From patchwork Thu Oct 17 13:14:23 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Price X-Patchwork-Id: 13840063 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 6C690D37491 for ; Thu, 17 Oct 2024 13:39:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Transfer-Encoding: MIME-Version:Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-Type: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=iVUi+c1GIroL05q82zxsZF06KX8qgNyZ/VsVpFHCX6E=; b=vXFHm24d0ujW0tfPi5KmnTr/FL N3YxivJ+OlZmiqH1kHF5KavHIZPeXmvUwyq/QRxmeSeAT7iTqxr4JBUa2vP5Ohg7mjSwWlJpEw1d7 3Q97G2xCE3GNBHelx2THEjNGt4MK3Nggdrm3+vQcFIsoIUAXa1XFDxq/IZy2nTdrCyvGXjYsjW1Hq Css4CDovs6XLZ+CpHcpkWI7rBNtHYhf3sBkvXwNCbBGTfPZX/HvBp3GlUWzJsWIfRTrZUz/55jyJQ uFCi8LIFpMa1OmyQD6Ng6i11BU4QWQ2VcDOj5BMR0SEGo5lSb6JFcLl4uvJa5fXFEajzjC4hZRkNm /kkpaFjg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1t1Qic-0000000Exp8-0KAb; Thu, 17 Oct 2024 13:39:10 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1t1QL4-0000000Etzg-1iur for linux-arm-kernel@lists.infradead.org; Thu, 17 Oct 2024 13:14:55 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AE1B8FEC; Thu, 17 Oct 2024 06:15:16 -0700 (PDT) Received: from e122027.cambridge.arm.com (e122027.cambridge.arm.com [10.1.35.62]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9D7C13F71E; Thu, 17 Oct 2024 06:14:42 -0700 (PDT) From: Steven Price To: kvm@vger.kernel.org, kvmarm@lists.linux.dev Cc: Steven Price , Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Oliver Upton , Suzuki K Poulose , Zenghui Yu , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Joey Gouly , Alexandru Elisei , Christoffer Dall , Fuad Tabba , linux-coco@lists.linux.dev, Ganapatrao Kulkarni , Gavin Shan , Shanker Donthineni , Alper Gun , Dan Williams , "Aneesh Kumar K . V" Subject: [PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA Date: Thu, 17 Oct 2024 14:14:23 +0100 Message-Id: <20241017131434.40935-1-steven.price@arm.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20241017_061450_748517_2CD522DF X-CRM114-Status: GOOD ( 19.34 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This series adds support for running Linux in a protected VM under the Arm Confidential Compute Architecture (CCA). This is a minor update following the feedback from the v6 posting[1]. Thanks for the feedback! Individual patches have a change log. The biggest changes are in patch 10 where Gavin gave some great feedback to tidy things up a bit. This series is based on v6.12-rc1. Testing ======= Since a couple of the patches have been merged separately, and there was also a bug[2] in -rc1 which impacts 9p filesystems, I've provided the below git tree with everything you need for a CCA guest: https://gitlab.arm.com/linux-arm/linux-cca cca-guest/v7 Back by popular demand is also a tree with both host and guest changes: https://gitlab.arm.com/linux-arm/linux-cca cca-full/v5+v7 You will also need an up-to-date RMM - the necessary changes have been merged into the 'main' branch of upstream: https://git.trustedfirmware.org/TF-RMM/tf-rmm.git main And you also need an updated kvmtool, there's a branch with the necessary changes here: https://git.gitlab.arm.com/linux-arm/kvmtool-cca.git cca/v3 earlycon -------- If using 'earlycon' on the kernel command line it is now necessary to pass the address of the serial port *in the unprotected IPA*. This is because the fixmap changes were dropped (due to the late probing of the RMM). E.g. for kvmtool you will need: earlycon=uart,mmio,0x101000000 This is the main drawback to late probing. One potential improvement would be an option like "earlycon=realm" to identify that the earlycon uart is in the unprotected space without having to know the actual IPA. I've left this out for now as I'm not sure whether there is any actual interest in this. [1] https://lore.kernel.org/r/20241004144307.66199-1-steven.price%40arm.com [2] https://lore.kernel.org/all/cbaf141ba6c0e2e209717d02746584072844841a.1727722269.git.osandov@fb.com/ Sami Mujawar (1): virt: arm-cca-guest: TSM_REPORT support for realms Steven Price (4): arm64: realm: Query IPA size from the RMM arm64: Enforce bounce buffers for realm DMA arm64: mm: Avoid TLBI when marking pages as valid arm64: Document Arm Confidential Compute Suzuki K Poulose (6): arm64: rsi: Add RSI definitions arm64: Detect if in a realm and set RIPAS RAM arm64: rsi: Add support for checking whether an MMIO is protected arm64: rsi: Map unprotected MMIO as decrypted efi: arm64: Map Device with Prot Shared arm64: Enable memory encrypt for Realms Documentation/arch/arm64/arm-cca.rst | 69 ++++++ Documentation/arch/arm64/booting.rst | 3 + Documentation/arch/arm64/index.rst | 1 + arch/arm64/Kconfig | 3 + arch/arm64/include/asm/io.h | 8 + arch/arm64/include/asm/mem_encrypt.h | 9 + arch/arm64/include/asm/pgtable-prot.h | 4 + arch/arm64/include/asm/pgtable.h | 5 + arch/arm64/include/asm/rsi.h | 68 ++++++ arch/arm64/include/asm/rsi_cmds.h | 160 +++++++++++++ arch/arm64/include/asm/rsi_smc.h | 193 +++++++++++++++ arch/arm64/include/asm/set_memory.h | 3 + arch/arm64/kernel/Makefile | 3 +- arch/arm64/kernel/efi.c | 12 +- arch/arm64/kernel/rsi.c | 142 +++++++++++ arch/arm64/kernel/setup.c | 3 + arch/arm64/mm/init.c | 10 +- arch/arm64/mm/pageattr.c | 98 +++++++- drivers/virt/coco/Kconfig | 2 + drivers/virt/coco/Makefile | 1 + drivers/virt/coco/arm-cca-guest/Kconfig | 11 + drivers/virt/coco/arm-cca-guest/Makefile | 2 + .../virt/coco/arm-cca-guest/arm-cca-guest.c | 224 ++++++++++++++++++ 23 files changed, 1026 insertions(+), 8 deletions(-) create mode 100644 Documentation/arch/arm64/arm-cca.rst create mode 100644 arch/arm64/include/asm/rsi.h create mode 100644 arch/arm64/include/asm/rsi_cmds.h create mode 100644 arch/arm64/include/asm/rsi_smc.h create mode 100644 arch/arm64/kernel/rsi.c create mode 100644 drivers/virt/coco/arm-cca-guest/Kconfig create mode 100644 drivers/virt/coco/arm-cca-guest/Makefile create mode 100644 drivers/virt/coco/arm-cca-guest/arm-cca-guest.c