audk/OvmfPkg/IntelTdx
Min M Xu be92e09206 OvmfPkg/IntelTdx: Update TDVF README
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4756

There are below updates in this patch:
1. Rename README to README.md so that it can be show as markdown
   document.
2. Update some information about TDVF.
2. Fix some typo.

Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Signed-off-by: Min Xu <min.m.xu@intel.com>
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
2024-04-22 02:53:53 +00:00
..
PrePiHobListPointerLibTdx OvmfPkg: Use PcdOvmfWorkAreaBase instead of PcdSevEsWorkAreaBase 2022-06-16 08:08:19 +00:00
Sec OvmfPkg/IntelTdx: auto-gen & fix SEC ProcessLibraryConstructorList() decl 2024-03-08 09:09:22 +00:00
TdxHelperLib OvmfPkg/IntelTdx: Add PeiTdxHelperLib 2023-02-04 03:38:15 +00:00
IntelTdxX64.dsc Ovmfpkg: Prepare OvmfPkg to use the AmdSvsmLib library 2024-04-17 18:30:03 +00:00
IntelTdxX64.fdf OvmfPkg: Update TdTcg2Dxe path in OvmfPkgX64 and IntelTdxX64.dsc 2024-04-17 03:04:13 +00:00
README.md OvmfPkg/IntelTdx: Update TDVF README 2024-04-22 02:53:53 +00:00

README.md

TDVF Overview

Intel Trust Domain Extension (TDX) is Intel Architecture extension to provide trusted, isolated VM execution by removing CSP software (hypervisor etc) from the TCB. TDX Virtual Firmware (TDVF) is an EDK II based project to enable UEFI support for TDX based Virtual Machines. It provides the capability to launch a TD.

The Intel TDX Virtual Firmware Design Guide is at https://www.intel.com/content/dam/develop/external/us/en/documents/tdx-virtual-firmware-design-guide-rev-1.01.pdf.

More information can be found at: https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html

Configurations and Features

There are 2 configurations for TDVF.

Config-A:

  • Merge the basic TDVF feature to existing OvmfPkgX64.dsc. (Align with existing SEV)
  • Threat model: VMM is NOT out of TCB. (We don't make things worse)
  • The OvmfPkgX64.dsc includes SEV/TDX/normal OVMF basic boot capability. The final binary can run on SEV/TDX/normal OVMF.
  • No changes to existing OvmfPkgX64 image layout.
  • No need to remove features if they exist today.
  • PEI phase is NOT skipped in either TD or Non-TD.
  • RTMR based measurement (CC_MEASUREMENT) is supported as an optional requirement.
  • External inputs from Host VMM are measured, such as TdHob, CFV.
  • Other external inputs are measured, such as FW_CFG data, os loader, initrd, etc.

Config-B:

  • Add a standalone IntelTdxX64.dsc to a TDX specific directory (OvmfPkg/IntelTdx) for a full feature TDVF.(Align with existing SEV)
  • Threat model: VMM is out of TCB. (We need necessary change to prevent attack from VMM)
  • IntelTdxX64.dsc includes TDX/normal OVMF basic boot capability. The final binary can run on TDX/normal OVMF.
  • It might eventually merge with AmdSev.dsc, but NOT at this point of time. And we don't know when it will happen. We need sync with AMD in the community after both of us think the solutions are mature to merge.
  • RTMR based measurement (CC_MEASUREMENT) is supported as a mandatory requirement.
  • External inputs from Host VMM are measured, such as TdHob, CFV.
  • Other external inputs are measured, such as FW_CFG data, os loader, initrd, etc.
  • PEI phase is skipped to remove unnecessary attack surface.
  • DXE FV is split into 2 FVs (DXEFV & NCCFV) to remove the unnecessary attack surface in a TD guest..
    • When launching a TD guest, only drivers in DXEFV are loaded.
    • When launching a Non-TD guest, dirvers in both DXEFV and NCCFV are loaded.

Build

  • Build the TDVF (Config-A) target:
cd /path/to/edk2
source edksetup.sh

## without CC_MEASUREMENT enabled
build -p OvmfPkg/OvmfPkgX64.dsc -a X64 -t GCC5 -b RELEASE

## CC_MEASUREMENT enabled
build -p OvmfPkg/OvmfPkgX64.dsc -a X64 -t GCC5 -D CC_MEASUREMENT_ENABLE=TRUE -b RELEASE
  • Build the TDVF (Config-B) target:
cd /path/to/edk2
source edksetup.sh
build -p OvmfPkg/IntelTdx/IntelTdxX64.dsc -a X64 -t GCC5 -b RELEASE

Usage

Assuming TDX-QEMU/TDX-KVM are already built, one can start a TD virtual machine as launching-td-guest:

qemu_system_x86 \ -machine ...,confidential-guest-support=tdx0 \ -object tdx-guest,id=tdx0,[sept-ve-disable=off] \ -drive if=pflash,format=raw,unit=0,file=/path/to/OVMF_CODE.fd \ -drive if=pflash,format=raw,unit=1,file=/path/to/OVMF_VARS.fd \

Note: TDX-QEMU/TDX-KVM are still in upstreaming progress. Please refer to:

Once above 2 upstreaming are completed a minimum qemu/kvm version will be updated here.