public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Laszlo Ersek" <lersek@redhat.com>
To: Bret Barkelew <Bret.Barkelew@microsoft.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>,
	"michael.kubacki@outlook.com" <michael.kubacki@outlook.com>
Cc: Jordan Justen <jordan.l.justen@intel.com>,
	Ard Biesheuvel <ard.biesheuvel@arm.com>
Subject: Re: [EXTERNAL] Re: [edk2-devel] [PATCH v3 05/14] OvmfPkg: Add VariablePolicy engine to OvmfPkg platform
Date: Mon, 25 May 2020 20:02:18 +0200	[thread overview]
Message-ID: <c125cd18-0dd4-4037-bca5-21730f6f4c07@redhat.com> (raw)
In-Reply-To: <CY4PR21MB074307E6FED6B5AA778DCBD8EFB40@CY4PR21MB0743.namprd21.prod.outlook.com>

Hi Bret,

On 05/23/20 00:35, Bret Barkelew wrote:
> 'Maybe you entirely missed my message that I posted in response to
> version 2 of this specific patch (i.e. you may have fully missed the
> message I link at the top). That could be the case because I mentioned
> "OvmfXen.dsc" under the v2 blurb as well.'
>
> Yup. That's the one. Saw this request, but not the patch feedback.
> Will address in the next version.

Thanks.

> You want the PCD dropped just for Xen?

No; I'd like it to be removed from all ArmVirtPkg and OvmfPkg DSC files.

>
> I would posit that dropping it for all of OVMF would negate the
> ability to use the unittest test to confirm the functionality in CI,
> which is something I would like to light up in future revisions, so I
> would need to hear the argument against it.

I spelled it out in the message you missed:

http://mid.mail-archive.com/a0e0e3d4-6712-078a-4d95-29408109b0b0@redhat.com
https://edk2.groups.io/g/devel/message/59271

To summarize briefly, the wiki page relating to this feature makes the
valid general argument that the PCD default should be secure. And that
applies specifically to the ArmVirtPkg and OvmfPkg platforms as well;
their upstream DSC files too should be as production-ready as possible.

Regarding the CI tests, I addressed them in the same message. I named
two options. One, we can build OVMF (specifically in the CI system too)
with the "--pcd" build option, to override the PCD from the DEC default.
Two, if we want just one binary, and override the PCD at boot time
(rather than at build time), we can do that as well, with a bit more
work -- make the PCD dynamic-access, and put a recently introduced
OvmfPkg and ArmVirtPkg feature (from TianoCore#2681) to use, for letting
users change the dynamic boolean PCD from the QEMU command line.

Hm... I can in fact quote it for you:

> Now, I realize that people might want to set this PCD to TRUE in OVMF,
> for testing various things. Maybe the unit tests / functional tests
> introduced in this series even *depend* on the PCD being TRUE (I can't
> tell, I haven't checked). That's OK; for accommodating that, we have
> two options:
>
> (2a) build OVMF with the appropriate --pcd=... switch passed to
>      "build",
>
> (2b) for controlling the PCD dynamically (on the QEMU command line):
>
> - the PCD would have permit the dynamic access method in the DEC file,
>
> - the modules consuming the PCD would have to do so in their entry
>   point functions / library constructors, and use the cached copy
>   thenceforth,
>
> - the OVMF DSC files would have to get a dynamic default (value
>   FALSE),
>
> - and OVMF would need another NULL class library for setting the PCD
>   from fw_cfg. Please refer to
>   <https://bugzilla.tianocore.org/show_bug.cgi?id=2681> for details on
>   that.

Thanks
Laszlo


  reply	other threads:[~2020-05-25 18:02 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20200521224331.15616-1-michael.kubacki@outlook.com>
2020-05-21 22:43 ` [PATCH v3 01/14] MdeModulePkg: Define the VariablePolicy protocol interface Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 02/14] MdeModulePkg: Define the VariablePolicyLib Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 03/14] MdeModulePkg: Define the VariablePolicyHelperLib Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 04/14] MdeModulePkg: Define the VarCheckPolicyLib and SMM interface Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 05/14] OvmfPkg: Add VariablePolicy engine to OvmfPkg platform Michael Kubacki
2020-05-22 21:41   ` [edk2-devel] " Laszlo Ersek
2020-05-22 22:35     ` [EXTERNAL] " Bret Barkelew
2020-05-25 18:02       ` Laszlo Ersek [this message]
2020-05-21 22:43 ` [PATCH v3 06/14] EmulatorPkg: Add VariablePolicy engine to EmulatorPkg platform Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 07/14] ArmVirtPkg: Add VariablePolicy engine to ArmVirtPkg platform Michael Kubacki
2020-05-22 21:47   ` [edk2-devel] " Laszlo Ersek
2020-05-21 22:43 ` [PATCH v3 08/14] UefiPayloadPkg: Add VariablePolicy engine to UefiPayloadPkg platform Michael Kubacki
2020-05-22  0:29   ` [edk2-devel] " Ma, Maurice
2020-05-21 22:43 ` [PATCH v3 09/14] MdeModulePkg: Connect VariablePolicy business logic to VariableServices Michael Kubacki
2020-05-22 20:29   ` [edk2-devel] " Laszlo Ersek
2020-05-21 22:43 ` [PATCH v3 10/14] MdeModulePkg: Allow VariablePolicy state to delete protected variables Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 11/14] SecurityPkg: Allow VariablePolicy state to delete authenticated variables Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 12/14] MdeModulePkg: Change TCG MOR variables to use VariablePolicy Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 13/14] MdeModulePkg: Drop VarLock from RuntimeDxe variable driver Michael Kubacki
2020-05-21 22:43 ` [PATCH v3 14/14] MdeModulePkg: Add a shell-based functional test for VariablePolicy Michael Kubacki

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c125cd18-0dd4-4037-bca5-21730f6f4c07@redhat.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox