[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ImageBuilder v2] uboot-script-gen: add xen xsm policy loading support


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Tue, 15 Apr 2025 07:01:29 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ed65JedvtLixGMrjW7VTHPtzpGPSaax4H5aGaB13iL8=; b=DHFDAikZ1TREnnO+SgGkYdTxrfPds6hluL0qtpV6Av+ZqKdprEWh5JIeGqh5+pR4vsopP9Ia8yAJq+c5EeiR2AsGYQnaXkMemlV+/I1B4YlVCC9hoVXb3ZGY67HFVoI45vLR/bkJf20Pd55MdEOTes0JhU0bjj7PbHb1z4XQFKFJ9oNpOBMEGzD2A4JX+bMcdnVGQEnT0EvCA7C4DrTms465KI7/MtdME04PkfYAmTmOpV/5cuhcvogKroyNOrBoQl3k+NhOxgbHDdcKCvevNFv+RcrWCsLx6SN1oHdGDLMcSA5b4Yxuz0Y2ujhhWjYwJ+RwbLEUKTSLof/sr4Ijtw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=qFuYu+mJ3TNgxWIPAu1pgtw4VyVNQSKm7IvOIdRc3o9Tt3Y6quHV3ZswYoWUUPOiR9gkBJZAyep8Cs2qBHZFiOaPrqEhenAxFX2JhOzop+6kkltYG5gEIY+VAfPx9nEBn/A+1fddf86n5Sv+bhIMnizeSmynjQAirk5eyFug9dSAWbpHLBYP80Z98BR4Kiu+k/IYWw+osTC3JJ3RbKKukfd12tJ9b7fmVRMYqmvNtdB4fqQyVOfVMd9sZOPmAsi4doy+XRMQMhhENPjR5kHhahrea+Zi9Xeo+LB3vW33sANSTULqxtKwA0SMsMq28VsnXL+KP+PLIvJhMctpqw0jew==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Oleksandr Tyshchenko <Oleksandr_Tyshchenko@xxxxxxxx>, Alejandro Vallejo <agarciav@xxxxxxx>, Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Delivery-date: Tue, 15 Apr 2025 07:01:45 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHbrdQ23X0WxR72F0K7gBcSDAVLlQ==
  • Thread-topic: [ImageBuilder v2] uboot-script-gen: add xen xsm policy loading support

From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

This patch adds Xen XSM policy loading support.

The configuration file XEN_POLICY specifies Xen hypervisor
XSM policy binary to load.

Signed-off-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
---
changes in v2:
- fix conditional statements for XEN_POLICY
- add XSM policy binary check

 README.md                |  2 ++
 scripts/uboot-script-gen | 34 ++++++++++++++++++++++++++++++++++
 2 files changed, 36 insertions(+)

diff --git a/README.md b/README.md
index 137abef153ce..9106d2a07302 100644
--- a/README.md
+++ b/README.md
@@ -91,6 +91,8 @@ Where:
 - XEN specifies the Xen hypervisor binary to load. Note that it has to
   be a regular Xen binary, not a u-boot binary.
 
+- XEN_POLICY specifies the Xen hypervisor XSM policy binary to load.
+
 - XEN_COLORS specifies the colors (cache coloring) to be used for Xen
   and is in the format startcolor-endcolor
 
diff --git a/scripts/uboot-script-gen b/scripts/uboot-script-gen
index c4d26caf5e0e..208eafdecfeb 100755
--- a/scripts/uboot-script-gen
+++ b/scripts/uboot-script-gen
@@ -315,6 +315,15 @@ function xen_device_tree_editing()
     dt_set "/chosen" "#size-cells" "hex" "0x2"
     dt_set "/chosen" "xen,xen-bootargs" "str" "$XEN_CMD"
 
+    if test -n "$XEN_POLICY" && test "$xen_policy_addr" != "-"
+    then
+        local node_name="xen-policy@${xen_policy_addr#0x}"
+
+        dt_mknode "/chosen" "$node_name"
+        dt_set "/chosen/$node_name" "compatible" "str_a" "xen,xsm-policy 
xen,multiboot-module multiboot,module"
+        dt_set "/chosen/$node_name" "reg" "hex" "$(split_addr_size 
$xen_policy_addr $xen_policy_size)"
+    fi
+
     if test "$DOM0_KERNEL"
     then
         local node_name="dom0@${dom0_kernel_addr#0x}"
@@ -900,6 +909,15 @@ xen_file_loading()
     kernel_addr=$memaddr
     kernel_path=$XEN
     load_file "$XEN" "host_kernel"
+
+    xen_policy_addr="-"
+    if test -n "$XEN_POLICY"
+    then
+        check_file_type "${XEN_POLICY}" "SE Linux policy"
+        xen_policy_addr=$memaddr
+        load_file "$XEN_POLICY" "xen_policy"
+        xen_policy_size=$filesize
+    fi
 }
 
 linux_file_loading()
@@ -939,6 +957,22 @@ bitstream_load_and_config()
 
 create_its_file_xen()
 {
+    if test -n "$XEN_POLICY" && test "$xen_policy_addr" != "-"
+    then
+        cat >> "$its_file" <<- EOF
+        xen_policy {
+            description = "Xen XSM policy binary";
+            data = /incbin/("$XEN_POLICY");
+            type = "kernel";
+            arch = "arm64";
+            os = "linux";
+            compression = "none";
+            load = <$xen_policy_addr>;
+            $fit_algo
+        };
+       EOF
+    fi
+
     if test "$DOM0_KERNEL"
     then
         if test "$ramdisk_addr" != "-"
-- 
2.34.1



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.