Received: by 2002:ab2:6d45:0:b0:1fb:d597:ff75 with SMTP id d5csp171643lqr; Wed, 5 Jun 2024 02:30:43 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWtfnTpm/iDnFynll4i+iD5g7i5JA64d3Yh64ylTMAInFIv/Z6jiMmSm39MF8TEHCYO24WxdU3CxZpnxmlqgbPPxb16G/K/CSWZwvpZDQ== X-Google-Smtp-Source: AGHT+IG5eAaacRrnWzI6prH8yoz8UIn0Duk4nDVMJWyJwHILx97DvjLyHXDq6bguQFzVEFt9vubY X-Received: by 2002:a50:ab58:0:b0:57a:2f7c:c779 with SMTP id 4fb4d7f45d1cf-57a8bcc8b31mr1247401a12.37.1717579843721; Wed, 05 Jun 2024 02:30:43 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717579843; cv=pass; d=google.com; s=arc-20160816; b=FnuCsm4ea5c9iiZj9QpRn6F90YDxX6uUFPRzuak5phPIDQ815hGhxOEN5ZHvmHAS0L 4kofoa5qEolxa8+YTND7p9ay4yAS3iyt9cbmPtpubDWvqwjYFdiLc5xGYyIT7CqY+rU0 mMtzPrQQRl++7Hwya7kwabpuxWFm7wnUnTkvQUnQtcSIiCrUGrUx/E+2cGCn5x3GLKEi 7+LRnCPY+/GLIBWP9eu33MOOnnoWpd8g8iqOK1hpvCRcdSOW7HBvJsoOiOZ7wGYRAT8f hYfM2Bs35s/c4h6CutulDAJcwW1rLDPbhRTo9tXix7RC7ZXQElv8j6l7PFemmaN6+TOa Vf0Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=82eZz4jfBFdoPe3XXlFzFGqF3xdHlzrJVyrADP4bo0U=; fh=NDCPdPn2hiqHaiIRDYQAzsW9PK20CTia4nECGof6enU=; b=NAAhgdrX7M4uagSCXkDYh+JCSr6dHqS1eON7LHAzRghnNUu6dAoz0UCfat31F3BTyW mpnasHENfQkr4nf82tcEzvl/ONQnx0TZBiSxqSoYcLNwjppcEvL97yj8RAS4Qh8G8B/c RY5KP81/fvKZky6HejG41QgFdPFng62YV5mCuD4SaN43/abWxZf4qbfHL/B8Iwut1bJJ 3kDvA7cLCnHm7KgsDPFojT8rINtCZk8tKLCgemk6zGl+yGSiYfFKXUt9PAvKkS0NVNcd z15VHmp3PJgXGY2Y7PMnk4S/LdVcE8qX46rXfV8ggGnNLX62xsf/jrPO2Aw69AVsSVIh 7GGA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-202097-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-202097-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id 4fb4d7f45d1cf-57a31c62eefsi5953120a12.240.2024.06.05.02.30.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Jun 2024 02:30:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-202097-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-202097-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-202097-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4AEA41F233EE for ; Wed, 5 Jun 2024 09:30:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E4C0D18FDD2; Wed, 5 Jun 2024 09:30:21 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9153F18FC6B; Wed, 5 Jun 2024 09:30:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717579821; cv=none; b=T+URD0XhLFQ5Mpna4AZ4fCPh4DwmxT15WQbQTchIWipTViyoh8UamTlPP63tqVMW81WLqzzThEGWmsDbVW//GjO2Gb7lgZtBkHkPTW5wv2KyjvE6C0at6rK1qk7VItKWpCoTaaozZ2srbCPXkqfODiDe0iV0Mplw2JD6KtI9M20= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717579821; c=relaxed/simple; bh=JHCT0Euro1lWgzGGxzXMk+qWvf8J+z8utOGTvZkOZH4=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=k49MlXpgQk8x7iXwS1xV5TZYCATuxb6Zuhf9iQZdxSyYwipYoelJU8QMEejYqZOcxXtBgXZasTnw82QeVIzk0Mep4GzOr1zxhIc23ZpcAXBaEXi2dKaDkIxMdbqFvYgoy3Znu1os/oya0GO8pQtlX6LMpHmHG5aNbxF1E6SlQ6I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3665ADA7; Wed, 5 Jun 2024 02:30:43 -0700 (PDT) Received: from e122027.arm.com (unknown [10.57.39.129]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D08213F792; Wed, 5 Jun 2024 02:30:14 -0700 (PDT) From: Steven Price To: kvm@vger.kernel.org, kvmarm@lists.linux.dev Cc: Steven Price , Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Oliver Upton , Suzuki K Poulose , Zenghui Yu , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Joey Gouly , Alexandru Elisei , Christoffer Dall , Fuad Tabba , linux-coco@lists.linux.dev, Ganapatrao Kulkarni Subject: [PATCH v3 00/14] arm64: Support for running as a guest in Arm CCA Date: Wed, 5 Jun 2024 10:29:52 +0100 Message-Id: <20240605093006.145492-1-steven.price@arm.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This series adds support for running Linux in a protected VM under the Arm Confidential Compute Architecture (CCA). This has been updated following the feedback from the v2 posting[1]. Thanks for the feedback! Individual patches have a change log for v3. The biggest change from v2 is fixing set_memory_{en,de}crypted() to perform a break-before-make sequence. Note that only the virtual address supplied is flipped between shared and protected, so if e.g. a vmalloc() address is passed the linear map will still point to the (now invalid) previous IPA. Attempts to access the wrong address may trigger a Synchronous External Abort. However any code which attempts to access the 'encrypted' alias after set_memory_decrypted() is already likely to be broken on platforms that implement memory encryption, so I don't expect problems. The ABI to the RMM from a realm (the RSI) is based on the final RMM v1.0 (EAC 5) specification[2]. Future RMM specifications will be backwards compatible so a guest using the v1.0 specification (i.e. this series) will be able to run on future versions of the RMM without modification. Arm plans to set up a CI system to perform at a minimum boot testing of Linux as a guest within a realm. This series is based on v6.10-rc1. It is also available as a git repository: https://gitlab.arm.com/linux-arm/linux-cca cca-guest/v3 This series (the guest side) should be in a good state so please review with the intention that this could be merged soon. The host side (KVM changes) is likely to require some more iteration and I'll post that as a separate series shortly - note that there is no tie between the series (i.e. you can mix and match v2 and v3 postings of the host and guest). Introduction (unchanged from v2 posting) ============ A more general introduction to Arm CCA is available on the Arm website[3], and links to the other components involved are available in the overall cover letter. Arm Confidential Compute Architecture adds two new 'worlds' to the architecture: Root and Realm. A new software component known as the RMM (Realm Management Monitor) runs in Realm EL2 and is trusted by both the Normal World and VMs running within Realms. This enables mutual distrust between the Realm VMs and the Normal World. Virtual machines running within a Realm can decide on a (4k) page-by-page granularity whether to share a page with the (Normal World) host or to keep it private (protected). This protection is provided by the hardware and attempts to access a page which isn't shared by the Normal World will trigger a Granule Protection Fault. Realm VMs can communicate with the RMM via another SMC interface known as RSI (Realm Services Interface). This series adds wrappers for the full set of RSI commands and uses them to manage the Realm IPA State (RIPAS) and to discover the configuration of the realm. The VM running within the Realm needs to ensure that memory that is going to use is marked as 'RIPAS_RAM' (i.e. protected memory accessible only to the guest). This could be provided by the VMM (and subject to measurement to ensure it is setup correctly) or the VM can set it itself. This series includes a patch which will iterate over all described RAM and set the RIPAS. This is a relatively cheap operation, and doesn't require memory donation from the host. Instead, memory can be dynamically provided by the host on fault. An alternative would be to update booting.rst and state this as a requirement, but this would reduce the flexibility of the VMM to manage the available memory to the guest (as the initial RIPAS state is part of the guest's measurement). Within the Realm the most-significant active bit of the IPA is used to select whether the access is to protected memory or to memory shared with the host. This series treats this bit as if it is attribute bit in the page tables and will modify it when sharing/unsharing memory with the host. This top bit usage also necessitates that the IPA width is made more dynamic in the guest. The VMM will choose a width (and therefore which bit controls the shared flag) and the guest must be able to identify this bit to mask it out when necessary. PHYS_MASK_SHIFT/PHYS_MASK are therefore made dynamic. To allow virtio to communicate with the host the shared buffers must be placed in memory which has this top IPA bit set. This is achieved by implementing the set_memory_{encrypted,decrypted} APIs for arm64 and forcing the use of bounce buffers. For now all device access is considered to required the memory to be shared, at this stage there is no support for real devices to be assigned to a realm guest - obviously if device assignment is added this will have to change. Finally the GIC is (largely) emulated by the (untrusted) host. The RMM provides some management (including register save/restore) but the ITS buffers must be placed into shared memory for the host to emulate. There is likely to be future work to harden the GIC driver against a malicious host (along with any other drivers used within a Realm guest). [1] https://lore.kernel.org/r/20240412084213.1733764-1-steven.price%40arm.com [2] https://developer.arm.com/documentation/den0137/1-0eac5/ [3] https://www.arm.com/architecture/security-features/arm-confidential-compute-architecture Sami Mujawar (2): arm64: rsi: Interfaces to query attestation token virt: arm-cca-guest: TSM_REPORT support for realms Steven Price (5): arm64: realm: Query IPA size from the RMM arm64: Mark all I/O as non-secure shared arm64: Make the PHYS_MASK_SHIFT dynamic arm64: Enforce bounce buffers for realm DMA arm64: realm: Support nonsecure ITS emulation shared Suzuki K Poulose (7): arm64: rsi: Add RSI definitions arm64: Detect if in a realm and set RIPAS RAM fixmap: Allow architecture overriding set_fixmap_io arm64: Override set_fixmap_io arm64: Enable memory encrypt for Realms arm64: Force device mappings to be non-secure shared efi: arm64: Map Device with Prot Shared arch/arm64/Kconfig | 3 + arch/arm64/include/asm/fixmap.h | 4 +- arch/arm64/include/asm/io.h | 6 +- arch/arm64/include/asm/mem_encrypt.h | 17 ++ arch/arm64/include/asm/pgtable-hwdef.h | 6 - arch/arm64/include/asm/pgtable-prot.h | 3 + arch/arm64/include/asm/pgtable.h | 7 +- arch/arm64/include/asm/rsi.h | 48 ++++ arch/arm64/include/asm/rsi_cmds.h | 143 ++++++++++++ arch/arm64/include/asm/rsi_smc.h | 142 ++++++++++++ arch/arm64/include/asm/set_memory.h | 3 + arch/arm64/kernel/Makefile | 3 +- arch/arm64/kernel/efi.c | 2 +- arch/arm64/kernel/rsi.c | 96 ++++++++ arch/arm64/kernel/setup.c | 8 + arch/arm64/mm/init.c | 10 +- arch/arm64/mm/mmu.c | 13 ++ arch/arm64/mm/pageattr.c | 65 +++++- drivers/irqchip/irq-gic-v3-its.c | 90 ++++++-- drivers/virt/coco/Kconfig | 2 + drivers/virt/coco/Makefile | 1 + drivers/virt/coco/arm-cca-guest/Kconfig | 11 + drivers/virt/coco/arm-cca-guest/Makefile | 2 + .../virt/coco/arm-cca-guest/arm-cca-guest.c | 211 ++++++++++++++++++ include/asm-generic/fixmap.h | 2 + 25 files changed, 858 insertions(+), 40 deletions(-) create mode 100644 arch/arm64/include/asm/mem_encrypt.h create mode 100644 arch/arm64/include/asm/rsi.h create mode 100644 arch/arm64/include/asm/rsi_cmds.h create mode 100644 arch/arm64/include/asm/rsi_smc.h create mode 100644 arch/arm64/kernel/rsi.c create mode 100644 drivers/virt/coco/arm-cca-guest/Kconfig create mode 100644 drivers/virt/coco/arm-cca-guest/Makefile create mode 100644 drivers/virt/coco/arm-cca-guest/arm-cca-guest.c -- 2.34.1