|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen/efi: Fix Grub2 boot on arm64
On Tue, 2 Nov 2021, Luca Fancellu wrote:
> The code introduced by commit a1743fc3a9fe9b68c265c45264dddf214fd9b882
> ("arm/efi: Use dom0less configuration when using EFI boot") is
> introducing a problem to boot Xen using Grub2 on ARM machine using EDK2.
>
> The problem comes from the function get_parent_handle(...) that inside
> uses the HandleProtocol on loaded_image->DeviceHandle, but the last
> is NULL, making Xen stop the UEFI boot.
>
> Before the commit above, the function was never called because the
> logic was skipping the call when there were multiboot modules in the
> DT because the filesystem was never used and the bootloader had
> put in place all the right modules in memory and the addresses
> in the DT.
>
> To fix the problem we allow the get_parent_handle(...) function to
> return a NULL handle on error and we check the usage of the function
> to handle the new use case. The function in fact should not prevent
> the boot even if the filesystem can't be used, because the DT and
> the modules could be put in place by the bootloader before running
> Xen and if xen,uefi-binary property is not used, there is no need
> for the filesystem.
>
> Another problem is found when the UEFI stub tries to check if Dom0
> image or DomUs are present.
> The logic doesn't work when the UEFI stub is not responsible to load
> any modules, so the efi_check_dt_boot(...) return value is modified
> to return the number of multiboot module found and not only the number
> of module loaded by the stub.
>
> Fixes: a1743fc3a9 ("arm/efi: Use dom0less configuration when using EFI boot")
> Signed-off-by: Luca Fancellu <luca.fancellu@xxxxxxx>
> ---
> Justification for integration in 4.16:
> Upside: allow booting xen from grub on arm64 when the stub doesn't load
> any module.
> Downside: It's affecting the EFI boot path.
> Risk: It's not affecting x86 arch that works the same way as before.
> If something is wrong it creates a problem on early boot and not at
> runtime, so risk is low.
>
> Tested in this configurations:
> - Bootloader loads modules and specify them as multiboot modules in DT:
> * combination of Dom0, DomUs, Dom0 and DomUs
> - DT specifies multiboot modules in DT using xen,uefi-binary property:
> * combination of Dom0, DomUs, Dom0 and DomUs
> - Bootloader loads a Dom0 module and appends it as multiboot module in DT,
> other multiboot modules are listed for DomUs using xen,uefi-binary
> - No multiboot modules in DT and no kernel entry in cfg file:
> * proper error thrown
>
> ---
> xen/arch/arm/efi/efi-boot.h | 28 ++++++++++++++++++----------
> xen/common/efi/boot.c | 15 ++++++++++++++-
> 2 files changed, 32 insertions(+), 11 deletions(-)
>
> diff --git a/xen/arch/arm/efi/efi-boot.h b/xen/arch/arm/efi/efi-boot.h
> index 8b88dd26a5..e714b2b44c 100644
> --- a/xen/arch/arm/efi/efi-boot.h
> +++ b/xen/arch/arm/efi/efi-boot.h
> @@ -51,9 +51,11 @@ static int handle_module_node(EFI_FILE_HANDLE dir_handle,
> int module_node_offset,
> int reg_addr_cells,
> int reg_size_cells,
> - bool is_domu_module);
> + bool is_domu_module,
> + unsigned int *modules_found);
> static int handle_dom0less_domain_node(EFI_FILE_HANDLE dir_handle,
> - int domain_node);
> + int domain_node,
> + unsigned int *modules_found);
> static int efi_check_dt_boot(EFI_FILE_HANDLE dir_handle);
>
> #define DEVICE_TREE_GUID \
> @@ -707,7 +709,8 @@ static int __init handle_module_node(EFI_FILE_HANDLE
> dir_handle,
> int module_node_offset,
> int reg_addr_cells,
> int reg_size_cells,
> - bool is_domu_module)
> + bool is_domu_module,
> + unsigned int *modules_found)
> {
> const void *uefi_name_prop;
> char mod_string[24]; /* Placeholder for module@ + a 64-bit number + \0 */
> @@ -725,6 +728,9 @@ static int __init handle_module_node(EFI_FILE_HANDLE
> dir_handle,
> /* Module is not a multiboot,module */
> return 0;
>
> + /* Count the multiboot module as found */
> + (*modules_found)++;
> +
> /* Read xen,uefi-binary property to get the file name. */
> uefi_name_prop = fdt_getprop(fdt, module_node_offset, "xen,uefi-binary",
> &uefi_name_len);
> @@ -804,7 +810,8 @@ static int __init handle_module_node(EFI_FILE_HANDLE
> dir_handle,
> * Returns 0 on success, negative number on error.
> */
> static int __init handle_dom0less_domain_node(EFI_FILE_HANDLE dir_handle,
> - int domain_node)
> + int domain_node,
> + unsigned int *modules_found)
> {
> int module_node, addr_cells, size_cells, len;
> const struct fdt_property *prop;
> @@ -834,7 +841,7 @@ static int __init
> handle_dom0less_domain_node(EFI_FILE_HANDLE dir_handle,
> module_node = fdt_next_subnode(fdt, module_node) )
> {
> int ret = handle_module_node(dir_handle, module_node, addr_cells,
> - size_cells, true);
> + size_cells, true, modules_found);
> if ( ret < 0 )
> return ret;
> }
> @@ -845,12 +852,12 @@ static int __init
> handle_dom0less_domain_node(EFI_FILE_HANDLE dir_handle,
> /*
> * This function checks for xen domain nodes under the /chosen node for
> possible
> * dom0 and domU guests to be loaded.
> - * Returns the number of modules loaded or a negative number for error.
> + * Returns the number of multiboot modules found or a negative number for
> error.
> */
> static int __init efi_check_dt_boot(EFI_FILE_HANDLE dir_handle)
> {
> int chosen, node, addr_len, size_len;
> - unsigned int i = 0;
> + unsigned int i = 0, modules_found = 0;
>
> /* Check for the chosen node in the current DTB */
> chosen = setup_chosen_node(fdt, &addr_len, &size_len);
> @@ -868,11 +875,12 @@ static int __init efi_check_dt_boot(EFI_FILE_HANDLE
> dir_handle)
> if ( !fdt_node_check_compatible(fdt, node, "xen,domain") )
> {
> /* Found a node with compatible xen,domain; handle this node. */
> - if ( handle_dom0less_domain_node(dir_handle, node) < 0 )
> + if ( handle_dom0less_domain_node(dir_handle, node,
> + &modules_found) < 0 )
> return ERROR_DT_MODULE_DOMU;
> }
> else if ( handle_module_node(dir_handle, node, addr_len, size_len,
> - false) < 0 )
> + false, &modules_found) < 0 )
> return ERROR_DT_MODULE_DOM0;
I think there is no need to add modules_found to the parameters of
handle_dom0less_domain_node and handle_module_node. You could just
increment modules_found here for every iteration of the loop where
there is no error. You would have to change a couple of returns in
handle_module_node, just to give you the idea:
diff --git a/xen/arch/arm/efi/efi-boot.h b/xen/arch/arm/efi/efi-boot.h
index e714b2b44c..7739789c41 100644
--- a/xen/arch/arm/efi/efi-boot.h
+++ b/xen/arch/arm/efi/efi-boot.h
@@ -726,7 +726,7 @@ static int __init handle_module_node(EFI_FILE_HANDLE
dir_handle,
if ( module_compat != 0 )
/* Module is not a multiboot,module */
- return 0;
+ return 1;
/* Count the multiboot module as found */
(*modules_found)++;
@@ -737,7 +737,7 @@ static int __init handle_module_node(EFI_FILE_HANDLE
dir_handle,
if ( !uefi_name_prop )
/* Property not found */
- return 0;
+ return 1;
file_idx = get_module_file_index(uefi_name_prop, uefi_name_len);
if ( file_idx < 0 )
> }
>
> @@ -883,7 +891,7 @@ static int __init efi_check_dt_boot(EFI_FILE_HANDLE
> dir_handle)
> efi_bs->FreePool(modules[i].name);
> }
>
> - return modules_idx;
> + return modules_found;
> }
>
> static void __init efi_arch_cpu(void)
> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
> index 392ff3ac9b..495e7a4096 100644
> --- a/xen/common/efi/boot.c
> +++ b/xen/common/efi/boot.c
> @@ -449,6 +449,13 @@ static EFI_FILE_HANDLE __init
> get_parent_handle(EFI_LOADED_IMAGE *loaded_image,
> CHAR16 *pathend, *ptr;
> EFI_STATUS ret;
>
> + /*
> + * If DeviceHandle is NULL, we can't use the SIMPLE_FILE_SYSTEM_PROTOCOL
> + * to have access to the filesystem.
> + */
> + if ( !loaded_image->DeviceHandle )
> + return NULL;
> +
> do {
> EFI_FILE_IO_INTERFACE *fio;
>
> @@ -581,6 +588,8 @@ static bool __init read_file(EFI_FILE_HANDLE dir_handle,
> CHAR16 *name,
> EFI_STATUS ret;
> const CHAR16 *what = NULL;
>
> + if ( !dir_handle )
> + blexit(L"Error: No access to the filesystem");
> if ( !name )
> PrintErrMesg(L"No filename", EFI_OUT_OF_RESOURCES);
> ret = dir_handle->Open(dir_handle, &FileHandle, name,
> @@ -1333,6 +1342,9 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
> *SystemTable)
> EFI_FILE_HANDLE handle = get_parent_handle(loaded_image,
> &file_name);
>
> + if ( !handle )
> + blexit(L"Error retrieving image name: no filesystem access");
I think it would be nice to have an other explicit check like this one
at the beginning of if ( use_cfg_file ) to make sure dir_handle is not
null in that case. If I am not mistaken, if we take the use_cfg_file
path, dir_handle has to be valid, right?
> handle->Close(handle);
> *argv = file_name;
> }
> @@ -1369,7 +1381,8 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE
> *SystemTable)
> /* Get the number of boot modules specified on the DT or an error (<0) */
> dt_modules_found = efi_check_dt_boot(dir_handle);
>
> - dir_handle->Close(dir_handle);
> + if ( dir_handle )
> + dir_handle->Close(dir_handle);
>
> if ( dt_modules_found < 0 )
> /* efi_check_dt_boot throws some error */
> --
> 2.17.1
>
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |