[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[XEN v2] xen/arm: Probe the entry point address of an uImage correctly


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
  • Date: Thu, 15 Dec 2022 12:38:26 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cMKgISDRc9J9yaWWalrknuiSdDKhceDtSJerFxaajQo=; b=GOCiOaXGAJ/E9RPW5EVyN8QBr9ufoCLS3xyvrd+h6imJZIg/zzzt1KvdWBSBhM6ro+rkNzhBT4en5WfiiSevJg/UgEPay5Whcxke/SZhns/B+sqftcBZDS8jRsr69TmJJewJet3ulbBnww5LRZVxEu84lbLWCIyAkFdjPTOWeUMtE/b5Aj+xn4WmSsYjv9YZR/u+EYk+a0djnhuX1GpHGR/J2o3iJVislsbpCwycbH6tLaqv6aHndoHD/+WxEMyhcKpovYv3OMbN0JFP3uzqvDNfvpJSjaECaW8ainTKN/y/oDfLWMmsTrsNl7YPfDkmFg4GVwroZCT2ny1JlSi8XA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FefE7iR77SuSCleiPvRdQxvR9je6Y96y3CqEkQ3pG6dDIFV5rncHAxhw7Vez1J0EXo70PKbJ4QA35OGPGcYfLB8KoMpi2yO8+flW/v5Id4tJdhapU3LyBfo51NlzjIgOFOupHoYSjYY275cmXxKka4P0vAQ76vPVPfEGiLqt7UIv8mXrZrWdG8BIeI6epDQ/qA4y9vxdoVCJnMJXoQ3Sx2PmStPq7EwNVFg4/xsgmgOmT2JflS6Hg4mLLRNbqX2MD0d2wE9rQ7ecmixbQm1Q7IkAbepST0xpo9Q/UwETrO4ogPmlTTwUXO8PpBScOMCHKZ0b4h16h7hH9xW8/C2VfQ==
  • Cc: <sstabellini@xxxxxxxxxx>, <stefano.stabellini@xxxxxxx>, <julien@xxxxxxx>, <Volodymyr_Babchuk@xxxxxxxx>, <bertrand.marquis@xxxxxxx>, <michal.orzel@xxxxxxx>, Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
  • Delivery-date: Thu, 15 Dec 2022 12:38:57 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Currently, kernel_uimage_probe() does not set info->zimage.start. As a
result, it contains the default value (ie 0). This causes,
kernel_zimage_place() to treat the binary (contained within uImage) as
position independent executable. Thus, it loads it at an incorrect address.

The correct approach would be to read "uimage.ep" and set
info->zimage.start. This will ensure that the binary is loaded at the
correct address. Also, it checks that the load address and entry address
are the same. The reason being we currently support non compressed images
for uImage header. And as seen in uboot sources(image_decomp(), case
IH_COMP_NONE), load address and entry address can be the same.

This behavior is applicable for both arm and arm64 platforms.

Earlier for arm32 and arm64 platforms, Xen was ignoring the entry point
address set in the uImage header. With this commit, Xen will use the
kernel entry point address as specified in the header. This makes the
behavior of Xen consistent with uboot for uimage headers.

A deviation from uboot behaviour is that we consider load address == 0x0,
to denote that the image supports position independent execution. This
is to make the behavior consistent across uImage and zImage.

Signed-off-by: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
---

Changes from v1:-
1. Added a check to ensure load address and entry address are the same.
2. Considered load address == 0x0 as position independent execution.
3. Ensured that the uImage header interpretation is consistent across
arm32 and arm64.

Some unanswered queries from v1 :-

Q1. "In non-statically allocated setup, a user doesn't know where the memory
for dom0/domU will be allocated.So I think this was correct to ignore the
address."
A. I am not sure the best way to handle this. Can we make the uImage probe
dependent on STATIC_MEMORY ? Currently, I have mentioned that user should
use load address = 0x0 if they want Xen to ignore it.

Q2. Zephyr or any other RTOS have different requirements, then we may need
to modify Xen and document it.
A. I will take it in a separate email/patch where we can list the
requirements for booting Zephyr.

 docs/misc/arm/booting.txt         | 11 ++++++++++-
 xen/arch/arm/include/asm/kernel.h |  2 +-
 xen/arch/arm/kernel.c             | 26 +++++++++++++++++++++++++-
 3 files changed, 36 insertions(+), 3 deletions(-)

diff --git a/docs/misc/arm/booting.txt b/docs/misc/arm/booting.txt
index 3e0c03e065..872262686a 100644
--- a/docs/misc/arm/booting.txt
+++ b/docs/misc/arm/booting.txt
@@ -4,7 +4,13 @@ Booting Xen
 Xen follows the zImage protocol defined for 32-bit ARM Linux[1] and the
 Image protocol defined for ARM64 Linux[2].
 
-In both cases the recommendation to boot in HYP/EL2 mode is a strict
+Xen also supports the legacy image protocol[3] for 32-bit ARM and ARM64.
+For now, it supports images where load address is same as entry address.
+A deviation from uboot is that, Xen treats "load address == 0x0" as
+position independent execution. Thus, Xen will load such an image at an
+address it considers appropriate.
+
+In all cases the recommendation to boot in HYP/EL2 mode is a strict
 requirement for Xen.
 
 The exceptions to this on 32-bit ARM are as follows:
@@ -39,3 +45,6 @@ Latest version: 
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/t
 
 [2] linux/Documentation/arm64/booting.rst
 Latest version: 
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/arm64/booting.rst
+
+[3] legacy format header
+Latest version: 
https://source.denx.de/u-boot/u-boot/-/blob/master/include/image.h#L315
diff --git a/xen/arch/arm/include/asm/kernel.h 
b/xen/arch/arm/include/asm/kernel.h
index 5bb30c3f2f..ee69a47052 100644
--- a/xen/arch/arm/include/asm/kernel.h
+++ b/xen/arch/arm/include/asm/kernel.h
@@ -72,7 +72,7 @@ struct kernel_info {
 #ifdef CONFIG_ARM_64
             paddr_t text_offset; /* 64-bit Image only */
 #endif
-            paddr_t start; /* 32-bit zImage only */
+            paddr_t start;
         } zimage;
     };
 };
diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/kernel.c
index 23b840ea9e..81ac945f5b 100644
--- a/xen/arch/arm/kernel.c
+++ b/xen/arch/arm/kernel.c
@@ -127,7 +127,7 @@ static paddr_t __init kernel_zimage_place(struct 
kernel_info *info)
     paddr_t load_addr;
 
 #ifdef CONFIG_ARM_64
-    if ( info->type == DOMAIN_64BIT )
+    if ( (info->type == DOMAIN_64BIT) && (info->zimage.start == 0) )
         return info->mem.bank[0].start + info->zimage.text_offset;
 #endif
 
@@ -223,6 +223,30 @@ static int __init kernel_uimage_probe(struct kernel_info 
*info,
     if ( len > size - sizeof(uimage) )
         return -EINVAL;
 
+    info->zimage.start = be32_to_cpu(uimage.ep);
+
+    /*
+     * Currently, we support uImage headers for uncompressed images only.
+     * Thus, it is valid for the load address and start address to be the
+     * same. This is consistent with the uboot behavior (Refer
+     * "case IH_COMP_NONE" in image_decomp()).
+     */
+    if ( info->zimage.start != be32_to_cpu(uimage.load) )
+    {
+        panic("Unable to support mismatching load address and entry 
address\n");
+        return -EINVAL;
+    }
+
+    /*
+     * While uboot considers 0x0 to be a valid load/start address, for Xen
+     * to mantain parity with zimage, we consider 0x0 to denote position
+     * independent image. That means Xen is free to load such an image at
+     * any valid address.
+     * Thus, we will print an appropriate warning.
+     */
+    if ( info->zimage.start == 0 )
+        printk(XENLOG_WARNING "No valid load address provided\n");
+
     info->zimage.kernel_addr = addr + sizeof(uimage);
     info->zimage.len = len;
 
-- 
2.17.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.