[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1724694969.git.jan.kiszka@siemens.com>
Date: Mon, 26 Aug 2024 19:56:04 +0200
From: Jan Kiszka <jan.kiszka@...mens.com>
To: Nishanth Menon <nm@...com>,
Santosh Shilimkar <ssantosh@...nel.org>,
Vignesh Raghavendra <vigneshr@...com>,
Rob Herring <robh+dt@...nel.org>,
Krzysztof Kozlowski <krzysztof.kozlowski+dt@...aro.org>,
Conor Dooley <conor+dt@...nel.org>
Cc: linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org,
devicetree@...r.kernel.org,
Siddharth Vadapalli <s-vadapalli@...com>,
Bao Cheng Su <baocheng.su@...mens.com>,
Hua Qian Li <huaqian.li@...mens.com>,
Diogo Ivo <diogo.ivo@...mens.com>,
Bjorn Helgaas <bhelgaas@...gle.com>,
Krzysztof Wilczyński <kw@...ux.com>,
linux-pci@...r.kernel.org,
Lorenzo Pieralisi <lpieralisi@...nel.org>
Subject: [PATCH 0/5] soc: ti: Add and use PVU on K3-AM65 for DMA isolation
Only few of the K3 SoCs have an IOMMU and, thus, can isolate the system
against DMA-based attacks of external PCI devices. The AM65 is without
an IOMMU, but it comes with something close to it: the Peripheral
Virtualization Unit (PVU).
The PVU was originally designed to establish static compartments via a
hypervisor, isolate those DMA-wise against each other and the host and
even allow remapping of guest-physical addresses. But it only provides
a static translation region, not page-granular mappings. Thus, it cannot
be handled transparently like an IOMMU.
Now, to use the PVU for the purpose of isolated PCI devices from the
Linux host, this series takes a different approach. It defines a
restricted-dma-pool for the PCI host, using swiotlb to map all DMA
buffers from a static memory carve-out. And to enforce that the devices
actually follow this, a special PVU soc driver is introduced. The driver
permits access to the GIC ITS and otherwise waits for other drivers that
detect devices with constrained DMA to register pools with the PVU.
For the AM65, the first (and possibly only) driver where this is
introduced is the pci-keystone host controller. Finally, this series
configures the IOT2050 devices (all have MiniPCIe or M.2 extension
slots) to make use of this protection scheme.
Due to the cross-cutting nature of these changes, multiple subsystems
are affected. However, I wanted to present the whole thing in one series
to allow everyone to review with the complete picture in hands. If
preferred, I can also split the series up, of course.
Jan
CC: Bjorn Helgaas <bhelgaas@...gle.com>
CC: "Krzysztof Wilczyński" <kw@...ux.com>
CC: linux-pci@...r.kernel.org
CC: Lorenzo Pieralisi <lpieralisi@...nel.org>
Jan Kiszka (5):
dt-bindings: soc: ti: Add AM65 peripheral virtualization unit
soc: ti: Add IOMPU-like PVU driver
arm64: dts: ti: k3-am65-main: Add VMAP registers to PCI root complexes
PCI: keystone: Add supported for PVU-based DMA isolation on AM654
arm64: dts: ti: iot2050: Enforce DMA isolation for devices behind PCI
RC
.../bindings/soc/ti/ti,am654-pvu.yaml | 48 ++
.../boot/dts/ti/k3-am65-iot2050-common.dtsi | 32 ++
arch/arm64/boot/dts/ti/k3-am65-main.dtsi | 18 +-
drivers/pci/controller/dwc/pci-keystone.c | 101 ++++
drivers/soc/ti/Kconfig | 4 +
drivers/soc/ti/Makefile | 1 +
drivers/soc/ti/ti-pvu.c | 487 ++++++++++++++++++
include/linux/ti-pvu.h | 11 +
8 files changed, 698 insertions(+), 4 deletions(-)
create mode 100644 Documentation/devicetree/bindings/soc/ti/ti,am654-pvu.yaml
create mode 100644 drivers/soc/ti/ti-pvu.c
create mode 100644 include/linux/ti-pvu.h
--
2.43.0
Powered by blists - more mailing lists