Theoretical Paper
- Computer Organization
- Data Structure
- Digital Electronics
- Object Oriented Programming
- Discrete Mathematics
- Graph Theory
- Operating Systems
- Software Engineering
- Computer Graphics
- Database Management System
- Operation Research
- Computer Networking
- Image Processing
- Internet Technologies
- Micro Processor
- E-Commerce & ERP
Practical Paper
Industrial Training
DMA
Stands for "Direct Memory Access." DMA is a method of transferring data from the computer's RAM to another part of the computer without processing it using the CPU. While most data that is input or output from your computer is processed by the CPU, some data does not require processing, or can be processed by another device. In these situations, DMA can save processing time and is a more efficient way to move data from the computer's memory to other devices.
For example, a sound card may need to access data stored in the computer's RAM, but since it can process the data itself, it may use DMA to bypass the CPU. Video cards that support DMA can also access the system memory and process graphics without needing the CPU. Ultra DMA hard drives use DMA to transfer data faster than previous hard drives that required the data to first be run through the CPU.
In order for devices to use direct memory access, they must be assigned to a DMA channel. Each type of port on a computer has a set of DMA channels that can be assigned to each connected device. For example, a PCI controller and a hard drive controller each have their own set of DMA channels.
Direct Memory Access (DMA) and Interrupt Handling
In this series on hardware basics, we have already looked at read and write bus cycles. In this article we will cover Direct Memory Access (DMA) and Interrupt Handling. Knowledge of DMA and interrupt handling would be useful in writing code that interfaces directly with IO devices DMA based serial port design pattern is a good example of such a device).
We will discuss the following topics:
Direct Memory Access (DMA) | A typical DMA operation is described here. Interactions between the main CPU and DMA device are covered. The impact of DMA on processor's internal cache is also covered. |
Interrupt Handling | Processor handling of hardware interrupts is described in this section. |
Interrupt Acknowledge Cycle | Many processors allow the interrupting hardware device to identify itself. This speeds up interrupt handling as the processor can directly invoke the interrupt service routine for the right device. |
>Synchronization Requirements for DMA and Interrupts | Software designers need to keep in mind that DMA operations can be triggered at bus cycle boundary while interrupts can only be triggered at instruction boundary. |
Direct Memory Access (DMA)
- Device wishing to perform DMA asserts the processors bus request signal.
- Processor completes the current bus cycle and then asserts the bus grant signal to the device.
- The device then asserts the bus grant ack signal.
- The processor senses in the change in the state of bus grant ack signal and starts listening to the data and address bus for DMA activity.
- The DMA device performs the transfer from the source to destination address.
- During these transfers, the processor monitors the addresses on the bus
and checks if any location modified during DMA operations is cached in the
processor. If the processor detects a cached address on the bus, it can take
one of the two actions:
- Processor invalidates the internal cache entry for the address involved in DMA write operation
- Processor updates the internal cache when a DMA write is detected
- Once the DMA operations have been completed, the device releases the bus by asserting the bus release signal.
- Processor acknowledges the bus release and resumes its bus cycles from the point it left off.
Interrupt Handling
Here we describe interrupt handling in a scenario where the hardware does not support identifying the device that initiated the interrupt. In such cases, the possible interrupting devices need to be polled in software.
- A device asserts the interrupt signal at a hardwired interrupt level.
- The processor registers the interrupt and waits to finish the current instruction execution.
- Once the current instruction execution is completed, the processor initiates the interrupt handling by saving the current register contents on the stack.
- The processor then switches to supervisor mode and initiates an interrupt acknowledge cycle.
- No device responds to the interrupt acknowledge cycle, so the processor fetches the vector corresponding to the interrupt level.
- The address found at the vector is the address of the interrupt service routine (ISR).
- The ISR polls all the devices to find the device that caused the interrupt. This is accomplished by checking the interrupt status registers on the devices that could have triggered the interrupt.
- Once the device is located, control is transferred to the handler specific to the interrupting device.
- After the device specific ISR routine has performed its job, the ISR executes the "return from interrupt" instruction.
- Execution of the "return from interrupt" instruction results in restoring the processor state. The processor is restored back to user mode.
Interrupt Acknowledge Cycle
Here we describe interrupt handling in a scenario where the hardware does support identifying the device that initiated the interrupt. In such cases, the exact source of the interrupt can be identified at hardware level.
- A device asserts the interrupt signal at a hardwired interrupt level.
- The processor registers the interrupt and waits to finish the current instruction execution.
- Once the current instruction execution is completed, the processor initiates the interrupt handling by saving the current register contents on the stack.
- The processor then switches to supervisor mode and initiates an interrupt acknowledge cycle.
- The interrupting device responds to the interrupt acknowledge cycle with the vector number for the interrupt.
- Processor uses the vector number obtained above and fetches the vector.
- The address found at the vector is the address of the interrupt service routine (ISR) for the interrupting device.
- After the ISR routine has performed its job, the ISR executes the "return from interrupt" instruction.
- Execution of the "return from interrupt" instruction results in restoring the processor state. The processor is restored back to user mode.
Synchronization Requirements for DMA and Interrupts
Many times software designers have to work with data structures that are shared with interrupts or DMA devices. This requires performing atomic updates to the shared critical regions.
Synchronization With Interrupts
When a data structure is shared with an ISR, disabling the interrupt to execute the critical region updates is a good technique. Keep in mind that disabling of interrupts should be restricted to only the code that updates the critical region. Keeping the interrupts disabled for a long time will increase the interrupt latency.
Another option is to make use of the fact that interrupts are processed at instruction boundaries. A single instruction that performs read as well as write could be used to perform an atomic transaction. For example, if your processor supports direct memory increment, you could increment a shared semaphore without disabling interrupts.
Synchronization With DMA
Sharing data structures with a DMA device is tricky. The processor can initiate a DMA operation at a bus cycle boundary. This means that a new DMA operation can be started in the middle of an instruction execution (Keep in mind that an instruction execution involves multiple bus cycles).
The best mechanism to perform critical region updates is to use the read-modify-write bus cycle. With this instruction, atomic updates can be made to critical regions as the read and write are glued together in a special bus cycle.
Another option is to disable DMA operation. Extreme caution should be used when employing these techniques.
- Some processors also support disabling DMA operations by using locked bus cycles. The processor could execute lock instruction to disable external bus grants. When critical region updates have been completed, the unlock instruction is used to allow bus grants.
- Another mechanism to prevent DMA might be to temporarily disable the device that will perform DMA. For example, if the DMA operations are being performed by an Ethernet controller, disabling the Ethernet controller will make sure no DMA operations are started when a critical region update is being made.