:01, mdalam@codeaurora.org wrote: >> > > On 2020-12-21 23:03, mdalam@codeaurora.org wrote: >> > > > On 2020-12-21 14:53, Vinod Koul wrote: >> > > > > Hello, >> > > > > >> > > > > On 17-12-20, 20:07, Md Sadre Alam wrote: >> > > > > > This change will add support for LOCK & UNLOCK flag bit support >> > > > > > on CMD descriptor. >> > > > > > >> > > > > > If DMA_PREP_LOCK flag passed in prep_slave_sg then requester of this >> > > > > > transaction wanted to lock the DMA controller for this transaction so >> > > > > > BAM driver should set LOCK bit for the HW descriptor. >> > > > > > >> > > > > > If DMA_PREP_UNLOCK flag passed in prep_slave_sg then requester >> > > > > > of this >> > > > > > transaction wanted to unlock the DMA controller.so BAM driver >> > > > > > should set >> > > > > > UNLOCK bit for the HW descriptor. >> > > > > >> > > > > Can you explain why would we need to first lock and then unlock..? How >> > > > > would this be used in real world. >> > > > > >> > > > > I have read a bit of documentation but is unclear to me. Also should >> > > > > this be exposed as an API to users, sounds like internal to driver..? >> > > > > >> > > > >> > > > IPQ5018 SoC having only one Crypto Hardware Engine. This Crypto Hardware >> > > > Engine >> > > > will be shared between A53 core & ubi32 core. There is two separate >> > > > driver dedicated >> > > > to A53 core and ubi32 core. So to use Crypto Hardware Engine >> > > > parallelly for encryption/description >> > > > we need bam locking mechanism. if one driver will submit the request >> > > > for encryption/description >> > > > to Crypto then first it has to set LOCK flag bit on command descriptor >> > > > so that other pipes will >> > > > get locked. >> > > > >> > > > The Pipe Locking/Unlocking will be only on command-descriptor. Upon >> > > > encountering a command descriptor >> > >> > Can you explain what is a cmd descriptor? >> >> In BAM pipe descriptor structure there is a field called CMD >> (Command >> descriptor). >> CMD allows the SW to create descriptors of type Command which does >> not >> generate any data transmissions >> but configures registers in the Peripheral (write operations, and >> read >> registers operations ). >> Using command descriptor enables the SW to queue new configurations >> between data transfers in advance. > > What and when is the CMD descriptor used for..? CMD descriptor is mainly used for configuring controller register. We can read/write controller register via BAM using CMD descriptor only. CMD descriptor use command pipe for the transaction. > >> > >> > > > with LOCK bit set, The BAM will lock all other pipes not related to >> > > > the current pipe group, and keep >> > > > handling the current pipe only until it sees the UNLOCK set then it >> > > > will release all locked pipes. >> > > > locked pipe will not fetch new descriptors even if it got event/events >> > > > adding more descriptors for >> > > > this pipe (locked pipe). >> > > > >> > > > No need to expose as an API to user because its internal to driver, so >> > > > while preparing command descriptor >> > > > just we have to update the LOCK/UNLOCK flag. >> > >> > So IIUC, no api right? it would be internal to driver..? >> >> Yes its totally internal to deriver. > > So no need for this patch then, right? This patch is needed , because if some hardware will shared between multiple core like A53 and ubi32 for example. In IPQ5018 there is only one crypto engine and this will be shared between A53 core and ubi32 core and in A53 core & ubi32 core there are different drivers is getting used. So if encryption/decryption request come at same time from both the driver then things will get messed up. So here we need LOCKING mechanism. If first request is from A53 core driver then this driver should lock all the pipes other than pipe dedicated to A53 core. So while preparing CMD descriptor driver should used this flag "DMA_PREP_LOCK", Since LOCK and UNLOCK flag bit we can set only on CMD descriptor. Once request processed then driver will set UNLOCK flag on CMD descriptor. Driver should use this flag "DMA_PREP_UNLOCK" while preparing CMD descriptor. Same logic will be apply for ubi32 core driver as well.