* [PATCH v1 0/2] Add support to disable VirtIo net at runtime
@ 2022-08-04 2:52 Yuan Yu
2022-08-04 2:52 ` [PATCH v1 1/2] OvmfPkg: Introduce NetworkCfgLib Yuan Yu
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: Yuan Yu @ 2022-08-04 2:52 UTC (permalink / raw)
To: devel
Cc: Ard Biesheuvel, Jordan Justen, Laszlo Ersek, Anthony Perard,
Julien Grall
Currently networking can only be enabled/disabled at compile time. This
patch series will add support to disable VirtIo net at runtime even if
the functionality is built into binary at compile time.
This will enable VMM to reduce attack surface without recompilation.
The changes can be seen at:
https://github.com/yyu/edk2/tree/network_cfg_lib_v1
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Anthony Perard <anthony.perard@citrix.com>
Cc: Julien Grall <julien@xen.org>
Yuan Yu (2):
OvmfPkg: Introduce NetworkCfgLib
OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net
OvmfPkg/OvmfPkg.dec | 3 ++
OvmfPkg/OvmfPkgX64.dsc | 7 ++++-
OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf | 29 ++++++++++++++++++
OvmfPkg/VirtioNetDxe/VirtioNet.inf | 3 ++
OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c | 32 ++++++++++++++++++++
OvmfPkg/VirtioNetDxe/EntryPoint.c | 10 ++++++
6 files changed, 83 insertions(+), 1 deletion(-)
create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
--
2.37.1.559.g78731f0fdb-goog
^ permalink raw reply [flat|nested] 6+ messages in thread
* [PATCH v1 1/2] OvmfPkg: Introduce NetworkCfgLib
2022-08-04 2:52 [PATCH v1 0/2] Add support to disable VirtIo net at runtime Yuan Yu
@ 2022-08-04 2:52 ` Yuan Yu
2022-08-04 2:52 ` [PATCH v1 2/2] OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net Yuan Yu
2022-08-04 5:55 ` [PATCH v1 0/2] Add support to disable VirtIo net at runtime Laszlo Ersek
2 siblings, 0 replies; 6+ messages in thread
From: Yuan Yu @ 2022-08-04 2:52 UTC (permalink / raw)
To: devel
Cc: Ard Biesheuvel, Jordan Justen, Laszlo Ersek, Anthony Perard,
Julien Grall
Introduce NetworkCfgLib which will set PcdNetworkSupport based on
"etc/networking" qemu file.
If "etc/networking" (type bool) is TRUE, then PcdNetworkSupport will be
TRUE and vice versa.
In the following patch, PcdNetworkSupport will be used to enable/disable
VirtIo net driver so that VMM will have control over networking
functionality in runtime.
The default value of PcdNetworkSupport is TRUE, which means if network
support is turned on at compile time and VMM doesn't do anything, the
VirtIo driver will be enabled. This is to make it consistent with the
behavior before this patch.
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Anthony Perard <anthony.perard@citrix.com>
Cc: Julien Grall <julien@xen.org>
Signed-off-by: Yuan Yu <yuanyu@google.com>
---
OvmfPkg/OvmfPkg.dec | 3 ++
OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf | 29 ++++++++++++++++++
OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c | 32 ++++++++++++++++++++
3 files changed, 64 insertions(+)
diff --git a/OvmfPkg/OvmfPkg.dec b/OvmfPkg/OvmfPkg.dec
index 5af76a540529..5dced0568f6c 100644
--- a/OvmfPkg/OvmfPkg.dec
+++ b/OvmfPkg/OvmfPkg.dec
@@ -451,6 +451,9 @@ [PcdsDynamic, PcdsDynamicEx]
## This PCD records LASA field in CC EVENTLOG ACPI table.
gUefiOvmfPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLasa|0|UINT64|0x67
+ ## This PCD controls if network support should be turned on at runtime.
+ gUefiOvmfPkgTokenSpaceGuid.PcdNetworkSupport|TRUE|BOOLEAN|0x72
+
[PcdsFeatureFlag]
gUefiOvmfPkgTokenSpaceGuid.PcdQemuBootOrderPciTranslation|TRUE|BOOLEAN|0x1c
gUefiOvmfPkgTokenSpaceGuid.PcdQemuBootOrderMmioTranslation|FALSE|BOOLEAN|0x1d
diff --git a/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf b/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
new file mode 100644
index 000000000000..44be171ccc7a
--- /dev/null
+++ b/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
@@ -0,0 +1,29 @@
+## @file
+# Configure some PCDs dynamically
+#
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+
+[Defines]
+ INF_VERSION = 1.27
+ BASE_NAME = NetworkCfgLib
+ FILE_GUID = c81bfcf9-7dce-44f7-a9cb-be607f481a86
+ MODULE_TYPE = BASE
+ VERSION_STRING = 1.0
+ LIBRARY_CLASS = NULL
+ CONSTRUCTOR = SetNetworkingSupportPcds
+
+[Sources]
+ NetworkCfgLib.c
+
+[Packages]
+ MdePkg/MdePkg.dec
+ OvmfPkg/OvmfPkg.dec
+
+[LibraryClasses]
+ PcdLib
+ DebugLib
+ QemuFwCfgSimpleParserLib
+
+[Pcd]
+ gUefiOvmfPkgTokenSpaceGuid.PcdNetworkSupport ## SOMETIMES_PRODUCES
diff --git a/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c b/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
new file mode 100644
index 000000000000..e77198dbd4e4
--- /dev/null
+++ b/OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
@@ -0,0 +1,32 @@
+#include <Library/PcdLib.h>
+#include <Library/DebugLib.h>
+#include <Library/QemuFwCfgSimpleParserLib.h>
+
+RETURN_STATUS
+EFIAPI
+SetNetworkingSupportPcds (
+ VOID
+ )
+{
+ BOOLEAN FwCfgBool;
+ RETURN_STATUS Status;
+
+ DEBUG ((DEBUG_INFO, "[network] %a\n", __FUNCTION__));
+
+ Status = QemuFwCfgParseBool ("etc/networking", &FwCfgBool);
+ if (RETURN_ERROR (Status)) {
+ DEBUG ((DEBUG_INFO,
+ "[network] QemuFwCfgParseBool('etc/networking') failed, will return "
+ "SUCCESS and continue without overriding PcdNetworkSupport.\n"));
+ return RETURN_SUCCESS;
+ }
+ DEBUG ((DEBUG_INFO, "[network] etc/networking = %d\n", FwCfgBool));
+
+ Status = PcdSetBoolS (PcdNetworkSupport, FwCfgBool);
+ if (RETURN_ERROR (Status)) {
+ return Status;
+ }
+ DEBUG ((DEBUG_INFO, "[network] PcdNetworkSupport was set to %d\n", FwCfgBool));
+
+ return RETURN_SUCCESS;
+}
--
2.37.1.559.g78731f0fdb-goog
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH v1 2/2] OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net
2022-08-04 2:52 [PATCH v1 0/2] Add support to disable VirtIo net at runtime Yuan Yu
2022-08-04 2:52 ` [PATCH v1 1/2] OvmfPkg: Introduce NetworkCfgLib Yuan Yu
@ 2022-08-04 2:52 ` Yuan Yu
2022-08-04 5:55 ` [PATCH v1 0/2] Add support to disable VirtIo net at runtime Laszlo Ersek
2 siblings, 0 replies; 6+ messages in thread
From: Yuan Yu @ 2022-08-04 2:52 UTC (permalink / raw)
To: devel
Cc: Ard Biesheuvel, Jordan Justen, Laszlo Ersek, Anthony Perard,
Julien Grall
Enable/Disable VirtIo net based on the value of PcdNetworkSupport which
is controlled in NetworkCfgLib, which sets the PCD based on
"etc/networking" qemu file.
With this change, VMM can disable networking even if it is enabled at
compile time. This will allow to reduce attack surface by simply
providing an "etc/networking" value without having to recompile EDK2
completely.
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Anthony Perard <anthony.perard@citrix.com>
Cc: Julien Grall <julien@xen.org>
Signed-off-by: Yuan Yu <yuanyu@google.com>
---
OvmfPkg/OvmfPkgX64.dsc | 7 ++++++-
OvmfPkg/VirtioNetDxe/VirtioNet.inf | 3 +++
OvmfPkg/VirtioNetDxe/EntryPoint.c | 10 ++++++++++
3 files changed, 19 insertions(+), 1 deletion(-)
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
index 6e68f60dc90f..63cce9f65a95 100644
--- a/OvmfPkg/OvmfPkgX64.dsc
+++ b/OvmfPkg/OvmfPkgX64.dsc
@@ -686,6 +686,8 @@ [PcdsDynamicDefault]
gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000
!endif
+ gUefiOvmfPkgTokenSpaceGuid.PcdNetworkSupport|TRUE
+
[PcdsDynamicHii]
!include OvmfPkg/OvmfTpmPcdsHii.dsc.inc
@@ -953,7 +955,10 @@ [Components]
NULL|OvmfPkg/Library/TlsAuthConfigLib/TlsAuthConfigLib.inf
}
!endif
- OvmfPkg/VirtioNetDxe/VirtioNet.inf
+ OvmfPkg/VirtioNetDxe/VirtioNet.inf {
+ <LibraryClasses>
+ NULL|OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
+ }
#
# Usb Support
diff --git a/OvmfPkg/VirtioNetDxe/VirtioNet.inf b/OvmfPkg/VirtioNetDxe/VirtioNet.inf
index ada84ed5543b..37bcf13b7863 100644
--- a/OvmfPkg/VirtioNetDxe/VirtioNet.inf
+++ b/OvmfPkg/VirtioNetDxe/VirtioNet.inf
@@ -54,3 +54,6 @@ [Protocols]
gEfiSimpleNetworkProtocolGuid ## BY_START
gEfiDevicePathProtocolGuid ## BY_START
gVirtioDeviceProtocolGuid ## TO_START
+
+[Pcd]
+ gUefiOvmfPkgTokenSpaceGuid.PcdNetworkSupport ## CONSUMES
diff --git a/OvmfPkg/VirtioNetDxe/EntryPoint.c b/OvmfPkg/VirtioNetDxe/EntryPoint.c
index c3f41dab57bd..9bf220b9ade5 100644
--- a/OvmfPkg/VirtioNetDxe/EntryPoint.c
+++ b/OvmfPkg/VirtioNetDxe/EntryPoint.c
@@ -9,6 +9,8 @@
**/
+#include <PiDxe.h>
+
#include <Library/UefiLib.h>
#include "VirtioNet.h"
@@ -32,6 +34,14 @@ VirtioNetEntryPoint (
IN EFI_SYSTEM_TABLE *SystemTable
)
{
+ if (PcdGetBool (PcdNetworkSupport)) {
+ DEBUG ((DEBUG_INFO, "[network] %a - Networking enabled.\n", __FUNCTION__));
+ } else {
+ DEBUG ((DEBUG_INFO, "[network] %a - Networking disabled.\n", __FUNCTION__));
+
+ return EFI_REQUEST_UNLOAD_IMAGE;
+ }
+
return EfiLibInstallDriverBindingComponentName2 (
ImageHandle,
SystemTable,
--
2.37.1.559.g78731f0fdb-goog
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH v1 0/2] Add support to disable VirtIo net at runtime
2022-08-04 2:52 [PATCH v1 0/2] Add support to disable VirtIo net at runtime Yuan Yu
2022-08-04 2:52 ` [PATCH v1 1/2] OvmfPkg: Introduce NetworkCfgLib Yuan Yu
2022-08-04 2:52 ` [PATCH v1 2/2] OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net Yuan Yu
@ 2022-08-04 5:55 ` Laszlo Ersek
2022-08-04 9:58 ` [edk2-devel] " Ard Biesheuvel
2 siblings, 1 reply; 6+ messages in thread
From: Laszlo Ersek @ 2022-08-04 5:55 UTC (permalink / raw)
To: Yuan Yu, devel
Cc: Ard Biesheuvel, Jordan Justen, Anthony Perard, Julien Grall,
Gerd Hoffmann, Pawel Polawski, Oliver Steffen, Jiewen Yao
On 08/04/22 04:52, Yuan Yu wrote:
> Currently networking can only be enabled/disabled at compile time. This
> patch series will add support to disable VirtIo net at runtime even if
> the functionality is built into binary at compile time.
>
> This will enable VMM to reduce attack surface without recompilation.
>
> The changes can be seen at:
> https://github.com/yyu/edk2/tree/network_cfg_lib_v1
>
> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
> Cc: Jordan Justen <jordan.l.justen@intel.com>
> Cc: Laszlo Ersek <lersek@redhat.com>
> Cc: Anthony Perard <anthony.perard@citrix.com>
> Cc: Julien Grall <julien@xen.org>
>
> Yuan Yu (2):
> OvmfPkg: Introduce NetworkCfgLib
> OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net
>
> OvmfPkg/OvmfPkg.dec | 3 ++
> OvmfPkg/OvmfPkgX64.dsc | 7 ++++-
> OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf | 29 ++++++++++++++++++
> OvmfPkg/VirtioNetDxe/VirtioNet.inf | 3 ++
> OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c | 32 ++++++++++++++++++++
> OvmfPkg/VirtioNetDxe/EntryPoint.c | 10 ++++++
> 6 files changed, 83 insertions(+), 1 deletion(-)
> create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
> create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
>
Well I've not been reviewing upstream edk2 patches for a while, but the
virtio-net driver is still very close to my heart, so this patch kind of
hits a nerve.
I think I disagree with the idea and the implementation both.
Minimally, the idea needs a much better elaboration -- what is the
threat model? Do you want to protect the host from the guest, or the
guest from the host? Or something else? How does controlling a single
SNP driver via fw_cfg (which is also dictated by the host) help?
Regarding the implementation: there is much more to networking in edk2
than VirtioNetDxe. UEFI driver binaries (SNP drivers) built from iPXE
can be passed in via the NICs' option ROMs. SNP drivers can be loaded
from the UEFI system partition (for example, Intel's binary-only driver
for QEMU's e1000* cards).
If you can control this fw_cfg switch from the VMM side, you can also
control the VMM enough to simply *not give* a virtio-net device to the
guest. Then the driver (it being a UEFI driver following the UEFI driver
model) will simply not have anything to bind.
Sorry I find this approach very wrong. If you really need it for your
particular VMM, I kind of suggest not upstreaming this patch. I see it
as a step backwards for the upstream project.
Anyway: I emphasize I'm no longer a reviewer for OvmfPkg, and it's quite
exceptional that I'm reacting at all to being CC'd on this.
Laszlo
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [edk2-devel] [PATCH v1 0/2] Add support to disable VirtIo net at runtime
2022-08-04 5:55 ` [PATCH v1 0/2] Add support to disable VirtIo net at runtime Laszlo Ersek
@ 2022-08-04 9:58 ` Ard Biesheuvel
2022-08-04 10:54 ` Laszlo Ersek
0 siblings, 1 reply; 6+ messages in thread
From: Ard Biesheuvel @ 2022-08-04 9:58 UTC (permalink / raw)
To: edk2-devel-groups-io, Laszlo Ersek
Cc: Yuan Yu, Ard Biesheuvel, Jordan Justen, Anthony Perard,
Julien Grall, Gerd Hoffmann, Pawel Polawski, Oliver Steffen,
Jiewen Yao
On Thu, 4 Aug 2022 at 07:55, Laszlo Ersek <lersek@redhat.com> wrote:
>
> On 08/04/22 04:52, Yuan Yu wrote:
> > Currently networking can only be enabled/disabled at compile time. This
> > patch series will add support to disable VirtIo net at runtime even if
> > the functionality is built into binary at compile time.
> >
> > This will enable VMM to reduce attack surface without recompilation.
> >
> > The changes can be seen at:
> > https://github.com/yyu/edk2/tree/network_cfg_lib_v1
> >
> > Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
> > Cc: Jordan Justen <jordan.l.justen@intel.com>
> > Cc: Laszlo Ersek <lersek@redhat.com>
> > Cc: Anthony Perard <anthony.perard@citrix.com>
> > Cc: Julien Grall <julien@xen.org>
> >
> > Yuan Yu (2):
> > OvmfPkg: Introduce NetworkCfgLib
> > OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net
> >
> > OvmfPkg/OvmfPkg.dec | 3 ++
> > OvmfPkg/OvmfPkgX64.dsc | 7 ++++-
> > OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf | 29 ++++++++++++++++++
> > OvmfPkg/VirtioNetDxe/VirtioNet.inf | 3 ++
> > OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c | 32 ++++++++++++++++++++
> > OvmfPkg/VirtioNetDxe/EntryPoint.c | 10 ++++++
> > 6 files changed, 83 insertions(+), 1 deletion(-)
> > create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
> > create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
> >
>
> Well I've not been reviewing upstream edk2 patches for a while, but the
> virtio-net driver is still very close to my heart, so this patch kind of
> hits a nerve.
>
Welcome back old friend!
> I think I disagree with the idea and the implementation both.
>
> Minimally, the idea needs a much better elaboration -- what is the
> threat model? Do you want to protect the host from the guest, or the
> guest from the host? Or something else? How does controlling a single
> SNP driver via fw_cfg (which is also dictated by the host) help?
>
I have to confess that I was the one who suggested this approach to
Yuan internally, but mainly to get the discussion going, as I was
anticipating some pushback, just not from you :-)
'Reducing the attack surface' is probably not the most accurate
characterization of the purpose. We are simply looking for a way to
disable network boot from the vmm/host side without affecting
how/which network interfaces the guest exposes to the OS.
> Regarding the implementation: there is much more to networking in edk2
> than VirtioNetDxe. UEFI driver binaries (SNP drivers) built from iPXE
> can be passed in via the NICs' option ROMs. SNP drivers can be loaded
> from the UEFI system partition (for example, Intel's binary-only driver
> for QEMU's e1000* cards).
>
> If you can control this fw_cfg switch from the VMM side, you can also
> control the VMM enough to simply *not give* a virtio-net device to the
> guest. Then the driver (it being a UEFI driver following the UEFI driver
> model) will simply not have anything to bind.
>
Sure, but then the OS will lose networking as well. We just want to
remove the ability to network boot without impacting anything else
that relies on virtio-net
> Sorry I find this approach very wrong. If you really need it for your
> particular VMM, I kind of suggest not upstreaming this patch. I see it
> as a step backwards for the upstream project.
>
If there are better ways to achieve this, we're all ears, but I think
that having a PCD which could either be fixed at build and compiled
out completely, or be set via a NULL library resolution, or even be
wired to a menu option (using PcdsDynamicHii] is a rather low-impact
but flexible way to go about this.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [edk2-devel] [PATCH v1 0/2] Add support to disable VirtIo net at runtime
2022-08-04 9:58 ` [edk2-devel] " Ard Biesheuvel
@ 2022-08-04 10:54 ` Laszlo Ersek
0 siblings, 0 replies; 6+ messages in thread
From: Laszlo Ersek @ 2022-08-04 10:54 UTC (permalink / raw)
To: Ard Biesheuvel, edk2-devel-groups-io
Cc: Yuan Yu, Ard Biesheuvel, Jordan Justen, Anthony Perard,
Julien Grall, Gerd Hoffmann, Pawel Polawski, Oliver Steffen,
Jiewen Yao
On 08/04/22 11:58, Ard Biesheuvel wrote:
> On Thu, 4 Aug 2022 at 07:55, Laszlo Ersek <lersek@redhat.com> wrote:
>>
>> On 08/04/22 04:52, Yuan Yu wrote:
>>> Currently networking can only be enabled/disabled at compile time. This
>>> patch series will add support to disable VirtIo net at runtime even if
>>> the functionality is built into binary at compile time.
>>>
>>> This will enable VMM to reduce attack surface without recompilation.
>>>
>>> The changes can be seen at:
>>> https://github.com/yyu/edk2/tree/network_cfg_lib_v1
>>>
>>> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
>>> Cc: Jordan Justen <jordan.l.justen@intel.com>
>>> Cc: Laszlo Ersek <lersek@redhat.com>
>>> Cc: Anthony Perard <anthony.perard@citrix.com>
>>> Cc: Julien Grall <julien@xen.org>
>>>
>>> Yuan Yu (2):
>>> OvmfPkg: Introduce NetworkCfgLib
>>> OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net
>>>
>>> OvmfPkg/OvmfPkg.dec | 3 ++
>>> OvmfPkg/OvmfPkgX64.dsc | 7 ++++-
>>> OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf | 29 ++++++++++++++++++
>>> OvmfPkg/VirtioNetDxe/VirtioNet.inf | 3 ++
>>> OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c | 32 ++++++++++++++++++++
>>> OvmfPkg/VirtioNetDxe/EntryPoint.c | 10 ++++++
>>> 6 files changed, 83 insertions(+), 1 deletion(-)
>>> create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.inf
>>> create mode 100644 OvmfPkg/Library/NetworkCfgLib/NetworkCfgLib.c
>>>
>>
>> Well I've not been reviewing upstream edk2 patches for a while, but the
>> virtio-net driver is still very close to my heart, so this patch kind of
>> hits a nerve.
>>
>
> Welcome back old friend!
>
>> I think I disagree with the idea and the implementation both.
>>
>> Minimally, the idea needs a much better elaboration -- what is the
>> threat model? Do you want to protect the host from the guest, or the
>> guest from the host? Or something else? How does controlling a single
>> SNP driver via fw_cfg (which is also dictated by the host) help?
>>
>
> I have to confess that I was the one who suggested this approach to
> Yuan internally, but mainly to get the discussion going, as I was
> anticipating some pushback, just not from you :-)
Heh, sorry about that :)
>
> 'Reducing the attack surface' is probably not the most accurate
> characterization of the purpose. We are simply looking for a way to
> disable network boot from the vmm/host side without affecting
> how/which network interfaces the guest exposes to the OS.
>
>> Regarding the implementation: there is much more to networking in edk2
>> than VirtioNetDxe. UEFI driver binaries (SNP drivers) built from iPXE
>> can be passed in via the NICs' option ROMs. SNP drivers can be loaded
>> from the UEFI system partition (for example, Intel's binary-only driver
>> for QEMU's e1000* cards).
>>
>> If you can control this fw_cfg switch from the VMM side, you can also
>> control the VMM enough to simply *not give* a virtio-net device to the
>> guest. Then the driver (it being a UEFI driver following the UEFI driver
>> model) will simply not have anything to bind.
>>
>
> Sure, but then the OS will lose networking as well. We just want to
> remove the ability to network boot without impacting anything else
> that relies on virtio-net
>
>> Sorry I find this approach very wrong. If you really need it for your
>> particular VMM, I kind of suggest not upstreaming this patch. I see it
>> as a step backwards for the upstream project.
>>
>
> If there are better ways to achieve this, we're all ears, but I think
> that having a PCD which could either be fixed at build and compiled
> out completely, or be set via a NULL library resolution, or even be
> wired to a menu option (using PcdsDynamicHii] is a rather low-impact
> but flexible way to go about this.
How about using PCDs, but at a higher level in the edk2 network stack
(regardless of the SNP driver(s) used)?
Not that I'm a huge fan of them, but we already have PcdIPv4PXESupport
and PcdIPv6PXESupport, and they can be set for OVMF and ArmVirtQemu via
fw_cfg. If both PCDs are "PXE_DISABLED" (0), then
PxeBcDriverEntryPoint() [NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c] exits
early. See:
- https://bugzilla.tianocore.org/show_bug.cgi?id=1695
- https://bugzilla.tianocore.org/show_bug.cgi?id=2681
So that's at least "prior art".
If similar PCDs could be introduced for other kinds of network boot (I
think there's only HTTP(S)v[46] to speak of [*]), i.e. in
"NetworkPkg.dec", then I guess setting those from fw_cfg in ArmVirtQemu
and OVMF could be fine. I assume HttpBootDxe would be the driver to
short-circuit.
[*] Hmm, maybe not just that. Do we consider booting off an iSCSI device
"network boot"? Perhaps where you want to "cut the stack" is
Ip4Dxe/Ip6Dxe. Prior art with PXE does suggest PCDs for the higher-level
network boot drivers.
Laszlo
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2022-08-04 10:54 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-08-04 2:52 [PATCH v1 0/2] Add support to disable VirtIo net at runtime Yuan Yu
2022-08-04 2:52 ` [PATCH v1 1/2] OvmfPkg: Introduce NetworkCfgLib Yuan Yu
2022-08-04 2:52 ` [PATCH v1 2/2] OvmfPkg: Use PcdNetworkSupport to enable/disable VirtIo net Yuan Yu
2022-08-04 5:55 ` [PATCH v1 0/2] Add support to disable VirtIo net at runtime Laszlo Ersek
2022-08-04 9:58 ` [edk2-devel] " Ard Biesheuvel
2022-08-04 10:54 ` Laszlo Ersek
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox