Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3598550pxb; Sun, 31 Jan 2021 22:36:01 -0800 (PST) X-Google-Smtp-Source: ABdhPJz5qRACoglktbBIvu3HLD1Gr/K4EfbZSFP6mX6asCLymaqdBzU+GxNo093TsupSvv2fT/C8 X-Received: by 2002:a05:6402:3d3:: with SMTP id t19mr9760864edw.26.1612161361597; Sun, 31 Jan 2021 22:36:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612161361; cv=none; d=google.com; s=arc-20160816; b=VPHGR1Fs0clF+wYx3KIJDbCe9toq/lrefwBdQjuRJ/wV4RlSae6jsN26VP0pLNWDWt uyw6ynihNlzvf03q7eNWvx7YPVhpGM2ZX23cv73FaSiekJ01pnxDo9OQ1DP/rIqFOAvr 8FGa6YhcDar5krgAxF2NSY2P423dw5ER3wXCb295nTtuBg/VycW7P2aepYHKPPcZg89k lr1C2e0CqMGQdtwH//SScwRr6e10JvKHK6rCPLEdl3P3gnk3Zsewc6VULoIE3CCG9mc2 yCjCriCgwqj8E3SeXzdMg1CRSB5mY+nWuM62w+CF2C2m4V3sGzPVI/H1ipQhxlsMne8I QkNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=tD4ikfAISDnHPEUlD9iJ1G6bx1MuC756Kqhu+BnJnE0=; b=aKuUeDNAxDT0vMppNrLpw9LECXc5dQmsjnGP/K+rcj8aBZskYykG4cSKbQ2pM3j40R tLtL11RBOgqgx3TDRIH6c0zcZL5GiTdWDAbcSO+vT7sYnQhCVCU9lPSI9vcyRslBZpFb I6hYWZYfPM6xxuZTxB8cuvDOHUXBS+pLBQ3Fatfq71kZedAPooCkNh3HgTPpez25d3GD UuTILXiDDc+5L7R5PLIUzGRKBQ4Z4lq+dRqlENR82PRfvIHJQ1VRlGQUkdONhjxMoK9m cfhKB+3EGFSrQmxII+w6KeVHHW49g/F7AG4W8aDBegYBAVBgzkjv5ieQ2X85fDJmSKsq ipHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XM+MxnGx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de28si1522637edb.466.2021.01.31.22.35.25; Sun, 31 Jan 2021 22:36:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XM+MxnGx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231864AbhBAGbr (ORCPT + 99 others); Mon, 1 Feb 2021 01:31:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:58890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231802AbhBAGFz (ORCPT ); Mon, 1 Feb 2021 01:05:55 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 484A264E06; Mon, 1 Feb 2021 06:05:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1612159513; bh=Hx6NNSuVfHpvFw6mqku4ZqP8Q+HUcv4PX0RJ8yzvlyI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=XM+MxnGxSFO3Ie1PJigLwIOn7wKp/3N8gsEmut1THWcr/WdANG1IHrN6h8L1kzODN YOTmB68bQRn3vjRSzFsts0VjWaULNLeKBM8U0H5F+QAUM1RzWKOfHBF0uxbND0Wxfa tY1tL/ZbQSa0uMH4xLzC8SUvs66o+ntCXGT+Xn84fQt/vV+56kUqTF5KwqLYb/dc39 obLLI8IgnsLSWD14iweVJDCW3BcE29gZ0bdXUW3NUqGiEppeAXNlIM4jK17w/E2lEK dI+rJxCdOFshG0nF07ujHIVrDLd1am8LFjrRIHwsM6SUMt25LvGcF498mV0rFtj7zN 6v1LWAqm3yISA== Date: Mon, 1 Feb 2021 11:35:08 +0530 From: Vinod Koul To: mdalam@codeaurora.org Cc: corbet@lwn.net, agross@kernel.org, bjorn.andersson@linaro.org, dan.j.williams@intel.com, dmaengine@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, sricharan@codeaurora.org, mdalam=codeaurora.org@codeaurora.org Subject: Re: [PATCH] dmaengine: qcom: bam_dma: Add LOCK and UNLOCK flag bit support Message-ID: <20210201060508.GK2771@vkoul-mobl> References: <1608215842-15381-1-git-send-email-mdalam@codeaurora.org> <20201221092355.GA3323@vkoul-mobl> <20210112101056.GI2771@vkoul-mobl> <20210115055806.GE2771@vkoul-mobl> <97ce29b230164a5848a38f6448d1be60@codeaurora.org> <20210119164511.GE2771@vkoul-mobl> <534308caab7c18730ad0cc25248d116f@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <534308caab7c18730ad0cc25248d116f@codeaurora.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27-01-21, 23:56, mdalam@codeaurora.org wrote: > On 2021-01-19 22:15, Vinod Koul wrote: > > On 18-01-21, 09:21, mdalam@codeaurora.org wrote: > > > On 2021-01-15 11:28, Vinod Koul wrote: > > > > On 14-01-21, 01:20, mdalam@codeaurora.org wrote: > > > > > On 2021-01-12 15:40, Vinod Koul wrote: > > > > > > On 12-01-21, 15:01, mdalam@codeaurora.org wrote: > > > > > > > On 2020-12-21 23:03, mdalam@codeaurora.org wrote: > > > > > > > > On 2020-12-21 14:53, Vinod Koul wrote: > > > > > > > > > Hello, > > > > > > > > > > > > > > > > > > On 17-12-20, 20:07, Md Sadre Alam wrote: > > > > > > > > > > This change will add support for LOCK & UNLOCK flag bit support > > > > > > > > > > on CMD descriptor. > > > > > > > > > > > > > > > > > > > > If DMA_PREP_LOCK flag passed in prep_slave_sg then requester of this > > > > > > > > > > transaction wanted to lock the DMA controller for this transaction so > > > > > > > > > > BAM driver should set LOCK bit for the HW descriptor. > > > > > > > > > > > > > > > > > > > > If DMA_PREP_UNLOCK flag passed in prep_slave_sg then requester > > > > > > > > > > of this > > > > > > > > > > transaction wanted to unlock the DMA controller.so BAM driver > > > > > > > > > > should set > > > > > > > > > > UNLOCK bit for the HW descriptor. > > > > > > > > > > > > > > > > > > Can you explain why would we need to first lock and then unlock..? How > > > > > > > > > would this be used in real world. > > > > > > > > > > > > > > > > > > I have read a bit of documentation but is unclear to me. Also should > > > > > > > > > this be exposed as an API to users, sounds like internal to driver..? > > > > > > > > > > > > > > > > > > > > > > > > > IPQ5018 SoC having only one Crypto Hardware Engine. This Crypto Hardware > > > > > > > > Engine > > > > > > > > will be shared between A53 core & ubi32 core. There is two separate > > > > > > > > driver dedicated > > > > > > > > to A53 core and ubi32 core. So to use Crypto Hardware Engine > > > > > > > > parallelly for encryption/description > > > > > > > > we need bam locking mechanism. if one driver will submit the request > > > > > > > > for encryption/description > > > > > > > > to Crypto then first it has to set LOCK flag bit on command descriptor > > > > > > > > so that other pipes will > > > > > > > > get locked. > > > > > > > > > > > > > > > > The Pipe Locking/Unlocking will be only on command-descriptor. Upon > > > > > > > > encountering a command descriptor > > > > > > > > > > > > Can you explain what is a cmd descriptor? > > > > > > > > > > In BAM pipe descriptor structure there is a field called CMD > > > > > (Command > > > > > descriptor). > > > > > CMD allows the SW to create descriptors of type Command which does > > > > > not > > > > > generate any data transmissions > > > > > but configures registers in the Peripheral (write operations, and > > > > > read > > > > > registers operations ). > > > > > Using command descriptor enables the SW to queue new configurations > > > > > between data transfers in advance. > > > > > > > > What and when is the CMD descriptor used for..? > > > > > > CMD descriptor is mainly used for configuring controller register. > > > We can read/write controller register via BAM using CMD descriptor > > > only. > > > CMD descriptor use command pipe for the transaction. > > > > In which use cases would you need to issue cmd descriptors..? > > In IPQ5018 there is only one Crypto engine and it will get shared > between UBI32 core & A53 core. So here we need to use command > descriptor in-order to perform LOCKING/UNLOCKING mechanism. Since > LOCK/ULOCK flag we can set only on CMD descriptor. So when will lock/unlock be performed? Can you please explain that.. > > > > > > > > > > > > > > > > > > > > with LOCK bit set, The BAM will lock all other pipes not related to > > > > > > > > the current pipe group, and keep > > > > > > > > handling the current pipe only until it sees the UNLOCK set then it > > > > > > > > will release all locked pipes. > > > > > > > > locked pipe will not fetch new descriptors even if it got event/events > > > > > > > > adding more descriptors for > > > > > > > > this pipe (locked pipe). > > > > > > > > > > > > > > > > No need to expose as an API to user because its internal to driver, so > > > > > > > > while preparing command descriptor > > > > > > > > just we have to update the LOCK/UNLOCK flag. > > > > > > > > > > > > So IIUC, no api right? it would be internal to driver..? > > > > > > > > > > Yes its totally internal to deriver. > > > > > > > > So no need for this patch then, right? > > > > > > This patch is needed , because if some hardware will shared between > > > multiple core like A53 and ubi32 for example. In IPQ5018 there is > > > only one crypto engine and this will be shared between A53 core and > > > ubi32 core and in A53 core & ubi32 core there are different drivers > > > is getting used. So if encryption/decryption request come at same > > > time from both the driver then things will get messed up. So here we > > > need LOCKING mechanism. If first request is from A53 core driver > > > then this driver should lock all the pipes other than pipe dedicated > > > to A53 core. So while preparing CMD descriptor driver should used > > > this flag "DMA_PREP_LOCK", Since LOCK and UNLOCK flag bit we can set > > > only on CMD descriptor. Once request processed then driver will set > > > UNLOCK flag on CMD descriptor. Driver should use this flag > > > "DMA_PREP_UNLOCK" while preparing CMD descriptor. Same logic will be > > > apply for ubi32 core driver as well. > > > > Why cant this be applied at driver level, based on txn being issued it > > can lock issue the txn and then unlock when done. I am not convinced yet > > that this needs to be exported to users and can be managed by dmaengine > > driver. > > The actual LOCK/UNLOCK flag should be set on hardware command descriptor. > so this flag setting should be done in DMA engine driver. The user of the > DMA > driver like (in case of IPQ5018) Crypto can use flag "DMA_PREP_LOCK" & > "DMA_PREP_UNLOCK" > while preparing CMD descriptor before submitting to the DMA engine. In DMA > engine driver > we are checking these flasgs on CMD descriptor and setting actual > LOCK/UNLOCK flag on hardware > descriptor. I am not sure I comprehend this yet.. when is that we would need to do this... is this for each txn submitted to dmaengine.. or something else.. > > if (flags & DMA_PREP_CMD) { <== check for descriptor type > if (flags & DMA_PREP_LOCK) > desc->flags |= cpu_to_le16(DESC_FLAG_LOCK); <== Actual LOCK flag setting > on HW descriptor. > if (flags & DMA_PREP_UNLOCK) > desc->flags |= cpu_to_le16(DESC_FLAG_UNLOCK); <== Actual UNLOCK flag > setting on HW descriptor. > } > > > > Thanks -- ~Vinod