From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753783AbcA0FWR (ORCPT ); Wed, 27 Jan 2016 00:22:17 -0500 Received: from mail-gw2-out.broadcom.com ([216.31.210.63]:24130 "EHLO mail-gw2-out.broadcom.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753746AbcA0FWN (ORCPT ); Wed, 27 Jan 2016 00:22:13 -0500 X-IronPort-AV: E=Sophos;i="5.22,353,1449561600"; d="scan'208";a="86526799" From: Anup Patel To: Catalin Marinas , Joerg Roedel , Will Deacon , Robin Murphy , Sricharan R , Linux IOMMU , Linux ARM Kernel CC: Rob Herring , Pawel Moll , "Mark Rutland" , Ian Campbell , Kumar Gala , "Device Tree" , Ray Jui , Scott Branden , Vikram Prakash , "Linux Kernel" , BCM Kernel Feedback , Anup Patel Subject: [RFC PATCH 6/6] iommu/arm-smmu: Update bindings document for smmu-inst-as-data DT option Date: Wed, 27 Jan 2016 10:51:19 +0530 Message-ID: <1453872079-27140-7-git-send-email-anup.patel@broadcom.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1453872079-27140-1-git-send-email-anup.patel@broadcom.com> References: <1453872079-27140-1-git-send-email-anup.patel@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch adds info about 'smmu-inst-as-data' DT option in ARM SMMUv1/SMMUv2 driver bindings document. Signed-off-by: Anup Patel Reviewed-by: Ray Jui Reviewed-by: Vikram Prakash Reviewed-by: Scott Branden --- Documentation/devicetree/bindings/iommu/arm,smmu.txt | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/Documentation/devicetree/bindings/iommu/arm,smmu.txt b/Documentation/devicetree/bindings/iommu/arm,smmu.txt index 7180745..4c4d03e 100644 --- a/Documentation/devicetree/bindings/iommu/arm,smmu.txt +++ b/Documentation/devicetree/bindings/iommu/arm,smmu.txt @@ -49,6 +49,14 @@ conditions. NOTE: this only applies to the SMMU itself, not masters connected upstream of the SMMU. +- smmu-inst-as-data : Treat privilege/unprivilege instruction fetch as + data read for SMMUv2. The SMMU driver by default provides + unprivilege read-write permission in page table entries. + For SMMUv2, privilege instruction fetch from MMU masters + will cause a context fault for unprivilege read-write + pages. To allow both privilege and unprivilege instruction + fetch, we have to forcefully treat it as data read. + - calxeda,smmu-secure-config-access : Enable proper handling of buggy implementations that always use secure access to SMMU configuration registers. In this case non-secure -- 1.9.1