From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965689AbdAFMH2 (ORCPT ); Fri, 6 Jan 2017 07:07:28 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:53350 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751662AbdAFMGV (ORCPT ); Fri, 6 Jan 2017 07:06:21 -0500 DMARC-Filter: OpenDMARC Filter v1.3.1 smtp.codeaurora.org AEF2C603B4 Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=pass smtp.mailfrom=sricharan@codeaurora.org From: "Sricharan" To: "'Joerg Roedel'" Cc: , , , , , , , , , , , , , References: <1483362764-11990-1-git-send-email-sricharan@codeaurora.org> <1483362764-11990-2-git-send-email-sricharan@codeaurora.org> <20170106110627.GO17255@8bytes.org> In-Reply-To: <20170106110627.GO17255@8bytes.org> Subject: RE: [PATCH V8 1/9] iommu: add IOMMU_PRIV attribute Date: Fri, 6 Jan 2017 17:35:25 +0530 Message-ID: <00bc01d26815$2f357480$8da05d80$@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQI4UjPt/mxKHZQvQwMAWo+9oftSOQGwMWZVAjCoi2GgQH0IUA== Content-Language: en-us Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Joerg, >-----Original Message----- >From: linux-arm-kernel [mailto:linux-arm-kernel-bounces@lists.infradead.org] On Behalf Of Joerg Roedel >Sent: Friday, January 06, 2017 4:36 PM >To: Sricharan R >Cc: mitchelh@codeaurora.org; pdaly@codeaurora.org; vinod.koul@intel.com; jgebben@codeaurora.org; will.deacon@arm.com; >linux-kernel@vger.kernel.org; iommu@lists.linux-foundation.org; linux@armlinux.org.uk; jcrouse@codeaurora.org; >dan.j.williams@intel.com; pratikp@codeaurora.org; tzeng@codeaurora.org; linux-arm-kernel@lists.infradead.org; >robin.murphy@arm.com >Subject: Re: [PATCH V8 1/9] iommu: add IOMMU_PRIV attribute > >On Mon, Jan 02, 2017 at 06:42:36PM +0530, Sricharan R wrote: >> From: Mitchel Humpherys >> >> Add the IOMMU_PRIV attribute, which is used to indicate privileged >> mappings. >> >> Reviewed-by: Robin Murphy >> Tested-by: Robin Murphy >> Signed-off-by: Mitchel Humpherys >> Acked-by: Will Deacon >> --- >> include/linux/iommu.h | 1 + >> 1 file changed, 1 insertion(+) >> >> diff --git a/include/linux/iommu.h b/include/linux/iommu.h >> index 0ff5111..8c15ada 100644 >> --- a/include/linux/iommu.h >> +++ b/include/linux/iommu.h >> @@ -31,6 +31,7 @@ >> #define IOMMU_CACHE (1 << 2) /* DMA cache coherency */ >> #define IOMMU_NOEXEC (1 << 3) >> #define IOMMU_MMIO (1 << 4) /* e.g. things like MSI doorbells */ >> +#define IOMMU_PRIV (1 << 5) /* privileged */ > >Since this is a new generic global flag, can you please add a more >verbose comment telling what a 'privileged' mapping is about in the >iommu-case? We should have a clear defined semantic for this flag or we >might end up with different meanings for it with different >iommu-hardware. This flag is to inform the iommu api to setup privileged mappings for the caller which can be accessed only by the master running with supervisor/privileged permissions and inaccessible to less privileged execution levels. i will repost this with comment added. Regards, Sricharan