mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-01 12:53:27 +01:00
442 lines
18 KiB
Plaintext
442 lines
18 KiB
Plaintext
|
|
=== OVMF OVERVIEW ===
|
|
|
|
The Open Virtual Machine Firmware (OVMF) project aims
|
|
to support firmware for Virtual Machines using the edk2
|
|
code base. More information can be found at:
|
|
|
|
http://www.tianocore.org/ovmf/
|
|
|
|
=== STATUS ===
|
|
|
|
Current capabilities:
|
|
* IA32 and X64 architectures
|
|
* QEMU (version 1.7.1 or later, with 1.7 or later machine types)
|
|
- Video, keyboard, IDE, CD-ROM, serial
|
|
- Runs UEFI shell
|
|
- Optional NIC support.
|
|
* UEFI Linux boots
|
|
* UEFI Windows 8 boots
|
|
* UEFI Windows 7 & Windows 2008 Server boot (see important notes below!)
|
|
|
|
=== FUTURE PLANS ===
|
|
|
|
* Test/Stabilize UEFI Self-Certification Tests (SCT) results
|
|
|
|
=== BUILDING OVMF ===
|
|
|
|
Pre-requisites:
|
|
* Build environment capable of build the edk2 MdeModulePkg.
|
|
* A properly configured ASL compiler:
|
|
- Intel ASL compiler: Available from http://www.acpica.org
|
|
- Microsoft ASL compiler: Available from http://www.acpi.info
|
|
* NASM: http://www.nasm.us/
|
|
|
|
Update Conf/target.txt ACTIVE_PLATFORM for OVMF:
|
|
PEI arch DXE arch UEFI interfaces
|
|
* OvmfPkg/OvmfPkgIa32.dsc IA32 IA32 IA32
|
|
* OvmfPkg/OvmfPkgIa32X64.dsc IA32 X64 X64
|
|
* OvmfPkg/OvmfPkgX64.dsc X64 X64 X64
|
|
|
|
Update Conf/target.txt TARGET_ARCH based on the .dsc file:
|
|
TARGET_ARCH
|
|
* OvmfPkg/OvmfPkgIa32.dsc IA32
|
|
* OvmfPkg/OvmfPkgIa32X64.dsc IA32 X64
|
|
* OvmfPkg/OvmfPkgX64.dsc X64
|
|
|
|
Following the edk2 build process, you will find the OVMF binaries
|
|
under the $WORKSPACE/Build/*/*/FV directory. The actual path will
|
|
depend on how your build is configured. You can expect to find
|
|
these binary outputs:
|
|
* OVMF.FD
|
|
- Please note! This filename has changed. Older releases used OVMF.Fv.
|
|
* OvmfVideo.rom
|
|
- This file is not built separately any longer, starting with svn r13520.
|
|
|
|
If you are new to building in edk2 or looking for the latest build
|
|
instructions, visit https://github.com/tianocore/tianocore.github.io/wiki/Build-Instructions
|
|
|
|
More OVMF-specific build information can be found at:
|
|
|
|
https://github.com/tianocore/tianocore.github.io/wiki/How%20to%20build%20OVMF
|
|
|
|
=== RUNNING OVMF on QEMU ===
|
|
|
|
* Be sure to use qemu-system-x86_64, if you are using an X64 firmware.
|
|
(qemu-system-x86_64 works for the IA32 firmware as well, of course.)
|
|
* Use OVMF for QEMU firmware (3 options available)
|
|
- Option 1: Use QEMU -pflash parameter
|
|
* QEMU/OVMF will use emulated flash, and fully support UEFI variables
|
|
* Run qemu with: -pflash path/to/OVMF.fd
|
|
* Note that this option is required for running SecureBoot-enabled builds
|
|
(-D SECURE_BOOT_ENABLE).
|
|
- Option 2: Use QEMU -bios parameter
|
|
* Note that UEFI variables will be partially emulated, and non-volatile
|
|
variables may lose their contents after a reboot
|
|
* Run qemu with: -bios path/to/OVMF.fd
|
|
- Option 3: Use QEMU -L parameter
|
|
* Note that UEFI variables will be partially emulated, and non-volatile
|
|
variables may lose their contents after a reboot
|
|
* Either copy, rename or symlink OVMF.fd => bios.bin
|
|
* Use the QEMU -L parameter to specify the directory where the bios.bin
|
|
file is located.
|
|
* The EFI shell is built into OVMF builds at this time, so it should
|
|
run automatically if a UEFI boot application is not found on the
|
|
removable media.
|
|
* On Linux, newer version of QEMU may enable KVM feature, and this might
|
|
cause OVMF to fail to boot. The QEMU '-no-kvm' may allow OVMF to boot.
|
|
* Capturing OVMF debug messages on qemu:
|
|
- The default OVMF build writes debug messages to IO port 0x402. The
|
|
following qemu command line options save them in the file called
|
|
debug.log: '-debugcon file:debug.log -global isa-debugcon.iobase=0x402'.
|
|
- It is possible to revert to the original behavior, when debug messages were
|
|
written to the emulated serial port (potentially intermixing OVMF debug
|
|
output with UEFI serial console output). For this the
|
|
'-D DEBUG_ON_SERIAL_PORT' option has to be passed to the build command (see
|
|
the next section), and in order to capture the serial output qemu needs to
|
|
be started with eg. '-serial file:serial.log'.
|
|
- Debug messages fall into several categories. Logged vs. suppressed
|
|
categories are controlled at OVMF build time by the
|
|
'gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel' bitmask (an UINT32
|
|
value) in the selected .dsc file. Individual bits of this bitmask are
|
|
defined in <MdePkg/Include/Library/DebugLib.h>. One non-default bit (with
|
|
some performance impact) that is frequently set for debugging is 0x00400000
|
|
(DEBUG_VERBOSE).
|
|
- The RELEASE build target ('-b RELEASE' build option, see below) disables
|
|
all debug messages. The default build target is DEBUG.
|
|
|
|
=== Build Scripts ===
|
|
|
|
On systems with the bash shell you can use OvmfPkg/build.sh to simplify
|
|
building and running OVMF.
|
|
|
|
So, for example, to build + run OVMF X64:
|
|
$ OvmfPkg/build.sh -a X64
|
|
$ OvmfPkg/build.sh -a X64 qemu
|
|
|
|
And to run a 64-bit UEFI bootable ISO image:
|
|
$ OvmfPkg/build.sh -a X64 qemu -cdrom /path/to/disk-image.iso
|
|
|
|
To build a 32-bit OVMF without debug messages using GCC 5:
|
|
$ OvmfPkg/build.sh -a IA32 -b RELEASE -t GCC
|
|
|
|
=== Secure Boot ===
|
|
|
|
Secure Boot is a security feature that ensures only trusted and digitally
|
|
signed software is allowed to run during the boot process. This is achieved
|
|
by storing Secure Boot keys in UEFI Variables, as result it can be easily
|
|
bypassed by writing directly to the flash varstore. To avoid this situation,
|
|
it's necessary to make the varstore with SB keys read-only and/or provide an
|
|
isolated execution environment for flash access (such as SMM).
|
|
|
|
* In order to support Secure Boot, OVMF must be built with the
|
|
"-D SECURE_BOOT_ENABLE" option.
|
|
|
|
* By default, OVMF is not shipped with any SecureBoot keys installed. The user
|
|
need to install them with "Secure Boot Configuration" utility in the firmware
|
|
UI, or enroll the default UEFI keys using the OvmfPkg/EnrollDefaultKeys app.
|
|
|
|
For the EnrollDefaultKeys application, the hypervisor is expected to add a
|
|
string entry to the "OEM Strings" (Type 11) SMBIOS table. The string should
|
|
have the following format:
|
|
|
|
4e32566d-8e9e-4f52-81d3-5bb9715f9727:<Base64 X509 cert for PK and first KEK>
|
|
|
|
Such string can be generated with the following script, for example:
|
|
|
|
sed \
|
|
-e 's/^-----BEGIN CERTIFICATE-----$/4e32566d-8e9e-4f52-81d3-5bb9715f9727:/' \
|
|
-e '/^-----END CERTIFICATE-----$/d' \
|
|
PkKek1.pem \
|
|
| tr -d '\n' \
|
|
> PkKek1.oemstr
|
|
|
|
- Using QEMU 5.2 or later, the SMBIOS type 11 field can be specified from a
|
|
file:
|
|
|
|
-smbios type=11,path=PkKek1.oemstr \
|
|
|
|
- Using QEMU 5.1 or earlier, the string has to be passed as a value:
|
|
|
|
-smbios type=11,value="$(< PkKek1.oemstr)"
|
|
|
|
=== SMM support ===
|
|
|
|
Requirements:
|
|
* SMM support requires QEMU 2.5.
|
|
* The minimum required QEMU machine type is "pc-q35-2.5".
|
|
* SMM with KVM requires Linux 4.4 (host).
|
|
|
|
OVMF is capable of utilizing SMM if the underlying QEMU or KVM hypervisor
|
|
emulates SMM. SMM is put to use in the S3 suspend and resume infrastructure,
|
|
and in the UEFI variable driver stack. The purpose is (virtual) hardware
|
|
separation between the runtime guest OS and the firmware (OVMF), with the
|
|
intent to make Secure Boot actually secure, by preventing the runtime guest OS
|
|
from tampering with the variable store and S3 areas.
|
|
|
|
For SMM support, OVMF must be built with the "-D SMM_REQUIRE" option. The
|
|
resultant firmware binary will check if QEMU actually provides SMM emulation;
|
|
if it doesn't, then OVMF will log an error and trigger an assertion failure
|
|
during boot (even in RELEASE builds). Both the naming of the flag (SMM_REQUIRE,
|
|
instead of SMM_ENABLE), and this behavior are consistent with the goal
|
|
described above: this is supposed to be a security feature, and fallbacks are
|
|
not allowed. Similarly, a pflash-backed variable store is a requirement.
|
|
|
|
QEMU should be started with the options listed below (in addition to any other
|
|
guest-specific flags). The command line should be gradually composed from the
|
|
hints below. '\' is used to extend the command line to multiple lines, and '^'
|
|
can be used on Windows.
|
|
|
|
* QEMU binary and options specific to 32-bit guests:
|
|
|
|
$ qemu-system-i386 -cpu coreduo,-nx \
|
|
|
|
or
|
|
|
|
$ qemu-system-x86_64 -cpu <MODEL>,-lm,-nx \
|
|
|
|
* QEMU binary for running 64-bit guests (no particular options):
|
|
|
|
$ qemu-system-x86_64 \
|
|
|
|
* Flags common to all SMM scenarios (only the Q35 machine type is supported):
|
|
|
|
-machine q35,smm=on,accel=(tcg|kvm) \
|
|
-m ... \
|
|
-smp ... \
|
|
-global driver=cfi.pflash01,property=secure,value=on \
|
|
-drive if=pflash,format=raw,unit=0,file=OVMF_CODE.fd,readonly=on \
|
|
-drive if=pflash,format=raw,unit=1,file=copy_of_OVMF_VARS.fd \
|
|
|
|
* In order to disable S3, add:
|
|
|
|
-global ICH9-LPC.disable_s3=1 \
|
|
|
|
=== Network Support ===
|
|
|
|
OVMF provides a UEFI network stack by default. Its lowest level driver is the
|
|
NIC driver, higher levels are generic. In order to make DHCP, PXE Boot, and eg.
|
|
socket test utilities from the StdLib edk2 package work, (1) qemu has to be
|
|
configured to emulate a NIC, (2) a matching UEFI NIC driver must be available
|
|
when OVMF boots.
|
|
|
|
(If a NIC is configured for the virtual machine, and -- dependent on boot order
|
|
-- PXE booting is attempted, but no DHCP server responds to OVMF's DHCP
|
|
DISCOVER message at startup, the boot process may take approx. 3 seconds
|
|
longer.)
|
|
|
|
* For each NIC emulated by qemu, a GPLv2 licensed UEFI driver is available from
|
|
the iPXE project. The qemu source distribution contains prebuilt binaries of
|
|
these drivers (and of course allows one to rebuild them from source as well).
|
|
This is the recommended set of drivers.
|
|
|
|
* Use the qemu -netdev and -device options, or the legacy -net option, to
|
|
enable NIC support: <http://wiki.qemu.org/Documentation/Networking>.
|
|
|
|
* The iPXE drivers are automatically available to and configured for OVMF in
|
|
the default qemu installation.
|
|
|
|
* Independently of the iPXE NIC drivers, the default OVMF build provides a
|
|
basic virtio-net driver, located in OvmfPkg/VirtioNetDxe.
|
|
|
|
* Also independently of the iPXE NIC drivers, Intel's proprietary E1000 NIC
|
|
driver (from the BootUtil distribution) can be embedded in the OVMF image at
|
|
build time:
|
|
|
|
- Download BootUtil:
|
|
- Navigate to
|
|
https://downloadcenter.intel.com/download/19186/Ethernet-Intel-Ethernet-Connections-Boot-Utility-Preboot-Images-and-EFI-Drivers
|
|
- Click the download link for "PREBOOT.EXE".
|
|
- Accept the Intel Software License Agreement that appears.
|
|
- Unzip "PREBOOT.EXE" into a separate directory (this works with the
|
|
"unzip" utility on platforms different from Windows as well).
|
|
- Copy the "APPS/EFI/EFIx64/E3522X2.EFI" driver binary to
|
|
"Intel3.5/EFIX64/E3522X2.EFI" in your WORKSPACE.
|
|
- Intel have stopped distributing an IA32 driver binary (which used to
|
|
match the filename pattern "E35??E2.EFI"), thus this method will only
|
|
work for the IA32X64 and X64 builds of OVMF.
|
|
|
|
- Include the driver in OVMF during the build:
|
|
- Add "-D E1000_ENABLE" to your build command (only when building
|
|
"OvmfPkg/OvmfPkgIa32X64.dsc" or "OvmfPkg/OvmfPkgX64.dsc").
|
|
- For example: "build -D E1000_ENABLE".
|
|
|
|
* When a matching iPXE driver is configured for a NIC as described above, it
|
|
takes priority over other drivers that could possibly drive the card too:
|
|
|
|
| e1000 ne2k_pci pcnet rtl8139 virtio-net-pci
|
|
---------------------+------------------------------------------------
|
|
iPXE | x x x x x
|
|
VirtioNetDxe | x
|
|
Intel BootUtil (X64) | x
|
|
|
|
=== HTTPS Boot ===
|
|
|
|
HTTPS Boot is an alternative solution to PXE. It replaces the tftp server
|
|
with a HTTPS server so the firmware can download the images through a trusted
|
|
and encrypted connection.
|
|
|
|
* To enable HTTPS Boot, you have to build OVMF with -D NETWORK_HTTP_BOOT_ENABLE
|
|
and -D NETWORK_TLS_ENABLE. The former brings in the HTTP stack from
|
|
NetworkPkg while the latter enables TLS support in both NetworkPkg and
|
|
CryptoPkg.
|
|
|
|
If you want to exclude the unsecured HTTP connection completely, OVMF has to
|
|
be built with -D NETWORK_ALLOW_HTTP_CONNECTIONS=FALSE so that only the HTTPS
|
|
connections will be accepted.
|
|
|
|
* By default, there is no trusted certificate. The user has to import the
|
|
certificates either manually with "Tls Auth Configuration" utility in the
|
|
firmware UI or through the fw_cfg entry, etc/edk2/https/cacerts.
|
|
|
|
-fw_cfg name=etc/edk2/https/cacerts,file=<certdb>
|
|
|
|
The blob for etc/edk2/https/cacerts has to be in the format of Signature
|
|
Database(*1). You can use p11-kit(*2) or efisiglit(*3) to create the
|
|
certificate list.
|
|
|
|
If you want to create the certificate list based on the CA certificates
|
|
in your local host, p11-kit will be a good choice. Here is the command to
|
|
create the list:
|
|
|
|
p11-kit extract --format=edk2-cacerts --filter=ca-anchors \
|
|
--overwrite --purpose=server-auth <certdb>
|
|
|
|
If you only want to import one certificate, efisiglist is the tool for you:
|
|
|
|
efisiglist -a <cert file> -o <certdb>
|
|
|
|
Please note that the certificate has to be in the DER format.
|
|
|
|
You can also append a certificate to the existing list with the following
|
|
command:
|
|
|
|
efisiglist -i <old certdb> -a <cert file> -o <new certdb>
|
|
|
|
NOTE: You may need the patch to make efisiglist generate the correct header.
|
|
(https://github.com/rhboot/pesign/pull/40)
|
|
|
|
* Besides the trusted certificates, it's also possible to configure the trusted
|
|
cipher suites for HTTPS through another fw_cfg entry: etc/edk2/https/ciphers.
|
|
|
|
OVMF expects a binary UINT16 array which comprises the cipher suites HEX
|
|
IDs(*4). If the cipher suite list is given, OVMF will choose the cipher
|
|
suite from the intersection of the given list and the built-in cipher
|
|
suites. Otherwise, OVMF just chooses whatever proper cipher suites from the
|
|
built-in ones.
|
|
|
|
- Using QEMU 5.2 or later, QEMU can expose the ordered list of permitted TLS
|
|
cipher suites from the host side to OVMF:
|
|
|
|
-object tls-cipher-suites,id=mysuite0,priority=@SYSTEM \
|
|
-fw_cfg name=etc/edk2/https/ciphers,gen_id=mysuite0
|
|
|
|
(Refer to the QEMU manual and to
|
|
<https://gnutls.org/manual/html_node/Priority-Strings.html> for more
|
|
information on the "priority" property.)
|
|
|
|
- Using QEMU 5.1 or earlier, the array has to be passed from a file:
|
|
|
|
-fw_cfg name=etc/edk2/https/ciphers,file=<cipher suites>
|
|
|
|
whose contents can be generated with the following script, for example:
|
|
|
|
export LC_ALL=C
|
|
openssl ciphers -V \
|
|
| sed -r -n \
|
|
-e 's/^ *0x([0-9A-F]{2}),0x([0-9A-F]{2}) - .*$/\\\\x\1 \\\\x\2/p' \
|
|
| xargs -r -- printf -- '%b' > ciphers.bin
|
|
|
|
This script creates ciphers.bin that contains all the cipher suite IDs
|
|
supported by openssl according to the local host configuration.
|
|
|
|
You may want to enable only a limited set of cipher suites. Then, you
|
|
should check the validity of your list first:
|
|
|
|
openssl ciphers -V <cipher list>
|
|
|
|
If all the cipher suites in your list map to the proper HEX IDs, go ahead
|
|
to modify the script and execute it:
|
|
|
|
export LC_ALL=C
|
|
openssl ciphers -V <cipher list> \
|
|
| sed -r -n \
|
|
-e 's/^ *0x([0-9A-F]{2}),0x([0-9A-F]{2}) - .*$/\\\\x\1 \\\\x\2/p' \
|
|
| xargs -r -- printf -- '%b' > ciphers.bin
|
|
|
|
(*1) See "31.4.1 Signature Database" in UEFI specification 2.7 errata A.
|
|
(*2) p11-kit: https://github.com/p11-glue/p11-kit/
|
|
(*3) efisiglist: https://github.com/rhboot/pesign/blob/master/src/efisiglist.c
|
|
(*4) https://wiki.mozilla.org/Security/Server_Side_TLS#Cipher_names_correspondence_table
|
|
|
|
=== OVMF Flash Layout ===
|
|
|
|
Like all current IA32/X64 system designs, OVMF's firmware device (rom/flash)
|
|
appears in QEMU's physical address space just below 4GB (0x100000000).
|
|
|
|
OVMF supports building a 1MB, 2MB or 4MB flash image (see the DSC files for the
|
|
FD_SIZE_1MB, FD_SIZE_2MB, FD_SIZE_4MB build defines). The base address for the
|
|
1MB image in QEMU physical memory is 0xfff00000. The base address for the 2MB
|
|
image is 0xffe00000. The base address for the 4MB image is 0xffc00000.
|
|
|
|
Using the 1MB or 2MB image, the layout of the firmware device in memory looks
|
|
like:
|
|
|
|
+--------------------------------------- 4GB (0x100000000)
|
|
| VTF0 (16-bit reset code) and OVMF SEC
|
|
| (SECFV, 208KB/0x34000)
|
|
+--------------------------------------- varies based on flash size
|
|
|
|
|
| Compressed main firmware image
|
|
| (FVMAIN_COMPACT)
|
|
|
|
|
+--------------------------------------- base + 0x20000
|
|
| Fault-tolerant write (FTW)
|
|
| Spare blocks (64KB/0x10000)
|
|
+--------------------------------------- base + 0x10000
|
|
| FTW Work block (4KB/0x1000)
|
|
+--------------------------------------- base + 0x0f000
|
|
| Event log area (4KB/0x1000)
|
|
+--------------------------------------- base + 0x0e000
|
|
| Non-volatile variable storage
|
|
| area (56KB/0xe000)
|
|
+--------------------------------------- base address
|
|
|
|
Using the 4MB image, the layout of the firmware device in memory looks like:
|
|
|
|
+--------------------------------------- base + 0x400000 (4GB/0x100000000)
|
|
| VTF0 (16-bit reset code) and OVMF SEC
|
|
| (SECFV, 208KB/0x34000)
|
|
+--------------------------------------- base + 0x3cc000
|
|
|
|
|
| Compressed main firmware image
|
|
| (FVMAIN_COMPACT, 3360KB/0x348000)
|
|
|
|
|
+--------------------------------------- base + 0x84000
|
|
| Fault-tolerant write (FTW)
|
|
| Spare blocks (264KB/0x42000)
|
|
+--------------------------------------- base + 0x42000
|
|
| FTW Work block (4KB/0x1000)
|
|
+--------------------------------------- base + 0x41000
|
|
| Event log area (4KB/0x1000)
|
|
+--------------------------------------- base + 0x40000
|
|
| Non-volatile variable storage
|
|
| area (256KB/0x40000)
|
|
+--------------------------------------- base address (0xffc00000)
|
|
|
|
The code in SECFV locates FVMAIN_COMPACT, and decompresses the
|
|
main firmware (MAINFV) into RAM memory at address 0x800000. The
|
|
remaining OVMF firmware then uses this decompressed firmware
|
|
volume image.
|
|
|
|
=== UEFI Windows 7 & Windows 2008 Server ===
|
|
|
|
* One of the '-vga std' and '-vga qxl' QEMU options should be used.
|
|
* Only one video mode, 1024x768x32, is supported at OS runtime.
|
|
* The '-vga qxl' QEMU option is recommended. After booting the installed
|
|
guest OS, select the video card in Device Manager, and upgrade its driver
|
|
to the QXL XDDM one. Download location:
|
|
<http://www.spice-space.org/download.html>, Guest | Windows binaries.
|
|
This enables further resolutions at OS runtime, and provides S3
|
|
(suspend/resume) capability.
|