From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id E34ACD802E7 for ; Fri, 19 Apr 2024 00:12:30 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=nlwZliF6DKC80ROy1jUeOYx8pEptrrysiJyNCWHF9G4=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20240206; t=1713485549; v=1; b=OdhLi9knKrFjbGRlLuZ13fwOoPUPoX+pgplPHfwjZx4wSoWesHTdBE+fNzjb+YfzTzXxtBM/ T5XiJBJgjeSVGzlOniRjitKGFt8hL7Z5S7zKVxfdZDCBogeT5mxpAuzQaq+0rlrcBiMkjToKmZ+ eX+RvyGH6OPkxuCop2batlV8ow9MLw/IOLgVF13Ln3XEPahIWY6dFGii0h6M/fHukhwt74jlBOG gZX+DRBjiDFpa5sw+qzuUAM1kudoPRyXOOn2lng9JdiWUzoHebK+h6164lqCk4zWMf/5hzyfy+R KvQNnb8BTTWPFK/aNWxMfaahZB1NS1PCdSRfgOa7PzyJw== X-Received: by 127.0.0.2 with SMTP id Wn0IYY7687511x8MSKojV9QR; Thu, 18 Apr 2024 17:12:29 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.13]) by mx.groups.io with SMTP id smtpd.web10.9117.1713485548797610112 for ; Thu, 18 Apr 2024 17:12:28 -0700 X-CSE-ConnectionGUID: 9fv5qJvLQayOAy/SYj4hyQ== X-CSE-MsgGUID: SXC1Ij9vR7KaFqehbbA6CA== X-IronPort-AV: E=McAfee;i="6600,9927,11047"; a="12013583" X-IronPort-AV: E=Sophos;i="6.07,213,1708416000"; d="scan'208";a="12013583" X-Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by fmvoesa107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2024 17:11:47 -0700 X-CSE-ConnectionGUID: d0K96FLaT6q31h/3tr67sQ== X-CSE-MsgGUID: yVldenjDTEaRcCuCVpJL2g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,213,1708416000"; d="scan'208";a="54370409" X-Received: from xxue3x-mobl.ccr.corp.intel.com (HELO mxu9-mobl1.ccr.corp.intel.com) ([10.124.224.178]) by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2024 17:11:45 -0700 From: "Min Xu" To: devel@edk2.groups.io Cc: Min M Xu , Jiewen Yao , Gerd Hoffmann Subject: [edk2-devel] [PATCH V2 1/1] OvmfPkg/IntelTdx: Update TDVF README Date: Fri, 19 Apr 2024 08:11:27 +0800 Message-ID: <20240419001127.53-1-min.m.xu@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Thu, 18 Apr 2024 17:12:28 -0700 Resent-From: min.m.xu@intel.com Reply-To: devel@edk2.groups.io,min.m.xu@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: RmFs5RPPh2QXm507h4v4JHiPx7686176AA= Content-Transfer-Encoding: 8bit X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=OdhLi9kn; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none) From: Min M Xu BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4756 There are below updates in this patch: 1. Rename README to README.md so that it can be show as markdown document. 2. Update some information about TDVF. 2. Fix some typo. Cc: Jiewen Yao Cc: Gerd Hoffmann Signed-off-by: Min Xu --- OvmfPkg/IntelTdx/{README => README.md} | 64 +++++++++++++++----------- 1 file changed, 38 insertions(+), 26 deletions(-) rename OvmfPkg/IntelTdx/{README => README.md} (52%) diff --git a/OvmfPkg/IntelTdx/README b/OvmfPkg/IntelTdx/README.md similarity index 52% rename from OvmfPkg/IntelTdx/README rename to OvmfPkg/IntelTdx/README.md index 7307ede78faf..c168167c1271 100644 --- a/OvmfPkg/IntelTdx/README +++ b/OvmfPkg/IntelTdx/README.md @@ -1,13 +1,13 @@ TDVF Overview ------------- -Intel Trust Domain Extension (TDX) is Intel Architecture extension +**Intel Trust Domain Extension (TDX)** is Intel Architecture extension to provide trusted, isolated VM execution by removing CSP software -(hypervisor etc) from the TCB. TDX Virtual Firmware (TDVF) is an +(hypervisor etc) from the TCB. **TDX Virtual Firmware (TDVF)** is an EDK II based project to enable UEFI support for TDX based Virtual Machines. It provides the capability to launch a TD. -The Intel? TDX Virtual Firmware Design Guide is at +The **Intel TDX Virtual Firmware Design Guide** is at https://www.intel.com/content/dam/develop/external/us/en/documents/tdx-virtual-firmware-design-guide-rev-1.01.pdf. More information can be found at: @@ -19,49 +19,61 @@ Configurations and Features There are 2 configurations for TDVF. -Config-A: - - Merge the *basic* TDVF feature to existing OvmfX64Pkg.dsc. (Align +**Config-A:** + - Merge the *basic* TDVF feature to existing **OvmfPkgX64.dsc**. (Align with existing SEV) - - Threat model: VMM is NOT out of TCB. (We don?t make things worse) - - The OvmfX64Pkg.dsc includes SEV/TDX/normal OVMF basic boot capability. + - Threat model: VMM is **NOT** out of TCB. (We don't make things worse) + - The OvmfPkgX64.dsc includes SEV/TDX/normal OVMF basic boot capability. The final binary can run on SEV/TDX/normal OVMF. - No changes to existing OvmfPkgX64 image layout. - No need to remove features if they exist today. - - PEI phase is NOT skipped in either Td or Non-Td. - - RTMR based measurement is supported. + - PEI phase is **NOT** skipped in either TD or Non-TD. + - RTMR based measurement (CC_MEASUREMENT) is supported as an optional requirement. - External inputs from Host VMM are measured, such as TdHob, CFV. - Other external inputs are measured, such as FW_CFG data, os loader, initrd, etc. -Config-B: - - Add a standalone IntelTdx.dsc to a TDX specific directory for a *full* - feature TDVF.(Align with existing SEV) +**Config-B:** + - Add a standalone **IntelTdxX64.dsc** to a TDX specific directory + (**OvmfPkg/IntelTdx**) for a *full* feature TDVF.(Align with existing SEV) - Threat model: VMM is out of TCB. (We need necessary change to prevent attack from VMM) - - IntelTdx.dsc includes TDX/normal OVMF basic boot capability. The final + - IntelTdxX64.dsc includes TDX/normal OVMF basic boot capability. The final binary can run on TDX/normal OVMF. - It might eventually merge with AmdSev.dsc, but NOT at this point of - time. And we don?t know when it will happen. We need sync with AMD in + time. And we don't know when it will happen. We need sync with AMD in the community after both of us think the solutions are mature to merge. - - Need to add necessary security feature as mandatory requirement, such - as RTMR based Trusted Boot support. - - Need to measure the external input from Host VMM, such as TdHob, CFV. - - Need to measure other external input, such as FW_CFG data, os loader, + - RTMR based measurement (CC_MEASUREMENT) is supported as a mandatory requirement. + - External inputs from Host VMM are measured, such as TdHob, CFV. + - Other external inputs are measured, such as FW_CFG data, os loader, initrd, etc. - - Need to remove unnecessary attack surfaces, such as network stack. + - PEI phase is skipped to remove unnecessary attack surface. + - DXE FV is split into 2 FVs (DXEFV & NCCFV) to remove the unnecessary attack + surface in a TD guest.. + - When launching a TD guest, only drivers in DXEFV are loaded. + - When launching a Non-TD guest, dirvers in both DXEFV and NCCFV are + loaded. Build ------ - Build the TDVF (Config-A) target: -`cd /path/to/edk2` -`source edksetup.sh` -`build.sh -p OvmfPkg/OvmfPkgX64.dsc -a X64 -t GCC5` +``` +cd /path/to/edk2 +source edksetup.sh + +## without CC_MEASUREMENT enabled +build -p OvmfPkg/OvmfPkgX64.dsc -a X64 -t GCC5 -b RELEASE + +## CC_MEASUREMENT enabled +build -p OvmfPkg/OvmfPkgX64.dsc -a X64 -t GCC5 -D CC_MEASUREMENT_ENABLE=TRUE -b RELEASE +``` - Build the TDVF (Config-B) target: -`cd /path/to/edk2` -`set PACKAGES_PATH=/path/to/edk2/OvmfPkg` -`source edksetup.sh` -`build.sh -p OvmfPkg/IntelTdx/IntelTdxX64.dsc -a X64 -t GCC5` +``` +cd /path/to/edk2 +source edksetup.sh +build -p OvmfPkg/IntelTdx/IntelTdxX64.dsc -a X64 -t GCC5 -b RELEASE +``` Usage ----- -- 2.44.0.windows.1 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118001): https://edk2.groups.io/g/devel/message/118001 Mute This Topic: https://groups.io/mt/105609363/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-