[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v3] Support ESRT in Xen dom0
On Tue, 20 Sept 2022 at 17:54, Jan Beulich <jbeulich@xxxxxxxx> wrote: > > On 20.09.2022 17:36, Ard Biesheuvel wrote: > > On Mon, 19 Sept 2022 at 21:33, Demi Marie Obenour > > <demi@xxxxxxxxxxxxxxxxxxxxxx> wrote: > >> > >> fwupd requires access to the EFI System Resource Table (ESRT) to > >> discover which firmware can be updated by the OS. Currently, Linux does > >> not expose the ESRT when running as a Xen dom0. Therefore, it is not > >> possible to use fwupd in a Xen dom0, which is a serious problem for e.g. > >> Qubes OS. > >> > >> Before Xen 4.16, this was not fixable due to hypervisor limitations. > >> The UEFI specification requires the ESRT to be in EfiBootServicesData > >> memory, which Xen will use for whatever purposes it likes. Therefore, > >> Linux cannot safely access the ESRT, as Xen may have overwritten it. > >> > >> Starting with Xen 4.17, Xen checks if the ESRT is in EfiBootServicesData > >> or EfiRuntimeServicesData memory. If the ESRT is in EfiBootServicesData > >> memory, Xen allocates some memory of type EfiRuntimeServicesData, copies > >> the ESRT to it, and finally replaces the ESRT pointer with a pointer to > >> the copy. Since Xen will not clobber EfiRuntimeServicesData memory, > >> this ensures that the ESRT can safely be accessed by the OS. It is safe > >> to access the ESRT under Xen if, and only if, it is in memory of type > >> EfiRuntimeServicesData. > >> > > > > Thanks for the elaborate explanation. This is really helpful. > > > > So here, you are explaining that the only way for Xen to prevent > > itself from potentially clobbering the ESRT is by creating a > > completely new allocation? > > There are surely other ways, e.g. preserving BootServices* regions > alongside RuntimeServices* ones. But as the maintainer of the EFI > code in Xen I don't view this as a reasonable approach. > Why not? > > What about other assets that may be passed > > via EFI boot services data regions? > > These would need handling similarly then. > > > So first of all, EfiRuntimeServicesData has a special purpose: it is > > used to carry data that is part of the EFI runtime service > > implementations themselves. Therefore, it has to be mapped into the > > EFI page tables by the OS kernel, and carved out of the linear map (to > > prevent inadvertent access with mismatched attributes). So unless you > > are writing the code that backs GetVariable() or SetVariable(), there > > are never good reasons to use EfiRuntimeServicesData. > > That's a rather strict interpretation of the spec. Even back when > I started dealing with EFI, when it was still quite new, I know > RuntimeServices* was already used for similar purposes. > I'm not saying it is never used inappropriately. But using a memory type that gets mapped into the runtime services page tables every time a runtime service call is made is pointless, fragments both the EFI page tables as well as the kernel direct map for no reason. > > If you want to use a memory type that is suitable for firmware tables > > that are intended for consumption by the OS only (and not by the > > runtime services themselves), you might consider EfiAcpiReclaimMemory. > > Personally I consider this type less appropriate than the one we > currently use. It's intended to be used by ACPI, which doesn't > come into play here. In spite of the name, that is not really true. It is reclaimable memory, which means that the OS can use the memory as conventional memory after consuming its contents, or discarding them. > It comes quite close to using e.g. > EfiUnusableMemory here ... No, that is something completely different. Using unusable memory for anything would be silly. > We might be able to (ab)use > EfiLoaderData for this, but that would again require special > casing (inside Xen) when deciding whether the memory can be used > as general-purpose memory. > EFI loader data and EFI boot services data are the exact same thing from this POV. They have no significance to the runtime firmware, and can be used as ordinary available memory after ExitBootServices(). > > TBH I still don't think this is a scalable approach. There are other > > configuration tables that may be passed in EFI boot services memory, > > and MS especially were pushing back in the UEFI forum on adding table > > types that were passed in anything other the EfiBootServicesData. > > Within Xen we might abstract the approach currently implemented in > case more such pieces of data appear. > > While I can easily believe MS might be advocating for this model, > I view it as problematic not only for Xen. How would you pass on > this information across kexec, for example, without introducing > further producer-consumer dependencies requiring separate protocols > to be followed? > In this case, I don't think this is unreasonable for configuration tables, which only have a GUID and a base address. If the OS knows the GUID, and knows how to interpret the contents, it can decide for itself whether or not to preserve it. If it doesn't know the GUID, the memory is just treated as available memory [after EBS()] I personally think reclaimable memory is more suitable for these cases, which is why I am willing to consider that as well. Note that the EFI spec now also mandates device trees on ARM to be passed via EfiAcpiReclaimMemory, simply because it is the memory type suitable for firmware tables that only the OS consumes.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |