Message: 1
Date: Fri, 30 May 2025 19:54:38 -0500
From: Aaron Rainbolt <arraybo...@gmail.com>
To: grub-devel@gnu.org
Cc: xen-de...@lists.xenproject.org, dki...@net-space.pl,
phco...@gmail.com
Subject: [PATCH v2 1/1] kern/xen: Add Xen command line parsing
Message-ID: <20250530195438.4d243157@kf-m2g5>
Content-Type: text/plain; charset="utf-8"
Xen traditionally allows customizing guest behavior by passing
arguments
to the VM kernel via the kernel command line. This is no longer
possible
when using GRUB with Xen, as the kernel command line is decided by the
GRUB configuration file within the guest, not data passed to the guest
by Xen.
To work around this limitation, enable GRUB to parse a command line
passed to it by Xen, and expose data from the command line to the GRUB
configuration as environment variables. These variables can be used in
the GRUB configuration for any desired purpose, such as extending the
kernel command line passed to the guest. The command line format is
inspired by the Linux kernel's command line format.
To reduce the risk of misuse, abuse, or accidents in production, the
command line will only be parsed if it consists entirely of 7-bit ASCII
characters, only alphabetical characters and underscores are permitted
in variable names, and all variable names must start with the string
"xen_grub_env_". This also allows room for expanding the command line
arguments accepted by GRUB in the future, in case additional APIs using
the Xen kernel command line need to be introduced.
Signed-off-by: Aaron Rainbolt <arraybo...@gmail.com>
---
docs/grub.texi | 50 +++++
grub-core/Makefile.core.def | 2 +
grub-core/kern/i386/xen/pvh.c | 14 ++
grub-core/kern/main.c | 12 ++
grub-core/kern/xen/cmdline.c | 344 ++++++++++++++++++++++++++++++++++
include/grub/xen.h | 2 +
6 files changed, 424 insertions(+)
create mode 100644 grub-core/kern/xen/cmdline.c
diff --git a/docs/grub.texi b/docs/grub.texi
index 34b3484..ce82483 100644
--- a/docs/grub.texi
+++ b/docs/grub.texi
@@ -3271,6 +3271,7 @@ GRUB. Others may be used freely in GRUB
configuration files.
@menu
* Special environment variables::
* Environment block::
+* Passing environment variables through Xen::
@end menu
@@ -3871,6 +3872,55 @@ using BIOS or EFI functions (no ATA, USB or
IEEE1275).
@command{grub-mkconfig} uses this facility to implement
@samp{GRUB_SAVEDEFAULT} (@pxref{Simple configuration}).
+@node Passing environment variables through Xen
+@section Passing environment variables through Xen
+
+If you are using a GRUB image as the kernel for a PV or PVH Xen
virtual
+machine, you can pass environment variables from Xen's dom0 to the VM
through
+the Xen-provided kernel command line. When combined with a properly
configured
+guest, this can be used to customize the guest's behavior on bootup
via the
+VM's Xen configuration file.
+
+GRUB will parse the kernel command line passed to it by Xen during
bootup.
+The command line will be split into space-delimited words. Single and
+double quotes may be used to quote words or portions of words that
contain
+spaces. Arbitrary characters may be backslash-escaped to make them a
literal
+component of a word rather than being parsed as quotes or word
separators. The
+command line must consist entirely of printable 7-bit ASCII characters
and
+spaces. If a non-printing ASCII character is found anywhere in the
command
+line, the entire command line will be ignored by GRUB.
+
+Each word should be a variable assignment in the format ``variable''
or
+``variable=value''. Variable names must contain only the characters
A-Z, a-z,
+and underscore (``_''). Variable names must begin with the string
+``xen_grub_env_''. Variable values can contain arbitrary printable
7-bit
+ASCII characters and space. If any variable contains an illegal name,
that
+variable will be ignored.
+
+If a variable name and value are both specified, the variable will be
set to
+the specified value. If only a variable name is specified, the
variable's
+value will be set to ``1''.
+
+The following is a simple example of how to use this functionality to
append
+arbitrary variables to a guest's kernel command line:
+
+@example
+# In the Xen configuration file for the guest
+name = "linux_vm"
+type = "pvh"
+kernel = "/path/to/grub-i386-xen_pvh.bin"
+extra = "xen_grub_env_kernelappend='loglevel=3'"
+memory = 1024
+disk = [ "file:/srv/vms/linux_vm.img,sda,w" ]
+
+# In the guest's GRUB configuration file
+menuentry "Linux VM with dom0-specified kernel parameters" @{
+ search --set=root --label linux_vm --hint hd0,msdos1
+ linux /boot/vmlinuz root=LABEL=linux_vm
$@{xen_grub_env_kernelappend@}
+ initrd /boot/initrd.img
+@}
+@end example
+
@node Modules
@chapter Modules
diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
index f70e02e..79e681a 100644
--- a/grub-core/Makefile.core.def
+++ b/grub-core/Makefile.core.def
@@ -248,6 +248,7 @@ kernel = {
xen = term/xen/console.c;
xen = disk/xen/xendisk.c;
xen = commands/boot.c;
+ xen = kern/xen/cmdline.c;
i386_xen_pvh = commands/boot.c;
i386_xen_pvh = disk/xen/xendisk.c;
@@ -255,6 +256,7 @@ kernel = {
i386_xen_pvh = kern/i386/xen/tsc.c;
i386_xen_pvh = kern/i386/xen/pvh.c;
i386_xen_pvh = kern/xen/init.c;
+ i386_xen_pvh = kern/xen/cmdline.c;
i386_xen_pvh = term/xen/console.c;
ia64_efi = kern/ia64/efi/startup.S;
diff --git a/grub-core/kern/i386/xen/pvh.c
b/grub-core/kern/i386/xen/pvh.c
index 91fbca8..12df2d8 100644
--- a/grub-core/kern/i386/xen/pvh.c
+++ b/grub-core/kern/i386/xen/pvh.c
@@ -321,6 +321,8 @@ void
grub_xen_setup_pvh (void)
{
grub_addr_t par;
+ const char *xen_cmdline;
Hi Aaron,
Initializing xen_cmdline would be good!
+ int i;
grub_xen_cpuid_base ();
grub_xen_setup_hypercall_page ();
@@ -352,6 +354,18 @@ grub_xen_setup_pvh (void)
grub_xen_mm_init_regions ();
grub_rsdp_addr = pvh_start_info->rsdp_paddr;
+
+ xen_cmdline = (const char *) pvh_start_info->cmdline_paddr;
+ for (i = 0; i < MAX_GUEST_CMDLINE; i++)
+ {
+ if (xen_cmdline[i] == '\0')
+ {
+ grub_strncpy ((char *) grub_xen_start_page_addr->cmd_line,
+ (char *) pvh_start_info->cmdline_paddr,
+ MAX_GUEST_CMDLINE);
Indentation seems off!
grub_strncpy ((char *) grub_xen_start_page_addr->cmd_line,
(char *) pvh_start_info->cmdline_paddr,
MAX_GUEST_CMDLINE);
+ break;
+ }
+ }
}
grub_err_t
diff --git a/grub-core/kern/main.c b/grub-core/kern/main.c
index 143a232..f96b16f 100644
--- a/grub-core/kern/main.c
+++ b/grub-core/kern/main.c
@@ -40,6 +40,10 @@
static bool cli_disabled = false;
static bool cli_need_auth = false;
+#if defined (GRUB_MACHINE_XEN) || defined (GRUB_MACHINE_XEN_PVH)
+#include <grub/xen.h>
+#endif
+
grub_addr_t
grub_modules_get_end (void)
{
@@ -351,6 +355,14 @@ grub_main (void)
grub_env_export ("root");
grub_env_export ("prefix");
+ /*
+ * Parse command line parameters from Xen and export them as
environment
+ * variables
+ */
Suggestion:
/*
* Parse command line parameters from Xen
* and export them as environment variables.
*/
Or
/* Parse command line parameters from Xen and export them as environment
variables. */
+#if defined (GRUB_MACHINE_XEN) || defined (GRUB_MACHINE_XEN_PVH)
+ grub_parse_xen_cmdline ();
+#endif
+
/* Reclaim space used for modules. */
reclaim_module_space ();
diff --git a/grub-core/kern/xen/cmdline.c
b/grub-core/kern/xen/cmdline.c
new file mode 100644
index 0000000..8d3422d
--- /dev/null
+++ b/grub-core/kern/xen/cmdline.c
@@ -0,0 +1,344 @@
+/*
+ * GRUB -- GRand Unified Bootloader
+ * Copyright (C) 2025 Free Software Foundation, Inc.
+ *
+ * GRUB is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published
by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GRUB is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include <grub/env.h>
+#include <grub/misc.h>
+#include <grub/mm.h>
+#include <grub/xen.h>
+
+enum parse_flags
+{
+ PARSER_HIT_BACKSLASH = 0x1,
+ PARSER_IN_SINGLE_QUOTES = 0x2,
+ PARSER_IN_DOUBLE_QUOTES = 0x4,
+};
+
+#define PARSER_BASE_WORD_LEN 16
+
+static grub_size_t word_list_len;
+static char **word_list;
Initializing word_list would be good!
+static grub_size_t current_word_len;
+static grub_size_t current_word_pos;
+static char *current_word;
Initializing current_word would be good!
+static char current_char;
+
+static bool
+append_char_to_word (bool allow_null)
+{
+ /*
+ * Fail if the current char is outside of the range 0x20 to 0x7E. If
+ * allow_null is true, make an exception for 0x00. This is a
safeguard
+ * against likely-invalid data.
+ */
+ if ( (!(current_char >= 0x20) || !(current_char <= 0x7E) )
+ && (current_char != '\0' || allow_null == false))
+ return false;
+
+ if (current_word_pos == current_word_len)
+ {
+ current_word_len *= 2;
+ current_word = grub_realloc (current_word, current_word_len);
+ if (current_word == NULL)
+ {
+ current_word_len /= 2;
+ return false;
+ }
+ }
+
+ current_word[current_word_pos] = current_char;
+ current_word_pos++;
+ return true;
+}
+
+static bool
+append_word_to_list (void)
+{
+ /* No-op on empty words. */
+ if (current_word_pos == 0)
+ return true;
+
+ current_char = '\0';
+ if (append_char_to_word (true) == false)
+ {
+ grub_error (GRUB_ERR_BUG,
+ "couldn't append null terminator to word during Xen cmdline
parsing");
Indention seems off!
Suggestion:
grub_error (GRUB_ERR_BUG, "couldn't append null terminator
to word during Xen cmdline parsing");
+ grub_print_error ();
+ grub_exit ();
+ }
+
+ current_word_len = grub_strlen (current_word) + 1;
+ current_word = grub_realloc (current_word, current_word_len);
+ if (current_word == NULL)
+ return false;
Adding a line after "if statement" would be good. Please consider this
suggestion in other parts of the code!
+ word_list_len++;
+ word_list = grub_realloc (word_list, word_list_len * sizeof (char
*));
+ if (word_list == NULL)
+ return false;
Same as above.
+ word_list[word_list_len - 1] = current_word;
+
+ current_word_len = PARSER_BASE_WORD_LEN;
+ current_word_pos = 0;
+ current_word = grub_malloc (current_word_len);
+ if (current_word == NULL)
+ return false;
+
+ return true;
+}
+
+static bool
+check_key_is_safe (char *key, grub_size_t len)
+{
+ grub_size_t i;
+
+ for (i = 0; i < len; i++)
+ {
+ /*
+ * Ensure only a-z, A-Z, and _ are allowed.
+ */
/* Ensure only a-z, A-Z, and _ are allowed. */
+ if (! ( (key[i] >= 'A' && key[i] <= 'Z')
+ || (key[i] >= 'a' && key[i] <= 'z')
+ || (key[i] == '_') ) )
if (! ( (key[i] >= 'A' && key[i] <= 'Z')
|| (key[i] >= 'a' && key[i] <= 'z')
|| (key[i] == '_') ) )
+ return false;
+ }
+ return true;
+}
+
+void
+grub_parse_xen_cmdline (void)
+{
+ const char *cmdline = (const char *)
grub_xen_start_page_addr->cmd_line;
+ bool cmdline_valid = false;
+ char **param_keys = NULL;
+ char **param_vals = NULL;
+ grub_size_t param_dict_len = 0;
+ grub_size_t param_dict_pos = 0;
+ enum parse_flags parse_flags = 0;
+ grub_size_t i = 0;
+
+ /*
+ * The following algorithm is used to parse the Xen command line:
+ *
+ * - The command line is split into space-separated words.
+ * - Single and double quotes may be used to suppress the
splitting
+ * behavior of spaces.
+ * - Double quotes are appended to the current word verbatim if
they
+ * appear within a single-quoted string portion, and vice versa.
+ * - Backslashes may be used to cause the next character to be
+ * appended to the current word verbatim. This is only useful
when
+ * used to escape quotes, spaces, and backslashes, but for
simplicity
+ * we allow backslash-escaping anything.
+ * - After splitting the command line into words, each word is
checked to
+ * see if it contains an equals sign.
+ * - If it does, it is split on the equals sign into a key-value
pair. The
+ * key is then treated as an variable name, and the value is
treated as
+ * the variable's value.
+ * - If it does not, the entire word is treated as a variable
name. The
+ * variable's value is implicitly considered to be `1`.
+ * - All variables detected on the command line are checked to see
if their
+ * names begin with the string `xen_grub_env_`. Variables that do
not pass
+ * this check are discarded, variables that do pass this check are
+ * exported so they are available to the GRUB configuration.
+ */
+
+ current_word_len = PARSER_BASE_WORD_LEN;
+ current_word = grub_malloc (current_word_len);
+ if (current_word == NULL)
+ goto cleanup;
+
+ for (i = 0; i < MAX_GUEST_CMDLINE; i++)
+ {
+ if (cmdline[i] == '\0')
+ {
+ cmdline_valid = true;
+ break;
+ }
+ }
+
+ if (cmdline_valid == false)
+ {
+ grub_error (GRUB_ERR_BAD_ARGUMENT,
+ "Command line from Xen is not NUL-terminated");
Indention seems off!
grub_error (GRUB_ERR_BAD_ARGUMENT,
"Command line from Xen is not NUL-terminated");
+ grub_print_error ();
+ goto cleanup;
+ }
+
+ for (i = 0; i < grub_strlen (cmdline); i++)
+ {
+ current_char = cmdline[i];
+
+ /*
+ * If the previous character was a backslash, append the current
+ * character to the word verbatim
+ */
+ if (parse_flags & PARSER_HIT_BACKSLASH)
+ {
+ parse_flags ^= PARSER_HIT_BACKSLASH;
+ if (append_char_to_word (false) == false)
+ goto cleanup;
+ continue;
+ }
+
+ switch (current_char)
+ {
+ case '\\':
+ /* Backslashes escape arbitrary characters. */
+ parse_flags ^= PARSER_HIT_BACKSLASH;
+ continue;
+
+ case '\'':
+ /*
+ * Single quotes suppress word splitting and double quoting
until
+ * the next single quote is encountered.
+ */
+ if (parse_flags & PARSER_IN_DOUBLE_QUOTES)
+ {
+ if (append_char_to_word (false) == false)
+ goto cleanup;
+ continue;
+ }
+
+ parse_flags ^= PARSER_IN_SINGLE_QUOTES;
+ continue;
+
+ case '"':
+ /*
+ * Double quotes suppress word splitting and single quoting
until
+ * the next double quote is encountered.
+ */
+ if (parse_flags & PARSER_IN_SINGLE_QUOTES)
+ {
+ if (append_char_to_word (false) == false)
+ goto cleanup;
+ continue;
+ }
+
+ parse_flags ^= PARSER_IN_DOUBLE_QUOTES;
+ continue;
+
+ case ' ':
+ /* Spaces separate words in the command line from each
other. */
+ if (parse_flags & PARSER_IN_SINGLE_QUOTES
+ || parse_flags & PARSER_IN_DOUBLE_QUOTES)
+ {
+ if (append_char_to_word (false) == false)
+ goto cleanup;
+ continue;
+ }
+
+ if (append_word_to_list () == false)
+ goto cleanup;
+ continue;
+ }
+
+ if (append_char_to_word (false) == false)
+ goto cleanup;
+ }
+
+ if (append_word_to_list () == false)
+ goto cleanup;
+
+ param_keys = grub_malloc (word_list_len * sizeof (char *));
+ if (param_keys == NULL)
+ goto cleanup;
+ param_vals = grub_malloc (word_list_len * sizeof (char *));
+ if (param_vals == NULL)
+ goto cleanup;
+
+ for (i = 0; i < word_list_len; i++)
+ {
+ char *current_word_eq_ptr;
+
+ current_word = word_list[i];
+ current_word_len = grub_strlen (current_word) + 1;
+ current_word_eq_ptr = grub_strchr (current_word, '=');
+
+ if (current_word_eq_ptr)
+ {
+ grub_size_t eq_idx = (grub_size_t)(current_word_eq_ptr -
current_word);
+ grub_size_t pre_eq_len = current_word_len -
(current_word_len - eq_idx);
+ grub_size_t post_eq_len = current_word_len - (eq_idx);
+
+ if (check_key_is_safe (current_word, pre_eq_len))
+ {
+ param_dict_pos = param_dict_len;
+ param_dict_len++;
+ param_keys[param_dict_pos] = grub_malloc (pre_eq_len +
1);
+ if (param_keys == NULL)
+ goto cleanup;
+ param_vals[param_dict_pos] = grub_malloc (post_eq_len +
1);
+ if (param_vals == NULL)
+ goto cleanup;
+
+ grub_strncpy (param_keys[param_dict_pos], current_word,
+ pre_eq_len);
grub_strncpy (param_keys[param_dict_pos], current_word,
pre_eq_len);
+ grub_strncpy (param_vals[param_dict_pos],
+ current_word + pre_eq_len + 1, post_eq_len);
Same as above!
+ param_keys[param_dict_pos][pre_eq_len] = '\0';
+ param_vals[param_dict_pos][post_eq_len] = '\0';
+ }
+ }
+ else
+ {
+ if (check_key_is_safe (current_word, current_word_len - 1))
+ {
+ param_dict_pos = param_dict_len;
+ param_dict_len++;
+ param_keys[param_dict_pos] = grub_malloc
(current_word_len);
+ if (param_keys == NULL)
+ goto cleanup;
+ param_vals[param_dict_pos] = grub_malloc (2);
+ if (param_vals == NULL)
+ goto cleanup;
+
+ grub_strncpy (param_keys[param_dict_pos], current_word,
+ current_word_len);
grub_strncpy (param_keys[param_dict_pos], current_word,
current_word_len);
+ grub_strcpy (param_vals[param_dict_pos], "1\0");
+ }
+ }
+ }
+
+ for (i = 0; i < param_dict_len; i++)
+ {
+ /*
+ * Find keys that start with "xen_grub_env_" and export them
+ * as environment variables.
+ */
+ if (grub_strlen (param_keys[i]) < (sizeof ("xen_grub_env_") -
1))
+ continue;
+ if (grub_strncmp (param_keys[i],
+ "xen_grub_env_",
+ sizeof ("xen_grub_env_") - 1) != 0)
if (grub_strncmp (param_keys[I],
"xen_grub_env_",
sizeof ("xen_grub_env_") - 1) != 0)
+ continue;
+ grub_env_set (param_keys[i], param_vals[i]);
+ grub_env_export (param_keys[i]);
+ }
+
+ cleanup:
+ for (i = 0; i < word_list_len; i++)
+ grub_free (word_list[i]);
+
+ for (i = 0; i < param_dict_len; i++)
+ {
+ grub_free (param_keys[i]);
+ grub_free (param_vals[i]);
+ }
+
+ grub_free (param_keys);
+ grub_free (param_vals);
+ grub_free (word_list);
is not freeing "current_word" intentional? or missed!
Thank you!
Regards,
Avnish Chouhan
+}
diff --git a/include/grub/xen.h b/include/grub/xen.h
index 91cb7cf..7f9efee 100644
--- a/include/grub/xen.h
+++ b/include/grub/xen.h
@@ -89,6 +89,8 @@ void grub_console_init (void);
void grub_xendisk_fini (void);
void grub_xendisk_init (void);
+void grub_parse_xen_cmdline (void);
+
#ifdef __x86_64__
typedef grub_uint64_t grub_xen_mfn_t;
#else
--
2.49.0
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel