[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHUa44G+hxjckap1e1qZXTf6vQqQYNMw=ofzdFCP1OgCXQsF5Q@mail.gmail.com>
Date: Tue, 15 Jun 2021 09:10:08 +0200
From: Jens Wiklander <jens.wiklander@...aro.org>
To: Tyler Hicks <tyhicks@...ux.microsoft.com>
Cc: Allen Pais <apais@...ux.microsoft.com>,
Sumit Garg <sumit.garg@...aro.org>,
Peter Huewe <peterhuewe@....de>,
Jarkko Sakkinen <jarkko@...nel.org>,
Jason Gunthorpe <jgg@...pe.ca>,
Vikas Gupta <vikas.gupta@...adcom.com>,
Thirupathaiah Annapureddy <thiruan@...rosoft.com>,
Pavel Tatashin <pasha.tatashin@...een.com>,
Rafał Miłecki <zajec5@...il.com>,
OP-TEE TrustedFirmware <op-tee@...ts.trustedfirmware.org>,
linux-integrity <linux-integrity@...r.kernel.org>,
bcm-kernel-feedback-list@...adcom.com, linux-mips@...r.kernel.org,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v5 6/8] tee: Correct inappropriate usage of
TEE_SHM_DMA_BUF flag
On Tue, Jun 15, 2021 at 12:33 AM Tyler Hicks
<tyhicks@...ux.microsoft.com> wrote:
>
> From: Sumit Garg <sumit.garg@...aro.org>
>
> Currently TEE_SHM_DMA_BUF flag has been inappropriately used to not
> register shared memory allocated for private usage by underlying TEE
> driver: OP-TEE in this case. So rather add a new flag as TEE_SHM_PRIV
> that can be utilized by underlying TEE drivers for private allocation
> and usage of shared memory.
>
> With this corrected, allow tee_shm_alloc_kernel_buf() to allocate a
> shared memory region without the backing of dma-buf.
>
> Cc: stable@...r.kernel.org
> Signed-off-by: Sumit Garg <sumit.garg@...aro.org>
> Co-developed-by: Tyler Hicks <tyhicks@...ux.microsoft.com>
> Signed-off-by: Tyler Hicks <tyhicks@...ux.microsoft.com>
> ---
> drivers/tee/optee/call.c | 2 +-
> drivers/tee/optee/core.c | 3 ++-
> drivers/tee/optee/rpc.c | 5 +++--
> drivers/tee/optee/shm_pool.c | 8 ++++++--
> drivers/tee/tee_shm.c | 4 ++--
> include/linux/tee_drv.h | 1 +
> 6 files changed, 15 insertions(+), 8 deletions(-)
Reviewed-by: Jens Wiklander <jens.wiklander@...aro.org>
Powered by blists - more mailing lists