[Bug 2125123] [NEW] add firmware for Intel tdx with secure boot capability

Hector CAO 2125123 at bugs.launchpad.net
Thu Sep 18 14:21:29 UTC 2025


Public bug reported:

Intel Confidential Computing (Intel TDX) is now available with Questing 25.10
components : kernel and qemu.

While we can boot a Intel confidential VM (TD - Trust Domain) with
the EDK2 default OVMF.fd (config: OvmfPkg/OvmfPkgX64.dsc), there are
2 drawbacks:

- default OVMF.fd has several security limitations for Intel TDX [1].

- secure boot is not enabled since TDX VM does not allow to use -pflash with QEMU
  for the UEFI vars that contains the necessary certificates for secure boot.

To address these 2 limitations:

1) we can build a customized OVMF file as we already did for AMD-SEV (LP: #2106771)
   the config file is OvmfPkg/IntelTdx/IntelTdxX64.dsc.
   We will name the OVMF file as OVMF.tdx.fd

2) we enable secure boot for this firmware : -DSECURE_BOOT_ENABLE=TRUE

3) we copy the necessary certificates from OVMF_VARS_4M.ms.fd over to
the OVMF.tdx.fd

Since we are delivering a new OVMF file, the regression risk is
minimized.

** Affects: edk2 (Ubuntu)
     Importance: Undecided
     Assignee: Hector CAO (hectorcao)
         Status: New

** Changed in: edk2 (Ubuntu)
     Assignee: (unassigned) => Hector CAO (hectorcao)

** Description changed:

- 
  Intel Confidential Computing (Intel TDX) is now available with Questing 25.10
  components : kernel and qemu.
  
- While we can boot a Intel confidential VM (TD - Trust Domain) with 
+ While we can boot a Intel confidential VM (TD - Trust Domain) with
  the EDK2 default OVMF.fd (config: OvmfPkg/OvmfPkgX64.dsc), there are
  2 drawbacks:
  
  - default OVMF.fd has several security limitations for Intel TDX [1].
  
  - secure boot is not enabled since TDX VM does not allow to use -pflash with QEMU
-   for the UEFI vars that contains the necessary certificates for secure boot. 
+   for the UEFI vars that contains the necessary certificates for secure boot.
  
  To address these 2 limitations:
  
- 1) we can build a customized OVMF file as we already did for AMD-SEV
-    the config file is OvmfPkg/IntelTdx/IntelTdxX64.dsc.
-    We will name the OVMF file as OVMF.tdx.fd
+ 1) we can build a customized OVMF file as we already did for AMD-SEV (LP: #2106771)
+    the config file is OvmfPkg/IntelTdx/IntelTdxX64.dsc.
+    We will name the OVMF file as OVMF.tdx.fd
  2) we enable secure boot for this firmware : -DSECURE_BOOT_ENABLE=TRUE
  
  3) we copy the necessary certificates from OVMF_VARS_4M.ms.fd over to
  the OVMF.tdx.fd
  
  Since we are delivering a new OVMF file, the regression risk is
  minimized.

** Description changed:

  Intel Confidential Computing (Intel TDX) is now available with Questing 25.10
  components : kernel and qemu.
  
  While we can boot a Intel confidential VM (TD - Trust Domain) with
  the EDK2 default OVMF.fd (config: OvmfPkg/OvmfPkgX64.dsc), there are
  2 drawbacks:
  
  - default OVMF.fd has several security limitations for Intel TDX [1].
  
  - secure boot is not enabled since TDX VM does not allow to use -pflash with QEMU
    for the UEFI vars that contains the necessary certificates for secure boot.
  
  To address these 2 limitations:
  
  1) we can build a customized OVMF file as we already did for AMD-SEV (LP: #2106771)
     the config file is OvmfPkg/IntelTdx/IntelTdxX64.dsc.
     We will name the OVMF file as OVMF.tdx.fd
+ 
  2) we enable secure boot for this firmware : -DSECURE_BOOT_ENABLE=TRUE
  
  3) we copy the necessary certificates from OVMF_VARS_4M.ms.fd over to
  the OVMF.tdx.fd
  
  Since we are delivering a new OVMF file, the regression risk is
  minimized.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to edk2 in Ubuntu.
https://bugs.launchpad.net/bugs/2125123

Title:
  add firmware for Intel tdx  with secure boot capability

Status in edk2 package in Ubuntu:
  New

Bug description:
  Intel Confidential Computing (Intel TDX) is now available with Questing 25.10
  components : kernel and qemu.

  While we can boot a Intel confidential VM (TD - Trust Domain) with
  the EDK2 default OVMF.fd (config: OvmfPkg/OvmfPkgX64.dsc), there are
  2 drawbacks:

  - default OVMF.fd has several security limitations for Intel TDX [1].

  - secure boot is not enabled since TDX VM does not allow to use -pflash with QEMU
    for the UEFI vars that contains the necessary certificates for secure boot.

  To address these 2 limitations:

  1) we can build a customized OVMF file as we already did for AMD-SEV (LP: #2106771)
     the config file is OvmfPkg/IntelTdx/IntelTdxX64.dsc.
     We will name the OVMF file as OVMF.tdx.fd

  2) we enable secure boot for this firmware : -DSECURE_BOOT_ENABLE=TRUE

  3) we copy the necessary certificates from OVMF_VARS_4M.ms.fd over to
  the OVMF.tdx.fd

  Since we are delivering a new OVMF file, the regression risk is
  minimized.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2125123/+subscriptions




More information about the foundations-bugs mailing list