From patchwork Sat Oct 9 00:36:55 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kuppuswamy Sathyanarayanan X-Patchwork-Id: 12546757 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3BBD1C43217 for ; Sat, 9 Oct 2021 00:37:34 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1F85660F92 for ; Sat, 9 Oct 2021 00:37:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244025AbhJIAj3 (ORCPT ); Fri, 8 Oct 2021 20:39:29 -0400 Received: from mga02.intel.com ([134.134.136.20]:5242 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231963AbhJIAj1 (ORCPT ); Fri, 8 Oct 2021 20:39:27 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10131"; a="213756480" X-IronPort-AV: E=Sophos;i="5.85,358,1624345200"; d="scan'208";a="213756480" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Oct 2021 17:37:31 -0700 X-IronPort-AV: E=Sophos;i="5.85,358,1624345200"; d="scan'208";a="624905334" Received: from dmsojoza-mobl3.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.251.135.62]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Oct 2021 17:37:29 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski , Bjorn Helgaas , Richard Henderson , Thomas Bogendoerfer , James E J Bottomley , Helge Deller , "David S . Miller" , Arnd Bergmann , Jonathan Corbet , "Michael S . Tsirkin" , Paolo Bonzini , David Hildenbrand , Andrea Arcangeli , Josh Poimboeuf Cc: Peter H Anvin , Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , Kuppuswamy Sathyanarayanan , x86@kernel.org, linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-alpha@vger.kernel.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, sparclinux@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v5 00/16] Add TDX Guest Support (shared-mm support) Date: Fri, 8 Oct 2021 17:36:55 -0700 Message-Id: <20211009003711.1390019-1-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-parisc@vger.kernel.org Hi All, Intel's Trust Domain Extensions (TDX) protect guest VMs from malicious hosts and some physical attacks. Since VMM is untrusted entity, it does not allow VMM to access guest private memory. Any memory that is required for communication with VMM must be shared explicitly. This series adds support to securely share guest memory with VMM when it is required by guest. Originally TDX did automatic sharing of every ioremap. But it was found that this ends up with a lot of memory shared that is supposed to be private, for example ACPI tables. Also in general since only a few drivers are expected to be used it's safer to mark them explicitly (for virtio it actually only needs two places). This gives the advantage of automatically preventing other drivers from doing MMIO, which can happen in some cases even with the device filter. There is still a command line option to override this option, which allows to use all drivers. This series is the continuation of the patch series titled "Add TDX Guest Support (Initial support)", "Add TDX Guest Support (#VE handler support)" and "Add TDX Guest Support (boot support)" which added initial support, #VE handler support and boot fixes for TDX guests. You can find the related patchsets in the following links. [set 1, v9] - https://lore.kernel.org/lkml/20211008234009.1211215-1-sathyanarayanan.kuppuswamy@linux.intel.com/ [set 2, v7] - https://lore.kernel.org/lkml/20211005204136.1812078-1-sathyanarayanan.kuppuswamy@linux.intel.com/ [set 3, v7] - https://lore.kernel.org/lkml/20211005230550.1819406-1-sathyanarayanan.kuppuswamy@linux.intel.com/ Also please note that this series alone is not necessarily fully functional. You need to apply all the above 3 patch series to get a fully functional TDX guest. You can find TDX related documents in the following link. https://software.intel.com/content/www/br/pt/develop/articles/intel-trust-domain-extensions.html Also, ioremap related changes in mips, parisc, alpha, sparch archs' are only compile tested, and hence need help from the community users of these archs' to make sure that it does not break any functionality. In this patch series, following patches are in PCI domain and are meant for the PCI domain reviewers. pci: Consolidate pci_iomap* and pci_iomap*wc pci: Add pci_iomap_shared{,_range} pci: Mark MSI data shared Patch titled "asm/io.h: Add ioremap_host_shared fallback" adds generic and arch specific ioremap_host_shared headers and are meant to be reviewed by linux-arch@vger.kernel.org, linux-alpha@vger.kernel.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, sparclinux@vger.kernel.org. Similarly patch titled "virtio: Use shared mappings for virtio PCI devices" adds ioremap_host_shared() support for virtio drivers and are meant to be reviewed by virtio driver maintainers. I have CCed this patch series to all the related domain maintainers and open lists. If you prefer to get only patches specific to your domain, please let me know. I will fix this in next submission. Changes since v4: * Since patch titled "x86/tdx: Get TD execution environment information via TDINFO" is required only by this patch set, moved it here. * Rest of the change log is included per patch. Changes since v3: * Rebased on top of Tom Lendacky's protected guest changes (https://lore.kernel.org/patchwork/cover/1468760/) * Added new API to share io-reamapped memory selectively (using ioremap_shared()) * Added new wrapper (pci_iomap_shared_range()) for PCI IO remap shared mappings use case. Changes since v2: * Rebased on top of v5.14-rc1. * No functional changes. Andi Kleen (6): PCI: Consolidate pci_iomap_range(), pci_iomap_wc_range() asm/io.h: Add ioremap_host_shared fallback PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range() PCI: Mark MSI data shared virtio: Use shared mappings for virtio PCI devices x86/tdx: Implement ioremap_host_shared for x86 Isaku Yamahata (1): x86/tdx: ioapic: Add shared bit for IOAPIC base address Kirill A. Shutemov (7): x86/mm: Move force_dma_unencrypted() to common code x86/tdx: Get TD execution environment information via TDINFO x86/tdx: Exclude Shared bit from physical_mask x86/tdx: Make pages shared in ioremap() x86/tdx: Add helper to do MapGPA hypercall x86/tdx: Make DMA pages shared x86/kvm: Use bounce buffers for TD guest Kuppuswamy Sathyanarayanan (2): x86/tdx: Enable shared memory confidential guest flags for TDX guest x86/tdx: Add cmdline option to force use of ioremap_host_shared .../admin-guide/kernel-parameters.rst | 1 + .../admin-guide/kernel-parameters.txt | 12 ++ Documentation/driver-api/device-io.rst | 7 + arch/alpha/include/asm/io.h | 2 + arch/mips/include/asm/io.h | 2 + arch/parisc/include/asm/io.h | 2 + arch/sparc/include/asm/io_64.h | 2 + arch/x86/Kconfig | 9 +- arch/x86/include/asm/io.h | 6 + arch/x86/include/asm/mem_encrypt_common.h | 21 +++ arch/x86/include/asm/pgtable.h | 5 + arch/x86/include/asm/tdx.h | 22 +++ arch/x86/kernel/apic/io_apic.c | 18 ++- arch/x86/kernel/cc_platform.c | 3 + arch/x86/kernel/tdx.c | 109 +++++++++++++++ arch/x86/mm/Makefile | 2 + arch/x86/mm/ioremap.c | 64 +++++++-- arch/x86/mm/mem_encrypt.c | 8 +- arch/x86/mm/mem_encrypt_common.c | 40 ++++++ arch/x86/mm/pat/set_memory.c | 45 +++++- drivers/pci/msi.c | 2 +- drivers/virtio/virtio_pci_modern_dev.c | 2 +- include/asm-generic/io.h | 5 + include/asm-generic/pci_iomap.h | 6 + include/linux/cc_platform.h | 13 ++ lib/pci_iomap.c | 131 +++++++++++++----- 26 files changed, 475 insertions(+), 64 deletions(-) create mode 100644 arch/x86/include/asm/mem_encrypt_common.h create mode 100644 arch/x86/mm/mem_encrypt_common.c