From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mx.groups.io with SMTP id smtpd.web10.2832.1649400109993352709 for ; Thu, 07 Apr 2022 23:41:50 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=FbnDIPGz; spf=pass (domain: intel.com, ip: 192.55.52.115, mailfrom: min.m.xu@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649400110; x=1680936110; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=v1SPU/lqszsCDyj5xf5MBpB2Myt32d6AF56HRxABHwU=; b=FbnDIPGzFQFPWvxCAvaO4sp0YGe6giA1aZpBhL4berqRQM8BLoog3FTs brAbA53x+pMa/SMROTK/bELYbsWy2OIgy8Z0LO9C+2ruYMm0ggb3s1+QC KVbtUNDyqu2HPcSTT+BOqM+IA1RVKpw7wIuv7TuS7BEVhbQY3ufW8doDJ qptgse+EzntbVhGTJZ8WyRymXcsOFQ6JxQ4d0mtxs7P3EG9TzGkUGDiN9 H8WtQjG4MqBF1AxJmRzDPeSdHSqwHQOoMnkCj5sqDiqxfLmuhh5ivM20A SA/SRxKv2tJlweF0lywkvRX/MqrVdwAecUkbE5HnUplc/Kp+P1TON08Ld w==; X-IronPort-AV: E=McAfee;i="6400,9594,10310"; a="261700523" X-IronPort-AV: E=Sophos;i="5.90,244,1643702400"; d="scan'208";a="261700523" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Apr 2022 23:41:39 -0700 X-IronPort-AV: E=Sophos;i="5.90,244,1643702400"; d="scan'208";a="525257517" Received: from mxu9-mobl1.ccr.corp.intel.com ([10.255.28.237]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Apr 2022 23:41:34 -0700 From: "Min Xu" To: devel@edk2.groups.io Cc: Min Xu , Jiewen Yao , Jian J Wang , Gerd Hoffmann , Xiaoyu Lu , Guomin Jiang , Michael D Kinney , Liming Gao , Zhiguang Liu , Sami Mujawar , Ken Lu , Ard Biesheuvel , Jordan Justen , Brijesh Singh , Erdem Aktas , James Bottomley , Tom Lendacky Subject: [PATCH V2 0/8] Enable RTMR based measurement and measure boot for Td guest Date: Fri, 8 Apr 2022 14:39:15 +0800 Message-Id: X-Mailer: git-send-email 2.29.2.windows.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit RFC: https://bugzilla.tianocore.org/show_bug.cgi?id=3853 Intel's Trust Domain Extensions (Intel TDX) refers to an Intel technology that extends Virtual Machines Extensions (VMX) and Multi-Key Total Memory Encryption (MKTME) with a new kind of virutal machines guest called a Trust Domain (TD). A TD is desinged to run in a CPU mode that protects the confidentiality of TD memory contents and the TD's CPU state from other software, including the hosting Virtual-Machine Monitor (VMM), unless explicitly shared by the TD itself. There are 2 configurations for TDVF to upstream. See below link for the definitions of the 2 configurations. https://edk2.groups.io/g/devel/message/76367 This patch-set is to enable below features of Config-B in OvmfPkg. - Enable RTMR based measurement and measured boot - Install CC_MEASUREMENT_PROTOCOL instance in Td guest The measurement for the other components, such as kernel image, initrd, will be in the following patch-sets. Patch 1: HashLibBaseCryptoRouterTdx provides SHA384 service and extend to RTMR registers. Patch 2: SecCryptLib is the cryptographic library instance for SEC. Patch 3 - 7: These 5 patches are related to RTMR based measurement and CC Eventlog ACPI table. Patch 8: Update IntelTdxX64.dsc/IntelTdxX64.fdf to support RTMR based measurement and measured boot. Code at: https://github.com/mxu9/edk2/tree/tdvf_wave4.v2 v2 changes: - Move the definition of EFI_CC_EVENT_HOB_GUID from MdePkg to SecurityPkg. - Update the definition of EFI_CC_EVENTLOG_ACPI_TABLE based on below discussion: https://edk2.groups.io/g/devel/message/87396 https://edk2.groups.io/g/devel/message/87402 - Update the code base to 94f905b3bf. Cc: Jiewen Yao Cc: Jian J Wang Cc: Gerd Hoffmann Cc: Xiaoyu Lu Cc: Guomin Jiang Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Sami Mujawar Cc: Ken Lu Cc: Ard Biesheuvel Cc: Jordan Justen Cc: Brijesh Singh Cc: Erdem Aktas Cc: James Bottomley Cc: Tom Lendacky Signed-off-by: Min Xu Min Xu (8): Security: Add HashLibBaseCryptoRouterTdx CryptoPkg: Add SecCryptLib SecurityPkg: Add definition of EFI_CC_EVENT_HOB_GUID OvmfPkg/IntelTdx: Measure Td HobList and Configuration FV OvmfPkg: Add PCDs for LAML/LASA field in CC EVENTLOG ACPI table MdePkg: Define CC Measure EventLog ACPI Table OvmfPkg/IntelTdx: Add TdTcg2Dxe OvmfPkg/IntelTdx: Enable RTMR based measurement and measure boot CryptoPkg/CryptoPkg.dsc | 4 + .../Library/BaseCryptLib/SecCryptLib.inf | 67 + MdePkg/Include/Protocol/CcMeasurement.h | 21 + OvmfPkg/IntelTdx/IntelTdxX64.dsc | 15 +- OvmfPkg/IntelTdx/IntelTdxX64.fdf | 5 + .../IntelTdx/TdTcg2Dxe/MeasureBootPeCoff.c | 407 +++ OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.c | 2489 +++++++++++++++++ OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf | 101 + OvmfPkg/Library/PeilessStartupLib/IntelTdx.c | 498 ++++ .../PeilessStartupLib/PeilessStartup.c | 30 + .../PeilessStartupInternal.h | 57 + .../PeilessStartupLib/PeilessStartupLib.inf | 7 +- OvmfPkg/OvmfPkg.dec | 6 + SecurityPkg/Include/Guid/CcEventHob.h | 22 + .../HashLibBaseCryptoRouterTdx.c | 214 ++ .../HashLibBaseCryptoRouterTdx.inf | 41 + SecurityPkg/SecurityPkg.dec | 4 + SecurityPkg/SecurityPkg.dsc | 10 + 18 files changed, 3995 insertions(+), 3 deletions(-) create mode 100644 CryptoPkg/Library/BaseCryptLib/SecCryptLib.inf create mode 100644 OvmfPkg/IntelTdx/TdTcg2Dxe/MeasureBootPeCoff.c create mode 100644 OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.c create mode 100644 OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf create mode 100644 OvmfPkg/Library/PeilessStartupLib/IntelTdx.c create mode 100644 SecurityPkg/Include/Guid/CcEventHob.h create mode 100644 SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterTdx.c create mode 100644 SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterTdx.inf -- 2.29.2.windows.2