Skip to content

ruomengh/tdx-tools

 
 

Repository files navigation

Linux Stack for Intel® TDX (Trust Domain Extensions)

CI Check Shell CI Check Python CI Check License CI Check Document

1. Overview

1.1 Intel® Trust Domain Extensions(TDX)

Intel® Trust Domain Extensions(TDX) refers to an Intel technology that extends Virtual Machine Extensions(VMX) and Multi-Key Total Memory Encryption(MK-TME) with a new kind of virtual machine guest called a Trust Domain(TD). A TD runs in a CPU mode that protects the confidentiality of its memory contents and its CPU state from any other software, including the hosting Virtual Machine Monitor (VMM). Please get more details from TDX White Papers and Specifications

NOTE: tdx-tools keeps evolving along with kernel version. Please refer to corresponding tag for different kernel version support. Please make sure to use the corresponding tag aligned with kernel version.

Tag Kernel version TDX Version Descriptions
2022ww44 5.15 TDX 1.0
2023ww01 5.19 TDX 1.0 Performance Optimizations
2023ww15 6.2 TDX 1.5 Live Migration
2023ww22 5.19.17 TDX 1.0 FDE, Amber Client, IMA
2023ww27 6.2.16 TDX 1.5 vTPM, Live Migration+

1.2 Hardware Availability

  • As of July 2023, Intel TDX is available through custom 4th Gen Intel Xeon Scalable processors (formerly code-named “Sapphire Rapids”) delivered to certain major Cloud Service Providers, including Alibaba, Azure, Google Cloud and IBM Cloud. Today, Alibaba and Azure are already in preview, with Google and IBM expected in the coming months.
  • Intel’s Developer Cloud will be equipped with TDX-capable Intel Xeon Scalable processors in the coming months for software testing and solution development. Stay tuned to our GitHub for news on availability.
  • Intel TDX will be generally available in the upcoming 5th Gen Intel Xeon Scalable processors (code-named “Emerald Rapids”).

NOTE:

1.3 API and Specifications

Please see details at here:

2. Linux Stack for Intel TDX

Linux Stack for Intel® TDX is an end-to-end hypervisor cloud stack including the Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) components.

2.1 Use Cases

It produce the following minimal use cases:

  • Launch Intel® TDX guest VM to run general computing workloads
  • Do launch-time measurement within the Intel® TDX guest VM
  • Do runtime attestation with the quote generated by Intel® Software Guard Extensions (Intel® SGX)-based quote generation service (QGS) on the IaaS host
  • vTPM stack for TD works with tpm2-tools, IMA and Keylime.

It provides the below tools for developer:

  • Build individual component's package or install pre-build binaries on IaaS host or create PaaS guest image for quick evaluation
  • Generate the patch set for deep dive in source code level
  • Test, hack and debug the TDX technology based on PyCloudStack framework
  • Dump guest VM measurement and generate TD quote report for TDX E2E attestation
  • Measured boot and Secure boot for TDX guest VM
  • Deployment tool for Linux TDX SW stack deployment on TDX enabled host
  • Guest image tool to generate TD guest image

2.2 Components

Linux Stack for Intel® TDX includes the components in below diagram:

TDX Stack Architecture

Name Stack Description
TDX Kernel Host + Guest Linux kernel for TDX
TDX Qemu-KVM Host Qemu VMM for TDX
TDX SEAM Module Host TDX Secure Arbitration Module
vTPM TD Host A service TD provides vTPM service to TD
Migration TD Host Migration TD for live migration
TDX Libvirt Host The modified libvirt to create TDX guest domain via Qemu
TDVF Host The modified OVMF(Open Source Virtual Firmware) to support TDX guest boot like page accept, TDX measurement
TDX Grub2 Guest The modified grub for guest VM to support TDX measurement
TDX shim Guest The modified shim for guest VM to support TDX measurement

3. How to Use

Please refer the white paper: Linux*Stacks for Intel® Trust Domain Extension 1.0 (only cover TDX 1.0) and wiki for additional informational about TDX 1.5 or developer specific.

Type Content
BKM Check Memory Encryption
BKM Enable IMA with TDX RTMR
Developer Developer Guide
Developer Off TD GDB Debug
1.5 TD Migration
1.5 vTPM

About

No description, website, or topics provided.

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 78.7%
  • Shell 7.7%
  • Python 6.1%
  • Makefile 3.3%
  • Assembly 3.2%
  • Perl 0.3%
  • Other 0.7%