Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp1016032pxb; Fri, 22 Apr 2022 16:53:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQYDRBHs59I/ZydHWEnHZWb3bKP7A/kzjFukUcYb2ZJ5bmuxe0U3axQaPvhfCeV/qBdiSu X-Received: by 2002:a65:6657:0:b0:381:1b99:3f04 with SMTP id z23-20020a656657000000b003811b993f04mr5847481pgv.512.1650671585844; Fri, 22 Apr 2022 16:53:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650671585; cv=none; d=google.com; s=arc-20160816; b=h00ed9zavdIc1+ZDwd1oU59l9H1pKHdhEseua9UXZTlVr8uoPas30GyAHi2wEQ75ML ezQsR9L+DzptftXJJkx6hnCAu5CGss2wF9KGUlLdWHxzTL2WvwuxCeBJ8YNlbwWxrEXc xq3p7eyOyLf7uA9elmksxqb2axeYOZUHmIEMdJ2AwD0oMh+DYDXQAzjTvuH2wvFC5Mgo ZSEyGSqRdXWFl+GWcxmp3zX1BnsfsJVbkfYo0LcoOm3Bvcem2ICEhxnG3EF3IZoDiaRm IWUNr5E5czpOC7b8nDBRIOC1F0N8xIHDK/rdV6HHwLAyCydxKsBqlEhr7tJ3MQU8a4iD /rUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date:dkim-signature; bh=UJfsERISzv3xjVwV/J5wK9SRhTeHt8kgzzXMyVtwFao=; b=Im+aIFB9NDIP1aw+2IxfZYTm0wZjS8WobqxMJd3ot2WDEnGF29lQEBvtgowk00b8tn Z4Uf0ztO/W6ERp1+5IpsYKAiL+ewc8zan9stfGNfRdvkvV42XTa8q1+2vVemwLk6c1e1 xIoWk0Ra0VOSHv0PhmWzMroInyqEUQWP4vLfR+szn9xov16h42qZ/TVY2KYTT5dWKTz3 mAntzErEnyg+RCz0hFAOS2iQVtJa8kQgaS+LK4wer/CS8bxuaINcGgo08WeNxO4Q2G46 Fzp4FhmSb1Xw0FB86KA87Am75hgu1XZlmHxCoV9pi29BYoTuC9poNW3eoVP8zxTqMTzH XY8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xj7t9bXw; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id q21-20020a635055000000b0039d8f7b8a04si8993061pgl.669.2022.04.22.16.53.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Apr 2022 16:53:05 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xj7t9bXw; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 82C622FFD7; Fri, 22 Apr 2022 16:23:14 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230173AbiDVXZp (ORCPT + 99 others); Fri, 22 Apr 2022 19:25:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229977AbiDVXZY (ORCPT ); Fri, 22 Apr 2022 19:25:24 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ACE201F3133; Fri, 22 Apr 2022 16:00:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3D2D3614BB; Fri, 22 Apr 2022 23:00:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DABEEC385A4; Fri, 22 Apr 2022 23:00:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1650668436; bh=i3k4Z+wq+0X0ubvvjcLYArt+TLHMdxZUdHM1xhLD/BY=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=Xj7t9bXwLftOK6Wn2xSX5vGqV5VDq4zyr6DxzaGMlOikdAPrXgpep/Xhxocbey161 /Yd5kPFmohPRLw2OhkmpBq1AaEq1ZHlyyn+XijNZq4BtcPDq+LqaikTsS8fuhthm/U Lz4xi+GzuHsx5VQ9qQCPSgspu3pWky/VJaqwx4E3VHQYIrwN7slyzw/DKoDci+pVhN OZOBiUwvHSsmSnxeU1NQ5jK4o4sdt2uwZ7HRO2c6jLRvCBqdD/cVTicSPYrzu6XIZg Ag9FRVb5V1cw/AGlUJAnjKOsrr6oanSlaQrtTNCYsfq0ogVQQiH7AumNcbcx/cvA5a I4grC0fhpEQfA== Date: Fri, 22 Apr 2022 16:00:35 -0700 (PDT) From: Stefano Stabellini X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop To: Oleksandr Tyshchenko cc: xen-devel@lists.xenproject.org, virtualization@lists.linux-foundation.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Oleksandr Tyshchenko , Jason Wang , Rob Herring , Krzysztof Kozlowski , Julien Grall , Juergen Gross , Stefano Stabellini , "Michael S. Tsirkin" , Christoph Hellwig Subject: Re: [PATCH V1 4/6] dt-bindings: Add xen, dev-domid property description for xen-grant DMA ops In-Reply-To: <1650646263-22047-5-git-send-email-olekstysh@gmail.com> Message-ID: References: <1650646263-22047-1-git-send-email-olekstysh@gmail.com> <1650646263-22047-5-git-send-email-olekstysh@gmail.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 22 Apr 2022, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > Introduce Xen specific binding for the virtualized device (e.g. virtio) > to be used by Xen grant DMA-mapping layer in the subsequent commit. > > This binding indicates that Xen grant mappings scheme needs to be > enabled for the device which DT node contains that property and specifies > the ID of Xen domain where the corresponding backend resides. The ID > (domid) is used as an argument to the grant mapping APIs. > > This is needed for the option to restrict memory access using Xen grant > mappings to work which primary goal is to enable using virtio devices > in Xen guests. > > Signed-off-by: Oleksandr Tyshchenko Looks OK to me. Just a couple of grammar improvements below. Aside from those, I have no further comments. > --- > Changes RFC -> V1: > - update commit subject/description and text in description > - move to devicetree/bindings/arm/ > --- > .../devicetree/bindings/arm/xen,dev-domid.yaml | 37 ++++++++++++++++++++++ > 1 file changed, 37 insertions(+) > create mode 100644 Documentation/devicetree/bindings/arm/xen,dev-domid.yaml > > diff --git a/Documentation/devicetree/bindings/arm/xen,dev-domid.yaml b/Documentation/devicetree/bindings/arm/xen,dev-domid.yaml > new file mode 100644 > index 00000000..ef0f747 > --- /dev/null > +++ b/Documentation/devicetree/bindings/arm/xen,dev-domid.yaml > @@ -0,0 +1,37 @@ > +# SPDX-License-Identifier: (GPL-2.0-only or BSD-2-Clause) > +%YAML 1.2 > +--- > +$id: http://devicetree.org/schemas/arm/xen,dev-domid.yaml# > +$schema: http://devicetree.org/meta-schemas/core.yaml# > + > +title: Xen specific binding for the virtualized device (e.g. virtio) NIT: Xen specific binding for virtualized devices (e.g. virtio) > +maintainers: > + - Oleksandr Tyshchenko > + > +select: true > + > +description: > + This binding indicates that Xen grant mappings scheme needs to be enabled > + for that device and specifies the ID of Xen domain where the corresponding > + device (backend) resides. This is needed for the option to restrict memory > + access using Xen grant mappings to work. NIT: This binding indicates that Xen grant mappings need to be enabled for the device, and it specifies the ID of the domain where the corresponding device (backend) resides. The property is required to restrict memory access using Xen grant mappings. > +properties: > + xen,dev-domid: > + $ref: /schemas/types.yaml#/definitions/uint32 > + description: > + The domid (domain ID) of the domain where the device (backend) is running. > + > +additionalProperties: true > + > +examples: > + - | > + virtio_block@3000 { > + compatible = "virtio,mmio"; > + reg = <0x3000 0x100>; > + interrupts = <41>; > + > + /* The device is located in Xen domain with ID 1 */ > + xen,dev-domid = <1>; > + };