Skip to content

gowthamsiddarthd/rme-sysarch-acs_1

 
 

Repository files navigation

Realm Management Extension System Architecture - Architecture Compliance Suite

Realm Management Extension System Architecture

Realm Management Extension System Architecture (RME) is an extension to the Armv9 A-profile architecture. RME adds the following features:

  • Two additional Security states, Root and Realm.
  • Two additional physical address spaces, Root and Realm.
  • The ability to dynamically transition memory granules between physical address spaces.
  • Granule Protection Check mechanism. Together with the other components of the Arm CCA, RME enables support for dynamic, attestable, and trusted execution environments (Realms) to be run on an Arm PE.

For more information, download the RME System Architecture specification

RME System - Architecture Compliance Suite

RME System Architecture Compliance Suite (ACS) is a collection of self-checking, portable C-based tests. This suite includes a set of examples of the invariant behaviors that are provided by the RME System Architecture specification, so that implementers can verify if these behaviours have been interpreted correctly. Most of the tests are executed from UEFI Shell by executing the RME UEFI shell application.

Release details

  • Code Quality: EAC v1.0.
  • The tests are written for version A.d of the Arm Realm Management Extension (RME) System Architecture.
  • The compliance suite is not a substitute for design verification.

GitHub branch

  • To pick up the release version of the code, checkout the latest tag.
  • To get the latest version of the code with bug fixes and new features, use the master branch.

Additional reading

Target platforms

Any RME enabled ARM system platform.

ACS build steps - UEFI Shell application

Prerequisites

ACK test requires to execute the code at EL3 for GPT/MMU modification, so ensure that the following requirements are met.
  • When Non-secure EL2 executes 'smc' with SMC FID, 0xC2000060, EL3 Firmware is expected to branch to plat_arm_acs_smc_handler function which is predefined in ACK.
  • To generate binary file for EL3 code, follow the build steps in README of val_el3.
  • 2MB memory must be flat mapped in EL3-MMU with Root access PAS and GPI as ROOT/ALL_ACCESS, which is used for MMU tables in EL3.
  • 2MB Free memory which is used as PA in tests.
  • 4KB/16KB/64KB shared memory that is used, a) as a structure, shared_data_el32 to share data between EL3 and EL2 domains, b) to save/restore registers and sp_el3, and tf-handler entry address.
  • 512MB Unused VA space (within 48bits) that is used in the tests as VA.
  • 4KB of Non-Volatile memory that is used only in reset tests.

For more information, see arm RME System ACS Validation Methodology document.

Before starting the ACS build, ensure that the following requirements are met.
  • Partner needs to provide their inputs to these following files...
    • val/src/sys_config.c,
    • val/include/sys_config.h
    • val/include/platform_overrride_fvp.h.
  • Partner can refer RME_ACS_SysARCUI_Tool for generating val/src/sys_config.c and val/include/platform_overrride_fvp.h files based on the memory mapping of their respective platform.
  • Partners are welcome to give their feedback on this tool improvement.
  • Any mainstream Linux based OS distribution running on a x86 or aarch64 machine.
  • git clone --branch edk2-stable202208 --depth 1 https://github.com/tianocore/edk2
  • git clone https://github.com/tianocore/edk2-libc [ Checkout SHA: 61687168fe02ac4d933a36c9145fdd242ac424d1]
  • Install GCC 12.3 or later toolchain for Linux from here.
  • Install the build prerequisite packages to build EDK2. Note: The details of the packages are beyond the scope of this document.

To start the ACS build, perform the following steps:

  1. cd local_edk2_path
  2. git clone https://github.com/tianocore/edk2-libc
  3. git submodule update --init --recursive
  4. git clone https://github.com/ARM-software/rme-sysarch-acs ShellPkg/Application/rme-acs
  5. Add the following to the [LibraryClasses.common] section in ShellPkg/ShellPkg.dsc
  • Add RmeValLib|ShellPkg/Application/rme-acs/val/RmeValLib.inf
  • Add RmePalLib|ShellPkg/Application/rme-acs/platform/pal_uefi/RmePalLib.inf
  • Add ShellPkg/Application/rme-acs/uefi_app/RmeAcs.inf in the [components] section of ShellPkg/ShellPkg.dsc
    If Baremetal platform, then add the following to [LibraryClasses.common] section in ShellPkg/ShellPkg.dsc
  • Add RmeValLib|ShellPkg/Application/rme-acs/val/RmeValLib.inf
  • Add RmePalBaremetalLib|ShellPkg/Application/rme-acs/platform/pal_baremetal/RmePalBaremetalLib.inf
  • Add RmePalFVPLib|ShellPkg/Application/rme-acs/platform/pal_baremetal/FVP/RmePalFVPLib.inf
  • Modify CC Flags in the [BuildOptions] section of ShellPkg/ShellPkg.dsc
      *_*_*_CC_FLAGS = -DENABLE_OOB

      !include StdLib/StdLib.inc
  • Modify the following in the edk2-libc/StdLib/LibC/Main/Main.c
      -extern int main( int, char**);
      +extern int ShellAppMainrme( int, char**);
  • Modify the following in ShellAppMain() of edk2-libc/StdLib/LibC/Main/Main.c
      -ExitVal = (INTN)main( (int)Argc, gMD->NArgV);
      +ExitVal = (INTN)ShellAppMainrme( (int)Argc, gMD->NArgV);
  • Comment the map[] variable in edk2-libc/StdLib/LibC/Main/Arm/flt_rounds.c to avoid -werror=unused-variable
      +#if 0
      static const int map[] = {
      1,  /* round to nearest */
      2,  /* round to positive infinity */
      3,  /* round to negative infinity */
      0   /* round to zero */
      };
      +#endif
  • Add ShellPkg/Application/rme-acs/baremetal_app/RmeAcs.inf in the [components] section of ShellPkg/ShellPkg.dsc

Linux build environment

If the build environment is Linux, perform the following steps:

  1. export GCC49_AARCH64_PREFIX= GCC12.3 toolchain path pointing to /bin/aarch64-linux-gnu-
  2. export PACKAGES_PATH= path pointing to edk2-libc
  3. source edksetup.sh
  4. make -C BaseTools/Source/C
  5. Change each "SBSA" string to "RME" string in MdePkg/Include/IndustryStandard/Acpi61.h using the command, ":%s/SBSA/RME/g"
  6. source ShellPkg/Application/rme-acs/tools/scripts/acsbuild.sh

Windows build environment

If the build environment is Windows, perform the following steps:

  1. Set the toolchain path to GCC12.3 or above.
  2. Setup the environment for AARCH64 EDK2 build.
  3. Setup the environment for PACKAGES_PATH.
  4. Build the RME shell application. For example, build -a AARCH64 -t GCC49 -p ShellPkg/ShellPkg.dsc -m ShellPkg/Application/rme-acs/uefi_app/RmeAcs.inf

Build output

The EFI executable file is generated at <edk2_path>/Build/Shell/DEBUG_GCC49/AARCH64/Rme.efi

Test suite execution

The execution of the compliance suite varies depending on the test environment. These steps assume that the test suite is invoked through the ACS UEFI shell application.

##For details about the RME System ACS UEFI Shell application, see Arm RME System ACS USER Guide

Post-Silicon

On a system where a USB port is available and functional, perform the following steps:

  1. Copy 'Rme.efi' to a USB Flash drive.
  2. Plug in the USB Flash drive to one of the functional USB ports on the system.
  3. Boot the system to UEFI shell.
  4. To determine the file system number of the plugged in USB drive, execute 'map -r' command.
  5. Type 'fsx' where 'x' is replaced by the number determined in step 4.
  6. To start the compliance tests, run the executable Rme.efi with the appropriate parameters. For details on the parameters, refer to Arm RME System ACS USER Guide.
  7. Copy the UART console output to a log file for analysis and certification.

Emulation environment with secondary storage

On an emulation environment with secondary storage, perform the following steps:

  1. Create an image file which contains the 'Rme.efi' file. For Example:
  • mkfs.vfat -C -n HD0 hda.img 2097152
  • sudo mount -o rw,loop=/dev/loop0,uid=whoami,gid=whoami hda.img /mnt/rme. If loop0 is busy, specify the loop that is free
  • cp "/Rme.efi" /mnt/rme/
  • sudo umount /mnt/rme
  1. Load the image file to the secondary storage using a backdoor. The steps followed to load the image file are Emulation environment specific and beyond the scope of this document.
  2. Boot the system to UEFI shell.
  3. To determine the file system number of the secondary storage, execute 'map -r' command.
  4. Type 'fsx' where 'x' is replaced by the number determined in step 4.
  5. To start the compliance tests, run the executable Rme.efi with the appropriate parameters. For details on the parameters, see the Arm RME System ACS USER Guide
  6. Copy the UART console output to a log file for analysis and certification.

Emulation environment without secondary storage

On an emulation platform where secondary storage is not available, perform the following steps:

  1. Add the path to 'Rme.efi' file in the UEFI FD file.
  2. Build UEFI image including the UEFI Shell.
  3. Boot the system to UEFI shell.
  4. Run the executable 'Rme.efi' to start the compliance tests. For details about the parameters, see the Arm RME System ACS USER Guide
  5. Copy the UART console output to a log file for analysis and certification.

Security implication

Arm RME ACS test suite may run at higher privilege level. An attacker may utilize these tests as a means to elevate privilege which can potentially reveal the platform security assets. To prevent the leakage of secure information, it is strongly recommended that the ACS test suite is run only on development platforms. If it is run on production systems, the system should be scrubbed after running the test suite.

Limitations

Below tests are not qualified in model. These are expected to pass in any valid RME system.

  • test_pool/legacy_system/test_ls001.c - Require Legacy TZ support.
  • test_pool/legacy_system/test_ls002.c - Require Legacy TZ Support.
  • test_pool/legacy_system/test_ls003.c - Require Legacy TZ Support.
  • test_pool/legacy_system/test_ls004.c - Require Legacy TZ Support.
  • test_pool/rme/test_rme029.c - Model Issue.
  • test_pool/rme/test_rme022.c - Require NS encryption to be programmable.
  • test_pool/gic/test_g001.c - Model issue.
  • test_pool/rme/test_rme015.c - Model limitation.

License

RME System ACS is distributed under Apache v2.0 License.

[Feedback, contributions, and support]

  • For support, send an email to "[email protected]" with details.
  • Arm licensees may contact Arm directly through their partner managers.
  • Arm welcomes code contributions through GitHub pull requests. See GitHub documentation on how to raise pull requests.

Copyright (c) 2022-2023, Arm Limited and Contributors. All rights reserved.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 89.7%
  • Assembly 4.7%
  • Python 2.4%
  • Makefile 2.2%
  • Objective-C 0.6%
  • Shell 0.4%