From patchwork Wed Sep 4 10:00:09 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Jan Kiszka X-Patchwork-Id: 13790286 Received: from mta-64-228.siemens.flowmailer.net (mta-64-228.siemens.flowmailer.net [185.136.64.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 52C0A146A76 for ; Wed, 4 Sep 2024 10:00:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.136.64.228 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725444033; cv=none; b=su+QatXqzXBInu0Ln2VrvKg2Gplr24pD70IQjpt7pFO4UHsatOSOkm/VTy8iMo3IdTFqyzjGVq+y3yu0X9s7WO5m9X23ujq2HTYggb8LreVJQ0y4u6WMkErhMeNJRU9qpQhUYFukz2zZlgMvSPWzo7zo8RFqRWiA67lOKXTPxNg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725444033; c=relaxed/simple; bh=p9yM82N6ZFFY1dVALMbkqI2CYBF12CQNPLXxHChHr0g=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=gsf/I/xXWKYP3nbaVve4rzfuGOTsKmz+OnL6iW/r53yTX2nQ3ejIiPwrblV+I4a9LFQpKIo4AIotDGVKXphbe4asEXKpsuKGkaPb4G5zrvtzzM+bCW7Ib+6VQt3dSXtTmWkLowmtJXzceVNeuHlBkVyTubz12hEYLuAPGOcmiko= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=siemens.com; spf=pass smtp.mailfrom=rts-flowmailer.siemens.com; dkim=pass (2048-bit key) header.d=siemens.com header.i=jan.kiszka@siemens.com header.b=eE3WFC2+; arc=none smtp.client-ip=185.136.64.228 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=siemens.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=rts-flowmailer.siemens.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=siemens.com header.i=jan.kiszka@siemens.com header.b="eE3WFC2+" Received: by mta-64-228.siemens.flowmailer.net with ESMTPSA id 2024090410002016421d8db874903270 for ; Wed, 04 Sep 2024 12:00:20 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; s=fm1; d=siemens.com; i=jan.kiszka@siemens.com; h=Date:From:Subject:To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:Cc; bh=1SKp36I9PCzGo29f5acEW3fG8torBGSzCm9VDjPCrYc=; b=eE3WFC2+TO/F4uOz51LAiwqvACKMhH1YWtK6A9xDcF6rL4XzlUr39mB3ySPuPzd7IAn0Bs ARIR4oojss2Aa9VYltAFoSnZfZpvT8MxIHGAtk42c807aea/MHOAlBjCbQHlFax0vNkeNnhA RXMgxDbMtYzF74S701JIl9FEXVq5oFsHAt9huQvTjENqbdrTO3qGAuF7EwCglApvBXSHFTkR 4/y6LzOb5DBJZHm8TkuHxAKpCeb0ZRebO0bLhIrqjsP5Hoxlq0it9HnGyc0t3Scww0cDQNNj odmC6w2ZfHZC04rHltOTpwRZ6Vl1UzJ/OT2fl0jy4D3iQNW5bxbaHtVA==; From: Jan Kiszka To: Nishanth Menon , Santosh Shilimkar , Vignesh Raghavendra , Tero Kristo , Rob Herring , Krzysztof Kozlowski , Conor Dooley , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, linux-pci@vger.kernel.org, Siddharth Vadapalli , Bao Cheng Su , Hua Qian Li , Diogo Ivo , Bjorn Helgaas , =?utf-8?q?Krzysztof_Wilczy=C5=84ski?= , Lorenzo Pieralisi Subject: [PATCH v4 0/7] soc: ti: Add and use PVU on K3-AM65 for DMA isolation Date: Wed, 4 Sep 2024 12:00:09 +0200 Message-ID: Precedence: bulk X-Mailing-List: linux-pci@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-294854:519-21489:flowmailer Changes in v4: - reorder patch queue, moving all DTS changes to the back - limit activation to IOT2050 Advanced variants - move DMA pool to allow firmware-based expansion it up to 512M Changes in v3: - fix ti,am654-pvu.yaml according to review comments - address review comments on ti,am65-pci-host.yaml - differentiate between different compatibles in ti,am65-pci-host.yaml - move pvu nodes to k3-am65-main.dtsi - reorder patch series, pulling bindings and generic DT bits to the front Changes in v2: - fix dt_bindings_check issues (patch 1) - address first review comments (patch 2) - extend ti,am65-pci-host bindings for PVU (new patch 3) Only few of the K3 SoCs have an IOMMU and, thus, can isolate the system against DMA-based attacks of external PCI devices. The AM65 is without an IOMMU, but it comes with something close to it: the Peripheral Virtualization Unit (PVU). The PVU was originally designed to establish static compartments via a hypervisor, isolate those DMA-wise against each other and the host and even allow remapping of guest-physical addresses. But it only provides a static translation region, not page-granular mappings. Thus, it cannot be handled transparently like an IOMMU. Now, to use the PVU for the purpose of isolated PCI devices from the Linux host, this series takes a different approach. It defines a restricted-dma-pool for the PCI host, using swiotlb to map all DMA buffers from a static memory carve-out. And to enforce that the devices actually follow this, a special PVU soc driver is introduced. The driver permits access to the GIC ITS and otherwise waits for other drivers that detect devices with constrained DMA to register pools with the PVU. For the AM65, the first (and possibly only) driver where this is introduced is the pci-keystone host controller. Finally, this series configures the IOT2050 devices (all have MiniPCIe or M.2 extension slots) to make use of this protection scheme. Due to the cross-cutting nature of these changes, multiple subsystems are affected. However, I wanted to present the whole thing in one series to allow everyone to review with the complete picture in hands. If preferred, I can also split the series up, of course. Jan CC: Bjorn Helgaas CC: "Krzysztof WilczyƄski" CC: linux-pci@vger.kernel.org CC: Lorenzo Pieralisi Jan Kiszka (7): dt-bindings: soc: ti: Add AM65 peripheral virtualization unit dt-bindings: PCI: ti,am65: Extend for use with PVU soc: ti: Add IOMPU-like PVU driver PCI: keystone: Add supported for PVU-based DMA isolation on AM654 arm64: dts: ti: k3-am65-main: Add PVU nodes arm64: dts: ti: k3-am65-main: Add VMAP registers to PCI root complexes arm64: dts: ti: iot2050: Enforce DMA isolation for devices behind PCI RC on Advanced .../bindings/pci/ti,am65-pci-host.yaml | 52 +- .../bindings/soc/ti/ti,am654-pvu.yaml | 51 ++ arch/arm64/boot/dts/ti/k3-am65-main.dtsi | 38 +- .../ti/k3-am6548-iot2050-advanced-common.dtsi | 21 +- drivers/pci/controller/dwc/pci-keystone.c | 101 ++++ drivers/soc/ti/Kconfig | 4 + drivers/soc/ti/Makefile | 1 + drivers/soc/ti/ti-pvu.c | 487 ++++++++++++++++++ include/linux/ti-pvu.h | 16 + 9 files changed, 754 insertions(+), 17 deletions(-) create mode 100644 Documentation/devicetree/bindings/soc/ti/ti,am654-pvu.yaml create mode 100644 drivers/soc/ti/ti-pvu.c create mode 100644 include/linux/ti-pvu.h