[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH v2 1/1] kern/xen: Add Xen command line parsing
Xen traditionally allows customizing guest behavior by passing arguments to the VM kernel via the kernel command line. This is no longer possible when using GRUB with Xen, as the kernel command line is decided by the GRUB configuration file within the guest, not data passed to the guest by Xen. To work around this limitation, enable GRUB to parse a command line passed to it by Xen, and expose data from the command line to the GRUB configuration as environment variables. These variables can be used in the GRUB configuration for any desired purpose, such as extending the kernel command line passed to the guest. The command line format is inspired by the Linux kernel's command line format. To reduce the risk of misuse, abuse, or accidents in production, the command line will only be parsed if it consists entirely of 7-bit ASCII characters, only alphabetical characters and underscores are permitted in variable names, and all variable names must start with the string "xen_grub_env_". This also allows room for expanding the command line arguments accepted by GRUB in the future, in case additional APIs using the Xen kernel command line need to be introduced. Signed-off-by: Aaron Rainbolt <arraybolt3@xxxxxxxxx> --- docs/grub.texi | 50 +++++ grub-core/Makefile.core.def | 2 + grub-core/kern/i386/xen/pvh.c | 14 ++ grub-core/kern/main.c | 12 ++ grub-core/kern/xen/cmdline.c | 344 ++++++++++++++++++++++++++++++++++ include/grub/xen.h | 2 + 6 files changed, 424 insertions(+) create mode 100644 grub-core/kern/xen/cmdline.c diff --git a/docs/grub.texi b/docs/grub.texi index 34b3484..ce82483 100644 --- a/docs/grub.texi +++ b/docs/grub.texi @@ -3271,6 +3271,7 @@ GRUB. Others may be used freely in GRUB configuration files. @menu * Special environment variables:: * Environment block:: +* Passing environment variables through Xen:: @end menu @@ -3871,6 +3872,55 @@ using BIOS or EFI functions (no ATA, USB or IEEE1275). @command{grub-mkconfig} uses this facility to implement @samp{GRUB_SAVEDEFAULT} (@pxref{Simple configuration}). +@node Passing environment variables through Xen +@section Passing environment variables through Xen + +If you are using a GRUB image as the kernel for a PV or PVH Xen virtual +machine, you can pass environment variables from Xen's dom0 to the VM through +the Xen-provided kernel command line. When combined with a properly configured +guest, this can be used to customize the guest's behavior on bootup via the +VM's Xen configuration file. + +GRUB will parse the kernel command line passed to it by Xen during bootup. +The command line will be split into space-delimited words. Single and +double quotes may be used to quote words or portions of words that contain +spaces. Arbitrary characters may be backslash-escaped to make them a literal +component of a word rather than being parsed as quotes or word separators. The +command line must consist entirely of printable 7-bit ASCII characters and +spaces. If a non-printing ASCII character is found anywhere in the command +line, the entire command line will be ignored by GRUB. + +Each word should be a variable assignment in the format ``variable'' or +``variable=value''. Variable names must contain only the characters A-Z, a-z, +and underscore (``_''). Variable names must begin with the string +``xen_grub_env_''. Variable values can contain arbitrary printable 7-bit +ASCII characters and space. If any variable contains an illegal name, that +variable will be ignored. + +If a variable name and value are both specified, the variable will be set to +the specified value. If only a variable name is specified, the variable's +value will be set to ``1''. + +The following is a simple example of how to use this functionality to append +arbitrary variables to a guest's kernel command line: + +@example +# In the Xen configuration file for the guest +name = "linux_vm" +type = "pvh" +kernel = "/path/to/grub-i386-xen_pvh.bin" +extra = "xen_grub_env_kernelappend='loglevel=3'" +memory = 1024 +disk = [ "file:/srv/vms/linux_vm.img,sda,w" ] + +# In the guest's GRUB configuration file +menuentry "Linux VM with dom0-specified kernel parameters" @{ + search --set=root --label linux_vm --hint hd0,msdos1 + linux /boot/vmlinuz root=LABEL=linux_vm $@{xen_grub_env_kernelappend@} + initrd /boot/initrd.img +@} +@end example + @node Modules @chapter Modules diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def index f70e02e..79e681a 100644 --- a/grub-core/Makefile.core.def +++ b/grub-core/Makefile.core.def @@ -248,6 +248,7 @@ kernel = { xen = term/xen/console.c; xen = disk/xen/xendisk.c; xen = commands/boot.c; + xen = kern/xen/cmdline.c; i386_xen_pvh = commands/boot.c; i386_xen_pvh = disk/xen/xendisk.c; @@ -255,6 +256,7 @@ kernel = { i386_xen_pvh = kern/i386/xen/tsc.c; i386_xen_pvh = kern/i386/xen/pvh.c; i386_xen_pvh = kern/xen/init.c; + i386_xen_pvh = kern/xen/cmdline.c; i386_xen_pvh = term/xen/console.c; ia64_efi = kern/ia64/efi/startup.S; diff --git a/grub-core/kern/i386/xen/pvh.c b/grub-core/kern/i386/xen/pvh.c index 91fbca8..12df2d8 100644 --- a/grub-core/kern/i386/xen/pvh.c +++ b/grub-core/kern/i386/xen/pvh.c @@ -321,6 +321,8 @@ void grub_xen_setup_pvh (void) { grub_addr_t par; + const char *xen_cmdline; + int i; grub_xen_cpuid_base (); grub_xen_setup_hypercall_page (); @@ -352,6 +354,18 @@ grub_xen_setup_pvh (void) grub_xen_mm_init_regions (); grub_rsdp_addr = pvh_start_info->rsdp_paddr; + + xen_cmdline = (const char *) pvh_start_info->cmdline_paddr; + for (i = 0; i < MAX_GUEST_CMDLINE; i++) + { + if (xen_cmdline[i] == '\0') + { + grub_strncpy ((char *) grub_xen_start_page_addr->cmd_line, + (char *) pvh_start_info->cmdline_paddr, + MAX_GUEST_CMDLINE); + break; + } + } } grub_err_t diff --git a/grub-core/kern/main.c b/grub-core/kern/main.c index 143a232..f96b16f 100644 --- a/grub-core/kern/main.c +++ b/grub-core/kern/main.c @@ -40,6 +40,10 @@ static bool cli_disabled = false; static bool cli_need_auth = false; +#if defined (GRUB_MACHINE_XEN) || defined (GRUB_MACHINE_XEN_PVH) +#include <grub/xen.h> +#endif + grub_addr_t grub_modules_get_end (void) { @@ -351,6 +355,14 @@ grub_main (void) grub_env_export ("root"); grub_env_export ("prefix"); + /* + * Parse command line parameters from Xen and export them as environment + * variables + */ +#if defined (GRUB_MACHINE_XEN) || defined (GRUB_MACHINE_XEN_PVH) + grub_parse_xen_cmdline (); +#endif + /* Reclaim space used for modules. */ reclaim_module_space (); diff --git a/grub-core/kern/xen/cmdline.c b/grub-core/kern/xen/cmdline.c new file mode 100644 index 0000000..8d3422d --- /dev/null +++ b/grub-core/kern/xen/cmdline.c @@ -0,0 +1,344 @@ +/* + * GRUB -- GRand Unified Bootloader + * Copyright (C) 2025 Free Software Foundation, Inc. + * + * GRUB is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GRUB is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GRUB. If not, see <http://www.gnu.org/licenses/>. + */ + +#include <grub/env.h> +#include <grub/misc.h> +#include <grub/mm.h> +#include <grub/xen.h> + +enum parse_flags +{ + PARSER_HIT_BACKSLASH = 0x1, + PARSER_IN_SINGLE_QUOTES = 0x2, + PARSER_IN_DOUBLE_QUOTES = 0x4, +}; + +#define PARSER_BASE_WORD_LEN 16 + +static grub_size_t word_list_len; +static char **word_list; +static grub_size_t current_word_len; +static grub_size_t current_word_pos; +static char *current_word; +static char current_char; + +static bool +append_char_to_word (bool allow_null) +{ + /* + * Fail if the current char is outside of the range 0x20 to 0x7E. If + * allow_null is true, make an exception for 0x00. This is a safeguard + * against likely-invalid data. + */ + if ( (!(current_char >= 0x20) || !(current_char <= 0x7E) ) + && (current_char != '\0' || allow_null == false)) + return false; + + if (current_word_pos == current_word_len) + { + current_word_len *= 2; + current_word = grub_realloc (current_word, current_word_len); + if (current_word == NULL) + { + current_word_len /= 2; + return false; + } + } + + current_word[current_word_pos] = current_char; + current_word_pos++; + return true; +} + +static bool +append_word_to_list (void) +{ + /* No-op on empty words. */ + if (current_word_pos == 0) + return true; + + current_char = '\0'; + if (append_char_to_word (true) == false) + { + grub_error (GRUB_ERR_BUG, + "couldn't append null terminator to word during Xen cmdline parsing"); + grub_print_error (); + grub_exit (); + } + + current_word_len = grub_strlen (current_word) + 1; + current_word = grub_realloc (current_word, current_word_len); + if (current_word == NULL) + return false; + word_list_len++; + word_list = grub_realloc (word_list, word_list_len * sizeof (char *)); + if (word_list == NULL) + return false; + word_list[word_list_len - 1] = current_word; + + current_word_len = PARSER_BASE_WORD_LEN; + current_word_pos = 0; + current_word = grub_malloc (current_word_len); + if (current_word == NULL) + return false; + + return true; +} + +static bool +check_key_is_safe (char *key, grub_size_t len) +{ + grub_size_t i; + + for (i = 0; i < len; i++) + { + /* + * Ensure only a-z, A-Z, and _ are allowed. + */ + if (! ( (key[i] >= 'A' && key[i] <= 'Z') + || (key[i] >= 'a' && key[i] <= 'z') + || (key[i] == '_') ) ) + return false; + } + return true; +} + +void +grub_parse_xen_cmdline (void) +{ + const char *cmdline = (const char *) grub_xen_start_page_addr->cmd_line; + bool cmdline_valid = false; + char **param_keys = NULL; + char **param_vals = NULL; + grub_size_t param_dict_len = 0; + grub_size_t param_dict_pos = 0; + enum parse_flags parse_flags = 0; + grub_size_t i = 0; + + /* + * The following algorithm is used to parse the Xen command line: + * + * - The command line is split into space-separated words. + * - Single and double quotes may be used to suppress the splitting + * behavior of spaces. + * - Double quotes are appended to the current word verbatim if they + * appear within a single-quoted string portion, and vice versa. + * - Backslashes may be used to cause the next character to be + * appended to the current word verbatim. This is only useful when + * used to escape quotes, spaces, and backslashes, but for simplicity + * we allow backslash-escaping anything. + * - After splitting the command line into words, each word is checked to + * see if it contains an equals sign. + * - If it does, it is split on the equals sign into a key-value pair. The + * key is then treated as an variable name, and the value is treated as + * the variable's value. + * - If it does not, the entire word is treated as a variable name. The + * variable's value is implicitly considered to be `1`. + * - All variables detected on the command line are checked to see if their + * names begin with the string `xen_grub_env_`. Variables that do not pass + * this check are discarded, variables that do pass this check are + * exported so they are available to the GRUB configuration. + */ + + current_word_len = PARSER_BASE_WORD_LEN; + current_word = grub_malloc (current_word_len); + if (current_word == NULL) + goto cleanup; + + for (i = 0; i < MAX_GUEST_CMDLINE; i++) + { + if (cmdline[i] == '\0') + { + cmdline_valid = true; + break; + } + } + + if (cmdline_valid == false) + { + grub_error (GRUB_ERR_BAD_ARGUMENT, + "Command line from Xen is not NUL-terminated"); + grub_print_error (); + goto cleanup; + } + + for (i = 0; i < grub_strlen (cmdline); i++) + { + current_char = cmdline[i]; + + /* + * If the previous character was a backslash, append the current + * character to the word verbatim + */ + if (parse_flags & PARSER_HIT_BACKSLASH) + { + parse_flags ^= PARSER_HIT_BACKSLASH; + if (append_char_to_word (false) == false) + goto cleanup; + continue; + } + + switch (current_char) + { + case '\\': + /* Backslashes escape arbitrary characters. */ + parse_flags ^= PARSER_HIT_BACKSLASH; + continue; + + case '\'': + /* + * Single quotes suppress word splitting and double quoting until + * the next single quote is encountered. + */ + if (parse_flags & PARSER_IN_DOUBLE_QUOTES) + { + if (append_char_to_word (false) == false) + goto cleanup; + continue; + } + + parse_flags ^= PARSER_IN_SINGLE_QUOTES; + continue; + + case '"': + /* + * Double quotes suppress word splitting and single quoting until + * the next double quote is encountered. + */ + if (parse_flags & PARSER_IN_SINGLE_QUOTES) + { + if (append_char_to_word (false) == false) + goto cleanup; + continue; + } + + parse_flags ^= PARSER_IN_DOUBLE_QUOTES; + continue; + + case ' ': + /* Spaces separate words in the command line from each other. */ + if (parse_flags & PARSER_IN_SINGLE_QUOTES + || parse_flags & PARSER_IN_DOUBLE_QUOTES) + { + if (append_char_to_word (false) == false) + goto cleanup; + continue; + } + + if (append_word_to_list () == false) + goto cleanup; + continue; + } + + if (append_char_to_word (false) == false) + goto cleanup; + } + + if (append_word_to_list () == false) + goto cleanup; + + param_keys = grub_malloc (word_list_len * sizeof (char *)); + if (param_keys == NULL) + goto cleanup; + param_vals = grub_malloc (word_list_len * sizeof (char *)); + if (param_vals == NULL) + goto cleanup; + + for (i = 0; i < word_list_len; i++) + { + char *current_word_eq_ptr; + + current_word = word_list[i]; + current_word_len = grub_strlen (current_word) + 1; + current_word_eq_ptr = grub_strchr (current_word, '='); + + if (current_word_eq_ptr) + { + grub_size_t eq_idx = (grub_size_t)(current_word_eq_ptr - current_word); + grub_size_t pre_eq_len = current_word_len - (current_word_len - eq_idx); + grub_size_t post_eq_len = current_word_len - (eq_idx); + + if (check_key_is_safe (current_word, pre_eq_len)) + { + param_dict_pos = param_dict_len; + param_dict_len++; + param_keys[param_dict_pos] = grub_malloc (pre_eq_len + 1); + if (param_keys == NULL) + goto cleanup; + param_vals[param_dict_pos] = grub_malloc (post_eq_len + 1); + if (param_vals == NULL) + goto cleanup; + + grub_strncpy (param_keys[param_dict_pos], current_word, + pre_eq_len); + grub_strncpy (param_vals[param_dict_pos], + current_word + pre_eq_len + 1, post_eq_len); + param_keys[param_dict_pos][pre_eq_len] = '\0'; + param_vals[param_dict_pos][post_eq_len] = '\0'; + } + } + else + { + if (check_key_is_safe (current_word, current_word_len - 1)) + { + param_dict_pos = param_dict_len; + param_dict_len++; + param_keys[param_dict_pos] = grub_malloc (current_word_len); + if (param_keys == NULL) + goto cleanup; + param_vals[param_dict_pos] = grub_malloc (2); + if (param_vals == NULL) + goto cleanup; + + grub_strncpy (param_keys[param_dict_pos], current_word, + current_word_len); + grub_strcpy (param_vals[param_dict_pos], "1\0"); + } + } + } + + for (i = 0; i < param_dict_len; i++) + { + /* + * Find keys that start with "xen_grub_env_" and export them + * as environment variables. + */ + if (grub_strlen (param_keys[i]) < (sizeof ("xen_grub_env_") - 1)) + continue; + if (grub_strncmp (param_keys[i], + "xen_grub_env_", + sizeof ("xen_grub_env_") - 1) != 0) + continue; + grub_env_set (param_keys[i], param_vals[i]); + grub_env_export (param_keys[i]); + } + + cleanup: + for (i = 0; i < word_list_len; i++) + grub_free (word_list[i]); + + for (i = 0; i < param_dict_len; i++) + { + grub_free (param_keys[i]); + grub_free (param_vals[i]); + } + + grub_free (param_keys); + grub_free (param_vals); + grub_free (word_list); +} diff --git a/include/grub/xen.h b/include/grub/xen.h index 91cb7cf..7f9efee 100644 --- a/include/grub/xen.h +++ b/include/grub/xen.h @@ -89,6 +89,8 @@ void grub_console_init (void); void grub_xendisk_fini (void); void grub_xendisk_init (void); +void grub_parse_xen_cmdline (void); + #ifdef __x86_64__ typedef grub_uint64_t grub_xen_mfn_t; #else -- 2.49.0 Attachment:
pgpIW37UECTVm.pgp
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |