Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5052005pxv; Wed, 28 Jul 2021 01:45:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsSA6ktYM5Wlers5XvLRDAV7FY85uhVI7Lt+bPjYADZkovWZcuP+A9Uy9LtSlrxeitAqfe X-Received: by 2002:a17:907:7e9a:: with SMTP id qb26mr26488596ejc.490.1627461938269; Wed, 28 Jul 2021 01:45:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627461938; cv=none; d=google.com; s=arc-20160816; b=Qx1XWW+VgxTf/HOkXcg8cEJkBHKGPpEjL+bJ08o5c7i/VJDawvCli4oJPe8diw/KlQ TOluB2sqjbBHdzoPSaWC6jNMcvlWEyiMVDiYfxQIhqOtulItox4Tz7+eYFY3eoYqaJ/u /8TW8J8MVQFsXqU5D9HHCQ//WbVwQHZWvB0BGb3KpU3yqxvVwmvfXqIOQMO5FEG83SCl JQUVaehL4diRqUX9p/I3OhtdYzTt9vNoWKxTroyeJMHVVbBwoiek5otAc8bZObi/wd6q 9fTA3DH9dY0osd88mk5ponHP4juw/Eh/SzowJhg6zlJOIuJMir0tKRqji92lE+cljuVQ Dnbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=VCGN/WeXxsssAPjPbi75fC+4aFNT1qOx2HsJIWcUzsI=; b=iiu9LOdoyF/knWRxDwKJ8d2HgPh6RjbiLWSXDyXZKzQaZoLw7NFdac295ms0ZbBN6I mi/+bCokV/2z+kzoSyqootvh0lo7GKTpKSeNMzBrb2jvBQSHDOz8eKEi7oivB4p8MEyD ukXZE1fAluXQWrxQTsBSZ2NZUnexINdHGS2U9dY8vKD0ALpWmsUCPP1i2t0mF9u/yMLh rRPqUBO6QOumxlFglXP+KTbyuCMhVWOCQVouBGiY9FNtp1ziQqBmwb4/eSVTj+5ilLpB 40tFsn/aPjy3KokxcER1UfeIvofEXeG8gBOwgekvWMdX5n0HOVFiCXbkgR5BwioKwJZc Xf+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=z35rX2Xn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z1si5371337eje.124.2021.07.28.01.45.14; Wed, 28 Jul 2021 01:45:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=z35rX2Xn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234630AbhG1Ilu (ORCPT + 99 others); Wed, 28 Jul 2021 04:41:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234207AbhG1Ilu (ORCPT ); Wed, 28 Jul 2021 04:41:50 -0400 Received: from mail-ot1-x330.google.com (mail-ot1-x330.google.com [IPv6:2607:f8b0:4864:20::330]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 43D75C061757 for ; Wed, 28 Jul 2021 01:41:49 -0700 (PDT) Received: by mail-ot1-x330.google.com with SMTP id c7-20020a9d27870000b02904d360fbc71bso1294923otb.10 for ; Wed, 28 Jul 2021 01:41:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=VCGN/WeXxsssAPjPbi75fC+4aFNT1qOx2HsJIWcUzsI=; b=z35rX2Xn3bqzz0BumMXI11i9SJjhv8GyRuMv6c/sAlHul+wxZNquvpAoU1QA8oKpRa 4oBpJW0lJvr1oEaDj31IIO/jf/LhcVzrzmufPFLVce0SGUMLYF+d/AuiI9NQvN+UDJxM 04L0Q2vJBZcyD1aoQbtK6cW6gQLJF7KX86U1d5gAIFxJs43rykM9LM4roqusBHSXSx8s dTnMV9bD1BqqNrL7HsNK1amUwBrJVkXXqHhqDfrq3zS2rvRKSaqSMWzX+Ha8CvSZTJR/ bOzNQ4AoXH3mcCdaZG+QFLLghJs0mt7xw+XyB16WQNnTl66ELwuP9YV0AYEcDGUTjiA3 L1ug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=VCGN/WeXxsssAPjPbi75fC+4aFNT1qOx2HsJIWcUzsI=; b=DBnU/uU4pJ8McC+SjwhSMsjz3MP1jYZO7Tw/FtT0rtWRg7+7mTZE1jVgk+q97H8YLv fBwGrMOlASw4jjzRcCum1UMqeJsWXhhNGXGDtzq/d2UaYmVIpyhm8Ck3/rz1s2hJY6fo Vy/JGEzk98H1P+utuzMzorNVJSWj8rLLzk8cNy24jM2hi01XL8XCO5P7t+sy5Y9Y6VbK rBcCTLf9MxZ5quVGAWbykw3lWNC5b4rrMyLgbbLjXjI8jBginCeUFa34P7aJ/+8iCB8S us+86Me2M5JJwBmhFJwXjFXCfv67P3gkv5H/tl1h47F/MW62ny5YiBBBzObCrgSd599O TShQ== X-Gm-Message-State: AOAM533+MY+2YhZRHll980hp71a1uNsaC6zSrvzsH40qQ6c5KiWn2y01 zltTra/gmZM46tKtp6MvToUkMynyDPJzPwUa0KziiQ== X-Received: by 2002:a05:6830:242f:: with SMTP id k15mr18879422ots.72.1627461708597; Wed, 28 Jul 2021 01:41:48 -0700 (PDT) MIME-Version: 1.0 References: <20210722121757.1944658-1-jens.wiklander@linaro.org> <20210722121757.1944658-2-jens.wiklander@linaro.org> In-Reply-To: <20210722121757.1944658-2-jens.wiklander@linaro.org> From: Sumit Garg Date: Wed, 28 Jul 2021 14:11:37 +0530 Message-ID: Subject: Re: [PATCH v3 1/5] tee: add sec_world_id to struct tee_shm To: Jens Wiklander Cc: Linux Kernel Mailing List , linux-arm-kernel , OP-TEE TrustedFirmware , Sudeep Holla , Marc Bonnici , Jerome Forissier , Sughosh Ganu Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 22 Jul 2021 at 17:48, Jens Wiklander wrote: > > Adds sec_world_id to struct tee_shm which describes a shared memory > object. sec_world_id can be used by a driver to store an id assigned by > secure world. > > Signed-off-by: Jens Wiklander > --- > include/linux/tee_drv.h | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > Reviewed-by: Sumit Garg -Sumit > diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h > index 54269e47ac9a..1a29f0e66e13 100644 > --- a/include/linux/tee_drv.h > +++ b/include/linux/tee_drv.h > @@ -196,7 +196,11 @@ int tee_session_calc_client_uuid(uuid_t *uuid, u32 connection_method, > * @num_pages: number of locked pages > * @dmabuf: dmabuf used to for exporting to user space > * @flags: defined by TEE_SHM_* in tee_drv.h > - * @id: unique id of a shared memory object on this device > + * @id: unique id of a shared memory object on this device, shared > + * with user space > + * @sec_world_id: > + * secure world assigned id of this shared memory object, not > + * used by all drivers > * > * This pool is only supposed to be accessed directly from the TEE > * subsystem and from drivers that implements their own shm pool manager. > @@ -212,6 +216,7 @@ struct tee_shm { > struct dma_buf *dmabuf; > u32 flags; > int id; > + u64 sec_world_id; > }; > > /** > -- > 2.31.1 >