From patchwork Mon Aug 26 21:50:01 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Jan Kiszka X-Patchwork-Id: 13778539 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 773F2C5321D for ; Mon, 26 Aug 2024 21:52:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Transfer-Encoding: Content-Type:MIME-Version:Message-ID:Date:Subject:Cc:To:From:Reply-To: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=yEquUkxoJfM5uHJg6dzTgpywJBY3hEgVM110Ob7YRJ4=; b=2cyeIdyWhSOa4jlhu+gvfIHRSb qb4wnhGNgaCoOwta0D7INyuVt0Xy1JUulugQbyOH1Di4bnuLp3W0cCT1txLFw897uN8osU2kdQmXy igsOI2K59IiDZyt+qryNwmf2gpuaM+DDvjmjpJ+FNKM2YWadkLKQ2IEjedjV9+T0HpvKqVNV2MMiG LmrhgN57UMpGU4Fq7MsNrSTmeVHRgHjlPZ/Bzld88xXgniauLvqES1HvuNpZvu5JNvGQkAsDXfR6a jU1sJCMSk8nqinhxfIVtSpFQHatmER8EB8mbWRSirKn3HYo40NIe09/rEHPmjlXVruIUV/C4lDKM9 LmeEM8fg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1sihdf-00000008tZf-1eUe; Mon, 26 Aug 2024 21:52:39 +0000 Received: from mta-65-227.siemens.flowmailer.net ([185.136.65.227]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1sihbJ-00000008svQ-3qAK for linux-arm-kernel@lists.infradead.org; Mon, 26 Aug 2024 21:50:17 +0000 Received: by mta-65-227.siemens.flowmailer.net with ESMTPSA id 20240826215008e7c518141853b77c02 for ; Mon, 26 Aug 2024 23:50:09 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; s=fm1; d=siemens.com; i=jan.kiszka@siemens.com; h=Date:From:Subject:To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:Cc; bh=yEquUkxoJfM5uHJg6dzTgpywJBY3hEgVM110Ob7YRJ4=; b=Wti7N4AdRaTl0Z3SMs1qgbFFMQmYdLYcRPJE83SPhZZkBF8GoBQrc/XztOqtGhu4OPJh6S 29SehBjo/jWQcbjwC+k+ulnwCoam5xLqvrh+5qLihohQyg5aPRshIwscqSB25g2B8r83Uxxa vYbNAIZuX5pSkxcEidkCox9yPp/gS6281uRP4u3mbEUriII0aUayNVRTfPE9dv+qvKQMHN8Z EYOWCGRoH7IgnTQTimti+fMdsKLlQ8243tcUnLeFErU2DqokC1DRrEZBbtJZeUlZbGwhRLIm BChH6mExyohk5A7wqU7kYAJzRE8INfWNvkFV4bvOwAfr5lWliBIVwl4A==; From: Jan Kiszka To: Nishanth Menon , Santosh Shilimkar , Vignesh Raghavendra , Rob Herring , Krzysztof Kozlowski , Conor Dooley Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, Siddharth Vadapalli , Bao Cheng Su , Hua Qian Li , Diogo Ivo , Bjorn Helgaas , =?utf-8?q?Krzysztof_Wilczy=C5=84ski?= , linux-pci@vger.kernel.org, Lorenzo Pieralisi Subject: [PATCH v2 0/6] soc: ti: Add and use PVU on K3-AM65 for DMA isolation Date: Mon, 26 Aug 2024 23:50:01 +0200 Message-ID: MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-294854:519-21489:flowmailer X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240826_145014_556848_6C505415 X-CRM114-Status: GOOD ( 15.80 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Changes in v2: - fix dt_bindings_check issues (patch 1) - address first review comments (patch 2) - extend ti,am65-pci-host bindings for PVU (new patch 3) Only few of the K3 SoCs have an IOMMU and, thus, can isolate the system against DMA-based attacks of external PCI devices. The AM65 is without an IOMMU, but it comes with something close to it: the Peripheral Virtualization Unit (PVU). The PVU was originally designed to establish static compartments via a hypervisor, isolate those DMA-wise against each other and the host and even allow remapping of guest-physical addresses. But it only provides a static translation region, not page-granular mappings. Thus, it cannot be handled transparently like an IOMMU. Now, to use the PVU for the purpose of isolated PCI devices from the Linux host, this series takes a different approach. It defines a restricted-dma-pool for the PCI host, using swiotlb to map all DMA buffers from a static memory carve-out. And to enforce that the devices actually follow this, a special PVU soc driver is introduced. The driver permits access to the GIC ITS and otherwise waits for other drivers that detect devices with constrained DMA to register pools with the PVU. For the AM65, the first (and possibly only) driver where this is introduced is the pci-keystone host controller. Finally, this series configures the IOT2050 devices (all have MiniPCIe or M.2 extension slots) to make use of this protection scheme. Due to the cross-cutting nature of these changes, multiple subsystems are affected. However, I wanted to present the whole thing in one series to allow everyone to review with the complete picture in hands. If preferred, I can also split the series up, of course. Jan CC: Bjorn Helgaas CC: "Krzysztof WilczyƄski" CC: linux-pci@vger.kernel.org CC: Lorenzo Pieralisi Jan Kiszka (6): dt-bindings: soc: ti: Add AM65 peripheral virtualization unit soc: ti: Add IOMPU-like PVU driver dt-bindings: PCI: ti,am65: Extend for use with PVU arm64: dts: ti: k3-am65-main: Add VMAP registers to PCI root complexes PCI: keystone: Add supported for PVU-based DMA isolation on AM654 arm64: dts: ti: iot2050: Enforce DMA isolation for devices behind PCI RC .../bindings/pci/ti,am65-pci-host.yaml | 13 +- .../bindings/soc/ti/ti,am654-pvu.yaml | 51 ++ .../boot/dts/ti/k3-am65-iot2050-common.dtsi | 32 ++ arch/arm64/boot/dts/ti/k3-am65-main.dtsi | 18 +- drivers/pci/controller/dwc/pci-keystone.c | 101 ++++ drivers/soc/ti/Kconfig | 4 + drivers/soc/ti/Makefile | 1 + drivers/soc/ti/ti-pvu.c | 487 ++++++++++++++++++ include/linux/ti-pvu.h | 16 + 9 files changed, 716 insertions(+), 7 deletions(-) create mode 100644 Documentation/devicetree/bindings/soc/ti/ti,am654-pvu.yaml create mode 100644 drivers/soc/ti/ti-pvu.c create mode 100644 include/linux/ti-pvu.h