The presentation discusses the inclusion of IO devices into Trusted Execution Environments (TEE) and the software changes required to support it.
- Current IO virtualization technologies for TEEs have limitations and incur significant performance overhead
- Direct access to hardware IO devices in VMs requires hardware support such as MMIO and DMA remapping capability
- Devices and VMs need to be trusted for protection and isolation
- Intel TDX architecture supports direct assignment and establishment of trust between TDI and TDS
- Software changes are required for Intel TDX in support of TEIO
- High-level software flows and new functionality enable Intel TDX support in TEEs
Confidential computing protects data in use by performing computation in a hardware-based Trusted Execution Environment (TEE) such as Intel SGX or Intel’s upcoming Trust Domain Extensions (Intel TDX). However, PCIe-attached devices are outside the TEE’s trust boundary and not allowed to read/write confidential memory, resulting in additional latency and overhead that negatively impacts application performance. The presentation focuses on the security and software changes required to support IO in trusted execution environments, including the use of Intel TDX architecture to establish trust between TDI and TDS and enable direct assignment of IO devices.